Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
The MAC sub-layer has the following functions:
This Document Applies to these Products Page 2
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
The MAC sub-layer supports two types of frame: IEEE 802.3 frames and Ethernet_II frames. In an Ethernet_II frame, the Type field identifies the upper layer protocol. Therefore, only the MAC sub-layer is required on a device, and the LLC sub-layer does not need to be realized. In an IEEE 802.3 frame, the LLC sub-layer defines useful features in addition to traditional services of the data link layer. All these features are provided by the sub-fields of DSAP, SSAP, and Control. The following lists three types of point-to-point services:
The following is an example that describes the applications of SSAP and DSAP. Assume that terminals A and B use connection-oriented services. Data is transmitted in the following process:
This Document Applies to these Products Page 3
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
In early stage of network deployment, most local area networks (LANs) were established using Layer 2 switches, and routers completed communication between LANs. At that time, intra-LAN traffic accounted for most of network traffic and little traffic was transmitted between LANs. A few routers were enough to handle traffic transmission between LANs. As data communication networks expand and more services emerge on the networks, increasing traffic needs to be transmitted between networks. Routers cannot adapt to this development trend because of their high costs, low forwarding performance, and small port quantities. New devices capable of high-speed Layer 3 forwarding are required. Layer 3 switches are such devices. Routers use CPUs to complete Layer 3 forwarding, whereas Layer 3 switches use hardware to complete Layer 3 forwarding. Hardware forwarding has a much higher performance than software forwarding (CPU based forwarding). Switches cannot replace routers in all scenarios because routers provide rich interface types, good service class control, and powerful routing capabilities that Layer 3 switches cannot provide. Layer 3 switches divide a Layer 2 network into multiple VLANs. They implement Layer 2 switching within the VLANs and Layer 3 IP connectivity between VLANs. Two hosts on different networks communicate with each other through the following process:
The following is the detailed Layer 3 switching process. As shown in Figure 1-7, the source and destination hosts connect to the same Layer 3 switch but belong to different VLANs (network segments). Both the two hosts are located on the directly connected network segments of the Layer 3 switch, so the routes to the IP addresses of the hosts are direct routes. Figure 1-7 Layer 3 forwarding Figure 1-7 shows the MAC addresses, IP addresses, and gateway addresses of the hosts, MAC address of the Layer 3 switch, and IP addresses of Layer 3 interfaces configured in VLANs on the Layer 3 switch. The process of a ping from PC A to PC B is as follows (the Layer 3 switch has not created any MAC address entry):
This Document Applies to these Products Page 4
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
This chapter describes how to configure Ethernet switching.
This Document Applies to these Products Page 5
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
In Figure 3-1, DeviceA and DeviceB are connected through three Ethernet physical links. These links bundle into a logical link, and their bandwidths are combined to form the total bandwidth of the logical link. The three physical Ethernet links provide backup for each other, improving reliability.
Both devices connected by the Eth-Trunk must use the same number of physical interfaces, interface rate, jumbo, and flow control mode. Figure 3-1 Eth-Trunk networking The link aggregation interface can be used as a common Ethernet interface to implement routing protocols and other services. Unlike a common Ethernet interface, the link aggregation interface needs to select one or more member interfaces to forward traffic. Link aggregation concepts are described as follows:
This Document Applies to these Products Page 6
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
A conventional Ethernet frame is encapsulated with the Length/Type field for an upper-layer protocol following the Destination address and Source address fields, as shown in Figure 5-2. Figure 5-2 Conventional Ethernet frame format IEEE 802.1Q is an Ethernet networking standard for a specified Ethernet frame format. It adds a 4-byte field between the Source address and the Length/Type fields of the original frame, as shown in Figure 5-3. Figure 5-3 802.1Q frame format Table 5-1 describes the fields contained in a 802.1Q tag. Table 5-1 Fields contained in an 802.1Q tag
Each frame sent by a 802.1Q-capable switch carries a VLAN ID. The following are the two types of Ethernet frames in a VLAN:
As shown in Figure 5-4, there are the following types of VLAN links:
Figure 5-4 Link types
Generally, only tagged frames are transmitted on trunk links; only untagged frames are transmitted on access links. In this manner, switching devices on the network can properly process VLAN information and hosts are not concerned about VLAN information. After the 802.1Q defines VLAN frames, ports can be classified into four types:
Figure 5-6 Format of a QinQ frame For details on the QinQ protocol, see QinQ. The default VLAN ID of an interface is called the port default VLAN ID (PVID). The meaning of the default VLAN varies according to the port type. For details on different PVIDs and methods of processing Ethernet frames, see Frame processing based on the port type. VLAN assignment is a basic VLAN configuration. Users in the same VLAN can communicate with each other. Table 5-2 shows the VLAN assignment methods and their usage scenarios. Table 5-2 Differences between VLAN assignment modes
The switch supports multiple VLAN assignment modes, the priority is of MAC address-based VLAN assignment or IP subnet-based VLAN assignment, protocol-based VLAN assignment, interface-based VLAN assignment in a descending order.
This Document Applies to these Products Page 7
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
MAC address flapping occurs when a MAC address is learned by two interfaces in the same VLAN and the MAC address entry learned later overrides the earlier one. Figure 2-4 shows how MAC address flapping occurs. In the MAC address entry with MAC address 0011-0022-0034 and VLAN 2, the outbound interface is changed from 10GE1/0/1 to 10GE1/0/2. MAC address flapping can cause an increase in the CPU usage on the device. MAC address flapping does not occur frequently on a network unless a network loop occurs. If MAC address flapping frequently occurs on your network, you can quickly locate the fault and eliminate the loops according to alarms and MAC address flapping records. Figure 2-4 MAC address flapping MAC address flapping detection determines whether MAC address flapping occurs by checking whether outbound interfaces in MAC address entries change frequently. After MAC address flapping detection is enabled, the device can report an alarm when MAC address flapping occurs. The alarm contains the flapping MAC address, VLAN ID, and outbound interfaces between which the MAC address flaps. A loop may exist between the outbound interfaces. You can locate the cause of the loop based on the alarm. Alternatively, the device can perform the action specified in the configuration of MAC address flapping detection to remove the loop automatically. The action can be quit-vlan (remove the interface from the VLAN) or error-down (shut down the interface). Figure 2-5 Networking of MAC address flapping detection As shown in Figure 2-5, a network cable is correctly connected between SwitchC to SwitchD, causing a loop between SwitchB, SwitchC, and SwitchD. When Port1 of SwitchA receives a broadcast packet, SwitchA forwards the packet to SwitchB. The packet is then sent to Port2 of SwitchA. After MAC address flapping detection is configured on SwitchA, SwitchA can detect that the source MAC address of the packet flaps from Port1 to Port2. If the MAC address flaps between Port1 and Port2 frequently, SwitchA reports an alarm about MAC address flapping to alert the network administrator.
MAC address flapping detection allows a device to detect changes in traffic transmission paths based on learned MAC addresses, but the device cannot obtain the entire network topology. It is recommended that this function be used on the interface connected to a user network where loops may occur. MAC address flapping occurs on a network when the network has a loop or undergoes an attack. During network planning, you can use the following methods to prevent MAC address flapping:
Figure 2-6 Networking of MAC address flapping prevention
This Document Applies to these Products Page 8
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
VLAN is widely applied to switching networks because of its flexible control of broadcast domains and convenient deployment. On a Layer-3 switch, the interconnection between the broadcast domains is implemented using one VLAN to correspond to one Layer 3 logic interface. However, this can waste IP addresses. Figure 5-10 shows the VLAN division in the device. Figure 5-10 Networking of a common VLAN Table 5-4 Example of assigning server addresses on a common VLAN
As shown in Table 5-4, VLAN 2 requires 10 server addresses. The subnet 10.1.1.0/28 with the mask length as 28 bits is assigned for VLAN 2. 10.1.1.0 is the address of the subnet, and 10.1.1.15 is the directed broadcast address. These two addresses cannot serve as the host address. In addition, as the default address of the network gateway of the subnet, 10.1.1.1 cannot be used as the host address. The other 13 addresses ranging from 10.1.1.2 to 10.1.1.14 can be used by the servers. In this way, although VLAN 2 needs only 10 addresses, 13 addresses need to be assigned for it according to the division of the subnet. VLAN 3 requires five server addresses. The subnet 10.1.1.16/29 with the mask length as 29 bits needs to be assigned for VLAN 3. VLAN 4 requires only one address. The subnet 10.1.1.24/30 with the mask length as 30 bits needs to be assigned for VLAN 4. In above, 16 (10+5+1) addresses are needed for all the preceding VLANs. However, 28 (16+8+4) addresses are needed according to the common VLAN addressing mode even if the optimal scheme is used. Nearly half of the addresses is wasted. In addition, if VLAN 2 is accessed to three servers instead of 10 servers later, the extra addresses will not be used by other VLANs and will be wasted. This division is inconvenient for the later network upgrade and expansion. Assume that two more servers need to be added to VLAN 4 and VLAN 4 does not want to change the assigned IP addresses, and the addresses after 10.1.1.24 has been assigned to others, a new subnet with the mask length as 29 bits and a new VLAN need to be assigned for the new customers of VLAN 4. Therefore, the customers of VLAN 4 have only three servers, but the customers are assigned to two subnets and are not in the same VLAN. As a result, this is inconvenient for network management. In above, many IP addresses are used as the addresses of subnets, directional broadcast addresses of subnets, and default addresses of network gateways of subnets. These IP addresses cannot be used as the server addresses in the VLAN. The limit on address assignation reduces the addressing flexibility, so that many idle addresses are wasted. To solve this problem, VLAN aggregation is used. The VLAN aggregation technology, also known as the super-VLAN, provides a mechanism that partitions the broadcast domain using multiple VLANs in a physical network so that different VLANs can belong to the same subnet. In VLAN aggregation, two concepts are involved, namely, super-VLAN and sub-VLAN.
A super-VLAN can contain one or more sub-VLANs retaining different broadcast domains. The sub-VLAN does not occupy an independent subnet segment. In the same super-VLAN, IP addresses of servers belong to the subnet segment of the super-VLAN, regardless of the mapping between servers and sub-VLANs. The same Layer 3 interface is shared by sub-VLANs. Some subnet IDs, default gateway addresses of the subnets, and directed broadcast addresses of the subnets are saved and different broadcast domains can use the addresses in the same subnet segment. As a result, subnet differences are eliminated, addressing becomes flexible and idle addresses are reduced. Table 5-4 is used to explain the implementation. Suppose that user demands are unchanged. In VLAN 2, 10 server addresses are demanded; in VLAN 3, five server addresses are demanded; in VLAN 4, one server address is demanded. According to the implementation of VLAN aggregation, create VLAN 10 and configure VLAN 10 as a super-VLAN. Then assign a subnet address 10.1.1.0/24 with the mask length being 24 to VLAN 10; 10.1.1.0 is the subnet ID and 10.1.1.1 is the gateway address of the subnet, as shown in Figure 5-11. Address assignments of sub-VLANs (VLAN 2, VLAN 3, and VLAN 4) are shown in Table 5-5. Figure 5-11 Networking of VLAN aggregation Table 5-5 Example for assigning Server addresses in VLAN aggregation mode
In VLAN aggregation implementation, sub-VLANs are not divided according to the previous subnet border. Instead, their addresses are flexibly assigned in the subnet corresponding to the super-VLAN according to the required server number. As the Table 5-5 shows that VLAN 2, VLAN 3, and VLAN 4 share a subnet (10.1.1.0/24), a default gateway address of the subnet (10.1.1.1), and a directed broadcast address of the subnet (10.1.1.255). In this manner, the subnet ID (10.1.1.16, 10.1.1.24), the default gateway of the subnet (10.1.1.17, 10.1.1.25), and the directed broadcast address of the subnet (10.1.1.15, 10.1.1.23, and 10.1.1.27) can be used as IP addresses of servers. Totally, 16 addresses (10 + 5 + 1 = 16) are required for the three VLANs. In practice, in this subnet, a total of 16 addresses are assigned to the three VLANs (10.1.1.2 to 10.1.1.17). A total of 19 IP addresses are used, that is, the 16 server addresses together with the subnet ID (10.1.1.0), the default gateway of the subnet (10.1.1.1), and the directed broadcast address of the subnet (10.1.1.255). In the network segment, 236 addresses (255 - 19 = 236) are available, which can be used by any server in the sub-VLAN.
Page 9
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Figure 5-21 Networking diagram of VLAN aggregation application As shown in Figure 5-21, four VLANs, namely, VLAN 21, VLAN 22, VLAN 31, and VLAN 32, are configured. If these VLANs need to communicate with each other, you should configure an IP address for each VLAN on the Switch. Alternatively, you can enable VLAN aggregation to aggregate VLAN 21 and VLAN 22 into super VLAN 2, and VLAN 31 and VLAN 32 into super VLAN 3. Therefore, you can save IP addresses by only assigning IP addresses to the super VLANs. After Proxy ARP is configured on Switch, the sub-VLANs in each super VLAN can communicate with each other.
This Document Applies to these Products Page 10
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
To use a network management system to manage multiple devices, create a VLANIF interface on each device and configure a management IP address for the VLANIF interface. You can then log in to a device and manage it using its management IP address. If a user-side interface is added to the VLAN, users connected to the interface can also log in to the device. This brings security risks to the device. After a VLAN is configured as a management VLAN (mVLAN), no access interface or dot1q-tunnel interface can be added to the VLAN. An access interface or a dot1q-tunnel interface is connected to users. The mVLAN forbids users connected to access and dot1q-tunnel interfaces to log in to the device, improving device performance.
This Document Applies to these Products Page 11
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
VLAN mapping technology changes VLAN tags in packets to implement the mapping between different VLANs. In some scenarios, two Layer 2 user networks in the same VLAN are connected through the backbone network. To implement Layer 2 connectivity between users and deploy Layer 2 protocols such as MSTP uniformly, the two user networks need to seamlessly interwork with each other. In this case, the backbone network needs to transmit VLAN packets from the user networks. Generally, VLAN plan on the backbone network and user network is different, so the backbone network cannot directly transmit VLAN packets from a user network. One method is to configure a Layer 2 tunneling technology such as QinQ or VPLS to encapsulate VLAN packets into packets on the backbone network so that VLAN packets are transparently transmitted. However, this method increases extra cost because packets are encapsulated. In addition, Layer 2 tunneling technology may not support transparent transmission of packets of some protocol packets. The other method is to configure VLAN mapping. When VLAN packets from a user network enter the backbone network, an edge device on the backbone network changes the C-VLAN ID to the S-VLAN ID. After the packets are transmitted to the other side, the edge device changes the S-VLAN ID to the C-VLAN ID. This method implements seamless interworking between two user networks. VLAN IDs in two directly connected Layer 2 networks are different because of different plans. The user needs to manage the two networks as a single Layer 2 network. For example, Layer 2 connectivity and Layer 2 protocols need to be deployed uniformly. VLAN mapping can be configured on the switch connecting the two user networks to map VLAN IDs on the two user networks. This implements Layer 2 connectivity and uniform management.
This Document Applies to these Products Page 12
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
The Generic Attribute Registration Protocol (GARP) provides an attribute propagation mechanism. The GARP VLAN Registration Protocol (GVRP) is a GARP application used to register and deregister VLAN attribute. GARP identifies applications based on destination MAC addresses. IEEE Std 802.1Q assigns 01-80-C2-00-00-21 to GVRP. To create or delete VLANs on all devices on a network, a network administrator must manually create or delete the VLANs on each device. When a network is too complex for a network administrator to know the network topology in a short time or when many VLANs are configured on the network, the manual configuration workload is enormous and configuration errors will occur. GVRP can be configured on the network to implement automatic VLAN registration and deregistration in this case. Through GVRP, VLAN attributes of one device can be propagated throughout the entire switching network. GVRP enables network devices to dynamically deliver, register, and propagate VLAN attributes, reducing workload of the network administrator and ensuring correct configuration.
This Document Applies to these Products Page 13
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Generally, redundant links are used on an Ethernet switching network to provide link backup and enhance network reliability. The use of redundant links, however, may produce loops, causing broadcast storms and rendering the MAC address table unstable. As a result, the communication quality deteriorates, and the communication service may even be interrupted. The Spanning Tree Protocol (STP) is introduced to solve this problem. STP refers to STP defined in IEEE 802.1D, the Rapid Spanning Tree Protocol (RSTP) defined in IEEE 802.1w, and the Multiple Spanning Tree Protocol (MSTP) defined in IEEE 802.1s. MSTP is compatible with RSTP and STP, and RSTP is compatible with STP. STP, RSTP, and MSTP all prevent broadcast storms and achieve redundancy. Table 10-1 compares STP, RSTP, and MSTP. Table 10-1 Comparison between STP, RSTP, and MSTP
After a spanning tree protocol is configured on an Ethernet switching network, it calculates the network topology and implements the following functions to remove network loops:
In addition to the above functions, MSTP also ensures faster convergence than STP and can load balance among multiple VLANs.
This Document Applies to these Products Page 14
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
VBST, a Huawei spanning tree protocol, constructs a spanning tree in each VLAN so that traffic from different VLANs is forwarded through different spanning trees. VBST is equivalent to STP or RSTP running in each VLAN. Spanning trees in different VLANs are independent of each other. Currently, there are three standard spanning tree protocols: Spanning Tree Protocol (STP), Rapid Spanning Tree Protocol (RSTP), and Multiple Spanning Tree Protocol (MSTP). STP and RSTP cannot implement VLAN-based load balancing, because all the VLANs on a LAN share a spanning tree and packets in all VLANs are forwarded along this spanning tree. In addition, the blocked link does not carry any traffic, which wastes bandwidth and may cause a failure to forward packets from some VLANs. In real-world situations, MSTP is preferred because it is compatible with STP and RSTP, ensures fast convergence, and provides multiple paths to load balance traffic. On enterprise networks, enterprise users need functions that are easy to use and maintain, whereas the configuration of MSTP multi-instance is complex and has high requirements for engineers' skills. To address this issue, Huawei develops VBST. VBST constructs a spanning tree in each VLAN so that traffic from different VLANs is load balanced along different spanning trees. In addition, VBST is easy to configure and maintain. VBST brings in the following benefits:
Table 11-1 lists the comparisons between VBST and STP/RSTP/MSTP. Table 11-1 Comparisons between VBST and STP/RSTP/MSTP
This Document Applies to these Products Page 15
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Multichassis Link Aggregation Group (M-LAG) implements link aggregation among multiple devices. In a dual-active system shown in Figure 4-1, one device is connected to two devices through M-LAG to achieve device-level link reliability. Figure 4-1 M-LAG network As an inter-device link aggregation technology, M-LAG increases link bandwidth, improves link reliability, and implements load balancing. It has the following advantages:
This Document Applies to these Products Page 16
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
This Document Applies to these Products Page 17
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
This Document Applies to these Products Page 18
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
This Document Applies to these Products Page 19
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
This Document Applies to these Products Page 20
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Virtual Spanning Tree Protocol (V-STP) is a Layer 2 topology management feature and virtualizes two STP-enabled devices into one device to perform STP calculation. STP can detect the M-LAG master or backup status. After V-STP is enabled on the M-LAG master and backup devices and M-LAG master/backup negotiation is successful, two devices are virtualized into one device for port role calculation and fast convergence. STP needs to synchronize the bridge information and instance priority of the M-LAG master and backup devices. After M-LAG master/backup negotiation is successful, the backup device uses the bridge MAC address and instance priority that is synchronized from the master device for STP calculation and packet transmission. This ensures STP parameter calculation on the virtualized device. V-STP can be only applicable to M-LAG networking. It can be used in multi-level M-LAG interconnection scenarios and scenarios where devices in the M-LAG function as non-root-bridges. When configuring V-STP, ensure that the STP/RSTP timer settings on the two devices that constitute an M-LAG be the same. Otherwise, network flapping may occur.
This Document Applies to these Products Page 21
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
This Document Applies to these Products Page 22
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
This Document Applies to these Products Page 23
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
ERPS works for ERPS rings. An ERPS ring consists of interconnected Layer 2 switching devices configured with the same control VLAN and data VLAN. Before configuring other ERPS functions, you must configure an ERPS ring.
In an ERPS ring, the control VLAN is used only to forward RAPS PDUs but not service packets, so the security of ERPS is improved. All the devices in an ERPS ring must be configured with the same control VLAN, and different ERPS rings must use different control VLANs.
On a Layer 2 device running ERPS, the VLAN in which RAPS PDUs and data packets are transmitted must be mapped to an ERP instance so that ERPS forwards or blocks the packets based on configured rules. If the mapping is not configured, the preceding packets may cause broadcast storms on the ring network. As a result, the network becomes unavailable.
After ERPS is configured, add Layer 2 ports to an ERPS ring and configure port roles so that ERPS can work properly. You can add a Layer 2 port to an ERPS ring in either of the following ways:
After a link or node failure in an ERPS ring recovers, the device starts timers in the ERPS ring to reduce traffic interruptions. This prevents network flapping.
On a Layer 2 network running ERPS, if another fault detection protocol (for example, CFM) is enabled, the MEL field in RAPS PDUs determines whether the RAPS PDUs can be forwarded. If the MEL value in an ERPS ring is smaller than the MEL value of the fault detection protocol, the RAPS PDUs have a lower priority and are discarded. If the MEL value in an ERPS ring is larger than the MEL value of the fault detection protocol, the RAPS PDUs can be forwarded. In addition, the MEL value can also be used for interworking with other vendors' devices in an ERPS ring. The same MEL value ensures smooth communication between devices.
This Document Applies to these Products Page 24
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
When there is no faulty link on a ring network, Ethernet Ring Protection Switching (ERPS) can eliminate loops on the network. When a link fails on the ring network, ERPS can immediately restore communication between nodes on the network. ERPSv2, compatible with ERPSv1, supports multi-ring topologies, in addition to ERPSv1 functions such as single ring topologies and multi-instance.
ERPS works for ERPS rings. An ERPS ring consists of interconnected Layer 2 switching devices configured with the same control VLAN and data VLAN. Before configuring other ERPS functions, configure an ERPS ring.
In an ERPS ring, the control VLAN is used only to forward RAPS PDUs but not service packets, so the security of ERPS is improved. All the devices in an ERPS ring must be configured with the same control VLAN, and different ERPS rings must use different control VLANs.
On a Layer 2 device running ERPS, the VLAN in which RAPS PDUs and data packets are transmitted must be mapped to an ERP instance so that ERPS forwards or blocks the packets based on configured rules. If the mapping is not configured, the preceding packets may cause broadcast storms on the ring network. As a result, the network becomes unavailable.
After ERPS is configured, add Layer 2 ports to an ERPS ring and configure port roles so that ERPS can work properly. You can add a Layer 2 port to an ERPS ring in either of the following ways:
If an upper-layer Layer 2 network is not notified of the topology change in an ERPS ring, the MAC address entries remain unchanged on the upper-layer network and therefore user traffic is interrupted. To ensure nonstop traffic transmission, configure the topology change notification function and specify the ERPS rings that will be notified of the topology change. In addition, if an ERPS ring frequently receives topology change notifications, its nodes will have lower CPU processing capability and repeatedly update Flush-FDB packets, consuming much bandwidth. To resolve this problem, set the topology change protection interval at which topology change notifications are sent to suppress topology change notification transmission, and set the maximum number of topology change notifications that can be processed during the topology change protection interval to prevent frequent MAC address and ARP entry updates.
To ensure that ERPS rings function normally when a node or link fails, configure revertive/non-revertive switching, port blocking mode, and timers.
After a link or node failure in an ERPS ring recovers, the device starts timers in the ERPS ring to reduce traffic interruptions. This prevents network flapping.
This Document Applies to these Products Page 25
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
There are three timers used in spanning tree calculation: Forward Delay, Hello Time, and Max Age. These timers can be configured to affect STP convergence. However, you are not advised to directly change these timers. Instead, it is recommended that you set the network diameter so that the spanning tree protocol automatically adjusts these timers in accordance with the network scale. The following timers are used in spanning tree calculation:
Devices on a ring network must use the same values of Forward Delay, Hello Time, and Max Age.
To prevent frequent network flapping, make sure that the Hello Time, Forward Delay, and Max Age timer values conform to the following formulas:
This Document Applies to these Products Page 26
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
This Document Applies to these Products |