Banner
HomeTOCPrevNextGlossSearchHelp

PDF

Table of Contents

Setting Configuration Attributes

Setting Configuration Attributes

Setting Configuration Attributes

This chapter describes how to change configuration attributes using the CLI. Normally, these changes are made to run-time memory only. If the switch is reset, the changes are overwritten by the attribute settings in the configuration database.


Changing Default Modem Password and Modem Initialization String

The modem password and the modem initialization string are stored in EEPROM in the midplane. The default modem password is

atmhiway


the default modem initialization string is

AT&F&D2&C1&Q0S0=1S2=128S7=30S36=7S95=44


Note The default modem initialization string is in Hayes modem command format. For an interpretation of this command format, see the LightStream 2020 CLI Reference Manual.

You may retain these default values. If you change them, the changes you make are permanent and remain in effect unless you change them again. Rebooting the system or restarting the CLI does not change the modem password or the modem initialization string.

If you change the modem password or the modem initialization string for one switch card slot, make the same change for the other. This is especially important for a two-card system because the backup switch card takes over if the active switch card fails. It is also important for a single switch card system because you may want to add an additional switch card later or you may decide to move the single switch card to the other slot.

You must have a switch card in the switch card slot to change the modem password or the modem initialization string. Therefore, if you have only one switch card, move it from one switch card slot to the other as you effect the change for both slots.

To change the default modem password and the modem initialization string, follow these steps:

Step 1 Enter the protected command at the cli> prompt.

Step 2 Enter the protected mode password when you see the following prompt:


Enter password:

Step 3 To verify that the target switch is correct, enter the show snmp command at the * cli> prompt.

If you need instructions on changing the target switch, see "Setting the Target Switch for CLI Commands" in the chapter entitled "Command Line Interface."

Step 4 To change the modem password, enter the following at the * cli> prompt:


*cli> set modem <slot #> password <password>

Where

<slot #> is the slot number for the switch card (SA or SB) whose modem password you are changing.

<password> is the new modem password.

Step 5 To change the modem initialization string, enter the following at the * cli > prompt:


*cli> set modem <slot #> initstring <initstring>

Where

<slot #> is the slot number for the switch card (SA or SB) whose modem initialization string you are changing.

<initstring> is the new modem initialization string. The format of the modem initialization string should be the same as the default modem initialization string. The content of the modem initialization string depends on the type of modem you are using. Refer to the documentation for your modem to determine the contents of the modem initialization string.


Note You can change the modem password and initstring only when you are running the Lynx version of CLI. The previous two steps do not apply to a Sun workstation.

Step 6 To verify the contents of the modem password and the modem initialization string, enter the following at the * cli> prompt:


*cli> show modem <slot #> all

The password and the modem initialization string are permanently changed. Inform all authorized users of the changes you make.

Different types of modems require different modem initialization strings. If you have different modems connected to each switch card, the init strings may be different. The passwords may or may not be different.

Inform authorized users of the changes you make.


Changing the Protected Mode and npadmin Password

You can change this password from within protected mode only.


Note When you change the protected mode password, you also change the npadmin password. You can also change the npadmin password with the password command.

To change the protected mode and npadmin password, follow these steps:

Step 1 Enter the protected command at the cli> prompt.


Step 2 Enter the protected mode password when you see the following prompt:


Enter password:

The * cli> prompt appears to indicate that you are in protected mode.

Enter the password command at the *cli> prompt.

Step 3 Enter the protected mode password when you see the following prompt:


Changing password for npadmin
Enter current password:

Step 4 Enter the new protected mode password when you see the following prompt:


Enter new password:

The password must contain at least six alphanumeric characters.

Step 5 Retype the new protected mode password when you see the following prompt:


Retype new password:

If you retype the new password correctly, the system changes the password and displays the * cli> prompt.

If you enter an inappropriate password, one or more of the following messages may appear:

Please use a longer password.
Password unchanged.
Please use a less obvious password.
Passwords don't match, try again.

Inform all authorized users of the changes you make.


Setting the SNMP Community

Each SNMP manager (the CLI, for example) and each managed system (the MMA in an LS2020 switch, for example) has a community name. The SNMP manager specifies a community name in each command it sends. The managed system validates the commands before executing them by comparing the community name in the command against its own community name.

Before you can set attributes or use the CLI control commands, you must set the SNMP community to a community that has read/write access privileges. The read/write community provided with the system is named write. (A switch can have several SNMP community names with read/write privileges.) The read-only community provided with your system is named public.

To prevent unauthorized access to your system, you should set the SNMP community names that the LS2020 switch uses to validate the commands before it executes them. Follow the procedure below to set the SNMP community name that the CLI puts in commands.


Setting the SNMP Community Name

Step 1 At the cli> prompt, enter


cli> set snmp community <name>

Where

<name> is the name for the SNMP community with read/write privileges that you want to access.

Step 2 To verify the SNMP community name, enter the show snmp command at the cli> prompt.

The community name is set to the SNMP community you specified.

The SNMP community reverts to the read-only community when you log out of the CLI. However, if you leave your terminal without logging out of the CLI, be sure to change the SNMP community back to the read-only community to prevent unauthorized access to your system.


Modifying Spanning Tree Bridging

The LS2020 switch uses the spanning tree protocol to detect loops within a bridged network. When a loop is detected, one port on the bridge performs a blocking function to break the loop. All bridging traffic on that port is discarded and MAC address learning is not performed. This section provides the steps to define and display spanning tree bridging parameters and static filters using the CLI show and set commands.


Defining and Displaying Spanning Tree Bridge Parameters

To define and display spanning tree bridge parameters, follow these steps:

Step 1 To verify that the target switch is correct, enter the show snmp command at the cli> prompt.


Step 2 To view the current general spanning tree bridge parameters, enter the following at the cli> prompt:


cli> show stb general

A screen similar to the following is displayed:

cli> show stb general

Bridge Max Age: 2000
Bridge Hello Timer: 200
Bridge Forward Delay: 1500
Priority: 0

Step 3 To set the spanning tree timeout parameters, enter the following commands at the cli> prompt:


cli> set stb maxage <maxagevalue>

Where

<maxagevalue> is the maximum interval that is used to time out spanning tree information.

cli> set stb hellotimer <hello-timer-val>

Where

<hello-timer-val> is the time interval between Hello BPDUs.

cli> set stb forwdelay <fwd-delay-val>

Where

<fwd-delay-val> is the time interval to be used before changing to another state.

cli> set stb priority <priority>

Where

<priority> is the priority for using this node versus others for a path using the Spanning Tree Protocol. The range is 0 to 65535, and the default is 32768.

Step 4 To verify that the spanning tree parameter changes have been made, enter the following at the cli> prompt


cli> show stb general

The changes appear in the display. The spanning tree parameters are set as you specified.


Defining Spanning Tree Static Filters

To make entries into the bridge filtering database, follow these steps:

Step 1 To verify that the target switch is correct, enter the show snmp command at the cli> prompt.

If you need instructions on changing the target switch, see "Setting the Target Switch for CLI Commands" in the chapter entitled "Command Line Interface."

Step 2 To view the current statically entered spanning tree bridge filtering entries, enter the following at the cli> prompt:


cli> show stb static

Step 3 To make entries into the spanning tree bridge static filtering database, enter the following at the cli> prompt:


cli> set stb static <MACaddr> rcv <rcv-port> xmit <xmit-port(s)>

Where

<MACaddr> is the MAC address. The MAC address must be entered in xx:xx:xx:xx:xx:xx (hex) format.

<rcv-port> is the port to which this MAC address is assigned. This may be an ifIndex (for example, port#) or the keyword any.

<xmit-port> is the comma-separated list of ports to which received frames are to be forwarded.

Step 4 To verify that your entries have been made, enter the following at the cli> prompt:


cli> show stb static

Your entries should appear in the display.

Step 5 To view the spanning tree bridge forwarding table entries and their associated variables, enter the following at the cli> prompt:


cli> show stb fwd

The entries appear in the display.

Step 6 To view bridge port information, enter the following at the cli> prompt:


cli> show stb ports


Defining Traffic Filters

LS2020 custom filtering allows you to define filters to block or forward incoming packets for specific ports. A filter is a set of conditions that is compared to information in the header of incoming packets. As an incoming packet is received, its level 2 and level 3 headers are broken into components. The header information is evaluated against all filters (in priority order) associated with the receiving port. If a filter condition matches the header information, the action specified by that filter is taken. If the filter condition does not match the packet header information, the next filter is evaluated. If no filter conditions match the packet header information, the default action for the port is taken.

You must first define the traffic filter (bridge filter, IP filter, or IPX filter) and then assign the filter with a port or ports. Optionally, you can associate a multicast group and traffic profile to a filter or a port. You must define a filter, a multicast group, and a traffic profile before you can assign that filter to a specific port.


Note Bridge filter conditions are applied before IP and IPX filter conditions. If a bridge filter condition forwards a packet, an IP or IPX filter may then block it.

To define a custom traffic filter, you assign a number to the filter and write the filter expression. The next sections discuss defining traffic filters, multicast groups, and traffic profiles and assigning filters to a specific port.

For a description of filter attributes, construction, and examples, see the LightStream 2020 CLI Reference Manual.


Procedures for Defining Traffic Filters

The following steps define sample traffic filters that block the LAN end stations in Figure 5-1 from communicating with each other. To successfully block the communications, filters must be created for the ports (1 and 4) supporting each LAN.

Figure 5-1 : Connections to be Filtered

h3356.gif

Step 1 Set SNMP community to write.

Step 2 To determine if any filters are currently defined for either of these ports, enter the following at the cli> prompt:


cli> show port <c.p> {bflt|ipflt|ipxflt} [ID]

Where

<c.p> is the card and port number in card.port format
(card = 2 to 10; port = 0 to 7)

{bflt | ipflt | ipxflt} is a bridge filter, IP filter, or IPX filter, respectively.

[ID] (optional) is the number that identifies the filter whose contents are to be displayed.

Step 3 To display a current filter, enter the following at the cli> prompt:


cli> show {bflt|ipflt|ipxflt} [ID]

Where

{bflt | ipflt | ipxflt} is a bridge filter, IP filter, or IPX filter, respectively.

[ID] (optional) is the number that identifies the filter whose contents are to be displayed.

If you want to display all traffic filters, leave off the ID number.

Step 4 To define the new filter for port 1, blocking all traffic from the source end station (xx:xx:xx:xx:xx:xx) that is directed to the destination end station (yy:yy:yy:yy:yy:yy), enter the following at the cli> prompt:


cli> define bflt <ID> (macDst == yy:yy:yy:yy:yy:yy) && (macScr == xx:xx:xx:xx:xx:xx)

Where

<ID> is the identifying number that you assign to the filter.

Step 5 To define the new filter for port 4, blocking all traffic from the source end station (yy:yy:yy:yy:yy:yy) that is directed to the destination end station (xx:xx:xx:xx:xx:xx), enter the following at the cli> prompt:


cli> define bflt <ID> (macDst == xx:xx:xx:xx:xx:xx) && (macSrc == yy:yy:yy:yy:yy:yy)

You must now assign each filter to the appropriate ports.

Step 6 To assign the appropriate filter with port 1, enter the following at the cli> prompt:


cli> set port <c.p> {bflt|ipflt|ipxflt} <ID> {block|forward} <priority>
[tprof <ID>] [mcast <ID>]

Where

<c.p> is the card and port number in card.port format
(card = 2 to 10; port = 1).

<ID> is the identifying number that you assigned to the filter.

{block | forward} is the action to be taken when the frame value matches the filter value (one of forward or block).

<priority> is the priority number applied to this filter. The filter is added to a priority list according to this value. Incoming frames are compared to the filters in priority order. One is the highest priority. It is recommended that you assign the priorities by 10s (10, 20, 30, and so forth) to leave ample numbers available for the reordering or adding of filter assignments.

[tprof <ID> is the word "tprof" followed by the traffic profile ID associated with the specified port for traffic forwarded by the specified filter.

[mcast <ID>] is the word "mcast" followed by the multicast group ID associated with the specified port for traffic forwarded by the specified filter.


Note The multicast group and traffic profile must have been created previously with the define mcast and define tprof commands.

Step 7 To assign the appropriate filter with port 4, enter the following at the cli> prompt:


cli> set port <c.p> bflt [ID] block <priority>

Where

<c.p> is the card and port number in card.port format
(card = 2 to 10; port = 4).

[ID] is the identifying number that you assigned to the filter.

block is the action to be taken when the frame value matches the filter value.

<priority> is the priority number applied to this filter. The filter is added to a priority list according to this value. Incoming frames are compared to the filters in priority order. One is the highest priority. It is recommended that you assign the priorities by 10s (10, 20, 30, and so forth) to leave ample numbers available for the reordering or adding of filter assignments.

If the default for both of these ports is to forward, then all other traffic is allowed (unless, of course, other filters have been defined to block certain traffic).

Step 8 To verify that the filters have been assigned, enter the following at the cli> prompt:


cli> show bflt

cli>
show port <c.p> {bflt|ipflt|ipxflt}

<c.p> is the card and port number in card.port format
(card = 2 to 10; port = 0 to7).

The filters you created now block traffic from being sent between the end stations on the LANs.


Defining a Multicast Group

A multicast group is a list of destination ports on nodes in the network. Traffic that matches an associated filter condition is sent to each member of the group. Only one multicast group may be associated with any given filter on a given port, and the action of the filter must be forward. These steps describe how to define the multicast group parameter for a filter:

Step 1 To determine if any multicast groups have been created, enter the following at the cli> prompt:


cli> show mcast [ID]

Where

ID is the identification number by which the filter is identified, in the range 1 to 255.

If you do not give an ID argument, then all defined multicast groups are displayed.

Step 2 To define the multicast group parameter for a filter, enter the following at the cli> prompt:


cli> define mcast ID [node:]c.p [[node:]c.p...]

Where

ID is the identification number by which the filter is identified, in the range 1 to 255.

[node:]c.p [[node:]c.p...] specifies a port on an LS2020 node.

If you do not specify a node, it defaults to the current node.


Note Although it is possible to define a multicast group consisting of non-LAN ports, the multicast LAN traffic will only be delivered to LAN ports.


Defining a Traffic Profile

A traffic profile is a set of type-of-service attributes that can be applied to traffic flows by associating the profile with a filter. Only one profile can be associated with any given filter on any given port, and the action of the filter must be forward. These steps describe how to define the traffic profile parameter for a filter:

Step 1 To determine if any traffic profiles have been created, enter the following at the cli> prompt:


cli> show tprof [ID]

Where

ID is the identification number by which the filter is identified, in the range 1 to 255.

If you do not give an ID argument, all current traffic profiles display.

Step 2 To define a traffic profile parameter enter the following at the cli> prompt:


cli> define tprof ID arguments

Where

ID is the identification number by which the filter is identified, in the range 1 to 255.

arguments are max-rate, max-burst, insured-rate, insured-burst, principal-service-type, secondary-scale, transmit-priority

If you do not give an ID argument, all current traffic profiles display.

For a description of the previously listed arguments, see the LightStream 2020 CLI Reference Manual.


Assigning a Filter to a Specific Port

Any filter can be assigned to any port (which is up and running) at any time. Incoming packets for that port are subsequently compared with the filter conditions. If the value of a specific field in the packet header matches the value of the filter, the action specified by the filter condition is taken.

To associate a filter with a specific port or ports, follow these steps:

Step 1 To view the filters currently defined for a specific port, enter the following at the cli> prompt:


cli> show <c.p> {bflt|ipflt|ipxflt}

Where

<c.p> is the card and port number in card.port format
(card = 2 to 10; port = 0 to 7).

{bflt | ipflt | ipxflt} is a bridge filter, IP filter, or IPX filter, respectively.

Step 2 To associate the filter with a specific port, enter the following at the cli> prompt:


cli> set port <c.p> {bflt|ipflt|ipxflt}
<filter ID> {block|forward} <priority>

Where

<filter ID> is the number that identifies the filter being assigned to the port.

{block | forward} is the action that is taken when the frame value matches the filter value (forward or block).

<priority> is the priority number applied to this filter. The filter is added to a port filter list according to its priority. Incoming frames are compared to the filters in priority order. One is the highest priority. It is recommended that you assign the priorities by 10s (10, 20, 30, and so forth) to leave ample numbers available for the reordering or adding of filter assignments.


Note You can assign up to 32 bridge, 32 IP, and 32 IPX filters to a port for a total of 96. The maximum number of filters that you can assign to a node is 1024.


Defining the Default Filter Action

This procedure describes how to define the default filter action for a specific port. This determines the action to take with incoming traffic (forward or block) when incoming traffic matches none of the defined filter conditions.

Step 1 To view the current default filter action parameter for a specific port, enter the following at the cli> prompt:


cli> show port <c.p> {bflt-def|ipflt-def|ipxflt-def}

Where

<c.p> is the card and port number in card.port format
(card = 2 to 10; port = 0 to 7).

Step 2 To define or alter the default filter action parameter for this port, enter the following at the cli> prompt:


cli> set port <c.p> {bflt-def|ipflt-def|ipxflt-def} {block|forward}

Where

<c.p> is the card and port number in card.port format
(card = 2 to 10; port = 0 to 7).

{bflt | ipflt | ipxflt} is a bridge filter, IP filter, or IPX filter, respectively.

{block | forward} is the action that is taken when the frame value matches the filter value (forward or block).

Step 3 To verify the change, enter the following at the cli> prompt:


cli> show port <c.p> {bflt-def|ipflt-def|ipxflt-def}


Defining the Default Broadcast Limit

This procedure describes how to define the default broadcast limit parameter for a specific port. It applies only to bridge filters.

Step 1 To view the current default broadcast limit parameter for a specific port, enter the following at the cli> prompt:


cli> show port <c.p> bcast-limit

Where

<c.p> is the card and port number in card.port format
(card = 2 to 10; port = 0 to 7).

Step 2 To define or alter the default broadcast limit parameter for this port, enter the following at the cli> prompt:


cli> set port <c.p> bcast-limit {discard-all|forward-all|packets/sec}

Where

<c.p> is the card and port number in card.port format
(card = 2 to 10; port = 0 to 7).

<bcast-limit> is the rate at which broadcast packets can be forwarded through the bridged LAN port. Excess broadcast packets are dropped.

<discard-all> means discard all broadcast packets sent to this port.

<forward-all> means forward all broadcast packets to this port.

<packets/sec> is the maximum number of broadcast packets per second to be forwarded through this port, in the range of 1 to 127.

To restore the default broadcast limit, enter the above command with forward all as the number of packets per second.


Deleting the Association Between a Filter and a Port

To disassociate a filter from a specific port or ports, follow these steps:

Step 1 To view the filters currently defined for a specific port, enter the following at the cli> prompt:


cli> show port <c.p> {bflt|ipflt|ipxflt}

Step 2 To break the association between a filter and a port, enter the following at the cli> prompt:


cli> set port <c.p> {bflt|ipflt|ipxflt} <filter ID> delete

Where

<c.p> is the card and port number in card.port format
(card = 2 to 10; port = 0 to 7).

{bflt | ipflt | ipxflt} is a bridge filter, IP filter, or IPX filter, respectively.

<filter ID> is the number that identifies the filter being assigned to the port.

This command removes the specified filter from the list of filters associated with a port. The filter is still defined but no longer affects traffic on the specified port.

Step 3 To verify that the association was removed, enter the following at the cli> prompt:


cli> show port <c.p> {bflt|ipflt|ixpflt}


Deleting a Filter

This procedure describes how to delete a filter. You cannot delete a filter that is associated with a port. You must first perform the procedure "Deleting the Association Between a Filter and a Port" as previously described.

Step 1 To view the currently defined filters, enter the following at the cli> prompt:


cli> show {bflt|ipflt|ipxflt}

Step 2 To view the filters currently defined for a specific port, enter the following at the cli> prompt:


cli> show port <c.p> {bflt|ipflt|ipxflt} <filter ID>

Where

<c.p> is the card and port number in card.port format
(card = 2 to 10; port = 0 to 7).

{bflt | ipflt | ipxflt} is a bridge filter, IP filter, or IPX filter, respectively.

<filter ID> is the number that identifies the filter being assigned to the port.

Step 3 To delete a filter, enter the following at the cli> prompt:


cli> delete {bflt|ipflt|ipxflt} <filter-id>

Where

<filter-id> is the number that identifies the filter.


Note If the filter is associated with a port, the delete action is rejected. Follow the steps in the preceding section, "Deleting the Association Between a Filter and a Port," and then delete the filter.

Step 4 To verify that the filter was deleted, enter the following at the cli> prompt:


cli> show {bflt|ipflt|ipxflt}

The filter you deleted should not appear in the display.


Configuring Virtual LAN Internetworking

Virtual LAN Internetworking (VLI) allows you to transcend the physical limitations of LAN internetworking. The LS2020 configurator lets you arrange stations in distinct workgroups and to restrict access between workgroups. Stations on different physical segments can belong to the same workgroup, and they can belong to more than one workgroup. For further information, see the LightStream 2020 Configuration Guide.


Establishing the Default Workgroup

You establish the default workgroup by having no workgroup IDs at all in an exclude list; that is, excluding no one. An exclude list that is not empty includes everybody except those that have at least one of the listed workgroup IDs in their include list. An include list admits only those that have at least one of the listed workgroup IDs in their include list. An empty include list blocks all communications.

Step 1 To create an include list, enter the following at the cli> prompt:


cli> set port <c.p> wgrp include

Where

<c.p> is the card and port number in card.port format
(card = 2 to 10; port = 0 to 7).

Step 2 To create an exclude list, enter the following at the cli> prompt:


cli> set port <c.p> wgrp exclude


Adding a Workgroup to a Port List

To add a workgroup ID to a list for a specific port, follow these steps:

Step 1 To verify that the target switch is correct, enter the show snmp command at the cli> prompt.

If you need instructions on changing the target switch, see "Setting the Target Switch for CLI Commands" in the chapter entitled "Command Line Interface."

Step 2 To add a workgroup to the list for the port, enter the following at the cli> prompt:


cli> set port <c.p> wgrp add <wgrp#>

<c.p> is the card and port number in card.port format
(card = 2 to 10; port = 0 to 7).

<wgrp#> is the number that identifies the workgroup.

Step 3 To verify that the workgroup was added to the list, enter the following at the cli> prompt:


cli> show port <c.p> wgrp

A screen similar to the following is displayed.

cli> show port <c.p> wgrp

WorkGroup List
______________

Card Port WgrpId Mode
____ ____ ______ ____
5 7 1 Include


Removing a Workgroup from a Port List

To delete a workgroup from a list for a specific port, follow these steps:

Step 1 To view the workgroups currently defined for a specific port, enter the following at the cli> prompt:


cli> show port <c.p> wgrp

Where

<c.p> is the card and port number in card.port format
(card = 2 to 10; port = 0 to 7).

<wgrp#> is the number that identifies the workgroup.

Step 2 To disassociate the workgroup from a port, enter the following at the cli> prompt:


cli> set port <c.p> wgrp del <wgrp#>

Step 3 To verify that the association was removed, enter the following at the cli> prompt:


cli> show port <c.p> wgrp

A screen similar to the following is displayed:

cli> show port 5.7 wgrp

WorkGroup List
______________

Card Port WgrpId Mode
____ ____ ______ ____
5 7 1 Exclude

cli>


Configuring Virtual Path Switching

In ATM processing, a virtual channel transports ATM cells belonging to a single data flow between two network nodes. Similarly, a virtual path (VP) supports multiple virtual channels and, thus, is able to transport numerous data flows between two network nodes.

The VP switching function in an LS2020 network lets you configure and remove multiple, point-to-point permanent virtual path connections (VPCs) through a single LS2020 switch or across a network of LS2020 switches. The LS2020 supports both the user-network interface (UNI) and the network-to-network interface (NNI) in configuring point-to-point permanent virtual paths (PVPs).

The ATM UNI cell header format defines an 8-bit VPI field, allowing a maximum of 256 PVPs to be defined for a single UNI interface. Similarly, the ATM NNI cell header format defines a maximum of 12 bits in the VPI field, allowing a maximum of 4096 PVPs to be defined for a single NNI interface (or trunk) in a network.

The LS2020 supports the simultaneous establishment and management of permanent, bidirectional, point-to-point VPCs and VCCs over the same interface.

For more information about VP switching commands and configuration, see the LightStream 2020 CLI Reference Manual and the LightStream 2020 Configuration Guide, respectively.


Creating a Permanent Virtual Path

To create an ATM UNI permanent virtual path (PVP) on a specified port, you use the set port <c.p> vpi commands. The VPI number must be in the range of 0 to 255. (This range may be further restricted depending on the type of interface module. The software informs you of such restrictions.) A typical command sequence would be as follows:

cli> set port <c.p> vpi vpi# destnode {chassisID | chassisIPaddress | chassisname}
cli> set port <c.p> vpi vpi# destport <c.p>
cli> set port <c.p> vpi vpi# destvpi destvpi#
cli> set port <c.p> vpi vpi# activate

You could use the insured-rate, max-rate, and transmit-priority arguments in addition to these commands, but most users accept the default values for these three parameters. It is recommended that you accept the defaults for the insured burst and maximum burst parameters.

If you want a bidirectional PVP, you must configure the circuit for the port at the other end of the PVP. Using the same VPI number at both ends of the PVP is administratively convenient, but not necessary. All other PVP parameters should be configured the same at both ends of the PVP.

For more information about the set port <c.p> vpi vpi# commands, see the LightStream 2020 CLI Reference Manual.


Activating a Permanment Virtual Path

Before you activate the circuit, you must configure both directions of an ATM UNI PVP. The destination node, destination port, and destination VPI number may not be altered after activating the PVP. After setting the parameters listed in the section on Creating a Permanent Virtual Path, follow these steps:

Step 1 Enter the following at the cli> prompt:


cli> set port <c.p> vpi VPI# activate

Where

<c.p> is the card and port number in card.port format
(card = 2 to 10; port = 0 to 7).

Step 2 To display all of the information for the specific virtual path on the specified port, enter the following at the cli> prompt:


cli> show port <c.p> vpi VPI#


Deleting a Permanent Virtual Path

To deactivate and delete the specified ATM UNI PVP from the specified port, follow these steps:

Step 1 Enter the following at the cli> prompt:


cli> set port <c.p> vpi VPI# del

Where

<c.p> is the card and port number in card.port format
(card = 2 to 10; port = 0 to 7).

Step 2 To verify the change, enter the following at the cli> prompt:


cli> show port <c.p> vpi VPI#

Where

<c.p> is the card and port number in card.port format
(card = 2 to 10; port = 0 to 7).


Enabling or Disabling Virtual Path (VP) Switching

VP switching is supported only on 4- and 8-port T3 and E3 modules and OC-3c modules. By default, VP switching is enabled on the interfaces which support it and by the setting of the vpt-vpi value. Typically, the vpt-vpi value is zero. If the vpt-vpi value is not set to zero, VP switching is not enabled.


Establishing ATM UNI Signaling

In an ATM network, the user-network interface typically interconnects an ATM user (such as a router) with an ATM switch. The messages and protocols used to establish, maintain, and clear virtual connections over the UNI are referred to as switched virtual connection (SVC) signaling or UNI signaling. The LS2020 supports point-to-point and point-to-multipoint SVCs. It also lets you provision PVCs concurrently with SVCs.

For this release, two interswitch signaling protocols apply to ATM switches in an LS2020 network:

  • Interim Inter-Switch Protocol (IISP)--A standard signaling and routing protocol used between ATM switches. IISP, sometimes referrred to as P-NNI Phase 0, lets ATM switches be statically configured with virtual connection routing information. It also allows ATM switches other than LS2020 switches to be connected to an LS2020, providing the basis for end-to-end SVCs.

  • LS2020 Network-Network Interface (LS-NNI)--A pre-standard signaling and routing protocol for a network of LS2020 switches. LS-NNI is used to build dynamic ATM connections between multiple LS2020 switches in a network.

You can configure the LS2020 on a per-port basis to support UNI 3.0, UNI 3.1, IISP 3.0, or IISP 3.1. By default, the LS2020 uses UNI 3.0.


Preparing for Connection

Before you can establish ATM UNI signaling, you need to enter the correct community password string and establish

  • UNI port characteristics

  • Signaling characteristics

  • ILMI characteristics

  • Address information (network prefix, end station identifiers (ESIs), local internal and external addresses, and LAN emulation configuration server (LECS) addresses)

In many cases, "establishing" simply means verifying that pre-existing defaults are acceptable. The next sections provide the CLI set port commands you enter to establish ATM UNI signaling. For more information about CLI commands and their syntax, refer to the LightStream 2020 CLI Reference Manual.


Establishing UNI Port Characteristics


Note In the following command examples, the default parameters are shown in italic.

The set port commands listed here are typically the commands used to establish UNI port characteristics.

To establish these characteristics, enter the following commands at the cli> prompt:

cli> set port <c.p> uni {private | public}

cli> set port <c.p> uni {network | user}
cli> set port <c.p> uni {uni3-0 | uni3-1 | iisp3-0 | iisp3-1}

Where

<c.p> is the card and port number in card.port format (card = 2 to 10; port = 0 to 7).

{private | public} are the options to configure the port as either a private or public UNI.

{network | user} are the options to configure the port as either the network side or the user side of the UNI.

{uni3.0 | uni3.1 | iisp3.0 | iisp3.1} are the options you can select to configure the port to conform to one of the following standards: UNI 3.0, UNI 3.1, IISP 3.0, or IISP 3.1.

The following set port commands (although used less frequently than other set port commands) are also used to establish UNI port characteristics:

cli> set port <c.p> uni signalling {enable | disable}

cli> set port <c.p> uni ilmi { enable | disable}

cli> set port <c.p> uni active-vci-bits <0-15> (the default is 15)

cli> set port <c.p> uni active-vpi-bits <0-8>  (the default is 0)


Where

<c.p> is the card and port number in card.port format (card = 2 to 10; port = 0 to 7).

{enable | disable} are the options to enable or disable ILMI for a port.


Establishing Signaling Characteristics

To establish signaling characteristics, enter the following commands at the cli> prompt:

cli> set port <c.p> signalling-uni address-format { nsap | e164 | both }

cli> set port <c.p> signalling-uni subaddress-route { yes | no}

Where

<c.p> is the card and port number in card.port format (card = 2 to 10; port = 0 to 7).

{nsap | e164 | both} are the options you can use to specify the format expected for ATM addresses: standard nsap for private ATM addresses, e164 for public E.164 networks addresses, and both to admit addresses of both types.

{yes | no} are the options for determining whenever an LS2020 port will route a SETUP message based on the called party subaddress (if any). This is typically set to "yes" in private networks, and "no" in public networks.


The following set port commands (although used less frequently than other set port commands) are also used to establish UNI signaling characteristics:

cli> set port <c.p> signalling-uni vci-range min <32-32767> (the default is 48)
cli> set port <c.p> signalling-uni vci-range max <32-32767> (the default is 32767)


Note These defaults apply when the LS2020 switch is the network side.

cli> set port <c.p> signalling-uni max-rate <cps> (the default is 4% of line rate)
cli> set port <c.p> signalling-uni vci <1-32767> (the default is 5)

Where

<c.p> is the card and port number in card.port format (card = 2 to 10; port = 0 to 7).

{cps} specifies the peak cell rate of the signaling channel (in cells/sec).


Establishing ILMI Characteristics

The Interim Local Management Interface (ILMI) protocol provides the mechanism for establishing addresses. If the ILMI is disabled, then you have to configure the ATM address . However, you need not configure the address yourself, you can let the chassis use default values. Typically, you use the default of VCI 16 on VPI 0.

To change the number of the VCI to be used for the ILMI, enter the following commands at the cli> prompt:

cli> set port <c.p> ilmi-uni vci <1-32767>(the default is 16)


Where

<c.p> is the card and port number in card.port format (card = 2 to 10; port = 0 to 7).

<1--32767> is the range of VCI values that you can specify for the ILMI.


Establishing Address Information

In many cases, "establishing" address information consists simply of verifying that the Cisco-supplied defaults are acceptable.

If you do not use the Cisco-supplied defaults to establish address information, you must establish the following parameters:

  • Network prefix

  • ESIs

  • Internal addresses

  • External addresses

  • LECS addresses

When you enter ASCII address information, you must follow these format rules:

  • Addresses must be entered between double quotes (" ").

  • Address digits may be separated by arbitrary period (.) punctuation (for clarity).

  • Public E.164 addresses are preceded by a plus sign (+).

An example of ASCII representation of each address looks like this:
"+1.508.555.1212"

  • Private addresses are not preceded by a +.

An example of a private address looks like this (19 hexadecimal digits):
"47.0091.81.000000.010203040506.0a0b0c0d0e0f"

  • Only LECS addresses include the SEL byte (which are the last 2 digits of the 20 hexadecimal digit address).

An example LECS address with the SEL byte looks like this:
"47.0091.81.000000.010203040506.0a0b0c0d0e0f00"



Default Address Information Supplied by Cisco

Cisco supplies defaults for many of the types of ATM address information needed by the LS2020. Use these defaults when the corresponding information has not been configured.

When you use private addresses, you need a per-chassis network prefix. The chassis default is a 13-byte long network prefix, which applies to all UNI ports. If a network prefix is not configured, the default takes the following form:

47.0091.81.000000.<chassis MAC address>

Where

<chassis MAC address> is the MAC address of the midplane (6 hexadecimal digits).

When a port assumes the user-side role and ILMI is enabled, an ESI is required. If one is not configured, the default takes the following form:

42.<chassis id>.<card #>.<port #>

Where

<chassis id> is the chassis identification (6 hexadecimal digits)

<card #> is the card number (2 hexadecimal digits)

<port #> is the port number (2 hexadecimal digits)

If ILMI is disabled on a port, an ATM address for that port must be established. The default ATM address consists of the default network prefix followed by the default ESI. The following example shows a complete ATM address (13-byte network prefix and 6-byte ESI):

Network Prefix ESI
47.0091.81.000000.<chassis MAC address> 42.<chassis>.<card>.<port> (optional SEL byte)


Establishing Network Prefix Information

The chassis network prefix identifies the switch and it must be unique to that switch. When you use private addresses, you need a per-chassis network prefix for the node. This means overriding the default. To override the default, enter the following command at the cli> prompt:

cli> set chassis atm-netprefix add <idx> <netprefix>

When you are using public addresses, you need a per-port network prefix for each port. The network prefix is the E.164 address. To set the per-port network prefix, enter the following command at the cli> prompt:

cli> set port <c.p> atm-netprefix add <idx> <netprefix>

Where

<c.p> is the card and port number in card.port format (card = 2 to 10; port = 0 to 7).

<idx> specifies the position in the list of per-chassis network prefixes for this node.

<netprefix> specifies the 13-byte-long network prefix for the node.


Note There are no defaults for per-port network prefixes.


Establishing ESIs

The end station identifier (ESI) identifies the individual port within the switch (for example, a MAC address). When an LS2020 port assumes the user role and ILMI is enabled, an ESI is required (you can have several ESIs). You can override the default by entering the following command at the cli> prompt:

cli> set port <c.p> atm-esi <idx> <esi>

Where

<c.p> is the card and port number in card.port format (card = 2 to 10; port = 0 to 7).

<idx> specifies the position in the list of ESIs for the port.

<esi> specifies the ESI for the port.


Establishing Internal Addresses

The internal ATM address is directly associated with a port that is part of a domain (provided that port is a network port). When the ILMI is disabled on a port, an ATM address is required. You can override the default by entering the following command at the cli> prompt:

cli> set port local-atm-address add <idx> <addr>

Where

<c.p> is the card and port number in card.port format (card = 2 to 10; port = 0 to 7).

<idx> specifies the position in the list of ATM addresses for the port.

<addr> is a complete ATM address.


Establishing External Addresses

You configure external addresses to inform the LS2020 switches in a domain about ATM addresses, that are not directly associated with LS2020 ports but that are reachable through those ports.

Configuring individual external addresses is almost always unnecessary; instead, if a given set of addresses are reachable through a port, you can take advantage of the hierarchical nature of ATM addresses by configuring only the "partial address" which is common to that set of addresses as an external address for the port.

For example, on a private network switch, all ATM addresses associated with that switch typically begin with a common network prefix. If all addresses on that switch are reachable through an LS2020 port, you need only configure the common network prefix as an external address for the port.

If an external address is reachable through more than one LS2020 egress port, it may be associated with these ports through multiple external address configuration commands. In this case, an "order" attribute associated with each port determines the order in which the egress ports will be tried when the network tries to establish a connection to the address.

To establish external addresses, enter the following commands:

cli> set port <c.p> extern-atm-address add <idx> <addr>
cli> set port <c.p> extern-atm-address order <idx> <order>
cli> set port <c.p> extern-atm-address validate <idx>

Where

<idx> specifies a positiion in the list of external addresses for the port.

<c.p> is the card and port number in card.port format.

<addr> is the partial ATM address.

<order> specifies the order in which multiple egress ports for an address will be tried. The default is 100, with a range of 1 to 255.

If all external addresses are reachable through a port (or set of ports), or if all external addresses not explicitly configured are reachable through a port or ports, you may configure a default egress port (or ports) by entering the following at the cli> prompt:

cli> set chassis atm-default-port add <c.p> <order>

Where

<c.p> is the card and port number in card.port format.

<order> specifies the order in which multiple default ports will be tried.


Establishing LECS Addresses

Any standards-based LANE device can be connected to an LS2020 UNI port so that LANE traffic can be transparently passed between the LAN emulation configuration server (LECS), LAN emulation client (LEC), and broadcast-and-unknown server (BUS). An edge device requiring the address of the LECS can request the address by querying the MIB, which is accessible through the ILMI. The LECS address, which is stored in the MIB, is determined by configuration.

The configured address of the LECS applies to all UNI ports and is configured through the CLI by entering the following command:

cli> set chassis lecs-address add <idx> <addr>

Where

<idx> specifies a position in the list of LECS addresses for the node.

<addr> is the ATM address of the LAN Emulation Configuration Server.


Note <addr> must be a full address, optionally including the SEL byte (if the SEL byte is not specified, a value of 00 is used).

HomeTOCPrevNextGlossSearchHelp
-

Copyright 1988-1996 © Cisco Systems Inc.