This chapter provides information about configuring chassis slots, cards, and ports.
Note: This document uses the term preprovisioning in the context of preparing or preconfiguring entities such as chassis slots, media dependent adapters (MDAs), ports, and interfaces, before initialization. These entities can be installed but not enabled. When the entity is in a no shutdown state (administratively enabled), the entity is considered to be provisioned. |
The 7210 SAS-D, 7210 SAS-Dxp, 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C and the variants are platforms with a fixed port configuration, and no expansion slots. The 7210 SAS software inherits the concept of CPM, IOM and MDA from the 7750 SR to represent the hardware logically. These components are fixed and are not removable. The software creates two logical cards to represent the CPM and IOM and these are preprovisioned on boot-up. The IOM card is modeled with a single MDA, a logical entity to represent the fixed ports on the system. This MDA is auto-provisioned on boot-up and the user does not need to provision it. Ports and interfaces can also be preprovisioned.
The 7210 SAS-D, 7210 SAS-Dxp, 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C have a set of fixed ports. The software preprovisions the cards on bootup.
The show card command lists the cards auto-provisioned on 7210 SAS platforms.
The following show card sample output lists the cards auto-provisioned on the 7210 SAS-D:
The following show card sample output lists the cards auto-provisioned on the 7210 SAS-Dxp:
The following show card sample output lists the cards auto-provisioned on the 7210 SAS-K 2F1C2T:
The following show card sample output lists the cards auto-provisioned on the 7210 SAS-K 2F6C4T:
The following show card sample output lists the cards auto-provisioned on the 7210 SAS-K 3SFP+ 8C:
Some Nokia SFPs, XFPs, and the MSA DWDM transponder support the Digital Diagnostics Monitoring (DDM) capability, which allows the transceiver module to maintain information about its working status in device registers, including:
Note: The optical transceiver DDM feature provides real-time values for guidance. For the specific values, the optical power data provides an accuracy of ±3 dB or better. The accuracy of this data is defined in the relevant standard for the transceiver type, such as SFF-8472 for SFP+. Use an optical power meter where precise optical power data is required. Contact your Nokia technical support representative for further assistance or clarification. |
The transceiver is also programmed with warning and alarm thresholds for low and high conditions that can generate system events. These thresholds are programmed by the transceiver manufacturer.
No CLI command configuration is required to support DDM operations. However, the show port port-id detail command displays DDM information in the Transceiver Digital Diagnostics Monitoring output section.
The Tx and Rx power displayed in the DDM output are average optical power in dBm.
DDM information is populated into the router MIBs, so the DDM data can be retrieved by Network Management using SNMP. Also, RMON threshold monitoring can be configured for the DDM MIB variables to set custom event thresholds if the factory-programmed thresholds are not at the desired levels.
The following are potential uses of the DDM data:
The following table describes supported real-time DDM features.
Parameter | User units | SFP/XFP units | SFP | XFP | MSA DWDM |
Temperature | Celsius | C | Supported | Supported | Supported |
Supply Voltage | Volts | µV | Supported | Supported | Not supported |
TX Bias Current | mA | µA | Supported | Supported | Supported |
TX Output Power | dBm (converted from mW) | mW | Supported | Supported | Supported |
RX Received Optical Power4 | dBm (converted from dBm) (Avg Rx Power or OMA) | mW | Supported | Supported | Supported |
AUX1 | parameter dependent (embedded in transceiver) | - | Not supported | Supported | Not supported |
AUX2 | parameter dependent (embedded in transceiver) | - | Not supported | Supported | Not supported |
The following table describes supported factory-programmed DDM alarms and warnings.
Parameter | SFP/XFP units | SFP | XFP | Required? | MSA DWDM |
Temperature - High Alarm - Low Alarm - High Warning - Low Warning | C | Yes | Yes | Yes | Yes |
Supply Voltage - High Alarm - Low Alarm - High Warning - Low Warning | µV | Yes | Yes | Yes | No |
TX Bias Current - High Alarm - Low Alarm - High Warning - Low Warning | µA | Yes | Yes | Yes | Yes |
TX Output Power - High Alarm - Low Alarm - High Warning - Low Warning | mW | Yes | Yes | Yes | Yes |
RX Optical Power - High Alarm - Low Alarm - High Warning - Low Warning | mW | Yes | Yes | Yes | Yes |
AUX1 - High Alarm - Low Alarm - High Warning - Low Warning | parameter dependent (embedded in transceiver) | No | Yes | Yes | No |
AUX2 - High Alarm - Low Alarm - High Warning - Low Warning | parameter dependent (embedded in transceiver) | No | Yes | Yes | No |
The availability of the DDM real-time information and the warning and alarm status is based on the transceiver. The transceiver may or may not indicate that DDM is supported. Although some Nokia SFPs support DDM, Nokia SFPs support DDM releases later than Release 2.0. Contact a Nokia technical support representative for more information about DDM support for specific 7210 SAS releases. Non-DDM and DDM-supported SFPs are distinguished by a specific value in their EEPROM.
Although DDM data may be available for SFPs that do not indicate DDM support in their EEPROM, Nokia has not validated or verified the accuracy of this information.
DDM information can be displayed for non-Nokia transceivers, but Nokia is not responsible for the formatting, accuracy, and other informational details.
The DDM information and warnings/alarms are collected at one minute intervals, so the minimum resolution for any DDM events when correlating with other system events is one minute.
In the Transceiver Digital Diagnostic Monitoring section of the show port port-id detail command output:
This section describes 7210 SAS ports.
The following table lists supported Ethernet port types on the 7210 SAS platforms.
7210 SAS platforms | Copper ports (10/100/1000 Base-T) | Ethernet SFP ports | 10 Gigabit SFP+ ports |
7210 SAS-D | ✓ | ✓ | |
7210 SAS-Dxp | ✓ | ✓ 1 | ✓ |
7210 SAS-K 2F1C2T | ✓ | ✓ | |
7210 SAS-K 2F6C4T | ✓ | ✓ | |
7210 SAS-K 3SFP+ 8C | ✓ | ✓ | ✓ |
Note:
On 7210 SAS devices, a port must be configured as one of the following: access, access uplink, network, or hybrid. The following list describes the significance of the different port modes and the support available on different platforms:
The following table describes supported port modes on the 7210 SAS platforms.
Port mode platforms | Access | Network | Hybrid | Access-uplink |
7210 SAS-D | Yes | No | No | Yes |
7210 SAS-Dxp | Yes | No | No | Yes 1 |
7210 SAS-K 2F1C2T | Yes | No | No | Yes |
7210 SAS-K 2F6C4T | Yes | Yes | Yes | Yes |
7210 SAS-K 3SFP+ 8C | Yes | Yes | Yes | Yes |
Note:
The 7210 SAS supports an option to allow the user to use a different dot1q VLAN Ethernet Type (Etype). It allows for interoperability with third-party switches that use some non-standard (other than 0x8100) dot1q VLAN Etype.
The following are the configuration guidelines for Dot1q-Etype configured for dot1q encap port on 7210 SAS-D and 7210 SAS-Dxp.
Note: Power over Ethernet (PoE) is supported only on the 7210 SAS-Dxp 16p and 7210 SAS-Dxp 24p. |
The 7210 SAS-Dxp 16p and 7210 SAS-Dxp 24p support PoE in accordance with the 802.3af, 802.3at, and 802.3bt standards. This feature allows these platforms to supply power to connected PoE devices, such as telephones, CCTV cameras, and other PoE standard compliant devices.
The following PoE functionalities are available.
Note: The software accounts for power requirements based on the PD type and does not consider the PoE class within a type (a PoE device uses 15 W, a PoE+ device uses 30 W, a PoE++ device uses 60 W, and a HPoE device uses 90 W). For example, if the user configures one PoE port, the software deducts 15 W from the configured max-poe-power-budget. If the user configures two PoE ports and two PoE + ports, the software deducts 90 W from the configured max-poe-power-budget (assuming the configured value is greater than or equal to 90 W). If the user configures a value of 100 W and attempts to configure four PoE+ ports, the software deducts 30 W from the configured max-poe-power-budget for the first three configured PoE+ ports using a total of 90 W (10 W are remaining). When the user configures the fourth port, the configuration fails because only 10 W are available, which does not meet the power requirement for the fourth PoE+ port. |
The following configuration notes apply for PoE.
Note: MACsec is supported only on 7210 SAS-K 2F6C4T ETR and 7210 SAS-K 3SFP+ 8C. |
Media Access Control Security (MACsec) is a security technology that provides secure communication for almost all types of traffic on Ethernet links. MACsec provides point-to-point and point-to-multipoint security on Ethernet links between directly connected nodes, or nodes connected using an Layer 2 cloud.
MACsec can identify and prevent most security threats, including:
MACsec, defined in IEEE 802.1AE, uses Layer 2 to encrypt MACsec to encrypt anything from the 802.1AE header to the end of the payload, including 802.1Q. MACsec leaves the DMAC and SMAC in clear text.
The following figure shows the 802.1AE LAN-mode structure.
Forwarding a MACsec packet uses the destination MAC address, which is in clear text.
The 802.1AE header has a security tag (SecTAG) which includes:
The SecTAG is identified by the MACsec EtherType and includes the following fields:
The following figure shows the format of the SecTAG.
MACsec uses the following main modes of encryption:
The 802.1AE standard requires that the 802.1Q VLAN is encrypted. Some vendors provide the option of configuring MACsec on a port with VLAN in clear text. The 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C support both modes on both 1GE and 10GE ports.
The following figure shows VLAN encrypted and VLAN in clear text.
MACsec can be applied to a selected subset of the port traffic, based on the type and value of the packet encapsulation. Configure the system to match and encrypt all encapsulated traffic arriving on a port, including untagged, single-tag, and double-tag. This is the default behavior of MACsec and the only option supported.
MKA PDUs are generated specifically for the traffic encapsulation type that is being matched.
The following table describes the key management modes in MACsec.
Keying | Explanation | SR OS support | Where used |
Static SAK | Manually configures each node with a static SAK using CLI or NSP. | N/A | Switch to switch |
Static CAK PRE SHARED KEY | Uses dynamic MACsec Key Management (MKA) and uses a configured pre-shared key to derive the CAK. The CAK encrypts the SAK between two peers and authenticates the peers. | Supported | Switch to switch |
Dynamic CAK EAP Authentication | Uses dynamic MKA and an EAP MSK (Master System Key) to derive the CAK. The CAK encrypts the SAK between two peers and authenticates the peers. | Not Supported | Switch to switch |
Dynamic CAK MSK Distribution via RADIUS and EAP-TLS | MSKs are stored in the RADIUS server and distributed to the hosts via EAP-TLS. This is typically used in access networks where there are a large number of hosts using MACsec and connecting to an access switch. MKA uses MSK to derive the CAK. The CAK encrypts the SAK between 2 peers and authenticates the peers. | Not Supported | Host to switch |
The following figure shows the main concepts used in MACsec for the static-CAK scenario.
The following table describes MACsec terminology.
MACsec term | Description |
Connectivity Association (CA) | A security relationship, established and maintained by the MKA, that comprises a fully connected subset of the service access points in stations attached to a single LAN that are to be supported by MACsec. |
MACsec Key Agreement Protocol (MKA) | Control protocol between MACsec peers, which is used for peer aliveness and encryption key distribution. MKA is responsible for discovering, authenticating, and authorizing the potential participants in a CA. |
MAC Security Entity (SecY) | Operates the MAC security protocol within a system. Manages and identifies the SC and the corresponding active SA. |
Port Access Entity (PAE) | The protocol entity associated with a port. May support the functionality of authenticator, supplicant, or both. |
Security Channel (SC) | Provides a unidirectional point-to-point or point-to-multipoint communication. Each SC contains a succession of SAs, and each SC has a different SAK. |
Security Association Key (SAK) | The key used to encrypt the datapath of MACsec. |
Security Association (SA) | A security relationship that provides security guarantees for frames transmitted from one member of a CA to the others. In the case of 2 SAs per SC, each with a different SAK, each SC comprises a succession of SAs. Each SA has an SC identifier, concatenated with a two-bit association number. The Secure Association Identifier (SAI) that has been created allows the receiving SecY to identify the SA, and thereby the SAK used to decrypt and authenticate the received frame. The AN (and the SAI) is only unique for the SAs that can be used or recorded by participating SecYs at any time. MKA creates and distributes SAKs to each of the SecYs in a CA. This key creation and distribution is independent of the cryptographic operation of each of the SecYs. The decision to replace one SA with its successor is made by the SecY that transmits using the SC, after MKA has informed it that all the other SecYs are prepared to receive using that SA. No notification, other than receipt of a secured frame with a different SAI, is sent to the receiver. A SecY must always be capable of storing SAKs for two SAs for each inbound SC, and of swapping from one SA to another without notice. Certain LAN technologies can reorder frames of different priority, so reception of frames on a single SC can use interleaved SA. |
MACsec uses SAs to encrypt packets. Each SA has a single SAK that contains the cryptographic operations used to encrypt the datapath PDUs.
SAK is the secret key used by an SA to encrypt the channel.
When enabled, MACsec uses a static CAK security mode, which has two security keys: a CAK that secures control plane traffic and a randomly generated SAK that secures data plane traffic. Both keys are used to secure the point-to-point or point-to-multipoint Ethernet link and are regularly exchanged between devices on each end of the Ethernet link.
The following figure shows MACsec generating the CAK.
The node initially needs to secure the control plane communication to distribute the SAKs between two or more members of a CA domain.
The control plane is secured using CAK, which is generated using one of the following methods:
The following figure shows MACsec control plane authentication and encryption.
After the CAK is generated, it can obtain the following additional keys:
The key server then creates a SAK and shares it with the CAs of the security domain, and that SAK secures all data traffic traversing the link. The key server periodically creates and shares a randomly created SAK over the point-to-point link for as long as MACsec is enabled.
The SAK is encrypted using the AES-CMAC, the KEK as the encryption key, and ICK as the integration key.
The SAK is regenerated after the following events:
Each MACsec peer operates the MKA. Each node can operate multiple MKAs based on the number of CAs that it belongs to. Each instance of MKA is protected by a distinct secure CAK, that allows each Port Access Entity (PAE), or port, to ensure that information for a specific MKA instance is accepted only from other peers that also possess that CAK, therefore identifying themselves as members or potential members of the same CA. For a description of how the CAK identification is performed using CKN, see MACsec static CAK.
The following table describes the MKA PDUs generated for different traffic encapsulation matches.
Configuration | Configuration example (<s-tag>.<c-tag>) | MKA packet generation | Traffic pattern match/behavior | Supported on 7210 SAS |
All-encap | Config>port>ethernet>dot1x>macsec ca-name 10 | untagged MKA packet | Matches all traffic on port, including untagged, single-tag, and double-tag. Default behavior. | Yes |
UN-TAG | Config>port>ethernet>dot1x>macsec sub-port 1 encap-match untagged ca-name 2 | untagged MKA packet | Matches only untagged traffic on port | No |
802.1Q single S-TAG (specific S-TAG) | Config>port>ethernet>dot1x>macsec sub-port 2 encap-match dot1q 1 ca-name 3 | MKA packet generated with S-TAG=1 | Matches only single-tag traffic on port with tagID of 1 | No |
802.1Q single S-TAG (any S-TAG) | Config>port>ethernet>dot1x>macsec sub-port 3 encap-match dot1q * ca-name 4 | untagged MKA packet | Matches any dot1q single-tag traffic on port | No |
802.1ad double tag (both tag have specific TAGs) | Config>port>ethernet>dot1x>macsec sub-port 4 encap-match qinq 1.1 ca-name 5 | MKA packet generated with S-tag=1 and C-TAG=1 | Matches only double-tag traffic on port with service tag of 1 and customer tag of 1 | No |
802.1ad double tag (specific S-TAG, any C-TAG) | Config>port>ethernet>dot1x>macsec sub-port 6 encap-match qinq 1.* ca-name 7 | MKA packet generated with S-TAG=1 | Matches only double-tag traffic on port with service tag of 1 and customer tag of any | No |
802.1ad double tag (any S-TAG, any C-TAG) | Config>port>ethernet>dot1x>macsec sub-port 7 encap-match qinq *.* ca-name 8 | untagged MKA packet | Matches any double-tag traffic on port | No |
By default, all tags are encrypted in CA. An MKA can be generated without any tags (un-tag), but the data being matched can be based on dot1q or q-in-q.
The following table describes how single or double tags in clear configuration under a CA affect different traffic flow encryptions.
Configuration | Traffic pattern match/behavior | CA configuration: no tag in clear text | CA configuration: single-tag in clear text | CA configuration: double-tag in clear text |
PORT | Matches all traffic on port, including untagged, single-tag, double-tag (default behavior) | MKA PDU: untagged Untagged traffic: encrypted Single-tag traffic: encrypted, no tag in clear Double-tag traffic: encrypted, no tag in clear | MKA PDU: untagged Untagged traffic: in clear Single-tag traffic: encrypted, single-tag in clear Double-tag traffic: encrypted, single-tag in clear | MKA PDU: untagged Untagged traffic: in clear Single-tag traffic: in clear Double-tag traffic: encrypted, double-tag in clear |
A peer may support the use of one or more pre-shared keys (PSKs). An instance of MKA operates for each PSK that is administratively configured as active.
A pre-shared key is either created by NSP or configured using the CLI. Each PSK is configured using the following fields:
The CKN must be unique for each port among the configured sub-ports, and can be used to identify the key in subsequent management operations.
Each static CAK configuration can have two pre-shared key entries for rollover. The active PSK index dictates which CAK is being used for encrypting the MKA PDUs.
NSP has additional functionality to rollover and configure the PSK. The rollover using NSP can be based on a configured timer.
MKA uses a member identifier (MI) to identify each node in the CA domain.
A participant proves liveness to each of its peers by including the MI, together with an acceptably recent message number (MN), in an MKPDU.
To avoid a new participant having to respond to each MKPDU from each partner as it is received, or trying to delay its reply until it is likely that MI MN tuples have been received from all potential partners, each participant maintains and advertises both a live peers list and a potential peers list.
The live peers list includes peers that have included the participant MI and a recent MN in a recent MKPDU. The potential peers list includes all other peers that have transmitted an MKPDU that has been directly received by the participant or that were included in the live peers list of a MKPDU transmitted by a peer that has proved liveness. Peers are removed from each list when an interval of between MKA lifetime and MKA lifetime plus MKA Hello Time has elapsed since the participant's recent MN was transmitted. This time is sufficient to ensure that two or more MKPDUs will have been lost or delayed prior to the incorrect removal of a live peer.
Note:
|
The following table lists the MKA participant timer values.
Timer use | Timeout (parameter) | Timeout (parameter) |
Per participant periodic transmission, initialized on each transmission on expiry | MKA Hello Time or MKA Bounded Hello Time | 2.0 0.5 |
Per peer lifetime, initialized when adding to or refreshing the potential peers list or live peers list, expiry causes removal from the list | MKA Life Time | 6.0 |
Participant lifetime, initialized when participant created or following receipt of an MKPDU, expiry causes participant to be deleted | ||
Delay after last distributing a SAK, before the key server distributes a fresh SAK following a change in the live peers list while the potential peers list is still not empty |
The IEEE 802.1x-2010 standard identifies the following fields in the MKA PDU:
MACsec capability signals whether MACsec is capable of integrity and confidentiality. For information about the basic settings for MACsec capability, see the encryption-offset command description.
Encryption offset of 0, 30, or 50 starts from the byte after the SecTAG (802.1AE header). Ideally, the encryption offset should be configured for IPv4 (offset 30) and IPv6 (offset 50) to leave the IP header in clear text. This allows routers and switches to use the IP header for LAG or ECMP hashing.
The participants in an MKA instance that agree on a key server are responsible for the following:
Each participant in an MKA instance uses the key server priority (an 8-bit integer) encoded in each MKPDU to agree on the key server. Each participant selects the live participant advertising the highest priority as its key server whenever the live peers list changes, provided that highest priority participant has not selected another as its key server or is unwilling to act as the key server.
If a key server cannot be selected, SAKs are not distributed. In the event of a tie for highest priority key server, the member with the highest priority SCI is chosen. For consistency with other uses of the SCI MAC address component as a priority, numerically lower values of the key server priority and SCI receive the highest priority.
Note: Each SC is identified by an SCI that comprises a globally unique MAC address, and a port identifier unique within the system that has been allocated that address. |
Each MACsec device supports 64 Tx-SAs and 64 Rx-SAs. An SA (Security Association) is the key to encrypt or decrypt the data.
As defined in IEEE 802.1AE, each SecY contains an SC. An SC is a unidirectional concept; for example, Rx-SC or Tx-SC. Each SC contains at least one SA for encryption on Tx-SC and decryption on Rx-SC. Also, for extra security, each SC should be able to roll over the SA, therefore, Nokia recommends for each SC to have two SAs for rollover purposes.
MACsec PHY is known as a MACsec security zone. Each MACsec security zone supports 64 Tx-SAs and 64 Rx-SAs. Assuming two SAs for each SC for SA rollover, each zone supports 32 Rx-SCs and 32 Tx-SCs.
The following table describes the port mapping to security zones.
Platform | Ports in security zone 1 | Ports in security zone 2 | Ports in security zone 3 | SA limit per security zone |
7210 SAS-K 2F6C4T | Ports 1, 2, 3, 4 | Ports 5, 6, 7, 8 | Ports 9, 10, 11, 12 | Rx-SA = 64 Tx-SA = 64 |
7210 SAS-K 3SFP+ 8C | Ports 1, 2, 3, 4 (1, 2, and 3 are 10GE ports) | Ports 5, 6, 7, 8 | Ports 9, 10, 11 | Rx-SA = 64 Tx-SA = 64 |
In a point-to-point topology, each router needs a single security zone, a single Tx-SC for encryption, and a single Rx-SC for decryption. Each SC has two SAs. In total, for point-to-point topology, four SAs are needed: two Rx-SAs for Rx-SC1 and two Tx-SAs for Tx-SC1.
The following figure shows the P2P topology.
In a multi-point topology with N nodes, each node needs a single Tx-SC and N Rx-SC, one for each one of the peers. As such, 64 maximum Rx-SAs for each security zone translates to 32 Rx-SCs, which breaks down to only 32 peers; for example, only 33 nodes in the multipoint topology for each security zone. So from the perspective of each node, there is one Tx-SC and 32 Rx-SCs.
As shown in the following figure, when the 34th node joins the multi-point topology, the other 33 nodes that are already part of this domain do not have SAs to create an Rx-SC for this 34th node; however, the 34th node has a Tx-SC and can accept 32 peers. The 34th node starts to transmit and encrypt the PDUs based on its Tx-SC. However, because all other nodes do not have as SC for this SAI, all Rx PDUs are dropped.
Nokia recommends that a multicast domain, for a single security zone, should not exceed 32 peers, or the summation of all the nodes in a security zone CA domain should not exceed 33. This is the same as if a security zone has four CAs; the summation of all nodes in the four CAs should be 33 or less.
A security zone has 64 Rx-SAs and 64 Tx-SAs, as described in SA limits and network design. Two Rx-SAs are used for each Rx-SC for rollover purposes, and two Tx-SAs are used for Tx-SC for rollover purposes. This translates to 32 peers for each security zone.
Under each port, you can configure a max-peer parameter to assign the number of peers allowed on that port.
Note: You must ensure that the number of peers does not exceed the limit of maximum peers per security zone or maximum peers per port; for example, exceeds the port max-peer parameter. |
If the maximum peer is exceeded, the peer connectivity becomes random. In the case of a node failure or packet loss, peers join the CA randomly, on a first-come-first-served basis.
Caution: Nokia strongly recommends that the maximum peer value is not exceeded per-security zone or port. |
In most Layer 2 networks, MAC forwarding is done using a destination MAC address. The 802.1AE standard requires that any field after source and destination MAC address and after the SecTAG must be encrypted. This includes the 802.1Q tags. In some VLAN switching networks, it might be desired to leave the 802.1Q tag in clear text.
7210 SAS allows the configuration of 802.1Q tag in clear text by placing the 802.1Q tag before the SecTAG, or encrypts it by placing it after the SecTAG.
The following table lists the MACsec encryption of 802.1Q tags when the clear-tag is configured.
Unencrypted format | Clear-tag-mode configuration | Pre-encryption (Tx) | Pre-decryption (Rx) |
Single tag (dot1q) | Single-tag | DA, SA, TPID, VID, Etype | DA, SA, TPID, VID, SecTAG |
Single tag (dot1q) | Double-tag | DA, SA, TPID, VID, Etype | DA, SA, TPID, VID, SecTAG |
Double tag (q-in-q) | Single-tag | DA, SA, TPID1, VID1, IPID2, VID2, Etype | DA, SA, TPID1, VID1, SecTAG |
Double tag (q-in-q) | Double-tag | DA, SA, TPID1, VID1, IPID2, VID2, Etype | DA, SA, TPID1, VID1, IPID2, VID2, SecTAG |
MACsec is an Ethernet packet and, as with any Ethernet packet, can be forwarded through multiple switches using Layer 2 forwarding. The encryption and decryption of the packets is done using the 802.1x (MKA) capable ports.
To ensure that MKA is not terminated on an intermediate switch or router, you can enable 802.1x tunneling on the corresponding port.
Check to see if tunneling is enabled using the following command:
By enabling tunneling, the 802.1x MKA packets transit that port without being terminated, because such MKA negotiation does not occur on a port that has 802.1x tunneling enabled.
The MKA packets are transported over EAPoL with a multicast destination MAC address.
In cases where a point-to-point connection from the MKA to a peer node over a Layer 2 multihop cloud is required, you can set the EAPoL destination MAC address to the peer MAC address. This forces the MKA to traverse multiple nodes and establish an MKA session with the specific peer.
Mirroring is performed prior to MACsec encryption. Therefore, if a port is MACsec-enabled and is also being mirrored, all the mirror packets are in clear text.
The 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C support combo ports. The combo port provides two physical interface options to the user. One option is to configure it as an SFP port allowing for fiber-based connectivity and speeds of 100/1000 Mb/s with the advantages of using suitable optics for longer reach. The other option is to configure it as a fixed copper port, which provides cheaper connectivity for shorter reach. The SFP port support 100/1000 Mb/s speeds and the copper port can support 10/100/1000Mbps speed. The combo port can be configured either as an SFP port or a copper port. Both interfaces cannot be used simultaneously.
The IEEE 802.1ab Link Layer Discovery Protocol (LLDP) standard defines protocol and management elements suitable for advertising information to stations attached to the same IEEE 802 LAN. The protocol facilitates the identification of stations connected by IEEE 802 LANs or MANs, their points of interconnection, and access points for management protocols.
The LLDP helps the network operators to discover topology information. This information is used to detect and resolve network problems and inconsistencies in the configuration.
The following list is the information included in the protocol defined by the IEEE 802.1ab standard:
The following figure shows LLDP internal architecture for a network node.
To detect and address network problems and inconsistencies in the configuration, the network operators can discover the topology information using LLDP. The Standard-based tools address the complex network scenarios where multiple devices from different vendors are interconnected using Ethernet interfaces.
The following figure shows an MPLS network that uses Ethernet interfaces in the core or as an access/handoff interfaces to connect to different kind of Ethernet enabled devices such as service gateway/routers, QinQ switches DSLAMs, or customer equipment.
The topology information of the network in the following figure can be discovered if, IEEE 802.1ab LLDP is running on each of the Ethernet interfaces in network.
LLDP is an unidirectional protocol that uses the MAC layer to transmit specific information related to the capabilities and status of the local device. Separately from the transmit direction, the LLDP agent can also receive the same kind of information for a remote device which is stored in the related MIBs.
LLDP does not contain a mechanism for soliciting specific information from other LLDP agents, nor does it provide a specific means of confirming the receipt of information. LLDP allows the transmitter and the receiver to be separately enabled, making it possible to configure an implementation so the local LLDP agent can either transmit only or receive only, or can transmit and receive LLDP information.
The information fields in each LLDP frame are contained in a LLDP Data Unit (LLDPDU) as a sequence of variable length information elements, that each include type, length, and value fields (known as TLVs), where:
Each LLDPDU contains four mandatory TLVs and can contain optional TLVs as selected by network management:
The chassis ID and the port ID values are concatenated to form a logical identifier that is used by the recipient to identify the sending LLDP agent/port. Both the chassis ID and port ID values can be defined in a number of convenient forms. When selected however, the chassis ID/port ID value combination remains the same as long as the particular port remains operable.
A non-zero value in the TTL field of the Time To Live TLV tells the receiving LLDP agent how long all information pertaining to this LLDPDU identifier will be valid so that all the associated information can later be automatically discarded by the receiving LLDP agent if the sender fails to update it in a timely manner. A zero value indicates that any information pertaining to this LLDPDU identifier is to be discarded immediately.
A TTL value of 0 can be used, for example, to signal that the sending port has initiated a port shutdown procedure. The End Of LLDPDU TLV marks the end of the LLDPDU.
The implementation defaults to setting the port-id field in the LLDP OAMPDU to tx-local. This encodes the port-id field as ifIndex (sub-type 7) of the associated port. This is required to support some releases of SAM. SAM may use the ifIndex value to properly build the Layer Two Topology Network Map. However, this numerical value is difficult to interpret or readily identify the LLDP peer when reading the CLI or MIB value without SAM. Including the port-desc option as part of the tx-tlv configuration allows an ALU remote peer supporting port-desc preferred display logic to display the value in the port description TLV instead of the port-id field value. This does not change the encoding of the port-id field. That value continues to represent the ifIndex. In some environments, it may be important to select the specific port information that is carried in the port-id field. The operator has the ability to control the encoding of the port-id information and the associated subtype using the port-id-subtype option. Three options are supported for the port-id-subtype:
tx-if-alias — Transmit the ifAlias String (subtype 1) that describes the port as stored in the IFMIB, either user configured description or the default entry (that is,10/100/Gig ethernet SFP)
tx-if-name — Transmits the ifName string (subtype 5) that describes the port as stored in the IFMIB, ifName info.
tx-local — The interface ifIndex value (subtype 7)
IPv6 (address subtype 2) and IPv4 (address subtype 1) LLDP System Management addresses are supported.
Customers who subscribe to Epipe service consider the Epipe as a wire, and run LLDP between their devices which are located at each end of the Epipe. To facilitate this, the 7210 devices support tunneling of LLDP frames that use the nearest bridge destination MAC address.
If enabled using the command tunnel-nearest-bridge-dest-mac, all frames received with the matching LLDP destination mac address are forwarded transparently to the remote end of the Epipe service. To forward these frames transparently, the port on which tunneling is enabled must be configured with NULL SAP and the NULL SAP must be configured in an Epipe service. Tunneling is not supported for any other port encapsulation or other services.
Additionally, before enabling tunneling, admin status for LLDP dest-mac nearest-bridge must be set to disabled or Tx only, using the command admin-status available under config>port>ethernet>lldp>destmac-nearest-bridge. If the admin-status for dest-mac nearest-bridge is set to receive and process nearest-bridge LLDPDUs (that is, if either rx or tx-rx is set), then it overrides the tunnel-nearest-bridge-dest-mac command.
The following table lists the behavior for LLDP with different values set in use for admin-status and when tunneling is enabled or disabled:
Note: Transparent forwarding of LLDP frames can be achieved using the standard defined mechanism when using the either nearest-non-tmpr or the nearest-customer as the destination MAC address in the LLDP frames. It is recommended that the customers use these MAC address where possible to conform to standards. This command allows legacy LLDP implementations that do not support these additional destinations MAC addresses to tunnel LLDP frames that use the nearest-bridge destination MAC address. |
Note: This feature is only supported on the 7210 SAS-Dxp. |
The IEEE standard 802.1AB is designed to provide a multivendor solution for the discovery of elements on an Ethernet Layer 2 data network. The LLDP standard allows nodes, which are attached to an Ethernet LAN or WAN, to advertise their supported functionalities to other nodes attached to the same LAN segment. See Link Layer Discovery Protocol for more information about IEEE 802.1AB.
The ANSI/TIA-1057 standard, Link Layer Discovery Protocol for Media Endpoint Devices, provides extensions to IEEE 802.1AB that are specific to media endpoint devices (MEDs), for example, voice phone and video terminal, in an IEEE 802 LAN environment. This standard defines specific usage of the IEEE 802.1AB LLDP base specification and interaction behavior between MEDs and LAN infrastructure elements.
LLDP media endpoint discovery (LLDP-MED) is an extension of LLDP that provides basic provisioning information to connected media endpoint devices. LLDP-MED extends LLDP protocol messages with additional information to support voice over IP (VoIP) applications.
On the 7210 SAS, LLDP-MED supports the exchange of network policy information to provide the VLAN ID, dot1p bits, and IP DSCP value to media endpoint devices, such as a VoIP phone.
The following TLVs are supported for LLDP-MED:
LLDP-MED devices are composed of two primary device types: network connectivity devices and endpoint devices.
The LLDP-MED network connectivity devices provide access to the IEEE 802 LAN infrastructure for LLDP-MED endpoint devices. An LLDP-MED network connectivity device is a LAN access device based on any of the following technologies:
The LLDP-MED endpoint devices are composed of three subtypes, as defined in ANSI/TIA-1057:
The following figure shows the LLDP-MED reference model.
Note: Acting as the network connectivity device, the 7210 SAS only supports the configuration of LLDP-MED communication device endpoints (Class III), such as VoIP phone, using the Network Policy TLV. |
To enable LLDP-MED network connectivity device functions, configure the config port ethernet lldp dest-mac lldp-med admin-status command. When this command is configured, the behavior of the node is as follows.
Note: The configure port ethernet lldp admin-status command must be enabled for LLDP-MED TLV processing. The admin-status configuration in the lldp context must not conflict with the admin-status configuration in the lldp-med context. |
When LLDP-MED is enabled on the port, the Network Policy TLV is sent out of the port using the parameters configured for the network policy that is associated with the port.
Note: Refer to the 7210 SAS-D, Dxp, K 2F1C2T, K 2F6C4T, K 3SFP+ 8C Basic System Configuration Guide for more information about configuring network policy parameters using commands in the config>system>lldp>lldp-med context. |
The endpoint move detection notification enables VoIP management systems to track the movement of VoIP phones. On the 7210 SAS, the user has the option to generate the lldpXMedTopologyChangeDetected event on detection of movement of the endpoint device. By default, this event is disabled. To enable the event, configure the config>log>event-control lldp generate and config>port>ethernet>lldp> dest-mac>nearest-bridge>notification commands.
LLDP-MED modifies the usage of some LLDP base TLVs for network connectivity devices. Specifically, the 7210 SAS supports the transmission of the MAC/PHY Configuration Status TLV when LLDP-MED is enabled. The transmission of this TLV is enabled using the config>port>ethernet>lldp>dest-mac>lldp-med>tx-tlvs mac-phy-config-status CLI command option.
The 7210 SAS supports port loopback for Ethernet ports. There are two flavors of port loopback commands - port loopback without mac-swap and port loopback with mac-swap. Both these commands are helpful for testing the service configuration and measuring performance parameters such as throughput, delay, and jitter on service turn-up. Typically, a third-party external test device is used to inject packets at desired rate into the service at a central office location.
The following sections describe the port loopback functionality.
Note: Port loopback without MAC swap is supported on all 7210 SAS platforms as described in this document. |
When the port loopback command is enabled, the system enables PHY/MAC loopback on the specified port. All the packets are sent out the port configured for loopback and received back by the system. On ingress to the system after the loopback, the node processes the packets as per the service configuration for the SAP.
This is recommended for use with only Epipe services. This command affects all the services configured on the port, therefore the user is advised to ensure all the configuration guidelines mentioned for this feature in the command description are followed.
Note: Port loopback with MAC swap is only supported on the 7210 SAS-D and 7210 SAS-Dxp. |
The 7210 SAS provides port loopback support with MAC swap. When the port loopback command is enabled, the system enables PHY/MAC loopback on the specified port. All the packets are sent out the port configured for loopback and received back by the system. On ingress to the system after the loopback, the node swaps the MAC addresses for the specified SAP and the service. It only processes packets that match the specified source MAC address and destination MAC address, while dropping packets that do not match. It processes these packets as per the service configuration for the SAP.
This is recommended for use with only VPLS and Epipe services. This command affects all the services configured on the port, therefore the user is advised to ensure all the configuration guidelines mentioned for this feature in the command description are followed.
Note: Per-SAP loopback with MAC swap is only supported on the 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C. |
The 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C provide per-SAP loopback support with MAC swap. When the SAP loopback command is enabled, all the packets that are sent out the SAP configured with loopback are looped back at the egress of the SAP back into the ingress of the SAP. The node swaps the MAC addresses before the packet hits the ingress of the SAP. After it is received back at SAP ingress, it processes these packets as per the service configuration for the SAP. Only traffic sent out of the test SAP is looped back. The loopback does not affect other SAPs and services configured on the same port. Per-SAP loopback is supported for use with both VPLS and Epipe services.
Based on the IEEE 802.3ax standard (formerly 802.3ad), Link Aggregation Groups (LAGs) can be configured to increase the bandwidth available between two network devices, depending on the number of links installed. LAG also provides redundancy in the event that one or more links participating in the LAG fail. All physical links in a specific LAG links combine to form one logical interface.
Packet sequencing must be maintained for any specific session. The hashing algorithm deployed by Nokia routers is based on the type of traffic transported to ensure that all traffic in a flow remains in sequence while providing effective load sharing across the links in the LAG.
LAGs must be statically configured or formed dynamically with Link Aggregation Control Protocol (LACP). The optional marker protocol described in IEEE 802.3ax is not implemented. LAGs can be configured on access uplink and access ports.
Hardware capabilities:
Software capabilities:
LAG configuration guidelines include:
The following figure shows traffic routed between ALA-1 and ALA-2 as a LAG consisting of four ports.
On the 7210 SAS-D and 7210 SAS-Dxp, an ingress QoS policy is applied to the aggregate traffic that is received on all the member ports of the LAG. For example, if an ingress policy is configured with a policer of PIR 100Mbps, for a SAP configured on a LAG with two ports, then the policer limits the traffic received through the two ports to a maximum of 100Mbps.
On the 7210 SAS-D and 7210 SAS-Dxp, an egress QoS policy parameters are applied to all the ports that are members of the LAG (all ports get the full SLA). For example, if an egress policy is configured with a queue shaper rate of PIR 100Mbps, and applied to an access-uplink or access LAG configured with two port members, then each port would send out 100 Mbps of traffic for a total of 200Mbps of traffic out of the LAG. The advantage of this method over a scheme where the PIR is divided equally among all the member ports of the LAG is that, a single flow can use the entire SLA. The disadvantage is that, the overall SLA can be exceeded if the flows span multiple ports.
On the 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C, an ingress QoS policy is applied to the aggregate traffic that is received through all the member ports of the LAG and mapped to that service entity (for example: access-uplink port). For example, if an ingress policy is configured with a queue shaper rate of PIR 100Mbps for an access-uplink LAG configured with two ports, then the queue shaper limits the traffic received through the two ports to a maximum of 100Mbps.
On the 7210 SAS-K 2F1C2T,7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C, egress QoS policy parameters are applied to all the ports that are members of the LAG (all ports get the full SLA). For example, if an egress policy is configured with a queue shaper rate of PIR 100Mbps, and applied to an access-uplink LAG configured with two port members, then each port can send out 100 Mbps of traffic for a total of 200Mbps of traffic out of the LAG (assuming flows are distributed among the 2 ports). The advantage of this method over a scheme where the PIR is divided equally among all the member ports of the LAG is that a single flow can use the entire SLA. The disadvantage is that the overall SLA can be exceeded if the flows span multiple ports.
Hold time controls enable port link damping timers that reduce the number of link transitions reported to upper layer protocols.
The 7210 SAS port link damping feature guards against excessive port transitions. Any initial port transition is immediately advertised to upper layer protocols, but any subsequent port transitions are not advertised to upper layer protocols until a configured timer has expired.
An “up” timer controls the dampening timer for link up transitions, and a “down” timer controls the dampening timer for link down transitions.
Generally, link aggregation is used for two purposes: provide an increase in bandwidth and/or provide redundancy. Both aspects are addressed by aggregating several Ethernet links in a single LAG.
LACP enhancements allow active lag-member selection based on particular constrains. The mechanism is based on the IEEE 802.3ax standard so interoperability is ensured.
Note: Refer to the 7210 SAS-D, Dxp, K 2F1C2T, K 2F6C4T, K 3SFP+ 8C Router Configuration Guide for more information about ECMP support for 7210 SAS platforms. |
When a requirement exists to increase the available bandwidth for a logical link that exceeds the physical bandwidth or add redundancy for a physical link, typically one of the following methods is applied:
A 7210 SAS can deploy both methods at the same time, meaning it can use ECMP of two or more Link Aggregation Groups (LAG) or single links.The Nokia implementation supports per flow hashing used to achieve uniform loadspreading and per service hashing designed to provide consistent per service forwarding. Depending on the type of traffic that needs to be distributed into an ECMP or a LAG, different variables are used as input to the hashing algorithm.
The following tables list the packets used for hashing on 7210 SAS platforms.
The following table describes the packet fields used for hashing for services configured on the 7210 SAS-D.
Note: The following notes apply to Table 16:
|
Traffic type | Packet fields used | ||||||||
BDA | BSA | EtherType | Ingress Port-ID | ISID | Source and destination | VLAN | |||
MAC | IP | L4 Ports | |||||||
VPLS service SAP to SAP | |||||||||
IP traffic (learned) | ✓ | ✓ | |||||||
IP traffic (unlearned) | ✓ | ✓ | ✓ | ||||||
PBB traffic (learned) | ✓ | ✓ | ✓ | ||||||
PBB traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | |||||
Non-IP traffic (learned) | ✓ | ✓ | ✓ | ||||||
Non-IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | |||||
Epipe service SAP to SAP | |||||||||
IP traffic | ✓ | ✓ | ✓ | ||||||
PBB traffic | ✓ | ✓ | ✓ | ✓ | |||||
Non-IP traffic | ✓ | ✓ | ✓ | ✓ | |||||
IES service (IPv4): IES SAP to IES SAP | |||||||||
IPv4 unicast traffic | ✓ | ✓ |
The following table describes the packet fields used for hashing for services configured on the 7210 SAS-Dxp.
Note: The following notes apply to Table 17:
|
Traffic type | Packet fields used | ||||||||
BDA | BSA | EtherType | Ingress Port-ID | ISID | Source and destination | VLAN | |||
MAC | IP | L4 Ports | |||||||
VPLS service SAP to SAP | |||||||||
IP traffic (learned) | ✓ | ✓ | |||||||
IP traffic (unlearned) | ✓ | ✓ | |||||||
PBB traffic (learned) | ✓ | ✓ | |||||||
PBB traffic (unlearned) | ✓ | ✓ | ✓ | ||||||
Non-IP traffic (learned) | ✓ | ✓ | |||||||
Non-IP traffic (unlearned) | ✓ | ✓ | |||||||
Epipe service SAP to SAP | |||||||||
IP traffic | ✓ | ✓ | |||||||
PBB traffic | ✓ | ✓ | ✓ | ||||||
Non-IP traffic | ✓ | ✓ | |||||||
IES service (IPv4): IES SAP to IES SAP | |||||||||
IPv4 unicast traffic | ✓ | ✓ |
The following table describes the packet fields used for hashing for services configured on the 7210 SAS-K 2F1C2T.
Note: The following notes apply to Table 18:
|
Traffic type | Packet fields used | ||||||||
BDA | BSA | Ingress Port-ID | IP Protocol | Source and destination | VLAN | ||||
MAC | IP | L4 Ports | Outer | Inner | |||||
VPLS Service SAP to SAP | |||||||||
IP traffic (learned and unlearned) | ✓ | ✓ | ✓ | ✓ | ✓ | ||||
PBB traffic (learned and unlearned) | ✓ | ✓ | ✓ | ✓ | ✓ | ||||
MPLS traffic (learned and unlearned) | ✓ | ✓ 1 | ✓ | ✓ | |||||
Non-IP traffic (learned and unlearned) | ✓ | ✓ | ✓ | ✓ | |||||
Epipe Service SAP to SAP | |||||||||
IP traffic | ✓ | ✓ | ✓ | ✓ | ✓ | ||||
PBB traffic | ✓ | ✓ | ✓ | ✓ | ✓ | ||||
MPLS traffic | ✓ | ✓ 1 | ✓ | ✓ | |||||
Non-IP traffic | ✓ | ✓ | ✓ | ✓ |
Note:
The following table describes the packet fields used for hashing for services configured on the 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C.
Note: The following notes apply to Table 19:
|
Traffic type | Packet fields used | |||||||
Ingress Port-ID | IP Protocol | MPLS Label Stack | Source and destination | VLAN | ||||
MAC | IP | L4 Ports | Outer | Inner | ||||
VPLS Service SAP to SAP | ||||||||
IP traffic (learned and unlearned) | ✓ | ✓ | ✓ | ✓ | ✓ | |||
MPLS traffic (learned and unlearned) | ✓ | ✓ 1 | ✓ | ✓ | ||||
Non-IP traffic (learned and unlearned) | ✓ | ✓ | ✓ | ✓ | ||||
VPLS Service SAP to SDP | ||||||||
IP traffic (learned and unlearned) | ✓ | ✓ | ✓ | ✓ | ✓ | |||
MPLS traffic | ✓ | ✓ 1 | ✓ | ✓ | ||||
Non-IP traffic (learned and unlearned) | ✓ | ✓ | ✓ | ✓ | ||||
VPLS Service SDP to SAP 2 | ||||||||
IP traffic (learned and unlearned) | ✓ | ✓ | ✓ | ✓ | ||||
Non-IP traffic (learned and unlearned) | ✓ | ✓ | ||||||
VPLS Service SDP to SDP 2 | ||||||||
IP traffic (learned and unlearned) | ✓ | ✓ | ✓ | ✓ | ||||
Non-IP traffic (learned and unlearned) | ✓ | ✓ | ||||||
Epipe Service SAP to SAP | ||||||||
IP traffic | ✓ | ✓ | ✓ | ✓ | ✓ | |||
MPLS traffic | ✓ | ✓ 1 | ✓ | ✓ | ||||
Non-IP traffic | ✓ | ✓ | ✓ | ✓ | ||||
Epipe Service SAP to SDP | ||||||||
IP traffic | ✓ | ✓ | ✓ | ✓ | ✓ | |||
MPLS traffic | ✓ | ✓ 1 | ✓ | ✓ | ||||
Non-IP traffic | ✓ | ✓ | ✓ | ✓ | ||||
Epipe Service SDP to SAP 2 | ||||||||
IP traffic (learned and unlearned) | ✓ | ✓ | ✓ | ✓ | ||||
Non-IP traffic (learned and unlearned) | ✓ | ✓ | ||||||
MPLS - LSR | ||||||||
All traffic | ✓ | ✓ 3 | ✓ | |||||
IES Service (IPv4) IES SAP to IES SAP | ||||||||
— | ✓ | ✓ |
| ✓ 4 | ✓ | ✓ | ||
IES Service (IPv6) IES SAP to IES SAP | ||||||||
— | ✓ | ✓ |
| ✓ 4 | ✓ | ✓ | ||
IES Service (IPv4) IES SAP to IPv4 network port interface | ||||||||
— | ✓ | ✓ |
| ✓ 4 | ✓ | ✓ | ||
IES Service (IPv6) IES SAP to IPv6 network port interface | ||||||||
— | ✓ | ✓ |
| ✓ 4 | ✓ | ✓ | ||
IES Service (IPv4) interface IPv4 network port interface to IES SAP | ||||||||
— | ✓ | ✓ |
| ✓ 4 | ✓ | ✓ | ||
IES Service (IPv6) IPv6 network port interface to IES SAP | ||||||||
— | ✓ | ✓ |
| ✓ 4 | ✓ | ✓ | ||
Network port (IPv4) interface IPv4 network interface to IPv4 network interface | ||||||||
— | ✓ | ✓ |
| ✓ 4 | ✓ | ✓ | ||
Network port (IPv6) interface IPv6 network interface to IPv6 network interface | ||||||||
— | ✓ | ✓ |
| ✓ 4 | ✓ | ✓ | ||
VPRN SAP to SAP, SDP to SAP, SAP to SDP | ||||||||
— | ✓ | ✓ |
| ✓ 4 | ✓ | ✓ |
Notes:
The following table describes the packet fields used by different services and traffic types to generate the PW hash label.
Traffic type | Packet fields used | ||||||
Ingress Port-ID | IP Protocol | Source and destination | VLAN | ||||
MAC | IP | L4 Ports | Outer | Inner | |||
VPLS and Epipes services SAP to SDP | |||||||
IP traffic (learned and unlearned) | ✓ | ✓ | ✓ | ✓ | ✓ | ||
MPLS traffic (learned and unlearned) | ✓ | ✓ 1 | ✓ | ✓ | |||
Non-IP traffic (learned and unlearned) | ✓ | ✓ | ✓ | ✓ | |||
VPLS services SDP to SDP | |||||||
IP traffic (learned and unlearned) | ✓ | ✓ | ✓ | ✓ | |||
Non-IP traffic (learned and unlearned) | ✓ | ✓ |
Note:
The following table describes the packet fields used for LDP ECMP hashing for label edge router (LER) and label switching router (LSR) devices on the 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C.
Traffic type | Packet fields used | |||||||
Ingress Port-ID | IP Protocol | MPLS Label Stack | Source and destination | VLAN | ||||
MAC | IP | L4 Ports | Outer | Inner | ||||
VPLS and Epipe services SAP to SDP (iLER) | ||||||||
IP traffic | ✓ | ✓ | ✓ | ✓ | ✓ | |||
MPLS traffic | ✓ | ✓ 1 | ✓ | ✓ | ||||
Non-IP traffic | ✓ | ✓ | ✓ | ✓ | ||||
LSR | ||||||||
MPLS traffic | ✓ | ✓ 2 | ✓ |
Notes:
This section describes the Multi-Chassis LAG (MC-LAG) concept. MC-LAG is an extension of a LAG concept that provides node-level redundancy in addition to link-level redundancy provided by “regular LAG”.
Note: MC-LAG is supported on the 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C. |
Typically, MC-LAG is deployed in a network-wide scenario and provides redundant connection between different end points. The whole scenario is then built by a combination of different mechanisms (for example, MC-LAG and redundant pseudowire to provide end-to-end (e2e) redundant point-to-point (p2p) connection or dual homing of CPE devices in Layer 2/3 VPNs).
MC-LAG is a method of providing redundant Layer 2/3 access connectivity that extends beyond link level protection by allowing two systems to share a common LAG end point.
The CPE/access node is connected with multiple links toward a redundant pair of Layer 2/3 access aggregation nodes such that both link and node level redundancy is provided. By using a multi-chassis LAG protocol, the paired Layer 2/3 aggregation nodes (referred to as the redundant-pair) appear to be a single node that is utilizing LACP toward the access node. The multi-chassis LAG protocol between the redundant-pair ensures a synchronized forwarding plane to and from the CPE/access node. It is used to synchronize the link state information between the redundant-pair nodes and provide correct LACP messaging to the CPE/access node from both redundant-pair nodes.
To ensure SLAs and deterministic forwarding characteristics between the CPE/access and the redundant-pair node, the multi-chassis LAG function provides an active/standby operation toward/from the CPE/access node. LACP is used to manage the available LAG links into active and standby states so that only links from one aggregation node are active at a time to and from the CPE/access node.
MC-LAG has the following characteristics.
Figure 13 and Figure 14 show different combinations of supported MC-LAG attachments. The supported configurations can be divided into the following subgroups:
The following figure shows dual homing to remote PE pairs.
The following figure shows dual homing to local PE pairs.
The forwarding behavior of the nodes is governed by the following principles. Note that the logical destination (actual forwarding decision) is primarily determined by the service (VPLS or VLL), and the following principle apply only if the destination or source is based on MC-LAG.
The following figure shows the connection between two CPE/access nodes across network based on Layer 2/3 VPN pseudo-wires. The connection between a CPE/access node and a pair of access aggregation PE routers is realized by MC-LAG. From the CPE/access node perspective, a redundant pair of access aggregation PE routers acts as a single partner in LACP negotiation. At any point in time, only one of the routers has active links in a specific LAG. The status of LAG links is reflected in the status signaling of pseudowires set between all participating PEs. The combination of active and standby states across LAG links and pseudowires give only one unique path between a pair of MSANs.
Note that the configuration in the following figure shows an example configuration of VLL connections based on MC-LAG. Specifically, it shows a VLL connection where the two ends (SAPs) are located on two different redundant-pairs. However, additional configurations are possible, for example:
The following guidelines apply to MC-LAG configurations.
Note: When configuring associated LAG ID parameters, the LAG must be in access mode and LACP must be enabled. |
Use the following syntax to configure multi-chassis redundancy features.
The following is a sample configuration output.
Multi-Chassis LAG (MC-LAG) is an extension of a LAG concept that provides node-level redundancy in addition to the link-level redundancy provided by “regular LAG”. Typically, MC-LAG is deployed network-wide, along with IP/MPLS, providing redundant connections between different access end points. In a typical MC-LAG deployment, a pair of nodes are configured to be MC-LAG peers (also referred to as MC-LAG servers), and access devices are connected to the MC-LAG peers using LAGs with active/standby LAG groups.
The 7210 SAS-D, 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C platforms can be connected to an MC-LAG-enabled node, such as an MC-LAG server. In particular, these platforms allow for provisioning of links into subgroups in a LAG and support active/standby links. The MC-LAG solution can be achieved with or without subgroups configured.
Ethernet ring protection switching provides ITU-T G.8032 specification compliance to achieve resiliency for Ethernet Layer 2 networks. G.8032 (Eth-ring) is built on Ethernet OAM and is often referred to as Ring Automatic Protection Switching (R-APS).
Refer to “G.8032 Protected Ethernet Rings” in the 7210 SAS-D, Dxp, K 2F1C2T, K 2F6C4T, K 3SFP+ 8C Services Guide for more information about Ethernet rings.
The Nokia 7210 SAS supports network access control of client devices (PCs, STBs, etc.) on an Ethernet network using the IEEE. 802.1x standard. 802.1x is known as Extensible Authentication Protocol (EAP) over a LAN network or EAPOL.
The 7210 SAS supports port-based network access control for Ethernet ports only. Every Ethernet port can be configured to operate in one of three different operation modes, controlled by the port-control parameter:
The authentication exchange is carried out between the supplicant and the authentication server, the authenticator acts only as a bridge. The communication between the supplicant and the authenticator is done through the Extended Authentication Protocol (EAP) over LANs (EAPOL). On the back end, the communication between the authenticator and the authentication server is done with the RADIUS protocol. The authenticator is therefore a RADIUS client, and the authentication server a RADIUS server.
The router initiates the procedure when the Ethernet port becomes operationally up, by sending a special PDU called EAP-Request/ID to the client. The client can also initiate the exchange by sending an EAPOL-start PDU, if it doesn't receive the EAP-Request/ID frame during bootup. The client responds on the EAP-Request/ID with a EAP-Response/ID frame, containing its identity (typically username + password).
After receiving the EAP-Response/ID frame, the router will encapsulate the identity information into a RADIUS AccessRequest packet, and send it off to the configured RADIUS server.
The RADIUS server checks the supplied credentials, and if approved will return an Access Accept message to the router. The router notifies the client with an EAP-Success PDU and puts the port in authorized state.
The 802.1x authentication procedure is controlled by a number of configurable timers and scalars. There are two separate sets, one for the EAPOL message exchange and one for the RADIUS message exchange.
EAPOL timers:
RADIUS timer and scaler:
The router can also be configured to periodically trigger the authentication procedure automatically. This is controlled by the enable re-authentication and reauth-period parameters. Reauth-period indicates the period in seconds (since the last time that the authorization state was confirmed) before a new authentication procedure is started. The range of reauth-period is 1 to 9000 seconds (the default is 3600 seconds, one hour). Note that the port stays in an authorized state during the re-authentication procedure.
Configuration of 802.1x network access control on the router consists of two parts:
801.x authentication:
Customers who subscribe to Epipe service considers the Epipe as a wire, and run 802.1x between their devices which are located at each end of the Epipe.
Note: This feature applies only to port-based Epipe SAPs because 802.1x runs at the port level not the VLAN level. Therefore such ports must be configured as null encapsulated SAPs. |
When 802.1x tunneling is enabled, the 802.1x messages received at one end of an Epipe are forwarded through the Epipe. When 802.1x tunneling is disabled (by default), 802.1x messages are dropped or processed locally according to the 802.1x configuration (shutdown or no shutdown).
Enabling 802.1x tunneling requires the 802.1x mode to be set to force-auth. Enforcement is performed at the CLI level.
802.3ah Clause 57 (EFM OAM) defines the Operations, Administration, and Maintenance (OAM) sub-layer, which provides mechanisms useful for monitoring link operation such as remote fault indication and remote loopback control. In general, OAM provides network operators the ability to monitor the health of the network and quickly determine the location of failing links or fault conditions. EFM OAM described in this clause provides data link layer mechanisms that complement applications that may reside in higher layers.
OAM information is conveyed in slow protocol frames called OAM protocol data units (OAMPDUs). OAMPDUs contain the appropriate control and status information used to monitor, test and troubleshoot OAM-enabled links. OAMPDUs traverse a single link, being passed between peer OAM entities, and as such, are not forwarded by MAC clients (like bridges or switches).
The following EFM OAM functions are supported:
EFM OAM defines a set of events that may impact link operation. The following events are supported:
Note: The dying gasp event is not supported on the 7210 SAS-Dxp 16p and 7210 SAS-Dxp 24p. |
These critical link events are signaled to the remote DTE by the flag field in OAM PDUs.
The 7210 SAS does not generate EFM OAM PDUs with these flags except for the dying gasp flag. However, it supports processing of these flags in EFM OAM PDUs received from the peer.
EFM OAM provides a link-layer frame loopback mode that can be remotely controlled.
To initiate remote loopback, the local EFM OAM client sends a loopback control OAM PDU by enabling the OAM remote-loopback command. After receiving the loopback control OAM PDU, the remote OAM client puts the remote port into local loopback mode.
To exit remote loopback, the local EFM OAM client sends a loopback control OAM PDU by disabling the OAM remote-loopback command. After receiving the loopback control OAM PDU, the remote OAM client puts the port back into normal forwarding mode.
Note that during remote loopback test operation, all frames except EFM OAM PDUs are dropped at the local port for the receive direction, where remote loopback is enabled. If local loopback is enabled, then all frames except EFM OAM PDUs are dropped at the local port for both the receive and transmit directions. This behavior may result in many protocols (such as STP or LAG) resetting their state machines.
Note that when a port is in loopback mode, service mirroring will not work if the port is a mirror-source or a mirror-destination.
The 7210 SAS routers support 802.3ah. Customers who subscribe to Epipe service treat the Epipe as a wire, so they demand the ability to run 802.3ah between their devices which are located at each end of the Epipe.
Note: This feature only applies to port-based Epipe SAPs because 802.3ah runs at port level not VLAN level. Therefore, such ports must be configured as null encapsulated SAPs.
When OAM PDU tunneling is enabled, 802.3ah OAM PDUs received at one end of an Epipe are forwarded through the Epipe. 802.3ah can run between devices that are located at each end of the Epipe. When OAM PDU tunneling is disabled (by default), OAM PDUs are dropped or processed locally according to the efm-oam configuration (shutdown or no shutdown).
Note that enabling 802.3ah for a port and enabling OAM PDU tunneling for the same port are mutually exclusive. That is, on a specific port either 802.3ah tunneling can be enabled or 802.3ah can be enabled, but both cannot be enabled together.
Observe the following general rules when planning your physical MTU configurations:
The 7210 SAS must contend with MTU limitations at many service points. The physical (access and access uplink) port, MTU values must be individually defined.
The following table describes the default MTU values that are dependent upon the (sub-) port type, mode, and encapsulation.
Port type | Mode | Encap type | Default (bytes) |
Ethernet | access | null | 1514 |
Ethernet | access | dot1q | 1518 |
Port mode | access | qinq | 1522 |
Fast Ethernet | uplink | — | 1522 |
Other Ethernet | uplink | — | 9212 |
Ethernet | hybrid | — | 9212 |
On the 7210 SAS-D and 7210 SAS-Dxp, MTU parameters can be modified only on the port level.
The default MTU values should be modified to ensure that packets are not dropped due to frame size limitations.
MTU parameters can be modified on the port level and at the service level.
The default MTU values should be modified to ensure that packets are not dropped due to frame size limitations.
The service MTU must be less than or equal to both the access SAP port MTU and the access-uplink port MTU values. If the service from the 7210 SAS-K 2F1C2T is transported over an SDP in the IP/MPLS network (the SDP is not originating or terminating on the node), the operational path MTU can be less than the service MTU. In this case, user might need to modify the MTU value accordingly.
In order for the maximum length service frame to successfully travel from a local ingress SAP to a remote egress SAP, the MTU values configured on the port on which the local ingress SAP is provisioned and the port on which the egress SAP is provisioned must be coordinated to accept the maximum frame size the service can forward.
The following figure shows an example of the targeted MTU values to configure for an Epipe service (ALA-A and ALA-B).
Since ALA-A uses Dot1q encapsulation, the port 1/1/1 MTU must be set to 1518 to be able to accept a 1514-byte service frame (see the following table for MTU default values). Each of the access uplink port MTU must be set to at least 1518 as well. Finally, the MTU of ALA-B SAP (access port 1/1/2) must be at least 1514, as it uses null encapsulation.
The following table describes sample MTU configuration values.
ALA-A | ALA-B | |||
Access (SAP) | Access Uplink (SAP) | Access Uplink (SAP) | Access (SAP) | |
Port (slot/MDA/port) | 1/1/1 | 1/1/24 | 1/1/18 | 1/1/2 |
Mode type | access (dot1q) | access-uplink (QinQ) | access-uplink (QinQ) | access (null) |
MTU | 1518 | 1518 | 1518 | 1514 |
Instead, if ALA-A uses a dot1q-preserve SAP on port 1/1/1, then port 1/1/1 MTU must be set to 1518 to be able to accept a 1514-byte service frame (see the following table for MTU default values). Each of the access uplink port MTU must be set to at least 1522 as well. Finally, the MTU of ALA-B SAP (access port 1/1/2) must be at least 1518, as it uses Dot1q encapsulation.
The following table describes sample MTU configuration values.
ALA-A | ALA-B | |||
Access (SAP) | Access Uplink (SAP) | Access Uplink (SAP) | Access (SAP) | |
Port (slot/MDA/port) | 1/1/1 | 1/1/24 | 1/1/18 | 1/1/2 |
Mode type | access (dot1q-preserve) | access-uplink (QinQ) | access-uplink (QinQ) | access (dot1q-preserve) |
MTU | 1518 | 1522 | 1522 | 1518 |
MTU parameters must be modified on the service level as well as the port level.
The default MTU values must be modified to ensure that packets are not dropped due to frame size limitations.
In a service configured to use access SAPs and access-uplinks SAPs, the service MTU must be less than or equal to both the access SAP port MTU and the access uplink port MTU values. If the service from the 7210 SAS-K 2F6C4T or 7210 SAS-K 3SFP+ 8C is transported over an SDP in the IP/MPLS network (the SDP is not originating or terminating on the node), the operational path MTU can be less than the service MTU. In this case, the user might need to modify the MTU value accordingly.
In a service configured to use access SAPs and MPLS SDPs, the service MTU must be less than or equal to both the SAP port MTU and the SDP path MTU values. When an SDP is configured on a network port using default port MTU values, the operational path MTU can be less than the service MTU. In this case, enter the show service sdp command to check the operational state. If the operational state is down, modify the MTU value accordingly.
Cards and MDAs are auto-provisioned by the system and do not need to be provisioned by the user.
Note: MAC authentication is only supported on 7210 SAS-Dxp. |
The 7210 SAS supports the 802.1x EAP standard for authenticating Ethernet devices before they can access the network. However, if a client device does not support 802.1x EAP, MAC authentication can be used to prevent unauthorized traffic from being transmitted through the 7210 SAS.
Because MAC authentication is a fallback mechanism, the user must first enable 802.1x EAP to use MAC authentication on the 7210 SAS. To authenticate a port using MAC authentication, first configure 802.1x authentication on the 7210 SAS by enabling port-control auto, and then configure mac-auth on the 7210 SAS to enable MAC authentication.
Layer 2 control protocols affect MAC authentication behavior differently depending on the protocol in use; see Layer 2 control protocol interaction with authentication methods for more information.
When a port becomes operationally up with MAC authentication enabled, the 7210 SAS (as the authenticator) performs the following steps.
Note: If it is known that the attached equipment does not support EAP, you can configure no mac-auth-wait so that MAC authentication is used as soon as the port is operationally up. |
While the port is unauthenticated, the port will be down to all upper layer protocols or services.
When a MAC address is authenticated, only packets whose source MAC address matches the authenticated MAC address are forwarded when the packets are received on the port, and only packets whose destination MAC address matches the authenticated MAC address are forwarded out of the port.
Broadcast and multicast packets at ingress are sent for source MAC address authentication. Broadcast and multicast packets at egress are forwarded as normal.
Unknown destination packets at ingress are copied to the CPU and MAC authentication is attempted. Unknown destination packets at egress are dropped.
MAC authentication is subject to the following limitations.
Caution: A small amount of traffic loss may occur while MAC reauthentication is in progress. |
Note: VLAN authentication is only supported on 7210 SAS-Dxp. |
The 7210 SAS supports VLAN authentication, which operates similarly to 802.1x network access control but only uses VLAN-tagged EAPOL frames to trigger the authentication process on a per-VLAN basis, or uses null-tagged EAPOL frames to authenticate and authorize processing of service traffic received in the context of a Dot1q explicit null SAP. See 802.1x network access control for information about 802.1x network access control and authentication.
To authenticate a port using VLAN authentication, you must first configure 802.1x authentication on the 7210 SAS by enabling port-control auto, and then configure vlan-auth on the 7210 SAS to enable VLAN authentication and allow VLAN authentication functionality to supersede that of basic 802.1x authentication.
VLAN authentication and MAC authentication are mutually exclusive. MAC authentication cannot be configured on a port while VLAN authentication is already configured on the same port. See MAC authentication for information about MAC authentication.
Layer 2 control protocols affect VLAN authentication behavior differently depending on the protocol in use; see Layer 2 control protocol interaction with authentication methods for more information.
When a port becomes operationally up with VLAN authentication enabled, the 7210 SAS (as the authenticator) performs the following steps.
While the port is unauthenticated, the port will be down to all upper layer protocols or services.
VLAN authentication is subject to the following limitations.
The following table describes the interactions of Layer 2 control protocols with 802.1x authentication, MAC authentication, and VLAN authentication.
Layer 2 control protocol | 802.1x port authentication enabled | MAC authentication enabled | VLAN authentication enabled | |
Dot1q explicit null SAP not configured | Dot1q explicit null SAP configured | |||
EFM OAM | Allow | Allow | Allow | Allow |
LLDP | Block if port is unauthenticated Allow if port is authenticated | Block if MAC is unauthenticated Allow if MAC is authenticated | Allow | Allow |
LACP | Block if port is unauthenticated Allow if port is authenticated | Block if MAC is unauthenticated Allow if MAC is authenticated | LAG and LACP are not supported on ports with VLAN authentication enabled | LAG and LACP are not supported on ports with VLAN authentication enabled |
CFM | Block if port is unauthenticated Allow if port is authenticated | Block if MAC is unauthenticated Allow if MAC is authenticated | Block if VLAN (SAP) is unauthenticated Allow only if specific VLAN is authenticated | Block if null SAP is unauthenticated Allow if null SAP is authenticated |
xSTP (STP/RSTP/MSTP) | Block if port is unauthenticated Allow if port is authenticated | Block if MAC is unauthenticated Allow if MAC is authenticated | Block if VLAN (SAP) is unauthenticated Allow if VLAN (SAP) is authenticated | Block if null SAP is unauthenticated Allow if null SAP is authenticated |
The following figure shows the process to provision chassis slots, line cards, MDAs, and ports.