Configuring EAPS on a Switch
ExtremeWare 7.2e Installation and User Guide
189
NOTE
The control VLAN must NOT be configured with an IP address. In addition, only ring ports may be
added to this control VLAN. No other ports can be members of this VLAN. Failure to observe these
restrictions can result in a loop in the network.
NOTE
When you configure the VLAN that will act as the control VLAN, that VLAN must be assigned a QoS
profile of Qp8, and the ring ports of the control VLAN must be tagged.
By assigning the control VLAN a QoS profile of Qp8 (with the QoS profile
HighHi
priority setting), you
ensure that EAPS control VLAN traffic is serviced before any other traffic and that control VLAN
messages reach their intended destinations. For example, if the control VLAN is not assigned the
highest priority and a broadcast storm occurs in the network, the control VLAN messages might be
dropped at intermediate points. Assigning the control VLAN the highest priority prevents dropped
control VLAN messages.
Because the QoS profile
High
priority setting by itself should ensure that the control VLAN traffic gets
through a congested port first, you should not need to set the QoS profile minimum bandwidth (
minbw
)
or maximum bandwidth (
maxbw
) settings. However, if you plan to use QoS (profile priority and
bandwidth settings) for other traffic, you might need to set a
minbw
value on Qp8 for control VLAN
traffic. Whether you need to do this depends entirely on your configuration.
The following command example adds the control VLAN “keys” to the EAPS domain “eaps_1”.
configure eaps eaps_1 add control vlan keys
Configuring the EAPS Protected VLANs
You must configure one or more protected VLANs for each EAPS domain. The protected VLANs are the
data-carrying VLANs.
NOTE
When you configure the VLAN that will act as a protected VLAN, the ring ports of the protected VLAN
must be tagged (except in the case of the default VLAN).
To configure an EAPS protected VLAN, use the following command:
configure eaps <name> add protect vlan <vlan_name>
NOTE
As long as the ring is complete, the master node blocks the protected VLANs on its secondary port.
The following command example adds the protected VLAN “orchid” to the EAPS domain “eaps_1.”
configure eaps eaps_1 add protect vlan orchid
Summary of Contents for ExtremeWare 7.2e
Page 14: ...14 ExtremeWare 7 2 0 Software User Guide Contents...
Page 18: ...18 ExtremeWare 7 2e Installation and User Guide Preface...
Page 80: ...80 ExtremeWare 7 2e Installation and User Guide Accessing the Switch...
Page 102: ...102 ExtremeWare 7 2e Installation and User Guide Virtual LANs VLANs...
Page 108: ...108 ExtremeWare 7 2e Installation and User Guide Forwarding Database FDB...
Page 180: ...180 ExtremeWare 7 2e Installation and User Guide Security...
Page 194: ...194 ExtremeWare 7 2e Installation and User Guide Ethernet Automatic Protection Switching...
Page 218: ...218 ExtremeWare 7 2e Installation and User Guide Spanning Tree Protocol STP...
Page 248: ...248 ExtremeWare 7 2e Installation and User Guide Interior Gateway Protocols...
Page 256: ...256 ExtremeWare 7 2e Installation and User Guide IP Multicast Routing...
Page 308: ...308 ExtremeWare 7 2e Installation and User Guide Using ExtremeWare Vista on the Summit 400...
Page 316: ...316 ExtremeWare 7 2e Installation and User Guide Technical Specifications...
Page 324: ...324 ExtremeWare 7 2e Installation and User Guide Software Upgrade and Boot Options...