367
Configuring Resilient Ethernet Protocol
Information About Configuring REP
REP can manage only a single failed port within the segment; multiple port failures within the REP segment cause
loss of network connectivity.
You should configure REP only in networks with redundancy. Configuring REP in a network without redundancy
causes loss of connectivity.
Link Integrity
REP does not use an end-to-end polling mechanism between edge ports to verify link integrity. It implements local link
failure detection. The REP Link Status Layer (LSL) detects its REP-aware neighbor and establishes connectivity within
the segment. All VLANs are blocked on an interface until it detects the neighbor. After the neighbor is identified, REP
determines which neighbor port should become the alternate port and which ports should forward traffic.
Each port in a segment has a unique port ID. The port ID format is similar to that used by the spanning tree algorithm: a
port number (unique on the bridge), associated to a MAC address (unique in the network). When a segment port is
coming up, its LSL starts sending packets that include the segment ID and the port ID. The port is declared as operational
after it performs a three-way handshake with a neighbor in the same segment.
A segment port does not become operational if:
No neighbor has the same segment ID.
More than one neighbor has the same segment ID.
The neighbor does not acknowledge the local port as a peer.
Each port creates an adjacency with its immediate neighbor. Once the neighbor adjacencies are created, the ports
negotiate to determine one blocked port for the segment, the alternate port. All other ports become unblocked. By
default, REP packets are sent to a BPDU class MAC address. The packets can also be sent to the Cisco multicast address,
which is used only to send blocked port advertisement (BPA) messages when there is a failure in the segment. The
packets are dropped by devices not running REP.
Fast Convergence
Because REP runs on a physical link basis and not a per-VLAN basis, only one hello message is required for all VLANs,
reducing the load on the protocol. We recommend that you create VLANs consistently on all switches in a given segment
and configure the same allowed VLANs on the REP trunk ports. To avoid the delay introduced by relaying messages in
software, REP also allows some packets to be flooded to a regular multicast address. These messages operate at the
hardware flood layer (HFL) and are flooded to the whole network, not just the REP segment. Switches that do not belong
to the segment treat them as data traffic. You can control flooding of these messages by configuring a dedicated
administrative VLAN for the whole domain.
The estimated convergence recovery time on fiber interfaces is less than 200 ms for the local segment with 200 VLANs
configured. Convergence for VLAN load balancing is 300 ms or less.
VLAN Load Balancing
One edge port in the REP segment acts as the primary edge port; the other as the secondary edge port. It is the primary
edge port that always participates in VLAN load balancing in the segment. REP VLAN balancing is achieved by blocking
some VLANs at a configured alternate port and all other VLANs at the primary edge port. When you configure VLAN load
balancing, you can specify the alternate port in one of three ways:
By entering the port ID of the interface. To identify the port ID of a port in the segment, enter the
show interface rep
detail
interface configuration command for the port.
Содержание IE 4000
Страница 12: ...8 Configuration Overview Default Settings After Initial Switch Configuration ...
Страница 52: ...48 Configuring Interfaces Monitoring and Maintaining the Interfaces ...
Страница 108: ...104 Configuring Switch Clusters Additional References ...
Страница 128: ...124 Performing Switch Administration Additional References ...
Страница 130: ...126 Configuring PTP ...
Страница 140: ...136 Configuring CIP Additional References ...
Страница 146: ...142 Configuring SDM Templates Configuration Examples for Configuring SDM Templates ...
Страница 192: ...188 Configuring Switch Based Authentication Additional References ...
Страница 244: ...240 Configuring IEEE 802 1x Port Based Authentication Additional References ...
Страница 274: ...270 Configuring SGT Exchange Protocol over TCP SXP and Layer 3 Transport Configuring Cisco TrustSec Caching ...
Страница 298: ...294 Configuring VLANs Additional References ...
Страница 336: ...332 Configuring STP Additional References ...
Страница 408: ...404 Configuring DHCP Additional References ...
Страница 450: ...446 Configuring IGMP Snooping and MVR Additional References ...
Страница 490: ...486 Configuring SPAN and RSPAN Additional References ...
Страница 502: ...498 Configuring Layer 2 NAT ...
Страница 559: ...555 Configuring Network Security with ACLs How to Configure Network Security with ACLs Creating a Numbered Extended ACL ...
Страница 770: ...766 Configuring IPv6 MLD Snooping Related Documents ...
Страница 930: ...926 Configuring IP Unicast Routing Related Documents ...
Страница 956: ...952 Configuring IPv6 Unicast Routing Configuring IPv6 network 2010 AB8 2 48 network 2010 AB8 3 48 exit address family ...
Страница 976: ...972 Configuring Cisco IOS IP SLAs Operations Additional References ...
Страница 978: ...974 Dying Gasp ...
Страница 990: ...986 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking ...
Страница 994: ...990 Configuring MODBUS TCP Displaying MODBUS TCP Information ...
Страница 996: ...992 Ethernet CFM ...
Страница 1030: ...1026 Working with the Cisco IOS File System Configuration Files and Software Images Working with Software Images ...
Страница 1066: ...1062 Using an SD Card SD Card Alarms ...