
management port. In this case, the source IP address is a management port IP address only if the traffic was originally destined
to the management port IP.
•
ICMP-based applications like ping and traceroute are exceptions to the preceding logic since we do not have TCP/UDP port
number. So if source IP address of the packet matches the management port IP address EIS route lookup is done.
•
Management application packet counter is incremented if EIS route lookup succeeds and packet is sent out of the management
port.
•
If route lookup in the EIS routing table fails or if the management port is down, then packets are dropped. The management
application drop counter is incremented.
•
Whenever IP address is assigned to the management port, it is stored in a global variable in the IP stack, which is used for
comparison with the source IP address of the packet.
•
Rest of the response traffic is handled as per existing behavior by doing route lookup in the default routing table. So if the traffic
is destined to the front-end port IP address, the response is sent out by doing a route lookup in the default routing table, which is
an existing behavior.
Consider a sample topology in which ip1 is an address assigned to the management port and ip2 is an address assigned to any of the
front panel port. A and B are end users on the management and front-panel port networks. The OS-initiated traffic for management
applications takes a preference for ip1 as source IP and uses the management network to reach the destination. If the management
port is down or the route lookup in EIS routing table fails, ip2 is the source IP and the front-panel port is used to reach the
destination. The fallback route between the management and data networks is used in such a case. At any given time, end users can
access Dell Networking OS applications using either ip1 or ip2. Return traffic for such end-user-originated sessions destined to
management port ip1 is handled using the EIS route lookup.
Handling of Transit Traffic (Traffic Separation)
This is forwarded traffic where destination IP is not an IP address configured in the switch.
•
Packets received on the management port with destination on the front-end port is dropped.
•
Packets received on the front-end port with destination on the management port is dropped.
•
A separate drop counter is incremented for this case. This counter is viewed using the
netstat
command, like all other IP layer
counters.
Consider a scenario in which ip1 is an address assigned to the management port and ip2 is an address assigned to any of the front
panel port of a switch. End users on the management and front panel port networks are connected. In such an environment, traffic
received in the management port destined on the data port network is dropped and traffic received in the front-end port destined on
the management network is dropped.
Mapping of Management Applications and Traffic Type
The following table summarizes the behavior of applications for various types of traffic when the management egress interface
selection feature is enabled.
Table 37. Mapping of Management Applications and Traffic Type
Traffic type /
Application type
Switch initiated traffic
Switch-destined traffic
Transit Traffic
EIS Management
Application
Management is the preferred
egress port selected based on
route lookup in EIS table. If the
management port is down or the
route lookup fails, packets are
dropped.
If source TCP/UDP port matches a
management application and source IP
address is management port IP address,
management port is the preferred egress port
selected based on route lookup in EIS table. If
Traffic from
management port to
data port and from data
port to management
port is blocked
362
Internet Group Management Protocol (IGMP)
Содержание S4048-ON
Страница 1: ...Dell Configuration Guide for the S4048 ON System 9 9 0 0 ...
Страница 146: ...Figure 14 BFD Three Way Handshake State Changes 146 Bidirectional Forwarding Detection BFD ...
Страница 477: ...Figure 68 Inspecting Configuration of LAG 10 on ALPHA Link Aggregation Control Protocol LACP 477 ...
Страница 480: ...Figure 70 Inspecting a LAG Port on BRAVO Using the show interface Command 480 Link Aggregation Control Protocol LACP ...
Страница 481: ...Figure 71 Inspecting LAG 10 Using the show interfaces port channel Command Link Aggregation Control Protocol LACP 481 ...
Страница 522: ...Figure 87 Configuring Interfaces for MSDP 522 Multicast Source Discovery Protocol MSDP ...
Страница 523: ...Figure 88 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 523 ...
Страница 524: ...Figure 89 Configuring PIM in Multiple Routing Domains 524 Multicast Source Discovery Protocol MSDP ...
Страница 528: ...Figure 91 MSDP Default Peer Scenario 1 528 Multicast Source Discovery Protocol MSDP ...
Страница 529: ...Figure 92 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 529 ...
Страница 530: ...Figure 93 MSDP Default Peer Scenario 3 530 Multicast Source Discovery Protocol MSDP ...
Страница 633: ...Policy based Routing PBR 633 ...
Страница 777: ...Figure 119 Single and Double Tag TPID Match Service Provider Bridging 777 ...
Страница 778: ...Figure 120 Single and Double Tag First byte TPID Match 778 Service Provider Bridging ...