
C
HAPTER
1
| Introduction
Description of Software Features
– 100 –
OSPF – This approach uses a link state routing protocol to generate a
shortest-path tree, then builds up its routing table based on this tree. OSPF
produces a more stable network because the participating routers act on
network changes predictably and simultaneously, converging on the best
route more quickly than RIP.
BGP – This protocol uses a path vector approach to connect autonomous
systems (AS) on the Internet. BGP maintains a table of IP network prefixes
which designate network reachability among autonomous systems based
the path of ASs to the destination, and next hop information. It makes
routing decisions based on path, network policies and/or rule sets. For this
reason, it is more appropriately termed a reachability protocol rather than
a routing protocol.
Policy-based Routing for BGP – The next-hop behavior for ingress IP traffic
can be determined based on matching criteria.
E
QUAL
-
COST
M
ULTIPATH
L
OAD
B
ALANCING
When multiple paths to the same destination and with the same path cost
are found in the routing table, the Equal-cost Multipath (ECMP) algorithm
first checks if the cost is lower than that of any other routing entries. If the
cost is the lowest in the table, the switch will use up to eight paths having
the lowest path cost to balance traffic forwarded to the destination. ECMP
uses either equal-cost unicast multipaths manually configured in the static
routing table, or equal-cost multipaths dynamically detected by the Open
Shortest Path Algorithm (OSPF). In other words, it uses either static or
unicast routing entries, not both.
R
OUTER
R
EDUNDANCY
The Virtual Router Redundancy Protocol (VRRP) uses a virtual IP address to
support a primary router and multiple backup routers. The backups can be
configured to take over the workload if the master fails or to load share the
traffic. The primary goal of this protocol is to allow a host device which has
been configured with a fixed gateway to maintain network connectivity in
case the primary gateway goes down.
A
DDRESS
R
ESOLUTION
P
ROTOCOL
The switch uses ARP and Proxy ARP to convert between IP addresses and
MAC (hardware) addresses. This switch supports conventional ARP, which
locates the MAC address corresponding to a given IP address. This allows
the switch to use IP addresses for routing decisions and the corresponding
MAC addresses to forward packets from one hop to the next. Either static
or dynamic entries can be configured in the ARP cache.
Proxy ARP allows hosts that do not support routing to determine the MAC
address of a device on another network or subnet. When a host sends an
ARP request for a remote network, the switch checks to see if it has the
best route. If it does, it sends its own MAC address to the host. The host
then sends traffic for the remote destination via the switch, which uses its
own routing table to reach the destination on the other network.
Содержание ECS4660-28F
Страница 1: ...Management Guide www edge core com ECS4660 28F Layer 3 Gigabit Ethernet Switch...
Страница 2: ......
Страница 4: ......
Страница 12: ...ABOUT THIS GUIDE 12...
Страница 64: ...CONTENTS 64...
Страница 90: ...TABLES 90...
Страница 92: ...SECTION I Getting Started 92...
Страница 122: ...SECTION II Web Configuration 122 Multicast Routing on page 825...
Страница 148: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 148...
Страница 224: ...CHAPTER 5 Interface Configuration VLAN Trunking 224 Figure 68 Configuring VLAN Trunking...
Страница 262: ...CHAPTER 6 VLAN Configuration Configuring VLAN Translation 262...
Страница 304: ...CHAPTER 9 Congestion Control Automatic Traffic Control 304...
Страница 340: ...CHAPTER 11 Quality of Service Attaching a Policy Map to a Port 340...
Страница 452: ...CHAPTER 13 Security Measures DHCP Snooping 452...
Страница 740: ...CHAPTER 17 IP Services Configuring the PPPoE Intermediate Agent 740...
Страница 866: ...CHAPTER 21 Multicast Routing Configuring PIMv6 for IPv6 866...
Страница 882: ...CHAPTER 22 Using the Command Line Interface CLI Command Groups 882...
Страница 1024: ...CHAPTER 26 Remote Monitoring Commands 1024...
Страница 1030: ...CHAPTER 27 Flow Sampling Commands 1030...
Страница 1088: ...CHAPTER 28 Authentication Commands PPPoE Intermediate Agent 1088...
Страница 1162: ...CHAPTER 29 General Security Measures Configuring Port based Traffic Segmentation 1162...
Страница 1186: ...CHAPTER 30 Access Control Lists ACL Information 1186...
Страница 1214: ...CHAPTER 31 Interface Commands Transceiver Threshold Configuration 1214...
Страница 1238: ...CHAPTER 33 Port Mirroring Commands RSPAN Mirroring Commands 1238...
Страница 1258: ...CHAPTER 34 Congestion Control Commands Automatic Traffic Control Commands 1258...
Страница 1270: ...CHAPTER 36 UniDirectional Link Detection Commands 1270...
Страница 1276: ...CHAPTER 37 Address Table Commands 1276...
Страница 1336: ...CHAPTER 39 ERPS Commands 1336...
Страница 1386: ...CHAPTER 40 VLAN Commands Configuring Voice VLANs 1386...
Страница 1406: ...CHAPTER 41 Class of Service Commands Priority Commands Layer 3 and 4 1406...
Страница 1424: ...CHAPTER 42 Quality of Service Commands 1424...
Страница 1536: ...CHAPTER 43 Multicast Filtering Commands MLD Proxy Routing 1536...
Страница 1602: ...CHAPTER 45 CFM Commands Delay Measure Operations 1602...
Страница 1624: ...CHAPTER 47 Domain Name Service Commands 1624...
Страница 1646: ...CHAPTER 48 DHCP Commands DHCP Server 1646...
Страница 1974: ...SECTION IV Appendices 1974...
Страница 1980: ...APPENDIX A Software Specifications Management Information Bases 1980...
Страница 2020: ...ECS4660 28F E102013 ST R03 149100000140A...