Configuring EAPS on a Switch
ExtremeWare 7.2e Installation and User Guide
189
NOTE
The control VLAN must NOT be configured with an IP address. In addition, only ring ports may be
added to this control VLAN. No other ports can be members of this VLAN. Failure to observe these
restrictions can result in a loop in the network.
NOTE
When you configure the VLAN that will act as the control VLAN, that VLAN must be assigned a QoS
profile of Qp8, and the ring ports of the control VLAN must be tagged.
By assigning the control VLAN a QoS profile of Qp8 (with the QoS profile
HighHi
priority setting), you
ensure that EAPS control VLAN traffic is serviced before any other traffic and that control VLAN
messages reach their intended destinations. For example, if the control VLAN is not assigned the
highest priority and a broadcast storm occurs in the network, the control VLAN messages might be
dropped at intermediate points. Assigning the control VLAN the highest priority prevents dropped
control VLAN messages.
Because the QoS profile
High
priority setting by itself should ensure that the control VLAN traffic gets
through a congested port first, you should not need to set the QoS profile minimum bandwidth (
minbw
)
or maximum bandwidth (
maxbw
) settings. However, if you plan to use QoS (profile priority and
bandwidth settings) for other traffic, you might need to set a
minbw
value on Qp8 for control VLAN
traffic. Whether you need to do this depends entirely on your configuration.
The following command example adds the control VLAN “keys” to the EAPS domain “eaps_1”.
configure eaps eaps_1 add control vlan keys
Configuring the EAPS Protected VLANs
You must configure one or more protected VLANs for each EAPS domain. The protected VLANs are the
data-carrying VLANs.
NOTE
When you configure the VLAN that will act as a protected VLAN, the ring ports of the protected VLAN
must be tagged (except in the case of the default VLAN).
To configure an EAPS protected VLAN, use the following command:
configure eaps <name> add protect vlan <vlan_name>
NOTE
As long as the ring is complete, the master node blocks the protected VLANs on its secondary port.
The following command example adds the protected VLAN “orchid” to the EAPS domain “eaps_1.”
configure eaps eaps_1 add protect vlan orchid
Содержание ExtremeWare 7.2e
Страница 14: ...14 ExtremeWare 7 2 0 Software User Guide Contents...
Страница 18: ...18 ExtremeWare 7 2e Installation and User Guide Preface...
Страница 46: ...46 ExtremeWare 7 2e Installation and User Guide Summit 400 48t Switch Overview and Installation...
Страница 80: ...80 ExtremeWare 7 2e Installation and User Guide Accessing the Switch...
Страница 102: ...102 ExtremeWare 7 2e Installation and User Guide Virtual LANs VLANs...
Страница 108: ...108 ExtremeWare 7 2e Installation and User Guide Forwarding Database FDB...
Страница 180: ...180 ExtremeWare 7 2e Installation and User Guide Security...
Страница 194: ...194 ExtremeWare 7 2e Installation and User Guide Ethernet Automatic Protection Switching...
Страница 218: ...218 ExtremeWare 7 2e Installation and User Guide Spanning Tree Protocol STP...
Страница 248: ...248 ExtremeWare 7 2e Installation and User Guide Interior Gateway Protocols...
Страница 256: ...256 ExtremeWare 7 2e Installation and User Guide IP Multicast Routing...
Страница 308: ...308 ExtremeWare 7 2e Installation and User Guide Using ExtremeWare Vista on the Summit 400...
Страница 316: ...316 ExtremeWare 7 2e Installation and User Guide Technical Specifications...
Страница 324: ...324 ExtremeWare 7 2e Installation and User Guide Software Upgrade and Boot Options...