ICX 150 Ruckus ICX Implementer Student Guide Revision 0419 Ruckus ICX Implementer Copyright © 2019 Ruckus Networks, an ARRIS company All rights reserved. 350 West Java Dr., Sunnyvale, CA 94089 USA All or some of the products detailed in this document may still be under development and certain specifications, including but not limited to, release dates, prices, and product features, may change. The products may not function as intended and a production version of the products may never be released. Even if a production version is released, it may be materially different from the pre-release version discussed in this document. Nothing in this document shall be deemed to create a warranty of any kind, either express or implied, statutory or otherwise, including but not limited to, any implied warranties of merchantability, fitness for a particular purpose, or non-infringement of third-party rights with respect to any products and services referenced herein. The Ruckus, Ruckus Wireless, Ruckus logo, Big Dog design, BeamFlex, ChannelFly, Xclaim, ZoneFlex and OPENG trademarks are registered in the U.S. and other countries. Ruckus Networks, MediaFlex, FlexMaster, ZoneDirector, SpeedFlex, SmartCast, SmartCell, and Dynamic PSK are Ruckus trademarks worldwide. Other names and brands mentioned in this document or website may be claimed as the property of others. 18-1-B Revision: April, 2019 ICX 150 Introduction ICX 150 Ruckus ICX Implementer Revision 0419 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Revision 0419 1‐1 ICX 150 Introduction Module 1: Course Introduction Revision 0419 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved We’ll begin with an overview of the course content. Revision 0419 1‐2 ICX 150 Introduction Legal Disclaimer All or some of the products detailed in this presentation may still be under development and certain specifications, including but not limited to, release dates, prices, and product features, may change. The products may not function as intended and a production version of the products may never be released. Even if a production version is released, it may be materially different from the pre‐release version discussed in this presentation. Nothing in this presentation shall be deemed to create a warranty of any kind, either express or implied, statutory or otherwise, including but not limited to, any implied warranties of merchantability, fitness for a particular purpose, or non‐infringement of third‐party rights with respect to any products and services referenced herein. The Ruckus, Ruckus Wireless, Ruckus logo, Big Dog design, BeamFlex, ChannelFly, Xclaim, ZoneFlex and OPENG trademarks are registered in the U.S. and other countries. Ruckus Networks, MediaFlex, FlexMaster, ZoneDirector, SpeedFlex, SmartCast, SmartCell, and Dynamic PSK are Ruckus trademarks worldwide. Other names and brands mentioned in this document or website may be claimed as the property of others. 18‐1‐B Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 3 Please take a moment to review our legal disclaimer, then advance to the next slide Revision 0419 1‐3 ICX 150 Introduction Course Overview • This self‐paced, web‐based training course concentrates on the Implementor functions within a network environment and focuses on the Ruckus ICX series of switches • Features and functions covered in this course include, Ruckus technologies, hardware architecture, software upgrades, basic CLI configuration, layer 2 feature configuration along with device access and security Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 4 This self‐paced, web‐based training course concentrating duties performed by an network Implementor within a typical network environment and focuses on the Ruckus ICX series of switches running FastIron 8.0.90. Features and functions covered in this course include, Ruckus technologies, hardware architecture, software upgrades, basic CLI configuration, layer 2 feature configuration along with device access and security. Revision 0419 1‐4 ICX 150 Introduction Course Objectives • After completing this course, attendees should be able to: – – – – – – – – – – – – – – Understand Ruckus technologies and how to access the resources available Discuss the available ICX hardware and their capabilities Discuss the major features and functions of Ruckus ICX switches Understand hardware configurations for Ruckus ICX switches including stacking Describe the Command Line (CLI) structure of Ruckus ICX switches Describe the different methods available for device management including, the console port, Telnet, SSH, and web management Use Authentication, Authorization, and Accounting (AAA) to secure a Ruckus ICX switch Describe the software upgrade process for Ruckus ICX switches Configure Virtual LANs (VLANs) and Link Aggregation Groups (LAGs) Configure interface settings including, name, VLAN association, speed and duplex, and PoE capabilities Describe and configure Spanning Tree Protocol (STP) features supported on Ruckus ICX switches Describe the features and function of Multi-Chassis Trunking (MCT) Describe and configure the Power over Ethernet capabilities of Ruckus ICX switches Describe and configure Campus Fabrics Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 5 Let’s take a look at the objectives for this course. After completing this course, attendees should be able to: Understand Ruckus technologies and how to access the resources available Discuss the available ICX hardware and their capabilities Discuss the major features and functions of Ruckus ICX switches Understand hardware configurations for Ruckus ICX switches including stacking Describe the Command Line (CLI) structure of Ruckus ICX switches Describe the different methods available for device management including, the console port, Telnet, SSH, and web management Use Authentication, Authorization, and Accounting (AAA) to secure a Ruckus ICX switch Describe the software upgrade process for Ruckus ICX switches Configure Virtual LANs (VLANs) and Link Aggregation Groups (LAGs) Configure interface settings including, name, VLAN association, speed and duplex, and PoE capabilities Describe and configure Spanning Tree Protocol (STP) features supported on Ruckus ICX switches Describe the features and function of Multi‐Chassis Trunking (MCT) Describe and configure the Power over Ethernet capabilities of Ruckus ICX switches Describe and configure Campus Fabrics Revision 0419 1‐5 ICX 150 Introduction Course Modules • Course Introduction • Ruckus ICX Technologies • Hardware Overview • CLI Basics • Software Upgrade & Licensing • Access and Management • Security and Monitoring • Layer 2 Fundamentals • Layer 2 Redundancy • ICX Stacking • Power over Ethernet (PoE) • Ruckus ICX Campus Fabric Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 6 This course is composed of the following course modules: Course Introduction Ruckus ICX Technologies Hardware Overview CLI Basics Software Upgrade & Licensing Access and Management Security and Monitoring Layer 2 Fundamentals Layer 2 Redundancy ICX Stacking Power over Ethernet (PoE) Ruckus ICX Campus Fabric Revision 0419 1‐6 ICX 150 Introduction Course Prerequisites • Before taking this course, attendees should have foundational knowledge of: – Network management protocols and their function including: • Telnet/SSH • SNMP • sFlow – Network features: • Routing/switching • VLAN • Link aggregation (LAG) • PoE – Network protocols including: • STP • 802.1Q • LACP • 802.1X • CDP/LLDP Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 7 The prerequisites for this course include: Knowledge of Ruckus IP hardware and its designated roles in a network along with Network management protocols and their function such as Telnet or SSH, SNMP and sflow. Knowledge for network functions and features such as a general understanding of Routing/switching along with specific functions such as VLANs, Link Aggregation (LAGs) and Power over Ethernet Because this course does not go into detail on how various protocols function along with their purpose it is good for students to have a working knowledge of L2 protocols an functions such as Spanning Tree, VLAN tagging, Link Aggregation Control Protocol, 802.1X security and neighbor discovery protocols like Cisco Discovery Protocol or Link Layer Discovery Protocol. Network protocols including: • STP • 802.1Q • LACP • 802.1X • CDP/LLDP Revision 0419 1‐7 ICX 150 Introduction End of Module 1: Course Introduction Revision 0419 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved This concludes the Course Introduction and encourage you to move on to the next module to continue this ICX Implementor course. Thank you. Revision 0419 1‐8 ICX 150 ICX Technologies Module 2: Ruckus Technologies Revision 0419 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Welcome to the ICX 150 Implementer course. This course consists of 12 modules and is based on the FastIron 8.0.90 software release. Subjects discussed in this course concentrate on the Implementor functions within a network environment however does not represent all functions or capabilities of an ICX switch. In this module we will provide an overview of Ruckus technologies and resources available. So, let’s get started Revision 0419 2‐1 ICX 150 ICX Technologies Objectives • In this module, you will learn – Ruckus products overview – Ruckus resources – Ruckus technologies Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 2 When you first start to learn about the Ruckus product line, the range and diversity of choices can seem confusing. It’s important to know the different hardware and software options Ruckus provides ensuring seamless integration of any implementations you many be planning. In this section you will learn about the main Ruckus products and technologies, as well as additional tools. Revision 0419 2‐2 ICX 150 ICX Technologies Ruckus Products Overview Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Lets first take a look at Ruckus products and solutions. Revision 0419 2‐3 ICX 150 ICX Technologies Ruckus SmartZone and Wireless Products Controllers SZ300 vSZ INDOOR AP SZ100 Series High Density R7xx Series R6xx Series ZoneDirector Enterprise R5xx Series Unleashed Cloud Wi‐Fi Small Business R3xx Series H5xx Series OUTDOOR AP Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 4 The Ruckus SmartZone products are Wireless LAN Controllers that provide management and control for Ruckus ZoneFlex indoor and outdoor Access Points. The Ruckus controllers are: • SmartZone 300 – can support up to 10,000 Access Points per node, and 30,000 in a cluster, running SmartZone in High Scale mode. • Virtual SmartZone – Virtualized versions of the SmartZone controllers, both High Scale and Essentials. • SmartZone 100 – managing networks up to 1,024 Access Points, or 3,000 in a cluster, running SmartZone in Essentials mode. • ZoneDirector ‐ manages small networks of up to 150 Access Points. The ZoneDirector is not classed in the SmartZone product line. It’s included here as it’s important to know that a ZoneDirector’s configuration can be imported into a SmartZone controller. • Unleashed – Offers management of a small group or organizations supporting of up to 50 APs without the need of a dedicated controller. This is perfect for small deployments in retail and small offices potentially supporting up to 1024 client devices. Unleashed also has dedicated mobile apps to allow for easy provisioning and management. • Cloud ‐ Ruckus Cloud Wi‐Fi simplifies deployment, monitoring and management of your distributed wireless network. • Simply put, Ruckus controllers manage Ruckus Access Points providing a solution for every deployment scenario from Small Business WLANs to mission‐critical, high‐ density carrier grade installations. Revision 0419 2‐4 ICX 150 ICX Technologies Indoor APs provide solutions for a wide range of environments including small offices to large scale high density deployments such as stadiums. Each were designed to provide a unique solution for each environment they are deployed providing the best technologies for high performance. Ruckus Outdoor Access Points are used in a range of environments • mounting and antenna options to suit your needs • Outdoor Point‐to‐Bridges provide connectivity between remote sites. For a full overview of all of these Ruckus products, please refer to the Ruckus website for more details. Revision 0419 2‐5 ICX 150 ICX Technologies Ruckus ICX 7000 Switch Portfolio – Overview Aggregation/Core ICX 7850 Access Premium Aggregation‐Core ICX 7750 Aggregation‐Core Price/Performance Price/Performance ICX 7150 Z‐Series ICX 7650 Entry‐Level Access High Availability Multi‐gigabit (2.5 GbE) ICX 7150 Entry‐Level Access PoE/PoE+ or non‐PoE Premium Access‐Aggregation ICX 7450 + Highest Performance + Campus Fabric CB + MCT Access‐Aggregation ICX 7250 + Higher Performance + 40G/100G Uplinks + Multigigabit 2.5/5/10G Access + 10G/40G Aggregation + Medium‐to‐Large Core + Highest Performance + Campus Fabric + MCT + 10G/25G/40G/100G Aggregation + 6.4 Tbps Switching Capacity + 10G Aggregation + Higher Performance + Hot‐swap PSU & Fans + L3: IPv4/IPv6, Multicast + Higher Performance + L3: VRF/GRE + EEE + 1G Aggregation Function and Scalability Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 6 ICX multi‐purpose switches can be deployed standalone, stacked or within a campus fabric. Each were designed to provide a unique function inside a network infrastructure with feature rich options and performance. Along with CLI configuration and management of the ICX switches, SmartZone now has the ability to manage the Ruckus ICX switch family as well. SmartzoneOS5 offers Switch management features which include: • Discovery and Inventory • SNMP • Monitoring • Link discovery • Software upgrades • Backup and restore functions And future releases of SmartZone will greatly expand the capabilities of switch management SmartZone provides organizations the ability to proactively monitor the network and perform network‐wide: • Troubleshooting • Generate traffic reports • Visibility into network activity from the wireless edge to the core • Centralizes management of the entire family of Ruckus switches and wireless Access Points with a single easy to deploy management platform Revision 0419 2‐6 ICX 150 ICX Technologies Cloudpath – Secure, Automated Device Enablement https://www.ruckuswireless.com/products/smart‐wireless‐services/cloudpath Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 7 Many WLAN Administrators face the challenge of providing strong WLAN security, and for many, the requirements of deployment can be complex and difficult. Cloudpath is a security and policy management platform that offers control over users and devices, and the provision of safe, secure WLAN access. Revision 0419 2‐7 ICX 150 ICX Technologies SPoT ‐ Smart Positioning Technology LBS https://www.ruckuswireless.com/products/smart‐wireless‐services/location‐services Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 8 When commercial enterprises invest in WLAN deployments, they often want to maximize their investment. SPoT is Ruckus’ Location Based Solution. Data gathered in SPoT is used to allow venues to understand the footfall traffic through their operational areas, and to engage directly with customers. Revision 0419 2‐8 ICX 150 ICX Technologies SmartCell Insight – Big Data Wi‐Fi Analytics https://www.ruckuswireless.com/products/smart‐wireless‐services/analytics Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 9 Ruckus SmartZone controllers provide an amount of reporting and reporting options for Administrators. However, for very large‐scale deployments with hundreds, thousands, and tens of thousands of Access Points, Administrators often require a deeper level of information. SmartCell Insight is designed for large‐scale service providers and integrators, and provides Administrators the means to extract high level performance analytics, and monitor Key Performance Indicators for mission critical networks. Revision 0419 2‐9 ICX 150 ICX Technologies ZonePlanner – RF Planning Tool https://www.ruckuswireless.com/products/smart‐wireless‐services/rf‐planning Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 10 When new WLAN installation projects are being initiated, it’s vital to make structured plans of the possible Access Point deployment. ZonePlanner is a Ruckus software product that allows WLAN designers to make detailed predictive maps of WLAN coverage before the installation begins. By predicting WLAN coverage potential problems can be anticipated and corrected, and project spending can be accurately assessed. Revision 0419 2 ‐ 10 ICX 150 ICX Technologies Ruckus Mobile Apps https://www.ruckuswireless.com/products/mobile‐apps SpeedFlex – Performance Testing ZD Remote – Monitoring SPoT – Location Analytics SWiPE ‐ Provisioning Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 11 Ruckus Mobile Apps are available for Apple and Android devices and provide a number of options for managing your networks. Mobile Apps are dynamic and subject to frequent updates, so please ensure you check the Ruckus website for the latest Ruckus Mobile App offerings. SpeedFlex ‐ Is a wireless performance testing tool. Based on the open source performance test tool, Zap, this comprehensive yet easy to use application from Ruckus gives users a simple way to collect site performance data ZoneDirector Remote ‐ Is a groundbreaking application that monitors and configures Ruckus ZoneDirectors and Access Points. SPoT ‐ generates operationally significant data that help businesses build an in‐ depth understanding of their venue and improve overall efficiency. Deployed on top of Ruckus WLANs, Ruckus SPoT has flexible deployment options, doesn’t require any additional hardware, and has unlimited scalability in the cloud. SWiPE ‐ With Ruckus Smart Wireless Installation & Provisioning Engine (SWIPE), you can easily register the Ruckus Access Points (APs) being managed by the Ruckus SZ or vSZ. Revision 0419 2 ‐ 11 ICX 150 ICX Technologies Ruckus Resources Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Lets take a look at the resources available to help inform and guide as well as provide the latest software of all product lines. Revision 0419 2 ‐ 12 ICX 150 ICX Technologies Online Resources ‐ Rucktionary https://www.ruckuswireless.com/rucktionary Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 13 The Rucktionary offers a short definition of a concept and then explains its relevance to WLAN deployments. Links are provided to help you see how the technologies relate to WLAN projects. You can access the Rucktionary at https://www.ruckuswireless.com/rucktionary Revision 0419 2 ‐ 13 ICX 150 ICX Technologies Online Resources ‐ Ruckus Products https://www.ruckuswireless.com/products Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 14 The best place to research Ruckus products is always the Ruckus website: https://www.ruckuswireless.com/products Here you will find the most up to date information on all of our products, including: • Software and Software as a Service (SAAS) solutions • System Management and Control • Wi‐Fi Access Points • ICX 7000 series Switches You can also change the language and location of the website – selecting the globe icon will show the available options. Revision 0419 2 ‐ 14 ICX 150 ICX Technologies Online Resources ‐ ICX Portfolio https://www.ruckuswireless.com/products/ruckus‐icx‐family‐switches Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 15 You can further research Ruckus products by navigating directly to: https://www.ruckuswireless.com/products/system‐management‐control/smartzone By selecting one of the product ranges, you will be able to access and download more resources that give you more details on each of the products including: • Data Sheets • At‐a‐Glance Sheet Other resources will be available depending on the selection you choose. Revision 0419 2 ‐ 15 ICX 150 ICX Technologies Online Resources ‐ Support https://support.ruckuswireless.com/ Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 16 You can receive support documentation and firmware details on the Ruckus support site. Upgrade Guides, Warranty & RMA as well as Knowledge Bases and Forums are accessible on the support page. You can navigate directly to the support page by using the URL: https://support.ruckuswireless.com/ Resources will be available depending on the selection you choose. Revision 0419 2 ‐ 16 ICX 150 ICX Technologies ICX Guide Zip Package • Grouping of the most common documentation for the ICX family of switches supporting the given release – Documents are broken into logical guides providing details on a specific subject – Examples: • Layer 2 features • Command References • Security • Stacking • Monitoring • Management • Release notes along with a Feature Support Matrix are included – Release notes are independent of the zip file Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 17 A Zip file is created for each release providing details of features that firmware provides. It consists of a grouping of guides providing information of the features and their configuration. Guides are broken into logical sections of the feature matrix of the release. Each file included in the Zip are independently available on the Ruckus website however using the Zip provides most all the guides needed to deploy an ICX switch. Revision 0419 2 ‐ 17 ICX 150 ICX Technologies Online Training – Introduction to Ruckus Products https://training.ruckuswireless.com Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 18 The Ruckus Training website offers a complete range of self‐study courses that allow you to learn at your own pace. Registration is free. https://training.ruckuswireless.com Without a doubt, the best course with which to begin your journey is Introduction to Ruckus Products. This dynamic course offers a complete overview of Ruckus products and technologies and is regularly updated to include new content. Introduction to Ruckus Products is an essential course for Ruckus internal staff, partners and end users. Revision 0419 2 ‐ 18 ICX 150 ICX Technologies Ruckus ICX Technologies Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Lets now take a look at the Ruckus ICX technologies that provide superior performance and solutions within a network environment. Revision 0419 2 ‐ 19 ICX 150 ICX Technologies ICX Stacking Advantages • Standard Ethernet cables (not • • • • • proprietary) Long‐distance stacking—Up to 40 km Up to 12 units per stack In Service Software Upgrade (ISSU) Hitless failover of management Simple setup and deployment – Guided step‐by‐step walkthrough – Zero Touch provisioning • No additional cost – No optional modules required – No dedicated stacking‐only ports – No license add‐on required Why Do You Care? • Greater scalability • Reduced costs • Stacking cables • Stacking modules/licenses • Simpler management • Flexible deployment • High availability Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 20 Most switch vendors offer stacking with their access switches. We are the ONLY networking vendor that offers stacking technology that makes managing your network “effortless”. Our unique stacking technology allows customers to reduce management costs while delivering the performance and scalability needed to meet today’s customer challenges Our stacking technology is standards‐based using flexible 10GbE and 40GbE connectors for stacking ports eliminating proprietary and costly approaches found in competitor solutions. Using standard Ethernet cables, you can stack across long distances: between multiple wiring closets, multiple floors, between buildings, up to 10km. We support stacking up to 12 switches per stack. No other vendor offers more than 9, and most are less than that. ISSU across a stack, which allows for software upgrades to switches in a stack, one at a time, with no downtime Revision 0419 2 ‐ 20 ICX 150 ICX Technologies We also provide continuous service delivery using our hitless stack member insertion and removal. And, stacking is “standard”, no extra costs No dedicated ports just for stacking No optional modules required for stacking. No license add‐ons required. Ruckus stacking technology provides the reliability, performance, and ease of ownership customers demand. Now you’d think all these premium capabilities would come at a high cost. If you were looking at competitive solutions, you’d probably be right. But not with Ruckus Campus Networking… Greater scalability (up to 12 switches) No extra costs for stacking or for expensive stacking cables Simplified management and flexible deployment High reliability Revision 0419 2 ‐ 21 ICX 150 ICX Technologies Stack Trunks • Stack ports can be combined to form a single logical link (LAG/Trunk) to stack members – Trunk consists of multiple stacking ports and is treated as one logical link – Provides more bandwidth and better resilience than individually connected ports • Stack trunks can be used in linear or ring topologies ― Supported on all ICX 7000 Series switches ― Stacking trunks can be configured as part of the stack interactive‐setup process Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 22 Stack ports of the ICX switches can be configured as trunks acting as a single link known as a stack trunk. This formation of a stack trunk not only provides link redundancy within a stack port but also increases the bandwidth between the switch stack. Stack trunks can be used in either a linear or ring topology switch stack and is supported on all of the ICX 7000 switches. Stack trunks can be configured independently or part of the interface setup process when forming the switch stack. Revision 0419 2 ‐ 22 ICX 150 ICX Technologies Long Distance Stacking • In a Ruckus distributed chassis topology, members are physically separated – Distance between stacking members depends on the platform and type of media used and can be up to 40Km Optics and Cable Documentation: www.ruckuswireless.com Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 23 As we have seen, the distributed chassis architecture of the Ruckus ICX switches allows the components to be spread across the entire campus—due to the use of long‐distance optical links—yet, the whole system can be managed as a single entity. Supported maximum distance depends on the platform or type of media used: the ICX 7150, 7250, 7450, and 7750 support up to 10km Supported optics and cables can be found in the documentation for each device on our Ruckus website at www.ruckuswireless.com Revision 0419 2 ‐ 23 ICX 150 ICX Technologies ICX 7450 IPsec VPN Module • 1 module per switch – Multiple modules per stack for redundancy (1 active per stack) • Hardware assisted AES‐128, AES‐256 and IKEv2 • • • • encryption Up to 20 IPsec tunnels per module 10Gbps total throughput, max 10G per tunnel FIPS certification and Suite‐B compliant Interoperates with any standard IPsec implementation Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 24 When installed, only one IPsec VPN module can be active. However, a second can installed for redundancy. It provides hardware assisted AES‐128, AES‐256 and IKEv2 encryption over up to 20 IPsec tunnels. With 10Gbps of total throughput it offers a maximum of 10G per tunnel. The module is Federal Information Processing Standards, or FIPS, certified and NSA Suite‐B compliant. It is also capable of interoperating with any standard IPsec implementation. Revision 0419 2 ‐ 24 ICX 150 ICX Technologies IPsec VPN Use Case 1 • Path isolation in a campus network for communities of interest Headquarters Office: IPSec Termination Community C IPSec tunnel ICX 7450 stacks in wiring closet with IPSec Service Module Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Campus Network 25 One use case for the IPsec VPN solution is to provide isolation between different communities of interest in the campus network. This allows complete traffic separation and security of traffic as it transits the infrastructure network, between the wiring closets of each community and the headquarters office or core. This insures no data capture capability anywhere between the terminating endpoints of the individual IPsec tunnels. Revision 0419 2 ‐ 25 ICX 150 ICX Technologies IPsec VPN Use Case 2 • ICX 7450 stacks in branch offices; IPSec termination in central office Branch Offices: ICX 7450 stacks with IPSec Service Module Central Office: IPSec Termination Public Network IPSec tunnel enables secure connectivity from branch to private or public clouds Branch offices need to access resources in central site securely Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved © 2017 RUCKUS WIRELESS, INC. COMPANY PROPRIETARY INFORMATION 26 Another scenario is to provide secure transmission between remote branch offices and the central office. Each branch office is capable of terminating an IPsec tunnel, thus securing all data transmissions across a public network, whether that be a provider network or the public Internet. Not only does this solution provide branch‐to‐CO security, but also branch‐ to‐branch security through the CO. Revision 0419 2 ‐ 26 ICX 150 ICX Technologies Campus Fabric • Collapses multiple network layers into a single logical switch – Flattens the network – Eliminating deployment complexity – Simplifies network management • Creates large management domain – Eliminates individual switch touch points – Reduces configuration errors • Combines premium and entry‐level switches together into a single logical switch – Shares advanced Layer 2 and Layer 3 (L2/L3) services Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 27 Based on open standard IEEE 802.1BR Bridge Port Extension technology, Ruckus Campus Fabric integrates premium, mid‐range, and entry‐level switches by collapsing the network access, aggregation, and core layers into a single domain that shares services. Campus fabrics consist of two types of switch rolls known as either a control bridge or a port extender providing increased resiliency and simplified control of a network environment. More details of campus fabrics will be discussed later in the course. Revision 0419 2 ‐ 27 ICX 150 ICX Technologies Multi‐Chassis Trunking 162_MCT.png • Providing switch level redundancy in addition to the link level redundancy provided by LAGs – Provides an active‐active connection of connected devices for increased capacity and forwarding • Expands the features of LAGs by: – Eliminates single point of failure – Integrated loop detection – Easy deployment without fundamentally changing the existing architecture – Sub second failure detection and allocation of traffic • Currently supported on ICX 7750 and 7850 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 28 MCT is an enhancement to Link Aggregation Control Protocol (LACP), IEEE standard 802.3ad and (802.1ax revision). MCT is supported on the ICX 7750 and 7850. Other ICX however can be used to connect to the MCT cluster to provide device level redundancy for its clients. A regular trunk or LAG is a switch‐to‐switch link that provides redundancy. A Multi‐Chassis Trunk is a trunk that initiates at a single MCT‐unaware switch and terminates at two MCT‐aware switches that form one MCT logical switch. From this picture here, we can see that each of the MCT‐unaware switches on the left have a trunk going to each of the MCT switches in the cluster. From the MCT logical switches point of view, these trunks are a single trunk. MCT is an Active‐Active network architecture. It provides high availability, high reliability and provides efficient utilization of bandwidth. Compared with a regular trunk which provides link‐level redundancy: If the trunk is one‐to‐one and the switch goes down, then the whole connection is lost. In addition to port‐level redundancy, MCT provides switch‐ level redundancy by extending the trunk across two switches providing high availability. Revision 0419 2 ‐ 28 ICX 150 ICX Technologies Virtual Router Redundancy Protocol Enhanced • VRRP is a standard protocol that provides the ability to provide IP gateway redundancy for edge devices – Secondary routers will monitor and take over routing if master gateway fails • VRRP‐E is a Ruckus enhanced version of VRRP that addresses the limitations in the standard protocol – Features VRRP‐E provide over standard: • Default gateway is always pingable – Even when master gateway fails secondary routers will respond to ICMP requests • More granular control of track port management – Unlike the standard, multiple track ports (uplinks) can be monitored – Provides the ability to configure a failover when a threshold has been reached • Additional security is available allowing MD5 authentication Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 29 Virtual Router Redundancy Protocol provides failover protection of end devices IP gateway. In the event of a failure of the gateway router other routers will take over and assume the gateway routers duties. Virtual Router redundancy protocol enhanced is a Ruckus proprietary protocol that is an improvement over the VRRP standard providing improved reliability and features to end devices. NOTE: VRRP‐E is supported in the full Layer 3 code only. It is not supported in the base Layer 3 code. VSRP can be used if full Layer 3 code is not installed. Revision 0419 2 ‐ 29 ICX 150 ICX Technologies Unified Firmware Image Upgrade • Unified FastIron Image (UFI) was introduced in 08.0.80 which simplifies the upgrade process of ICX switches – Combines both the FastIron application image and boot code along with the FI signature • Application image also now includes the PoE firmware • From 08.0.80, it is now possible to update all the necessary software components in a setup using one command – The UFI is recommended for all image upgrades • A stack can be upgraded using a UFI bundle, and all stack members are also upgraded • The manifest Image will use the UFI to upgrade images in future releases Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 30 The UFI (which was introduced in 08.0.80) consists of the application image, the boot code image, and the signature file, and can be downloaded in a single file. This provides the ability to upgrade a FastIron switch with a single command simplifying the upgrade process. Moving forward it is recommended to use the UFI process to upgrade images due to the ease of use and the automation of code compatibility functions. Stacked switches can also be upgraded using the UFI process which upgrades all switches in the stack. Beginning with FastIron 08.0.90, any new ICX hardware platform (starting with the ICX 7850 ) will use only UFIs. Revision 0419 2 ‐ 30 ICX 150 ICX Technologies Licensing • Software licensing provides increased scalability and rapid deployment of hardware – Permanent license can be ordered pre‐installed in a Ruckus device – Ordered separately after delivery • Self‐Authenticated Upgrade Licensing provides a “pay‐as‐you‐grow” capabilities – SAU licensing allows you to upgrade or downgrade to a licensed feature set with a single command • License options include:1 – – – – Ports on Demand (PoD) Layer 3 Base Features (L3‐BASE) L3 Premium Features (L3 PREM) Media Access Control Security (Prem‐MACsec) Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 31 Flexible licensing allows organizations to optimize network performance based on specific requirements by simply applying a software license. This eliminates the need to pull and replace hardware equipment but instead simply add license to your existing devices as your network grows or to simply provide additional features that were not previously needed. This makes network or infrastructure upgrades much easier and decreases downtime required to make these changes. Footnote 1: License options are not available on all switch types. Refer to the ICX License Guide for specific license available for each switch. Revision 0419 2 ‐ 31 ICX 150 ICX Technologies End of Module 2: Ruckus Technologies Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved This completes the Ruckus technologies module. I encourage you to continue to the next module of the ICX 150 Implementer course. Thank you. Revision 0419 2 ‐ 32 ICX 150 ICX Hardware Overview Module 3: ICX Hardware Overview Revision 0419 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved This module will provide an overview of Ruckus ICX Hardware. Revision 0419 3‐1 ICX 150 ICX Hardware Overview Objectives • After completing this module, attendees will be able to: – Describe the evolution of the network – Understand where in the network topology you would find different ICX switches – Describe the different configurations available with each ICX switch model, including: • ICX 7150 • ICX 7250 • ICX 7450 • ICX 7650 • ICX 7750 • ICX 7850 – Explain stacking, optic and cabling capabilities of Ruckus ICX switches Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 2 This module will describe the evolution of the network, and where in the network you would find the different types of Ruckus ICX switches. Then we will look a the different hardware configurations available within the ICX family covering all of the models here. Lastly, we will review some of the additional capabilities of ICX switches including stacking capabilities, Ruckus optics and unique cabling options. Revision 0419 3‐2 ICX 150 ICX Hardware Overview Building a New Network Core Aggregation Access Problems: • Complex network architecture, with too many layers and inactive links • Many points of management • High upfront and maintenance costs • Underutilized chassis • Forklift upgrades only Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 3 Lets begin with the evolution of the Campus network. Traditionally, networks were deployed using chassis at the core, aggregation and access layers. These networks tended to be large with many points of management. Chassis are inherently big, bulky, and require a large up‐front investment. Typically, they had unused capacity for anticipated growth. Maintenance was difficult and expensive and upgrades were expensive as well. Once maximum capacity was reached, upgrades could only be done through forklift upgrades. Revision 0419 3‐3 ICX 150 ICX Hardware Overview Fixed Switches at Access Benefits Core Aggregation Access Benefits: • Scale‐out, “pay as you grow” networking • Greater scalability • Flexible network deployment options • Lower power consumption Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 4 Enterprises are now commonly deployed using stackable switches at the access layer. They offer more flexibility and can be deployed exactly where they are needed in the campus. Ruckus has been a pioneer in delivering fixed access switches with open standards and multi‐vendor support. The fixed‐switch and stackable design of the Ruckus ICX switches, provides the flexibility that allows users to pay‐as‐you‐grow, with market‐leading performance. Customers can purchase what they need today and know that they will be able to easily add switches, without requiring a forklift upgrade. Revision 0419 3‐4 ICX 150 ICX Hardware Overview Fixed Switches at Aggregation & Core Core Core & Aggregation Access Benefits: • Lower up‐front capital investment • Scale‐out, “pay as you grow” networking • Increased scalability • Distributed chassis with long distance stacking • Reduced power, cooling and footprint Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 5 The Ruckus distributed chassis technology collapses the aggregation and core layers using the Ruckus ICX 7750 and 7850 switches. These aggregation/core switches deliver industry‐ leading 10 GbE, 40 GbE and 100 GbE port densities, advanced high‐availability capabilities, and flexible stacking architecture, making it the most robust aggregation and core distributed chassis switch offering for enterprise LANs. In addition to rich Layer 3 features, both of these switch models scale to a 12‐unit distributed chassis stack or a Multi‐Chassis Trunking (MCT) topology. Though stacking distances depend on the ICX platform, optics, and cables used, the ICX 7750 and 7850 can form a distributed chassis of up to 40 kilometers. Revision 0419 3‐5 ICX 150 ICX Hardware Overview Simplified Architecture with Campus Fabric Campus Network as a Single Logical Domain Benefits: • Single point of management & control • Collapsed Core, Aggregation and Access • STP‐free Layer 2 design • Edges switches inherit all the features of the core devices • Greater scalability – over 1,700 ports in a single system • Flexible edge deployment options for optimized cost and performance Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 6 The Ruckus Campus Fabric (also known as Switch Port Extender) is the evolution of the HyperEdge Architecture. It is based on the IEEE 802.1BR standard for Bridge Port Extension, and it collapses multiple network layers into a single logical switch, flattening the network and eliminating deployment complexity. Campus Fabric simplifies network management. All switches are managed as if they are a single switch. It offers a great opportunity for enterprises to replace aging legacy chassis with Ruckus ICX switches and Campus Fabric technology, extending the life of their network, and dramatically reducing total cost of ownership. The Campus Fabric also eliminates the inefficiency of Spanning Tree Protocol. The entire domain runs from a unified control and forwarding plane, eliminating the need to deploy a loop avoidance protocol, or complex Layer 3 protocol like OSPF in the fabric domain. Multi‐pathing is supported by design within a Campus Fabric domain. All links between switches are active at all times, and traffic is load balanced, and optimizes performance, while delivering fast failover recovery from link failure with no impact on network service. Revision 0419 3‐6 ICX 150 ICX Hardware Overview Ruckus ICX 7000 Switch Portfolio – Overview Aggregation/Core ICX 7850 Access Premium Aggregation‐Core ICX 7750 Aggregation‐Core Price/Performance Price/Performance ICX 7150 Z‐Series ICX 7650 Entry‐Level Access High Availability Multi‐gigabit (2.5 GbE) ICX 7150 Entry‐Level Access PoE/PoE+ or non‐PoE Premium Access‐Aggregation ICX 7450 + Highest Performance + Campus Fabric CB + MCT Access‐Aggregation ICX 7250 + Higher Performance + 40G/100G Uplinks + Multigigabit 2.5/5/10G Access + 10G/40G Aggregation + Medium‐to‐Large Core + Highest Performance + Campus Fabric + MCT + 10G/25G/40G/100G Aggregation + 6.4 Tbps Switching Capacity + 10G Aggregation + Higher Performance + Hot‐swap PSU & Fans + L3: IPv4/IPv6, Multicast + Higher Performance + L3: VRF/GRE + EEE + 1G Aggregation Function and Scalability Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 7 Here we have all of the switches currently in the ICX 7000 series family. Starting from the left we have our ICX 7150 series which offers entry‐level access capabilities offered with or without Power‐over‐Ethernet (PoE) capabilities. In addition, the ICX 7150 Z‐series switches offers 2.5 GbE capabilities at an entry‐level price. The next access‐level switch is the ICX 7250, which offers the same capabilities as the 7150 and then some, including Higher performance throughput, advanced Layer2 capabilities including VRF and GRE. Moving up in function and scalability, we have the ICX 7450 and 7650 switches. These are both capable of operating in the access and aggregation space with hop‐swappable components and high speed uplinks capabilities. An in the core space, the ICX 7750 and 7850 switches provide the most enhanced capabilities, including Campus Fabric control bridge functionality and Multi‐chassis trunking as well the support for 10, 40 and 100GbE aggregation. All of these options allow you to select the appropriate device to meet your current requirements as well as the ability to grow to meet your future needs. Revision 0419 3‐7 ICX 150 ICX Hardware Overview Hardware Overview Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Now, lets take a deeper look at the hardware configuration for each switch in the ICX product family. We will start with the entry level devices and work our way up to the high end products. Revision 0419 3‐8 ICX 150 ICX Hardware Overview ICX 7150 ‐ Overview Fanless 120W PoE budget 2xSFP+ and 2xUTP uplink ports C12P High performance and port density • • • • • 6 models with 12/24/48 ports and optional PoE/PoE+ All downlink ports 10/100/1000 with PoE and PoE+ 4 x 1/10G flexible uplink/stacking SFP+ ports 2 x 1G UTP uplink ports Stack up to 12 units and 576 ports • Any combination of switch versions (not compact) High availability 24 24P • Redundant 10G Ethernet stack links • Hitless stacking failover Advanced scalability and features • L2 and L3 features including STP/RSTP/MSTP and OSPF • sFlow for granular network traffic accounting 48 48P 48PF Deployment flexibility Optional fanless mode 370W (P) and 740W (PF) PoE budget options 4xSFP+ and 2xUTP uplink ports Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved • • • • 4 x 10G SFP+ ports configurable for stacking or uplinks 24/48 are fanless for quiet operation Support for OpenFlow and Campus Fabric Optional fanless operation for 24P/48P (150W PoE budget) 9 Let’s start with a look at the ICX 7150. The ICX7150 comes in seven hardware configurations. The first six are shown here: • First is the compact 12 port (C12P) with PoE on all 12 ports, 2 ports of 10 Gigs, as well as 2 additional ports with 1 Gig copper uplinks. • Next, there is the 24 port (labeled 24) and 24 port PoE configuration (labeled 24P) that has PoE+ capabilities on every port. It also has up to 370 Watts of PoE budget that allows for 15.4 Watts of PoE assigned to all 24 ports. If one were to need 30 Watts of PoE+ assigned to the ports, this configuration provides up to 12 ports of PoE+ power. To reiterate, this is a high value position because a lot of other similar products in this category only offer 190 to 195 Watts of PoE budget assigned to their 24 port switches. • Finally, there are three 48 port versions – non‐PoE (48), PoE (48P), and one (48PF) that has double the PoE budget with 740 Watts. This provides 48 ports of 15.4 Watts (802.3af PoE) assigned to every port. If one were to need 30 Watts of PoE+ power assigned to the ports, this configuration can allow up to 24 ports. Revision 0419 3‐9 ICX 150 ICX Hardware Overview ICX 7150‐48ZP High performance and port density 16x1/2.5G PoE/PoE+/PoH 32x10/100/1G PoE/PoE+ 8xSFP+ Stacking/Uplink • • • • • 16 x 1/2.5G ports with PoH 32 x 10/100/1G ports with PoE+ 4 x 1/10G flexible uplink/stacking SFP+ ports 4 x 1/10G uplink SFP+ ports Stack up to 12 units with other ICX7150 family members High availability • Redundant PSU and fans • Redundant 8x10G Ethernet stack/uplinks • Hitless stacking failover Advanced scalability and features • L2 and L3 features • Campus Fabric PE capabilities Dual Fan Trays Dual PSU Up to 1480W PoE budget Deployment flexibility • 8 x 10G SFP+ ports configurable for stacking or uplinks • Support for OpenFlow and Campus Fabric • PoE power budget 1xPSU: 820W 2xPSU: 1480W Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 10 The 48‐port “Z‐Series” adds Multi‐gigabit (2.5G), high availability and higher performance for 802.11ac and ac Wave 2 deployments. The ICX 7150 Z‐Series, 48‐port switch adds: • Multi‐gigabit technology, with 16 2.5G ports. • Dual, hot‐swap power supplies and fans • An impressive PoE budget • Stacks with the rest of the ICX 7150 switch family. Revision 0419 3 ‐ 10 ICX 150 ICX Hardware Overview ICX 7150‐C12P – LEDs Status button is pushed to cycle through different interpretations of the Port LEDs, including: Link, Speed, Member ID, USB status and PoE status LEDs light in Amber or Green to display status of the System, Master/Slave, SW Update, Diagnostics, Cloud Management and Power View the ICX 7150 Hardware Installation Guide for interpreting each of these LEDs Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 11 The LEDs on the ICX 7150‐C12P provide valuable insight into the operations of the switch. Above the management interface there are LEDs to indicated the status of the Operating System, the master/slave status if the unit is a member of a stack, a software update, diagnostics and power. There is also an LED, intended for future use, to indicate if the device is cloud managed. On the left near the console port status LED section. There is a button that changes what the status of the port LEDs represent. It cycles through various statuses including port link, port speed, stack member ID, USB and PoE status. Full interpretation of each of these LEDs is available in the Ruckus ICX 7150 Switch Hardware Installation Guide, found on the Ruckus Networks web site. Revision 0419 3 ‐ 11 ICX 150 ICX Hardware Overview ICX 7150‐24/48/P – LEDs Status button is pushed to cycle through different interpretations of the Port LEDs, including: Link, Speed, Member ID, USB status and PoE status LEDs light in Amber or Green to display status of the System, Master/Slave, SW Update, Diagnostics, Cloud Management and Power View the ICX 7150 Hardware Installation Guide for interpreting each of these LEDs Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 12 The LEDs on the ICX 7150‐24‐port, 48‐port and their PoE derivatives provide the same valuable insight as the 7150‐C12P. There is no difference in the available LEDs or their interpretation. The only difference is the placement on the front of the unit. Full interpretation of the LEDs for all ICX 7150 devices can be found in the Ruckus ICX 7150 Switch Hardware Installation Guide, found on the Ruckus Networks web site. Revision 0419 3 ‐ 12 ICX 150 ICX Hardware Overview ICX 7150 – Hardware‐based Factory Reset • The RESET button on the front of the ICX 7150 can be used to perform a factory reset of the switch – This is applicable from R08.0.70 and later • Perform the following steps to perform hardware‐based factory reset 1. 2. 3. Remove power from the switch. Press and hold the reset button and apply power to the switch. Release the reset button after all of the system LEDs flash amber. – When all the system LEDs blink green, all the configuration data is being erased and the switch is returned to its factory configuration – When all the system LEDs are solid green, the erase process is complete and the system will reload – Once reloaded and the SYST LED is steady green the factory reset is complete Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 13 Another feature of all of the ICX 7150 switches is the ability to perform a factory default reset from the front of the switch. The button is recessed and can only be depressed with a small tool, like a paperclip. The functionality of this button was first enabled with release 8.0.70. The button‐press factory default process is fairly simple and requires no management/CLI connection the switch as the LEDs will indicate each phase of the reset process. To initiate the factory reset, simply remove power from the device. Next, press and hold the reset then apply power again. Keep the button pressed until all of the System LEDs flash AMBER, then release it. At this point the system will begin the factory reset. All of the system LEDs will blink green when all of the configuration data is being erased, returning the switch to its factory configuration. The system LEDs will turn solid GREEN when the erase process is complete and then the system will reload. Once reloaded a solid GREEN SYST LED indicates completion. Revision 0419 3 ‐ 13 ICX 150 ICX Hardware Overview ICX 7250 ‐ Overview 10/100/1000 Ports PoE, PoE+ 8 x 1/10G integrated SFP+ ports 24 24P High performance and port density • 4 models with 24/48 ports and optional PoE/PoE+ • 8 x 1/10G flexible uplink/stacking SFP+ ports • 80G stacking bandwidth • Stack up to 12 units and 576 ports • Any combination of switch versions High availability • Redundant 10G Ethernet stack links • Hitless stacking failover • Optional external redundant PSU shelf • Up to 16 switches monitored per EPS shelf 48 48P Advanced scalability and features • L2 and L3 features • Campus Fabric PE capabilities EPS Deployment flexibility Quad Modular PSU Trays Supports up to 16 x 7250 switches • 8 x 10G SFP+ ports configurable for stacking or uplinks • Support for EEE. OpenFlow 1.3 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 14 The ICX 7250 Switch is our “work horse” access switch. All ICX 7250 models provide either 24 or 48 1Gbps Ethernet connectivity. Each of the models are equipped with 8x1/10G uplink/stacking ports for high throughput stack capabilities. Additionally the “P” models provide PoE+ capabilities to supply current to many devices including IP phones and Wi‐Fi access points. It delivers higher performance than the ICX 7150, with up to 8 10G uplink ports, more Layer 3 features and Energy‐Efficient Ethernet. An external power shelf (EPS) is also available to provide redundant system power, as well as additional PoE power. While not hot‐swappable, you can use any of the 4 external power supplies in it to backup up to 16 switches. Revision 0419 3 ‐ 14 ICX 150 ICX Hardware Overview ICX 7250 – LEDs • The ICX 7250 has System and Port‐level LEDs indicators • System LEDs to indicate status of: – Power Supply – External Power Supply (EPS) • ICX 7250‐48P supports two EPS • All others support only one – Diagnostics – Master/Slave – Uplink – Downlink – Stack Unit ID • Port LEDs indicate: – Valid link and TX/RX – PoE status View the ICX 7250 Hardware Installation Guide for interpreting each of these LEDs Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 15 The LEDs on the ICX 7250 provide valuable insight into the operations of the switch. There LEDs for power status, both local and power from an External Power Supply (EPS). Note that only the ICX 7250‐48P supports connecting to two EPS devices and is the only device with two EPS LEDs. Diagnostic LED indicates if the system is in diagnostic mode. The remaining LEDs provide insight when the unit is operating in a stack. These indicate master slave status, uplink and downlink port status and the unit’s stack ID. You may notice that there are only 10 LEDs but the 7250 has ability to have 12 units in a stack. In the case of unit IDs higher than 10, the 10+ LED and the 1 or 2 LED will be lit, indicating unit ID 11 or 12, respectively. In addition to these, LEDs on each port indicate link status, activity and PoE status. Full interpretation of each of these LEDs is available in the Ruckus ICX 7250 Switch Hardware Installation Guide, found on the Ruckus Networks web site. Revision 0419 3 ‐ 15 ICX 150 ICX Hardware Overview ICX 7450 – Overview 1 x Module Slot 4x1G SFP 4x10G SFP+ 4x10G Copper 1x40G* PoE, PoE+, PoE++ and PoH 24 24P 24 24P 48 48P 48 48P 48F High performance and port density • 5 models supporting 24/48 POE+ and 48‐port SFP • 8 ports of PoE+ (65W) and PoH (95W) • Flexible uplink modules • 2 x 40G QSPF+ stack connections, 160G stack bandwidth • Stack up to 12 units and 576 PoE ports • Any combination of port types High availability • Hitless stacking failover and redundant 40G stack links • Redundant hot‐swap load‐sharing power supplies and fans Advanced scalability and features 48F • L2 and advanced L3 features • Campus Fabric PE capabilities Deployment flexibility 2 x Module Slots 4x10G SFP+ 4x10G Copper 1x40G Dual Modular Fan Trays Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Dual Modular Power Supply AC/DC • • • • AC or DC power Reversible front‐to‐back or back‐to‐front airflow 10G or 40GbE uplink and stacking options Support for EEE, MACsec, IPsec and OpenFlow 1.3 16 The ICX 7450 delivers high performance and flexibility with a backbone of up to 40G. It can serve as a high‐end access switch or as an aggregation device. Its unique design includes 3 modular slots that can be used for 1G, 10G or 40G uplink/stacking ports. There’s also an IPsec encryption module for security‐minded customers. The ICX 7450 also offers dual hot‐swap power supplies and fans, MACsec, Energy Efficient Ethernet (EEE) and advanced Layer 3 features. A truly premium access switch. The ICX7450 comes in five basic configurations that are primarily differentiated based on the port density (i.e. 24 port and 48 port) and the PoE/PoH capabilities (i.e. with PoE/PoH and without PoE). • The first is the ICX7450‐24 that has 24x10/100/1000 Mbps RJ‐45 ports. This does not support PoE. • Second is the ICX7450‐24P that features 24×10/100/1000 Mbps RJ‐45 PoE+ ports with eight pre‐assigned ports supporting PoH (90 W). These ports are identified by the yellow markings above/below the ports. • The next three models, the ICX 7450‐48, the 48P, and the 48F have 48 port density. The ICX 7450‐48 does not have PoE capability. It has 48×10/100/1000 Mbps RJ‐45 ports. The ICX 7450‐48P has 48×10/100/1000 Mbps RJ‐45 PoE+ ports with eight pre‐ assigned ports supporting PoH (90 W), again indicated by yellow markings. The ICX7450‐48F comes with 48×100/1000 Mbps SFP ports. Revision 0419 3 ‐ 16 ICX 150 ICX Hardware Overview ICX 7450 Interface Modules ICX7400‐1X40GQ ICX7400‐4X10GF ICX7400‐4X10GC ICX7400‐4X1GF Bandwidth 80Gbps 80Gbps 80Gbps 8Gbps Port Type 1x40GE QSFP+ 4x10GE SFP+ 4x10GE RJ‐45 4x1GE SFP Front (24) or Rear (24/48) Front or Rear Front or Rear Front only Stacking (rear), Uplink Stacking (front) Uplink with MACsec LRM optic support Uplink Uplink Module Slot Function Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 17 Here we have the interface modules for the ICX7450. They offer 1, 10 or 40Gigabit Ethernet connectivity options. Some have specific installation location requirements, that are based on interface type as well as location on the switch, either on the front or the back of the unit. Two offer stacking as well as uplink capabilities while the remaining two only offer uplink. Revision 0419 3 ‐ 17 ICX 150 ICX Hardware Overview ICX 7450 IPsec VPN Module • Industry first hardware based IPsec solution for stackable switch • Flexible deployment, can encrypt traffic from/to any stack port • Rich feature set – IPv4 unicast, OSPF, QoS, PBR, VRF, ACL and Jumbo frames supported on IPsec tunnels • Futureproofing via field‐upgradeable FPGA based Packet Processor Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 18 The ICX 7450 IPsec VPN module is the industry’s first hardware based IPsec solution for stackable switch. It is capable of encrypting traffic to or from any stack port on the switch. It supports a vast number of features over the IPsec tunnel, including: IPv4 unicast, OSPF, QoS, PBR, VRF, ACL and Jumbo frames. The module is future‐proofed by leveraging a field‐upgradeable Field Programmable Gate Array (FPGA) based Packet Processor. Revision 0419 3 ‐ 18 ICX 150 ICX Hardware Overview ICX 7450 IPsec VPN Module • 1 module per switch – Multiple modules per stack for redundancy (1 active per stack) • Hardware assisted AES‐128, AES‐256 and IKEv2 • • • • encryption Up to 20 IPsec tunnels per module 10Gbps total throughput, max 10G per tunnel FIPS certification and Suite‐B compliant Interoperates with any standard IPsec implementation Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 19 When installed, only one IPsec VPN module can be active. However, a additional modules can be installed for redundancy. It provides hardware assisted AES‐128, AES‐256 and IKEv2 encryption over up to 20 IPsec tunnels. With 10Gbps of total throughput it offers a maximum of 10G per tunnel. The module is Federal Information Processing Standards (FIPS) certified and NSA Suite‐B compliant. It is also capable of interoperating with any standard IPsec implementation. Revision 0419 3 ‐ 19 ICX 150 ICX Hardware Overview ICX 7450 – LEDs • The ICX 7450 has System and Port‐level LEDs indicators • Front System LEDs to indicate status of: – – – – – – Power Supply 1 Power Supply 2 Diagnostics Master/Slave Media Expansion Modules 2‐4 Stack Unit ID • Port LEDs indicate: – Valid link and TX/RX – PoE status View the ICX 7450 Hardware Installation Guide for interpreting each of these LEDs Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 20 The LEDs on the ICX 7450 provide the same insights to switch operations as the ICX 7250 switch. There is an LED for power status of each hot‐swappable power supply and a diagnostic LED indicates if the system is in diagnostic mode. There are LEDs indicating Media Expansion Modules in slots 2‐4. And the remaining LEDs provide insight when the unit is operating in a stack. These indicate master slave status, uplink and downlink port status and the unit’s stack ID. Like with the 7250 when the unit ID is higher than 10, the 10+ LED and the 1 or 2 LED will be lit, indicating unit ID 11 or 12, respectively. In addition to these, LEDs on each port indicate link status, activity and PoE status. Full interpretation of each of these LEDs is available in the Ruckus ICX 7450 Switch Hardware Installation Guide, found on the Ruckus Networks web site. Revision 0419 3 ‐ 20 ICX 150 ICX Hardware Overview ICX 7650 Overview 4x10G, 2 x 40G, 1 x 100G uplink ports 48ZP High performance and port density • • • • • 48ZP: 1, 2.5, 5 and 10G copper downlinks 48P: 48 x 10/100/1G copper downlinks 48F: 1 and 10G fiber downlinks 10, 40 and 100G uplinks Stack up to 12 units via 40G or 100G links • Any combination of port types High availability 48P • Hitless stacking failover and redundant stack links • Redundant hot‐swap load‐sharing power supplies and fans 48F Advanced scalability and features • Campus Fabric CB/PE capability • L2 and advanced L3 features including BGP and VRF • sFlow for granular network traffic accounting Deployment flexibility Dual Fixed 2 x 100G or Modular 4x40G Fan Trays stacking/uplink Ports Dual Modular AC or DC Power Supplies • • • • AC or DC power PoE overdrive Reversible front‐to‐back or back‐to‐front airflow Support for MACsec256, EEE and OpenFlow 1.3 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 21 The ICX 7650 can serve as a premium access switch or a medium core/aggregation switch. There are three models in this family: • First is the ICX 7650‐48ZP, where the “Z” indicates is its compliance to the IEEE 802.3bz Multigigabit standard. It has 24 Multigigabit 2.5/5/10G ports, each with PoE up to 90Watts (compatible with the 802.3bt standard, as well as compatible with 60W PoE). Plus an additional 24 x 1G ports, with PoE+. • Next is the ICX 7650‐48P that has 48 x 1G ports with PoE+, 8 of those supporting up to 90W of PoE power. • Lastly, ICX 7650‐48F model offers a medium core/aggregation switch with fiber connectivity via 24 x 10G ports, plus 24 1G ports. All of the ICX 7650 switches offers fully redundant, hot‐swappable load‐sharing AC or DC power supplies and fans. Revision 0419 3 ‐ 21 ICX 150 ICX Hardware Overview ICX 7650 Interface Modules (Front ‐ Optional) ICX7650‐1x100GQ ICX7650‐2X40GQ ICX7650‐4x10GF Port Type 1 × 40/100 GbE QSFP28 2 x 40 GbE QSFP+ 4 × 10 GbE SFP+ Module Slot Front Front Front Function Uplink Uplink Uplink Bandwidth 100 Gbps 80 Gbps 40 Gbps Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 22 Here we have the interface modules for the ICX7650. They offer 10, 40 and 100 Gigabit Ethernet connectivity options. All are installed in the front module slots of the switch and provide uplink functionality only, as stacking is accomplished through the fixed ports on the rear of the switch. Revision 0419 3 ‐ 22 ICX 150 ICX Hardware Overview ICX 7650 – LEDs • ICX 7650 LEDs and interpretations are similar to ICX 7150 Status button is pushed to cycle through different interpretations of the Port LEDs, including: Link, Speed, Member ID, USB status and PoE status LEDs light in Amber or Green to display status of the System, Master/Slave, SW Update, Diagnostics, Cloud Management and Power View the ICX 7650 Hardware Installation Guide for interpreting each of these LEDs Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 23 The LEDs on the ICX 7650 are very similar to the LEDs on the ICX 7150 platform. To the right of the console interface there are LEDs to indicate the status of the Operating System, the master/slave status if the unit is a member of a stack, a software update, diagnostics and power. There is also an LED, intended for future use, to indicate if the device is cloud managed. On the left near the console port status LED section. There is a button that changes what the status of the port LEDs represent. It cycles through various statuses including port link, port speed, stack member ID, USB and PoE status. Full interpretation of each of these LEDs is available in the Ruckus ICX 7650 Switch Hardware Installation Guide, found on the Ruckus Networks web site. Revision 0419 3 ‐ 23 ICX 150 ICX Hardware Overview ICX 7750 ‐ Overview High performance and port density 48F • • • • 48C 3 models supporting 10G fibre and copper plus 40G QSFP+ 6 x QSFP+ 40G module Up to 12 x 40G QSPF+ stack connections, 5.76T stack bandwidth Stack up to 12 units and 576 10G ports • Any combination of port types High availability • Hitless stacking failover and redundant 40G stack links • Redundant hot‐swap load‐sharing power supplies and fans 26Q Advanced scalability and features • L2 and advanced L3 features including BGP and VRF • Campus Fabric CB/PE capabilities Deployment flexibility Non blocking 2Tbps switch capacity 6 x 40G Module Slot Dual Modular Power Supply AC/DC • AC or DC power • Reversible front‐to‐back or back‐to‐front airflow • Support for OpenFlow 1.3 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 24 The ICX 7750 is the first of our Aggregation and Core layer switches. It is designed to compete in the data center and the campus aggregation and core market. The high‐port density distributed chassis system architecture is one of the most important features that makes the ICX7750 such a robust asset in these network segments. The ICX7750 comes in three basic configurations: • First is the ICX 7750‐48F that features 48, 1/10 GbE SFP+ ports and 6, 40 GbE QSFP+ ports that can each be split into 4×10 GbE SFP+ ports. • Next is the ICX 7750‐48C. This comes with 48 x 10GBASE‐T ports and 6 x 40 GbE QSFP+ ports that can each be split into 4×10 GbE SFP+ ports. • Lastly, we have the ICX 7750‐26Q that features 26 x 40 GbE QSFP+ ports that can be split into as many as 96 x 10 GbE SFP+ ports. It is a 10 and 40GbE (Gigabit Ethernet) switch in a 1RU form factor for campus aggregation and core applications. It provides the chassis‐level reliability using Ruckus’ High Availability (HA) stacking technology. It also offers hitless stack failover, In‐Service Software Upgrade (ISSU), hot‐swappable power supplies, fan trays, and a plug‐in module. In addition, it has market‐leading density, physical and logical redundancy, and a highly efficient cooling design. It also provides low‐latency, cut‐through routing, non‐blocking architecture with excellent scalability. All these features make the ICX 7750 very suitable for data center applications. Revision 0419 3 ‐ 24 ICX 150 ICX Hardware Overview ICX 7750 – LEDs • Each ICX 7750 has the same System Status LEDs, containing: – – – – – – Power Supply 1 Power Supply 2 Master/Slave Diagnostics High Availability Redundant 4x10/40GbE QSFP+ Upper port 1/10GbE SFP+ • Port Status LEDs vary by model – Green and Amber LEDs indicate Link and Speed 1/10GbE RJ‐45 Lower port View the ICX 7750 Hardware Installation Guide for interpreting each of these LEDs Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 25 The LEDs on the ICX 7750 provides valuable insight into switch operations. There is an LED for power status of each hot‐swappable power supply and a diagnostic LED indicates if the system is in diagnostic mode. There are LEDs indicating master/slave status in a stack, the presence of redundant power supplies and fans and High Availability operation. In addition to these, LEDs on each port indicate link status, activity and PoE status. These LEDs vary by model, therefor for full interpretation of each of these LEDs view the Ruckus ICX 7750 Switch Hardware Installation Guide, found on the Ruckus Networks web site. Revision 0419 3 ‐ 25 ICX 150 ICX Hardware Overview ICX 7850 ‐ Overview High performance and port density • Up to 32x 40/100 GbE ports per switch • Up to 8x 40/100GbE standard QSFP28 stacking ports • Up to 8x 100 GbE stacking ports, 1.6 Tbps of stacking bandwidth per switch 32Q High availability • Hitless stacking failover and redundant 10G and 40G stack links • Redundant hot‐swap load‐sharing power supplies and fans Advanced scalability and features • L2 and advanced L3 features including BGP and VRF • sFlow for granular network traffic accounting 48F/FS Deployment flexibility Modular Fan Trays Dual Modular Power Supply AC/DC • • • • AC or DC power Reversible front‐to‐back or back‐to‐front airflow Support for OpenFlow 1.3 MACSec for data privacy and EEE for power efficiency Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 26 The ICX 7850 switches offer 40GbE and 100GbE for maximum performance in the aggregation and core layers as well as highly efficient top of rack switches in datacenters. If offers up to 32x 40/100 GbE ports per switch and up to 8x 100 GbE stacking ports, resulting in 1.6 Tbps of stacking bandwidth per switch. The ICX 7850 can deliver the performance and scalability required by future generations of wireless access points, IoT and LTE devices. It provides highly efficient core switching with redundant, hot‐swappable power supplies and fans, In‐Service Software Upgrades (ISSU), Multi‐Chassis Trunking (MCT) for core failover with load‐balancing, and hitless stack insertion and removal. It supports advanced IPv4 and IPv6 routing functionality including, BGP, OSPF, VRRP, PIM, PBR, VRF. The ICX 7850 comes in three models: • The ICX 7850‐48F stackable aggregation switches comes with 48x 1/10/25 GbE SFP28 ports and 8x 40/100 GbE QSFP28 ports for uplinks or stacking. • The ICX 7850‐48FS stackable aggregation switches comes standard with 8‐QSFP28 ports for 40/100 GbE for stacking or uplinks and offers 48x 1/10 GbE fiber SPF+ ports with MACsec and LRM. • The ICX 7850‐32Q aggregation/core switch comes standard with 32 40/100 GbE QSFP28 ports and up to 8 of these ports can be used for stacking. The QSFP28 ports are capable of native 40 GbE or 100 GbE Ethernet, or may be broken out to 4x10 Gbps or 4x25 Gbps links to give up to 128 10/25GbE ports for server aggregation in a Data Center, or switch aggregation in the campus. Revision 0419 3 ‐ 26 ICX 150 ICX Hardware Overview ICX 7850 – Power and Cooling Hot Swap N+1 Redundant Fan Trays Exhaust airflow or Intake airflow Dual Hot Swap Power Supplies AC or DC Exhaust airflow or Intake airflow Hot Swap N+1 Redundant Fan Trays Exhaust airflow or Intake airflow Dual Hot Swap Power Supplies AC or DC Exhaust airflow or Intake airflow 48F/FS 32Q Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 27 Here we have a view of the back of the ICX 7850‐48F/FS and the ‐32Q devices. All models offer 2x hot‐swappable load sharing power supplies and 5x hot‐ swappable fan assemblies with reversible airflow options. Revision 0419 3 ‐ 27 ICX 150 ICX Hardware Overview ICX 7850 – LEDs • ICX 7850 LEDs and interpretations are similar to ICX 7150 and ICX 7650 Status button is pushed to cycle through different interpretations of the Port LEDs, including: Link, Speed, Member ID, USB status and PoE status LEDs light in Amber or Green to display status of the System, Master/Slave, SW Update, Diagnostics, Cloud Management and Power View the ICX 7850 Hardware Installation Guide for interpreting each of these LEDs Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 28 The LEDs on the ICX 7850 are very similar to the LEDs on the ICX 7150 and 7650 platforms. On the front of the switch are LEDs to indicate the status of the Operating System, the master/slave status if the unit is a member of a stack, a software update, diagnostics and power. There is also an LED, intended for future use, to indicate if the device is cloud managed. Again, there is group of LEDs with a button that changes what the status of the port LEDs represent. It cycles through various statuses including port link, port speed, stack member ID, USB and PoE status. Full interpretation of each of these LEDs is available in the Ruckus ICX 7850 Switch Hardware Installation Guide, found on the Ruckus Networks web site. Revision 0419 3 ‐ 28 ICX 150 ICX Hardware Overview Reversible Airflow – ICX 7450, 7650, 7750 and 7850 • ICX 7450, 7650, 7750 and 7850 support reversable airflow options to support any datacenter deployment • Exhaust – Standard airflow for pre‐configured versions of the ICX 7450, 7650, 7750 and 7850 – Can be changed to Intake by swapping ALL PSUs and fans • Intake – Option for ICX 7450, 7650, 7750 and 7850 – Can be changed to Exhaust by swapping ALL PSUs and fans • ICX 7150 and 7250 have fixed exhaust airflow Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 29 Two airflow options are supported on the ICX 7450, 7650, 7750 and 7850. Air can flow as exhaust, where air flows from the front of the unit to the back. Alternatively, it can operate in intake mode where air flows from the back to the front. It is important to note that the airflow must be consistent for all installed PSUs and fan units, meaning they must all flow the same way. Exhaust airflow PSUs and fans are labeled with a green, downward pointing arrow marked with the letter “E”. Intake airflow PSUs and fans are labeled with an orange, upward pointing arrow marked with the letter “I”. The ICX 7150 and 7250 switch are only offered with fixed power supplies and flow only in exhaust mode, or front‐back Revision 0419 3 ‐ 29 ICX 150 ICX Hardware Overview ICX 7150, 7650 and 7850 – Console Ports USB console port RJ45 console port • USB Type‐C connector on switch • Plug‐and‐Play – Windows OS will install automatically – MacOS will download the driver • USB cable Type‐C to Type‐A • Drivers for Windows, MacOS and Linux available from https://support.ruckuswireless.com Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 30 The ICX 7150, 7650 and 7850 switches offer two console connection options. The first is a Type‐C USB connector on the switch. This allows the use of a Type‐C to Type‐A cable to access the CLI. This connection option requires a driver be installed that allows your devices USB port to operate as a serial interface. The driver can be found at: http://support.ruckuswireless.com An RJ‐45 interface is also provided for true serial connectivity. This allows connectivity to a serial interface on the management device, typically a DB9 connector. Revision 0419 3 ‐ 30 ICX 150 ICX Hardware Overview ICX 7250, 7450 and 7750 Console Port Serial console port • USB type connector on switch but it’s actually a serial interface! • Other end is an RJ45 connector and RJ45/DB9F adapter Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 31 The ICX 7250, 7450 and 7750 offer only a serial interface for connecting to the CLI. The interface itself is a USB‐type connector, but only provides serial connectivity. Each unit is shipped with a cable that connects to the switch interface, has an RJ54 connector that in‐ turn connects to an adapter that modifies the RJ45 to a DB9 female serial interface for connecting to your management device’s serial port. Revision 0419 3 ‐ 31 ICX 150 ICX Hardware Overview Stack Connections Platform Maximum Number of Switches in a Stack Stack Link Speeds Maximum Links Per Stack Trunk Maximum Stack Bandwidth ICX 7150 12 10G 2 x 10G 480Gbps ICX 7250 12 10G 2 x 10G 480Gbps ICX 7450 12 10G or 40G 2 x 10G or 1 x 40G 960Gbps ICX 7650 12 40G or 100G 2 x 40G or 1 x 100G 1.128Tbps ICX 7750 12 40G 6 x 40G 5.76Tbps ICX 7850 12 40G or 100G 4 x 40G or 4 x 100G 9.6Tbps Maximum Stack Bandwidth Calculation Link speed x number of links per stack trunk x number switches in stack x Full Duplex e.g. ICX 7250: 10G x 2 x 12 x 2 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 32 Each switch in the ICX 7000 family allows for 12 units in a stack. The various models provide link speeds from 10 to 40 to 100Gbps. Each also has multiple connection options from multiple 10G, 40G or 100G ports dedicated to stacking. This allows for very high throughput within the stack ranging between 480Gbps all the way up to 9.6Tbps. The maximum bandwidth is calculated by multiplying the stack link speed times the number of stack links, times the number of switches in the stack, times 2 due to the stack’s full‐duplex operation. Revision 0419 3 ‐ 32 ICX 150 ICX Hardware Overview Ruckus Ethernet Optics • Ruckus‐qualified optic transceivers are available for ICX switches and APs • Benefits include: – Guaranteed compatibility with Ruckus ICX switches – Full compliance with industry standards • 802.3z • 802.3ah • 802.3u • 802.3ae • 802.3ak • 802.3ba – Factory tested to assure functionality and reliability – Hot‐swappable flexibility in the field for greater ease and lower total cost of ownership – Digital Optical Monitoring (DOM) support • Ruckus supports digital optical monitoring only on Ruckus optics For a list of Ruckus‐certified optics, refer to the Ruckus Ethernet Optics data sheet Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 33 Ruckus offers a unique set of high‐performance, reliable, and cost‐effective optical transceivers to help enterprises and service providers meet the challenges of diverse network topologies. To ensure maximum quality, Ruckus selects and tests the most reliable, highest‐performing optical transceivers on the market, and then warrants their availability, capacity, and performance in Ruckus products. Ruckus optics are fully compliant with the industry standards displayed here and are compliant with Restrictions on Hazardous Substances (RoHS), meeting RoHS 6 European Union (EU) requirements. Using Ruckus optics also enables the support of Digital Optical Monitoring (DOM) on ICX switches. DOM supports monitoring of optical output power, optical input power, temperature, laser bias current, and transceiver voltage. This capability is only available with Ruckus optics. Revision 0419 3 ‐ 33 ICX 150 ICX Hardware Overview Breakout Cables • Breakout cables allow the splitting of certain high‐speed ports into 4 lower‐speed ports – On ICX 7750, 40 GbE QSPF+ ports can be split into 4‐10 GbE ports – On ICX 7850, QSFP28 40 GbE/100 GbE ports can be split into 4‐10 GbE and 4‐25 GbE ports, respectively • When employed, port numbering on the device changes • A switch reload is required when enabled Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 34 The ICX 7750 and 7850 support the use of breakout cables that allows a single high‐speed interface to be split into four separate interfaces. On the ICX 7750, the 40 GbE QSPF+ ports can be split into 4‐10 GbE ports. On the ICX 7850, the QSFP28 ports that operate at 40 GbE/100 GbE can be split into 4‐10 GbE and 4‐25 GbE ports, respectively. Switch configuration is required to allow use of the breakout functionality. This change creates sub‐ports on the device which can be configured the same way as any other physical interface. In order for system to manage these sub‐interfaces, the switch must be reloaded whenever breakout mode is enabled or disabled. Revision 0419 3 ‐ 34 ICX 150 ICX Hardware Overview Summary • Attendees should now be able to: – Describe the evolution of the network – Understand where in the network topology you would find different ICX switches – Describe the different configurations available with each ICX switch model, including: • ICX 7150 • ICX 7250 • ICX 7450 • ICX 7650 • ICX 7750 • ICX 7850 – Explain stacking, optic and cabling capabilities of Ruckus ICX switches Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 35 This concludes the ICX Hardware overview module. You should now be able to: • Describe the evolution of the network • Understand where in the network topology you would find different ICX switches • Describe the different configurations available with each ICX switch model • Explain stacking, optic and cabling capabilities of Ruckus ICX switches Revision 0419 3 ‐ 35 ICX 150 ICX Hardware Overview End of Module 3: ICX Hardware Overview Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved This concludes the ICX Hardware Overview training module. Revision 0419 3 ‐ 36 ICX 150 CLI Basics Module 4: CLI Basics Revision 0419 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved This module will cover the ICX CLI basic commands. Revision 0419 4‐1 ICX 150 CLI Basics Objectives • After completing this module, attendees should be able to: – Explain the Command Line (CLI) structure of ICX devices – Manage device configuration files – Configure switch hostname, IP address, and default gateway – Configure interface settings including, name, IP address, speed and duplex – Use show commands to view switch information Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 2 The objectives of this module include: • Explaining the CLI structure of ICX devices • Managing device configuration files • Configuring global switch settings like hostname, IP address, and default gateway • Configuring interface settings like name, IP address, and speed and duplex • Finally, we'll look at using show commands to verify switch information Revision 0419 4‐2 ICX 150 CLI Basics CLI Overview Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Let’s start with an overview of the CLI structure. Revision 0419 4‐3 ICX 150 CLI Basics Initial Startup – Factory Defaults • Beginning with software version 8.0.90, factory default ICX switches will start with: – SSH enabled – Local user account created for initial login • SSH and local user accounts will be covered in detail in later modules – By default CLI, Web and SSH require authentication before allowing access Press Enter key to login User Access Verification Default username and password is: super / sp-admin Please Enter Login Name: super Please Enter Password: sp-admin User login successful. User ‘super’ login successful with default password. Please change the password. Enter the new password for user super: NewPa$$word Enter the reconfirm password for user super: NewPa$$word Password modified successfully for user super Once logged in, you are required to change the password for user: super Authentication is enabled in the device for Console/WEB/SSH. ICX7150-C12-Switch> Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Beginning with ICX software version 8.0.90, there has been a major change to the default behavior of a factory defaulted switch. In previous releases, SSH was disabled and there were no local user accounts required to login. In this release, SSH is enabled and because of this a user account is required. This impacts all enabled access methods on the switch, including console, web UI and SSH. Note, in release 8.0.90 Telnet is disabled by default. On initial boot and logon, you will be presented with a login prompt. The default username is super and the password is sp‐admin. Once successfully logged in, you are required to change the password for user: super. You must input the new password twice to ensure accuracy. Revision 0419 4‐4 ICX 150 CLI Basics CLI Command Tree User EXEC > • User EXEC level – Prompt: > – View basic system info – Verify connectivity (such as ping and traceroute) • Privileged EXEC level – – – – – Enter using the enable command Prompt: # Can be password protected View detailed information using show commands Execute system‐wide commands (boot system, reload) • Configuration (CONFIG) level – – – – Enter using the configure terminal command Prompt: (config)# Make global or local system changes (VLANs, interfaces, etc.) Save changes using the write memory command Privileged EXEC # Global Configuration (CONFIG) (config)# The CONFIG level contains sublevels for configuring individual interfaces, VLANs, routing protocols, and other configuration areas. The prompts for these levels change to indicate the current level Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 5 Once logged into the ICX, you will see the commands in the CLI are organized into the following levels: First, we have User EXEC, this level (or mode) is indicated by the greater than sign (>), here you can display information and perform basic tasks such as ping and traceroute. Next, we move into the Privileged EXEC level using the enable command. This level is indicated by the pound or number sign (#). Here there are many more commands that can be run along with the User EXEC commands. The next level is configuration (or CONFIG), this level is Indicated by the (config)# prompt. Here you can make configuration changes to the device and they are put into the running‐config file. To save the changes across reboots, you need to save them to the startup‐config file using the write memory command. The CONFIG level contains sub‐levels for individual ports, VLAN’s, routing protocols, and other configuration areas. Prompts for these levels will change to indicate the current level. Revision 0419 4‐5 ICX 150 CLI Basics CLI Prompts • The prompt changes to indicate your current status From the User EXEC level, enter enable to move to the Privilege EXEC level ICX7150-C12-Switch> ICX7150-C12-Switch> enable From the Privilege EXEC level, No password has been assigned yet... enter config terminal to move to the global CONFIG ICX7150-C12-Switch# level ICX7150-C12-Switch# config terminal ICX7150-C12-Switch(config)# interface ethernet 1/1/1 ICX7150-C12-Switch(config-if-e1000-1/1/1)# ? 100-fx 100 FX Mode From the global acl-logging enable logging of deny aclCONFIG level, enter a sub command acl-mirror-port Set acl based inbound mirroring arp Assign IP ARP option to this interface authentication Configure flexible authentication on interface Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 6 Here we see an example of how the prompt changes to indicate where you are in the CLI structure. We start at the User EXEC level as designated by the greater than sign (>). Next, we enter the enable command and we get a message that no password has been assigned yet. We will talk more about assigning passwords later in the course. Once we enter the enable command, the prompt changes to the pound sign or number sign, this puts us into Privileged EXEC level. To move into configuration level we enter config terminal. Note that, all of these commands can be shortened, for instance you can use config t instead of the full command. We will discuss using abbreviated commands later in this module. Now that we are in CONFIG mode, we can go into a sublevel. Here we are going into the interface configuration level for interface 1/1/1. As you can see the prompt changes to show that you are now in the interface configuration level. Revision 0419 4‐6 ICX 150 CLI Basics CLI Prompts (cont.) • Move back up the menu tree using exit ICX7150-C12-Switch(config-if-e1000-1/1/1)# exit ICX7150-C12-Switch(config)# exit ICX7150-C12-Switch# exit ICX7150-C12-Switch> • Use end or Ctrl+z to return to # prompt from any lower level • Use quit to return to > prompt from any lower level Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 7 To go back and forth between the different levels, issue the exit command. This will move you one level up the command hierarchy. Pressing Ctrl‐Z or the end command will move the prompt to the Privileged EXEC level (#) from any lower level. Use the quit command to return to the User EXEC level from any lower level. Revision 0419 4‐7 ICX 150 CLI Basics CLI Command Properties • CLI commands are not case sensitive • The CLI accepts abbreviations for commands, as long as it is a unique string – For example, for the show interfaces brief command use the abbreviation: ICX7150-C12-Switch# sh int br • Most commands only display feedback or error messages upon failure • Most configuration commands have a [no] option to undo the configuration ICX7150-C12-Switch(config)# no vlan 200 • Use up and down arrow keys for command memory recall Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 8 Let’s take a look at the properties of the CLI commands. First, the only time a CLI command is case sensitive is for passwords. The CLI does accept abbreviated commands, as long as the string is unique. If a string is not unique you will get an “ambiguous input” message. For instance, if you just enter the letter s, you will get the Ambiguous input -> s message, because there is more than one command that starts with the letter s. Most commands will only give you an error message if the command is incorrect, otherwise the system will take the command and display no message. Most commands have a no option to undo the command. For instance, if you create VLAN 200 and decide it is a mistake, just enter the no vlan 200 command. To view previously used commands use the up and down arrow keys. This is very helpful if you are entering a command over and over, or making a small change to a previously entered command. Revision 0419 4‐8 ICX 150 CLI Basics CLI Command Properties (cont.) • Certain commands, such as ping, reload and debug, can only be entered from the Privileged EXEC or User EXEC level, not the CONFIG level ICX7150-C12-Switch(config)# ping 10.1.1.1 Invalid input -> ping 10.1.1.1 Type ? for a list ICX7150-C12-Switch(config)# exit ICX7150-C12-Switch# ping 10.1.1.1 Sending 1, 16-byte ICMP Echo to 10.1.1.1, timeout 5000 msec, ttl 64 Type Control-c to abort Reply from 10.1.1.1 : bytes=16 time<1ms ttl=128 Success rate is 100 percent <1/1> round-trip min/avg/max=0/0/0ms. Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 9 There are some commands, like ping and traceroute, that cannot be run from CONFIG mode. You must exit to Privilege EXEC or User EXEC mode to run the command. If a command cannot be run from a particular level, you will get an invalid input command as we see here when we try to ping from the CONFIG mode. At this level in the hierarchy, typing exit, end or pressing Ctrl-Z will return to the Privileged EXEC prompt allowing the command to be run. Revision 0419 4‐9 ICX 150 CLI Basics CLI Help • Use question mark (?) help to display available options at a CLI level – For example, to view all available commands at the User EXEC level, enter ? or enter Tab at the prompt: ICX7150-C12-Switch> enable exit nslookup ping show stop-traceroute traceroute ? Enter Privileged mode Exit from EXEC mode Nslookup Utility Ping IP node Display system information Stop current TraceRoute TraceRoute to IP Node Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 10 To view all available commands at a certain level of the CLI, you can use question mark help. Simply enter a ? or use the Tab key at the prompt. The example here shows the available commands at the User EXEC level. Revision 0419 4 ‐ 10 ICX 150 CLI Basics CLI Help (cont.) • Use a ? or the Tab key to view possible options for an individual command ICX7150-C12-Switch# copy ? disk0 From an external USB disk flash From flash https From https server pdc PDC file running-config From running config scp From a scp file startup-config From startup config tftp From a tftp file – Enter copy flash followed by a ?, or enter Tab, to view the next available options ICX7150-C12-Switch# copy flash ? disk0 To an external USB disk file flash To flash memory scp To a scp file tftp To a tftp file Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 11 You can also use question mark help to view the options for an individual command. For example, to view the options for the copy command, enter the command followed by a space then use a question mark. You can then chose an option, and use the question mark again to view available options. This way you can work your way through the CLI without having to learn every available command option. Revision 0419 4 ‐ 11 ICX 150 CLI Basics CLI Help (cont.) • To display a list of commands that begin with a particular string, add a ? at the end of the string – For example, enter s? to view all commands starting with “s” ICX7150-C12-Switch> s? show skip-page-display ssh stack stop-traceroute supportsave sz ICX7150-C12-Switch> st? stack stop-traceroute Display system information Enable continuous display SSH by name or IP address / hostkeys stacking runtime commands Stop TraceRoute operation support save related On Premise SZ Exec Mode stacking runtime commands Stop TraceRoute operation Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 12 You can also use a question mark to see a list of commands that start with a particular letter. For example, enter the letter s with a question mark. Note that there is no space between the letter and the question mark. Adding additional characters further filters the available commands, as shown when st? is typed. Revision 0419 4 ‐ 12 ICX 150 CLI Basics Managing the Configuration File • Save changes from the running configuration to the startup configuration ICX7150-C12-Switch# write memory • Display the running configuration ICX7150-C12-Switch# show running-config • Display the startup configuration ICX7150-C12-Switch# show configuration Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 13 Here we see the RAM and flash memory of the device. RAM is where the currently running configuration file, referred to as “running‐config”, is stored. All real‐time changes to the current running configuration file are kept here, and are temporary in nature. If there is a power failure, RAM is erased. Running the write memory command copies the contents of the running‐config to the startup‐config in flash. Flash memory is where the startup configuration file is stored. This file is loaded into RAM when the system boots or is reloaded. The configuration file in flash memory is changed by executing the write memory command, or a file copy from a TFTP server. You can view the contents of RAM using the show running-config command, or view the contents of the flash with the show configuration command. Note that the files may not necessarily be the same since the running configuration may contain changes that have not been saved to the startup configuration. Revision 0419 4 ‐ 13 ICX 150 CLI Basics Configuration File Management • The running or startup configuration can be saved to/restored from an external device • Supported external methods are: – – – – USB HTTPS TFTP SCP • File management options for ICX devices: Ruckus# copy startup-config tftp <tftp-ip-addr> <filename> – Uploads a copy of the startup configuration file from the ICX switch to a TFTP server Ruckus# copy running-config scp <scp-ip-addr> <filename> – Uploads a copy of the running configuration file from the ICX switch to an SCP server Ruckus# copy https startup-config <https-ip-addr> <filename> – Downloads a copy of the startup configuration file from a the HTTPS server to the ICX switch Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved © 2017 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 14 For easy configuration management, all Ruckus devices support both the download and upload of configuration files between the devices and external servers on the network. Supported external servers are: • USB • HTTPS • TFTP • SCP The examples show variations of copying the startup‐config and the running‐config to/from external servers. Revision 0419 4 ‐ 14 ICX 150 CLI Basics Erasing the Configuration File • Erase the startup configuration and reload the device with a blank configuration ICX7150-C12-Switch# erase startup-config – This erases the startup‐config file stored in flash – It does not change the running‐configuration stored in NVRAM • In order to complete the restoration of an empty/factory configuration, the device must be reset ICX7150-C12-Switch# reload – After reload, the startup‐config and running‐config will have the default/factory configuration parameters Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 15 If you want to erase the startup configuration on a device, effectively resetting the unit back to factory defaults, issue the erase startup‐config command and then reload the device. When the device boots up the configuration will revert back to the default configuration. When you execute the reload command, the system will prompt to you for verification that you want to reload to an empty configuration. After verification the system will reset. Be sure not to perform a write memory after erase startup-config, that will end up re‐writing the configuration to the file you just erased. Revision 0419 4 ‐ 15 ICX 150 CLI Basics Basic Switch Configurations Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Now that we’ve gone over the structure of the CLI and the navigational commands. Let’s start making some configurations. Revision 0419 4 ‐ 16 ICX 150 CLI Basics Hostname • Configure a system name for the device using the hostname command at the global CONFIG level • The name can be up to 255 alphanumeric characters • The example changes the hostname to Ruckus, from the default hostname of ICX7150‐C12‐ Switch ICX7150-C12-Switch# config t ICX7150-C12-Switch(config)# hostname Ruckus Ruckus(config)# Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 17 Let’s start by giving the device a hostname. We use the config t command to move into CONFIG mode, and use the hostname command to assign the name. The name can be up to 255 alphanumeric characters. This example changes the name of the device from the default of ICX7150‐C12‐Switch to Ruckus. Note that the prompt changes to the new hostname when the command is entered. Revision 0419 4 ‐ 17 ICX 150 CLI Basics Port Numbering Format • The port address format is stack_unit_ID/slot/port – Stack_unit_ID – specifies the stack ID of the unit • For all ICX 7000 series switches valid stack unit IDs are 1 to 12 – Slot – specifies the slot number • Slot numbers vary by device type – Port – specifies the port number in the slot • Port numbers vary by device type • Example specifies port 1, in slot 1, of stack unit 3 in an ICX 7250‐48 stack Ruckus(config)# interface ethernet 3/1/1 Ruckus(config-if-e1000-3/1/1)# Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 18 ICX devices use the stack_unit_ID/slot/port format for port numbering. The stack_unit_ID indicates where in the stack the unit sits. A device that is not participating in a stack uses the ID of 1. If the unit is in a stack, the ID is assigned from the active controller in the stack. For all ICX 7000 series switches valid stack unit IDs are 1 to 12 Note: Stacking is covered in separate presentation. The slot number indicates which slot the port is in. for instance, The 48‐port ICX 7250 has two slots: Slot 1 has the 48 x 1 GbE ports, and slot 2 has the 8 x SFP+ uplink or stacking ports. Finally, the port is the port number in the slot. Remember, port numbers vary by device type, so refer to the Hardware Installation Guide for your specific device. Here we see an example of the port number on a 48‐port ICX 7250. The command entered at the CONFIG level is for port 3/1/1. That is port 1, in slot 1, of stack unit 3. Revision 0419 4 ‐ 18 ICX 150 CLI Basics Breakout Port Number and Configuration • ICX 7750 and 7850 allow 40 GbE ports to be split into 4‐10 GbE ports using breakout cable • ICX 7850 allows 100 GbE port to be split into 4‐25 GbE ports • Configured with the breakout ethernet command ICX7750-26Q# configure terminal ICX7750-26Q(config)# breakout ethernet 1/1/11 – If port has any configuration, command is rejected – Requires write memory and reload after enabling/disabling breakout mode • Breakout ports are viewed and configured as sub‐ports ICX7750-26Q# show interface brief 1/1/11:1 Up Forward Full 10G None 1/1/11:2 Up Forward Full 10G None 1/1/11:3 Up Forward Full 10G None 1/1/11:4 Up Forward Full 10G None | in No 1 No 1 No 1 No 1 1/1/11 0 cc4e.2439.3721 0 cc4e.2439.3722 0 cc4e.2439.3723 0 cc4e.2439.3724 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 19 The ICX 7750 and 7850 support the use of breakout cables that allows a single high‐speed interface to be split into four separate interfaces. On the ICX 7750, the 40 GbE QSPF+ ports can be split into 4‐10 GbE ports. On the ICX 7850, the QSFP28 ports that operate at 40 GbE/100 GbE can be split into 4‐10 GbE and 4‐25 GbE ports, respectively. This functionality is configured with the breakout command at the global configuration level. This command requires that the port referenced does not have any configuration. If it does, the breakout command will be rejected. Executing this command requires the creation of sub‐ports on the device. Because of this, the switch must be reloaded whenever breakout mode is enabled or disabled. After enabling and resetting, breakout ports are configured and viewed in the same way as regular Ethernet ports except they will be referenced as sub‐interfaces. In the example you can see that when interface 1/1/11 was broken out, it created sub‐ interfaces 1/1/11:1 through 1/1/11:4. Revision 0419 4 ‐ 19 ICX 150 CLI Basics Enabling Ports • By default, all interfaces on ICX devices are enabled • To disable or enable a specific interface, or range of interfaces, use the following commands: Ruckus(config)# interface ethernet 1/1/9 Ruckus(config-if-e1000-1/1/9)# disable Ruckus(config)# interface ethernet 1/1/10 ethernet 1/1/15 ethernet 1/1/20 Ruckus(config-mif-1/1/10,1/1/15,1/1/20)# enable Ruckus(config)# interface ethernet 1/1/1 to 1/1/8 Ruckus(config-mif-1/1/1-1/1/8)# disable Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 20 By default, all interfaces on ICX devices are enabled. If you need to disable a port, or range of ports, enter the configuration level for the desired ports and enter the disable command. Notice how the prompt changes to show that you are in the sub‐configuration level for the port or ports. If you then want to enable a port, use the enable command. Port configurations can be applied to a single port, a list of specific ports or a range of ports. • A single port is configured by specifying only that port in the interface command. • Example: interface ethernet 1/1/9 • A port list if configured by including multiple, single ports in a list. • Example: interface ethernet 1/1/10 ethernet 1/1/15 ethernet 1/1/20 • A range of ports can be configured by using the keyword “to”. This is an inclusive list of all ports from the first port listed to the last port listed. • Example: interface ethernet 1/1/1 to 1/1/8 Revision 0419 4 ‐ 20 ICX 150 CLI Basics Port Addressing • Ruckus ICX switches can operate as strictly Layer2 or Layer2/3 devices based on firmware type: switch ‐or‐ router1 • On Layer 2 switches, the IP address and default gateway are assigned globally, only one per switch – Addresses can be IPv4 or IPv6 Switch(config)# ip address 192.22.33.45/24 Switch(config)# ip default-gateway 192.22.33.1 Switch(config)# ipv6 address 2001:DB8:12D:1300:240:D0FF:FE48:1/64 • On Layer 3 switches, IP addresses are assigned per interface – Addresses can be IPv4 or IPv6 Router(config)# interface ethernet 1/1/9 Router(config-if-e1000-1/1/9)# ip address 192.22.33.45/24 Router(config-if-e1000-1/1/9)# ipv6 address 2001:2000:F00D:1::1/64 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 21 Footnote 1: Switching and router code will covered in an upcoming presentation. On a Layer 2 switch, the IP address and default gateway are assigned globally and are used for management access through Telnet, SSH, or the Web GUI. Only one IPv4 and one IPv6 address can be assigned. If you try to add another address using the ip address, or ipv6 address command, the most recently entered address becomes the switch address. Though, you can have both an IPv4 and an IPv6 address configured at the same time. Also, it is important to note that Ruckus does support the use of CIDR notation for the subnet mask, as well as the dotted‐decimal format. ICX devices also have an out‐of‐band managed port that can be used for management access. The management port is discussed later in this course. For an ICX running Layer 3 routing code, each interface is assigned an IPv4 or IPv6 address individually. Note that interfaces can be multi‐netted, meaning they can be assigned more than one IPv4 or IPv6 address. In fact, by default you can configure up to 24 IP addresses on each interface. Revision 0419 4 ‐ 21 ICX 150 CLI Basics Port Naming • Use a text string to identify a port with a meaningful name • Assign a name to an individual port, or a group of ports • Names can be assigned to physical ports, virtual interfaces, and loopback interfaces • For example, assign a name to interface 1/1/1 Ruckus(config)# interface ethernet 1/1/1 Ruckus(config-if-e1000-1/1/1)# port-name PortToPC1 • Port names display in various CLI output including the running configuration and show interfaces brief Ruckus(config)# Port Link 1/1/1 Down 1/1/2 Down show interfaces brief State Dupl Speed Trunk Tag Pvid Pri MAC None None None None No 1 0 0024.38b7.4f40 None None None None No 1 0 0024.38b7.4f41 Name PortToPC1 <Output Truncated> Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 22 In many cases it is useful to assign a name to your ports so you know what they are used for. Use the port-name command to assign a meaningful name to an individual port, or a group of ports. Names can be assigned to physical ports, virtual interfaces, and loopback interfaces. Port names can be up to 255 characters long and cannot contain any blanks. The name can contain special characters, but if the name ends in a percentage sign (%), it is dropped. When configured, port names are displayed in show commands like show interfaces brief, but only the first ten characters are displayed. However, the full name is displayed in the running and startup configs. Revision 0419 4 ‐ 22 ICX 150 CLI Basics Speed & Duplex • By default, all ICX copper Ethernet interfaces are set to auto‐negotiation – Use the speed-duplex command to change the speed and duplex of the interface • Use the no form of the command to restore the default Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Ruckus(config-if-e1000-1/1/1)# speed-duplex ? 10-full 10M, full duplex 10-half 10M, half duplex 100-full 100M, full duplex 100-half 100M, half duplex 1000-full 1G, full duplex 1000-full-master 1G, full duplex, master 1000-full-slave 1G, full duplex, slave 100g-full 100G, full duplex 10g-full 10G, full duplex 10g-full-master 10G, full duplex, master 10g-full-slave 10G, full duplex, slave 2500-full 2.5G, full duplex 2500-full-master 2.5G, full duplex, master 2500-full-slave 2.5G, full duplex, slave 40g-full 40G, full duplex auto Autonegotiation 23 Copper Ethernet ports are designed to auto‐sense and auto‐negotiate the speed and duplex mode of the connected device. If the attached device does not support this operation, you can manually enter the port speed to operate anywhere between 10 Mbps and 10 Gbps, depending on the specific device. This configuration is referred to as force mode. The default and recommended setting is auto for 10/100/1000 auto‐sense. Port duplex mode and port speed are modified by the same command. View the notes section of this slide to view some considerations for speed and duplex settings on ICX devices, then advance to the next slide when you’re ready. Use care when configuring speed and duplex on a switchport as a misconfiguration on one side of the link could result in connectivity issues and errors. Revision 0419 4 ‐ 23 ICX 150 CLI Basics Displaying Switch Information Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Now that we’ve made some configurations, let’s take a look at displaying the information. Revision 0419 4 ‐ 24 ICX 150 CLI Basics Show Commands Show Command Description version Software version and uptime interface Interface status statistics Interface statistics ip IP information span Spanning Tree information mac-address MAC forwarding table mac-address statistics Number of MACs learned per port flash Flash memory images vlan Configured VLANs telnet IP address of active telnet sessions lag Configured, active link aggregation groups tech-support Technical details for help troubleshooting issues when working with technical support Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 25 There are many show commands available on the ICX switches. The table displays a few of the options and a brief description of some commonly executed show commands. Advance to the next slide when you are ready. Revision 0419 4 ‐ 25 ICX 150 CLI Basics Searching and Filtering CLI Output • Use pipe “|” to modify the output of show commands according to operators: – Begin – Display all output beginning with the first line that contains the matched text string – Include – Display only lines that include the matched text string – Exclude – Display only lines that to not include the matched text string • Used for searching and filtering purposes • Only one pipe allowed per command string • Matching strings are case‐sensitive • Examples: show show show show interfaces interfaces interfaces interfaces | include Up | begin 1/1/5 | include Disable brief | exclude Down Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 26 Searching and filtering using pipe “|” and its operators can save you time when searching through long outputs of show commands. The operators available are: • Begin – Display all output beginning with the first line that contains the matched text string • Include – Display only lines that include the matched text string • Exclude – Display only lines that to not include the matched text string I tis important to note that only one pipe can be used per command string, and that searched strings are case‐sensitive. For example, if you want to view ports that are active, use show interfaces | include Up. If you want to view ports that are manually disabled, use show interfaces | include Disable. Revision 0419 4 ‐ 26 ICX 150 CLI Basics Show Commands ‐ System Verification • show chassis – Displays system temperature, fans, power supplies, MAC address, etc. • show module – Displays the module type, status, number of ports, and MAC address • show version – Displays the software version that the device is currently running Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 27 There are some useful commands for viewing overall system information. The show chassis command displays the power supply and fan status, temperature reading, and the MAC address of the system. The show module command is very useful when trying to figure out which ports are in which module. It also displays the number of ports in the module and the starting MAC of the ports in the module. The show version command displays the software version and boot version running on the device, any installed licenses, slot information, stack unit ID, and system uptime. Revision 0419 4 ‐ 27 ICX 150 CLI Basics Show Commands ‐ System Verification (cont.) • show flash – Displays the primary and secondary software codes stored in the flash memory (versions and sizes) • show memory – Displays the amount of total/used/free DRAM • show dir | show files – Displays the contents of the system flash, including amount of flash available and the amount taken by the primary and secondary images • show dir disk0 | show files disk0 – Displays the contents of the USB flash drive and the amount of flash taken by each of the files Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 28 The show flash command displays the software versions loaded in the primary and secondary flash partitions as well as the boot image installed. It also displays the amount of free flash on the device. The show memory command displays the amount of DRAM used and free on the device. The show dir and show files commands will list the contents of system flash including the size of primary and secondary images installed on the system. The show dir disk0 and show files disk0 commands display the contents of a connected USB flash drive. This is especially useful when upgrading the switch from the USB drive. Revision 0419 4 ‐ 28 ICX 150 CLI Basics Show Configuration • Display the running configuration Ruckus# show running-config • Display the startup configuration Ruckus# show configuration • The example displays a partial running configuration on a ICX 7150‐C12 Ruckus(config)# show running-config Current configuration: ! ver 08.0.90T211 ! stack unit 1 module 1 icx7150-c12-poe-port-management-module module 2 icx7150-2-copper-port-2g-module module 3 icx7150-2-sfp-plus-port-20g-module stack-port 1/3/1 stack-port 1/3/2 ! ! vlan 1 name DEFAULT-VLAN by port ! vlan 10 by port tagged ethe 1/1/2 untagged ethe 1/1/3 to 1/1/5 ! ! aaa authentication web-server default local aaa authentication login default local enable aaa console ip address 192.168.1.121 255.255.255.0 ip default-gateway 192.168.1.1 ! no telnet server username super password ..... <Output Truncated> Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 29 As previously mentioned, the ICX has a running configuration and a startup configuration. The commands to view the configuration files are show running-config and show configuration. Here we see an example of the running configuration on a 24‐port ICX7450. The output has been truncated as these files can be rather long. But you can see here, starting from the top, the software version, the stack unit ID, the modules installed, configured VLANs, the hostname, and the IP address and default gateway configured on the device. Revision 0419 4 ‐ 29 ICX 150 CLI Basics Displaying Interfaces • The show interfaces brief command can be used to quickly check port operational status Spanning Tree State: Forward, Listen, Blocked, etc. Ruckus# Port 1/1/1 1/1/2 1/1/3 1/1/4 1/1/5 show interfaces Link State Up Forward Up Blocked Down None Disable None Up Forward brief Dupl Speed Full 1G Full 1G None None None None Full 1G 802.1q Tagged Yes or No Trunk None None None None None Tag No No No No No Pvid 1 1 1 1 1 Pri 0 0 0 0 0 MAC 748e.f87b.fe40 748e.f87b.fe41 748e.f87b.fe42 748e.f87b.fe43 748e.f87b.fe44 Name Server Router <Output Truncated> Current Link State Up, Down, Disabled Speed & Duplex Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 30 When it comes to displaying interface information there is a brief command and a detailed command. Here we see an example of the, show interfaces brief command. This allows you to quickly check the general status of all interfaces. Some of the details provided include: • Link – which is the physical connectivity state. Typical values range between Up, Down and Disable. • State – displays the Spanning Tree state for all Spanning Tree flavors, 802.1D, 802.1w etc., here you might see states like Forward, Listen, Learning, or Blocked. • Tag – displays if the port is tagged 802.1Q or not. No means the port is untagged. The output also shows the MAC address of the port, the QoS priority, as well as the Pvid or VLAN ID. Revision 0419 4 ‐ 30 ICX 150 CLI Basics Displaying Interface Details Ruckus# show interfaces ethernet 1/1/1 Interface up/down status GigabitEthernet1/1/1 is up, line protocol is up Speed and duplex Port up for 2 minute(s) 5 second(s) Hardware is GigabitEthernet, address is 0024.38b7.7056 (bia 0024.38b7.7056) Configured speed auto, actual 1Gbit, configured duplex fdx, actual fdx Configured mdi mode AUTO, actual MDIX Untagged member of L2 VLAN 1, port state is FORWARDING <Output Truncated> VLAN membership, STP state MTU 1500 bytes 300 second input rate: 127536 bits/sec, 239 packets/sec, 0.16% utilization 300 second output rate: 37642168 bits/sec, 53507 packets/sec, 46.16% utilization 29939 packets input, 1992836 bytes, 0 no buffer Received 0 broadcasts, 29 multicasts, 29910 unicasts Throughput statistics & input 1826 input errors, 20119 CRC, 0 frame, 0 ignored and output errors 0 runts, 0 giants 7032695 packets output, 615654919 bytes, 0 underruns Transmitted 251641 broadcasts, 0 multicasts, 6781054 unicasts 0 output errors, 0 collisions Relay Agent Information option: Disabled Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 31 To view the details of an interface, use the show interfaces ethernet command with the interface number. This output displays a lot of useful information including: interface up/down status, VLAN membership with tagged or untagged status, the STP state, and port MTU. Also shown are input/output throughput statistics (including utilization percentage) and any input and output errors seen on the interface. In the example output, we can see that there are Cyclic Redundancy Check (CRC) errors on the port. CRC errors can often be caused by faulty hardware, such as cables, SFPs, switch port or any other component of the physical connections. Revision 0419 4 ‐ 31 ICX 150 CLI Basics Displaying Interface Statistics • Use the show statistics command to view port statistics and detailed error counters Ruckus# show statistics ethernet 1/1/1 Port 1/1/1 Counters: InOctets 1992836 InPkts 29939 InBroadcastPkts 0 InMulticastPkts 29 InUnicastPkts 29910 InBadPkts 20119 InFragments 1707 InDiscards 0 CRC 20119 InErrors 0 InGiantPkts 0 InShortPkts 0 InJabber 0 InFlowCtrlPkts 0 InBitsPerSec 118088 InPktsPerSec 221 InUtilization 0.15% OutOctets OutPkts OutBroadcastPkts OutMulticastPkts OutUnicastPkts 694011939 8021550 266281 0 7755269 OutErrors Collisions LateCollisions 0 0 0 OutDiscards OutFlowCtrlPkts OutBitsPerSec OutPktsPerSec OutUtilization 0 0 40742424 58810 50.15% Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 32 The show statistics command offers a more in‐depth look at the port statistics, including detailed error counters. Revision 0419 4 ‐ 32 ICX 150 CLI Basics Summary • Attendees should now be able to: – Explain the Command Line (CLI) structure of ICX devices – Manage device configuration files – Configure switch hostname, IP address, and default gateway – Configure interface settings including, name, IP address, speed and duplex – Use show commands to view switch information Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 33 This concludes the CLI Basics module. You should now be able to: • Explaining the CLI structure of ICX devices • Managing device configuration files • Configuring global switch settings like hostname, IP address, and default gateway • Configuring interface settings like name, IP address, and speed and duplex • Finally, we'll look at using show commands to verify switch information Revision 0419 4 ‐ 33 ICX 150 CLI Basics End of Module 4: CLI Basics Revision 0419 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved This concludes Module 4 – CLI Basics Revision 0419 4 ‐ 34 ICX 150 Software Upgrade and Licensing Module 5: Software Upgrade & Licensing Revision 0419 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Welcome to the ICX 150 Implementor course. This course consists of 12 modules and is based on the FastIron 8.0.90 software release. Subjects discussed in this course concentrate on the Implementor functions within a network environment however does not represent all functions or capabilities of an ICX switch. This module will cover ICX software upgrades and licensing. So, let’s get started . Revision 0419 5‐1 ICX 150 Software Upgrade and Licensing Objectives • After completing this module, you should be able to: – Discuss the upgrade considerations when upgrading a ICX switch • Use the Target Path Selection Guide to find which software version is right for your device – Discuss the Software Image Files – Describe the simplified upgrade process – Perform the process of verifying the current software version – Perform a software upgrade using both legacy and Unified FastIron Image processes – Describe and install Software Licensing Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 2 After completing this module you’ll be able to: Discuss the upgrade considerations when upgrading a ICX switch • Use the Target Path Selection Guide to find which software version is right for your device Discuss the Software Image Files Describe the simplified upgrade process Perform the process of verifying the current software version Perform a software upgrade using both legacy and Unified FastIron Image processes Describe and install Software Licensing Revision 0419 5‐2 ICX 150 Software Upgrade and Licensing Upgrade Considerations Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Let’s take a look at the different software image files for Ruckus ICX products. Revision 0419 5‐3 ICX 150 Software Upgrade and Licensing Software Release Notes • Every time you upgrade or downgrade to a software version, you must read the Ruckus Software Release Notes • Software Release Notes can be found on – https://support.ruckuswireless.com/software • Software Release Notes contain: – Supported devices and new enhancements – Upgrade/downgrade considerations and procedures – Bug fixes in the release Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 4 Before you upgrade or down grade software on any Ruckus product, refer to the Software Release Notes on the Ruckus support website at: https://support.ruckuswireless.com/software Software Release Notes will show you the supported devices for the release, and new enhancements. Also, it provides any upgrade or downgrade considerations, as well as the upgrade procedure. Finally, the release notes provide any bug fixes in the release. Be aware that the software downloaded from the Ruckus support site will be in the form of a zip file. Many of the transfer processes require the zip file to be unzipped and place on the server you intend to transfer the software with. Revision 0419 5‐4 ICX 150 Software Upgrade and Licensing Target Path Selection Guides • Target Path releases are recommended code levels for Ruckus IP platforms • Target Path releases meet the following criteria: – Stability and reliability • Typically does not contain new major software features • It is not used for support of new hardware • It may contain reliability, availability, and serviceability (RAS) improvements and enhancements – Deployed in large number of end‐user Target Path Selection Guides an be found on https://support.ruckuswireless.com/documents/1591‐fastiron‐target‐path‐selection‐guide production environments for a specified time • Must have no known critical or pervasive issues or defects Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 5 Target path releases are recommended code levels for Ruckus IP platforms. A target path release meets the following criteria: • It is a release created primarily for stability and reliability, and typically does not contain new major software features • It is not used for the support of any new hardware, although it may contain reliability, availability, and serviceability (RAS) improvements and enhancements • It has been deployed in a sufficient number of end‐user production environments for a specific period of time and must have no known critical or pervasive issues or defects Target Path Selection Guides for each product line can be found on the Ruckus support website under the ICX Technical Documents section. Revision 0419 5‐5 ICX 150 Software Upgrade and Licensing Example Target Path • The following table is from the FastIron Target Path Selection Guide for software version 08.0.90 – In most cases there are more recent versions of code available that provide additional functionality – Customers who wish to deploy these features, and cannot wait for a Target Path designation on that release, should use the latest release available – Customers who do not have an immediate need for the latest features should follow the provided Target Path recommendations Enterprise/Campus Product Current Target Path Version ICX 7150 FI 08.0.70d ICX 7250 FI 08.0.70d ICX 7450 FI 08.0.70d ICX 7650 FI 08.0.70d ICX 7750 FI 08.0.70d ICX 7850 Recommended Release if No Target Path Version Exist FI 08.0.90 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 6 Here we see an example of the ICX target path releases as of software version FI 08.0.90 As you can see the target path varies on each platform and in most cases the target path is not the most current revision of the software. If you do not need a later version of software for specific features, Ruckus suggests using the recommended target path release. Revision 0419 5‐6 ICX 150 Software Upgrade and Licensing Software Image Files Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Let’s take a look at the different software image files for Ruckus ICX products. Revision 0419 5‐7 ICX 150 Software Upgrade and Licensing Unified FastIron Image (UFI) • The new process (UFI) contains all files within one file allowing a single image download to update all necessary software components – The UFI contains components/packages • Application image • Application image’s signature file • U‐boot • PoE firmware • Python libraries • HTTP package • DHCP package • <Any other package in future> • ICX7850 was introduced with this software release – Supports only the UFI upgrade process – Supports router code only Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 8 8.0.80 release introduces the Unified FastIron Image which combines all the necessary files together into one file simplifying the upgrade process with a single command to assure all is upgraded uniformly on the switch. Its important to note that since the ICX7850 was introduced with the 8.0.90 software release it only supports UFI image and is not backwards compatible with previous software management solutions. Additionally it only support Router image code unlike the other ICX switch families. The UFI will be supported moving forward with other releases and eventually the legacy simplified software upgrade option will be phased out. Revision 0419 5‐8 ICX 150 Software Upgrade and Licensing Legacy Software Upgrade (Simplified Software Upgrade) • Manifest file – Makes use of a manifest file • Manifest file specifies the directory path of all images to be upgraded – When used it will upload the necessary boot and application software • Downloads the boot image to the device only if a newer boot image version is available/required – Can be done through a single CLI command or through SNMP MIB set‐request operations – The command will only accept a manifest file with a .txt extension – Each software release maintains its own version of the manifest file – Specifies images for both router and switch code • Based on the device family and the type of image that are installed – Performs multiple copies of images specified in the manifest file – Specifies which flash partition to install software to (primary/secondary) Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 9 Prior to FI 8.0.80 a manifest file was used in a process known as the Simplified Software Upgrade for switch software. This manifest file identified the u‐boot and Image file locations however both were still individual files along with separate PoE file as well. Because these were still individual files there was still the possibility of a u‐boot and image software mis‐match. The Simplified Software Upgrade process was an improvement over the original upgrade process used in the early stages of the ICX platform however did not eliminate the possibility of mis‐matched files which UFI eliminates. The simplified upgrade process uses a single CLI command and a manifest file to perform the upgrade. When the single copy command is run, it performs multiple copies of the images specified in the manifest file. The upgrade can be done using the CLI command, or through SNMP MIB set‐request operations. The simplified upgrade process includes a version‐check of the images to determine if it is necessary to upgrade the image or not. The command also allows for the specification of where the upgrade files should be stored either in the primary or secondary location. More details on the flash partitions will be discussed later in the module. Revision 0419 5‐9 ICX 150 Software Upgrade and Licensing Legacy Software Migration (Excluding 7850) • Application and U‐Boot image compatibility issue solved – Prior legacy process led to the possibility of U‐Boot and Image software mis‐match – UFI process eliminates the issue due to the unified code • Both legacy and UFI will be available for the 8.0.90 release – Switches will not support full 8.0.90 functionality without UFI update – Beyond 8.0.90 only a single release of a UFI image will be available • Upgrades from 8.0.80 or older software to 8.0.90 requires a two step process • Downgrading from UFI software – Recommended to use only manifest for downgrading to non‐UFI version Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 10 The 8.0.90 release provides support for both legacy and the new UFI upgrade process however the legacy release does not support the full functionality of the new code. Therefore it is important to treat the legacy code as more of a migration mechanism to the UFI update process. More details about the legacy upgrade process and migration steps will be discussed later in this module. If downgrading to code prior to 8.0.90 it is recommended to only use the manifest file process for downgrading. Revision 0419 5 ‐ 10 ICX 150 Software Upgrade and Licensing ICX 7150, 7250 and 7450 Image Files ICX 7150 Access ICX 7450 Access-Aggregation • Both legacy and UFI images provide: – Two software images for the ICX 7150, 7250 and 7450 platforms (Layer 2 or Layer 3) • The file type is identified by the 3rd letter in the file name ICX 7250 Access – Image File Names: Legacy • Flash Image File UFI File (boot, image) SPS08090.bin (Layer 2) SPS08090ufi.bin (Layer 2) SPR08090.bin (Layer 3) SPR08090ufi.bin (Layer 3) – Boot File Name: • 7150 mnz10115.bin • 7250 & 7450 spz10115.bin Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 11 The ICX 7150, 7250, and 7450 switches use the same image files. The file type, either Layer 2 or Layer 3 is designated by “S” or “R” in the fie name in either the flash or UFI images. Also shown here is the boot file used for the 7150, 7250 and 7450 series switches. The boot file begins with “mnz” for the 7150 and “spz” for the 7250 and 7450. Revision 0419 5 ‐ 11 ICX 150 Software Upgrade and Licensing ICX 7650 Image Files • Both legacy and UFI images provide: – Two software images for the ICX 7650, 7250 and 7450 platforms (Layer 2 or Layer 3) ICX 7650 Access-Aggregation-Core • The file type is identified by the 3rd letter in the file name – Image File Names: Legacy Flash Image File UFI File (boot, image) TNS08090.bin (layer 2) TNS08090ufi.bin (Layer 2) • TNR08090.bin (Layer 3) TNR08090ufi.bin (Layer 3) – Boot File Name: • tnu10115.bin Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 12 The ICX 7650 switch uses a unique image file. The file type, either Layer 2 or Layer 3 is designated by “S” or “R” in the fie name. Also shown here is the boot file used for the 7650 series switches. The boot file begins with “tnu”. Revision 0419 5 ‐ 12 ICX 150 Software Upgrade and Licensing ICX 7750 Image Files • Both legacy and UFI images provide: – Two software images for the ICX 7750 platform (Layer 2 or Layer 3) • The file type is identified by the 3rd letter in the file name – Image File Names: Legacy Flash Image File UFI File(boot, image) SWS08090.bin (layer 2) SWS08090ufi.bin (Layer 2) SWR08090.bin (Layer 3) • SWR08090ufi.bin (Layer 3) ICX 7750 Aggregation-Core – Boot File Name: • swz10115.bin Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 13 The ICX 7750 switch also uses a unique image file. Like the others, file types are designated by “S” or “R” in the fie name. The boot file for the 7750 begins with “swz”. Revision 0419 5 ‐ 13 ICX 150 Software Upgrade and Licensing ICX 7850 Image Files • Single UFI software image available for the ICX 7850 platform (Layer 3) ICX 7850 Aggregation-Core • Supports UFI image file only – Image File Name: • TNR08090ufi.bin (Layer 3) – Boot File Name: • n/a Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 14 And finally the 7850 has one image file which is router code however it is still identified in the software file by the use of the r in the third position. Because the 7850 was introduces in this release and only supports the UFI image a separate boot code file is not needed. Revision 0419 5 ‐ 14 ICX 150 Software Upgrade and Licensing ICX Image Files ICX 7450 ICX 7250 Access ICX 7150 AccessAggregation ICX 7650 Access-Aggregation-Core Access ICX 7850 Aggregation-Core Device Boot image file name Flash image file name UFI file name (boot, image) ICX 7150 mnz10115.bin SPR08090.bin/SPS08090.bin SPR08090ufi.bin/SPS08090ufi.bin ICX 7250 spz10115.bin SPR08090.bin/SPS08090.bin SPR08090ufi.bin/SPS08090ufi.bin ICX 7450 spz10115.bin SPR08090.bin/SPS08090.bin SPR08090ufi.bin/SPS08090ufi.bin ICX 7650 tnu10115.bin TNR08090.bin/ TNS08090.bin TNR08090ufi.bin/TNS08090ufi.bin ICX 7750 swz10115.bin SWR08090.bin/ SWS08090.bin SWR08090ufi.bin/SWS08090ufi.bin ICX 7850 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved n/a n/a TNR08090ufi.bin 15 Here is another view of the files specific to their switch family with both legacy and UFI file names. Revision 0419 5 ‐ 15 ICX 150 Software Upgrade and Licensing Verify Current Software Version Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Now that we have reviewed the different types of files, lets take a look at how to verify what software is running on a device. Revision 0419 5 ‐ 16 ICX 150 Software Upgrade and Licensing ICX Flash Partitions • Ruckus ICX devices have two flash memory modules: – Primary flash ‐ The default local storage device for image files and configuration files – Secondary flash ‐ A second flash storage device • To preserve one software image while testing another one • You can use secondary flash to store redundant images for additional booting reliability – It is best practice on switches in production to have the same image on both partitions to ensure failover capabilities • To specify which flash to boot – To immediately boot to a specific partition, issue below command from Privilege Exec mode Ruckus# boot system flash [primary | secondary] – This does not get saved to startup config file – For persistent boot flash preference you will configure the switch Ruckus(config)# boot system flash [primary | secondary] Ruckus(config)# write memory – Any future reboots will load from the configured partition Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 17 Two separate flash locations are available in the ICX devices and can be specifically booted from the software that is stored there. This can provide redundancy in the switch software and the ability to evaluate new software by uploading to one flash location and booting from it. You then can easily revert back to the previous software by simply booting the switch to the flash partition that contains the previous code. ICX switches by default boot from the primary partition however you can prompt a switch to boot from a specified flash (such as the secondary) by issuing the boot system flash secondary from privilege exec mode. This will prompt the switch to immediately reload using the flash partition specified. Please note that any future reloads of the switch will revert back to the default behavior or boot based on configuration previously specified. To cause the switch to boot from the secondary flash consistently you will configure the switch under configure mode using the boot system flash [primary | secondary] command. This configuration will need to be saved prior to any reload of the switch otherwise it will revert back to default behavior or its previous boot configuration. Revision 0419 5 ‐ 17 ICX 150 Software Upgrade and Licensing Displaying Software Version • Use show version to view the current software version Ruckus# show version Copyright (c) 2017 Ruckus Wireless, Inc. All rights reserved. VersionUNIT Number 1: compiled on Nov 20 2018 at 00:09:55 labeled as SPS08080d Image file name (25968884 bytes) from Primary SPS08080d.bin SW: Version 08.0.80dT211 Compressed Boot-Monitor Image size = 786944, Version:10.1.14T225 (mnz10114) Compiled on Thu Nov 15 06:59:22 2018 HW: Stackable ICX7150-C12-POE ========================================================================== UNIT 1: SL 1: ICX7150-C12-2X10GR POE 12-port Management Module Serial #:FEK3237N0B4 Software Package: BASE_SOFT_PACKAGE Current License: 2X10GR P-ASIC 0: type B160, rev 11 Chip BCM56160_B0 ========================================================================== UNIT 1: SL 2: ICX7150-2X1GC 2-port 2G Module ========================================================================== UNIT 1: SL 3: ICX7150-2X10GF 2-port 20G Module ========================================================================== 1000 MHz ARM processor ARMv7 88 MHz bus 8192 KB boot flash memory 2048 MB code flash memory 1024 MB DRAM STACKID 1 system uptime is 36 day(s) 3 hour(s) 6 minute(s) 7 second(s) The system started at 11:48:06 Central Tue Feb 26 2019 Boot version and file name The system : started=cold start Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 18 The show version output displays the current software version along with the .bin file name. Also shown is the boot version and file name. The output also displays each module or slot (SL) in the device, and the details of the module, including any licenses installed on the management module. Revision 0419 5 ‐ 18 ICX 150 Software Upgrade and Licensing Displaying Flash Versions • Use show flash to view which files are installed in the flash partitions Ruckus# show flash 8.0.80dT211 L2 code is installed in the primary partition, L3 code is installed in the secondary partition Stack unit 1: NAND Type: Micron NAND 2GiB (x 1) Compressed Pri Code size = 25968884, Version:08.0.80dT211 (SPS08080d.bin) Compressed Sec Code size = 25968884, Version:08.0.80dT211 (SPR08080d.bin) Compressed Boot-Monitor Image size = 786944, Version:10.1.14T225 Code Flash Free Space = 1292234752 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 19 The show flash command displays both the primary and secondary partitions and the version of software installed in each. The output also shows the amount of free flash on the device. Notice that the switch code is loaded in the primary partition designated by the SWS in the .bin file name, and the router code SWR is loaded in the secondary partition. Revision 0419 5 ‐ 19 ICX 150 Software Upgrade and Licensing Software Upgrade Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Next, we will look at the software upgrade. Revision 0419 5 ‐ 20 ICX 150 Software Upgrade and Licensing Upgrade Transfer Options • Software images for all Ruckus ICX devices can be uploaded and downloaded using: – – – – – TFTP (manifest file) SCP HTTPS (8.0.80 or newer) USB module Between flash modules (partitions) on the switch • Transfer of software images can be designated to the primary or secondary flash memory • Flash image boot options: – Download UFI image to primary, all the components will be updated for primary • Boot from primary: all the components installed with primary UFI image is applicable – Downloaded UFI image to secondary, all the components will be updated for secondary • Boot from secondary: all the components installed with secondary UFI image is applicable • Only one image/flash partition is active at one time Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 21 There are many different transfer methods that can be used to upgrade a switch however it is important to note that only TFTP utilizes the manifest file process. Other transfer options require the U‐Boot and image software to be transferred separately. Moving forward using the UFI process all transfer options will support a single command pointing to the single UFI file for the upgrade. When transferring the software you will specify the flash partition you will place the new code. Once downloaded it is required that the switch be booted from the flash where the new software is stored. Note that only one flash partition can be active and switching between the two options requires a reload of the switch. Revision 0419 5 ‐ 21 ICX 150 Software Upgrade and Licensing Upgrade Methods • Legacy and UFI commands depending on transfer method used Transfer Method Commands Legacy Ruckus# copy tftp system-manifest 10.176.132.11 FI08090_Manifest.txt primary UFI Ruckus# copy tftp system-manifest 10.176.132.11 FI08090_Manifest.txt primary Legacy Ruckus# copy scp flash 10.176.132.13 SPR08090.bin primary Ruckus# copy scp flash 10.176.132.13 spz10115.bin bootrom UFI Ruckus# copy scp flash 10.176.132.11 SPR08090ufi.bin primary Legacy Ruckus# copy https flash 10.176.132.132 SPR08090.bin primary Ruckus# copy https flash 10.176.132.132 spz10115.bin bootrom UFI Ruckus# copy https flash 10.176.132.132 SPR08090ufi.bin primary Legacy Ruckus# copy disk0 flash SPR08090_B22.bin primary Ruckus# copy disk0 flash spz10115.bin bootrom UFI Ruckus# copy disk0 flash SPR08090_B22ufi.bin primary TFTP SCP HTTPS [FastIron release 08.0.80 and above] USB1 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 22 You can reference the command needed to upgrade a switch which will depend on you transfer method along with your migration to UFI code. If you are migrating to the UFI process from software previous to 8.0.90 it will require a two step process to complete. More details on that process in the next few slides. You can also select this flash partition you plan to transfer the software however in these examples all transfers are being placed in the primary partition. For TFTP upgrade process using the manifest file can be used however will need to be performed twice to install the UFI image. The first step is to upgrade the to 8.0.90 software (non UFI) and when run again it will install the UFI version of the software. When performing legacy upgrade methods other that TFTP (which supports the simplified manifest process) the software and boot file will need to be uploaded independently. It is not always necessary to upgrade the boot code on the device. Refer to the Software Release Notes for your specific version to see if the boot code needs to be upgraded. The UFI process combines all software needed including the boot image and all other software therefore only a single command pointing to the UFI file is needed. Footnote 1: Image upgrade using USB is not supported for stacking in FastIron release 08.0.80 and 08.0.80 patches. The workaround is to upgrade using the TFTP or SCP protocol. Revision 0419 5 ‐ 22 ICX 150 Software Upgrade and Licensing UFI Software Upgrade • Legacy to UFI application upgrade involves 2 step upgrade Upgrade from previous software – Old releases do not understand UFI format • Image update procedure to 8.0.90 from previous software 1. 2. 3. 4. From 8.0.30 application download 8.0.90 legacy image Reboot the system with 8.0.90 image Download 8.0.90 UFI image from 8.0.90 image Reboot the system • If update UFI in step 3 is not performed: • Unsupported state • Some functionality is limited if not using UFI image • Indication is displayed in the show version command and syslog From the existing software CLI Download 8090 legacy image using transfer method to preferred flash Primary/Secondary Boot from flash to new 8.0.90 legacy software Download the 8.0.90 UFI software using transfer method to flash Primary/Secondary Boot from flash to new 8.0.90 UFI software Upgrade complete Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 23 As mentioned the Unified FastIron Image combines all software files together into one single file eliminating application and U‐Boot image compatibility issue seen in the legacy upgrade process. Migrating from the Legacy to the UFI requires a 2 step process allowing you to use the full potential of the UFI features. The first step requires the traditional upgrade process to the non‐UFI image. Once that is installed the switch can be migrated to the UFI image where all the necessary files will be upgraded automatically. ICX7150 running 8060 will require one more reload (total of 3 reloads) New CPLD was released in 8061 If the system already runs new CPLD, no additional reload Revision 0419 5 ‐ 23 ICX 150 Software Upgrade and Licensing Manifest File Upgrade • You will issue the TFTP command below to start the upgrade process Ruckus# copy tftp system-manifest 10.1.1.117 08090\FI08090_Manifest.txt primary Ruckus# Flash Memory Write (8192 bytes per dot) DOWNLOADING MANIFEST FILE Done. Manifest upgrade in progress... telnet@Lab-ICX01#Flash Memory Write (8192 bytes per dot) <Output Truncated> Copy ICX7150 from TFTP to Flash Done Manifest file upgrade done, please reload the system • Reload of the switch is required Ruckus# boot system flash primary • After reboot you will now be on non‐ufi 8.0.90 code Ruckus# show version Copyright (c) Ruckus Networks, Inc. All rights reserved. UNIT 1: compiled on Feb 19 2019 at 13:48:49 labeled as SPR08090 32454468 bytes) from Primary SPR08090.bin(Non-UFI) SW: Version 08.0.90T213 Compressed Primary Boot Code size = 786944, Version:10.1.15T225 (mnz10115) Compiled on Thu Jan 31 01:08:55 2019 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 24 Its important to see that the process identified the router software that was previously running on the switch and the manifest process upgraded accordingly. If switch software were running on this switch it would have updated using switch software. If you are using a method other than TFTP manifest process you will have to transfer both the image and boot code independently using the commands in the previous slide. Both manifest or independent files require the 2 step process. This is the first step of the two step press for both TFTP manifest and other transfer methods. Revision 0419 5 ‐ 24 ICX 150 Software Upgrade and Licensing Manifest File Upgrade (cont.) • Indication of non UFI software displays warning message can be seen from show version or during boot ========================================================================================== =================== WARNING: FI image is not booted from UFI!!! =============== ========== Please download UFI image and reboot the system for full functionality ====== ========================================================================================== • Below syslog message will be logged if image is not booted with UFI image SYSLOG: <14> Jul 5 08:01:05 WARNING: FI image is not booted from UFI, download UFI and reboot system for full functionality. • You will again issue the TFTP command below to start the upgrade process to UFI code Ruckus# copy tftp system-manifest 10.1.1.117 08090\FI08090_Manifest.txt primary Ruckus# Flash Memory Write (8192 bytes per dot) DOWNLOADING MANIFEST FILE Done. Manifest upgrade in progress... telnet@Lab-ICX01#Flash Memory Write (8192 bytes per dot) <Output Truncated> Post processing bundle image... Bundle image processed successfully Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 25 If a switch is running 8.0.90 code that is not the UFI image you will receive a warning message in both the show version command or when the switch is booted up. Syslog entries will also be recorded indicating the switch is not running UFI code. To now migrate to the UFI code using the manifest file you will issue the previous command again to allow the manifest to now migrate to the UFI code on the switch. Notice that when it completes it indicates that the bundle image was used and process successfully Revision 0419 5 ‐ 25 ICX 150 Software Upgrade and Licensing Upgrade Results • Use show flash to verify that the image and boot code has been successfully copied Ruckus# show flash Stack unit 1: NAND Type: Micron NAND 2GiB (x 1) Compressed Pri Code size = 32454872, Version:08.0.90T213 (SPR08090.bin) Compressed Sec Code size = 30778540, Version:08.0.80T213 (SPR08080b276.bin) Compressed Pri Boot Code size = 786944, Version:10.1.15T225 (mnz10115) Compressed Sec Boot Code size = 786944, Version:10.1.15T225 (mnz10115) Code Flash Free Space = 1251205120 • Once transfer is complete you must reboot the device to complete the upgrade process Ruckus# boot system flash primary • When reloaded the switch will reflect the UFI code is loaded and running Ruckus# show version Copyright (c) Ruckus Networks, Inc. All rights reserved. UNIT 1: compiled on Feb 19 2019 at 13:48:49 labeled as SPR08090 (32454872 bytes) from Primary SPR08090.bin (UFI) SW: Version 08.0.90T213 Compressed Primary Boot Code size = 786944, Version:10.1.15T225 (mnz10115) Compiled on Thu Jan 31 01:08:55 2019 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 26 After the second upgrade step and boot you can issue the show flash command to verify that the new software has been loaded into the partition you have chosen. Also there are now two boot code locations instead of the one that was used in previous code. Additionally you will see there is a mismatch of code between the primary and secondary code which once the new software is verified can be copied over to the secondary partition shown later. Once the switch is reloaded it is now running on the UFI code indicated by the output. Revision 0419 5 ‐ 26 ICX 150 Software Upgrade and Licensing Upgrade Results (cont.) • Once verified issue the copy flash flash primary | secondary to copy to other flash partition Ruckus# copy flash flash secondary Flash Memory Write (8192 bytes per dot) Ruckus#......................................................................................................... <output Truncated> Processing the bundle image... Flashing application image to Secondary partition... SYNCING IMAGE TO FLASH. DO NOT SWITCH OVER OR POWER DOWN THE UNIT(65536 bytes per dot)... ............................................................................ Flashing bootrom image to Secondary partition... <output Truncated> SYNCING IMAGE TO FLASH. DO NOT SWITCH OVER OR POWER DOWN THE UNIT(65536 bytes per dot)... ............ Copy Done • Both partitions now reflect the now UFI code Ruckus# show flash Stack unit 1: NAND Type: Micron NAND 2GiB (x 1) Compressed Pri Code size = 32454872, Version:08.0.90T213 (SPR08090.bin) Compressed Sec Code size = 32454872, Version:08.0.90T213 (SPR08090.bin) Compressed Pri Boot Code size = 786944, Version:10.1.15T225 (mnz10115) Compressed Sec Boot Code size = 786944, Version:10.1.15T225 (mnz10115) Code Flash Free Space = 1205903360 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 27 After you are running in the new software you can then copy it over to the secondary partition allowing for backup in case the primary partition software becomes currupted. After this is completed you can issue the show flas command to verify the software is copied over to the secondary. Revision 0419 5 ‐ 27 ICX 150 Software Upgrade and Licensing Software Licensing Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Our next topic is software licensing for ICX devices. Revision 0419 5 ‐ 28 ICX 150 Software Upgrade and Licensing Self‐Authenticated Upgrade (SAU) Licensing • Software licensing provides increased scalability and rapid deployment of hardware – Permanent license can be ordered pre‐installed in a Ruckus device – Ordered separately after delivery • Self‐Authenticated Upgrade Licensing provides a “pay‐as‐you‐grow” capabilities – SAU licensing allows you to upgrade or downgrade to a licensed feature set with a single command • Software Licensing Terminology – Certificate of Entitlement (CoE): The proof‐of‐purchase certificate issued by Ruckus when a license is purchased – Licensed feature: Any hardware or software feature or set of features that require a valid software license to operate – Activation Code: A unique key, along with the serial number, used to generate a CoE on the Ruckus Support site • Activation Code is delivered in an email message after the order is placed Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 29 Licensing provides the convenient and budget friendly way of purchasing equipment with advanced features sets that may or may not be used when deployed. As the network changes or advances, these features might be needed and can be activated by the use of a license. These features include Ports on Demand (PoD), Layer 3 Base Features (L3‐BASE), L3 Premium Features (L3 PREM), Media Access Control Security (Prem‐MACsec) depending on the switch series. This is an upgrade option that does not require a pull and replace process but rather the enabling of a license for the specific feature set. Footnote 1: License options are not available on all switch types. Refer to the ICX License Guide for specific license available for each switch. There are a few terms used when working with Ruckus licenses on ICX devices. This include: Certificate of Entitlement – This is a certificate issued once the license purchased has been registered and will provide a code that can be associated with an enabled license feature set Licensed feature – If a switch is being configured for a feature that requires a license you will receive an error when entering the commands until a license has been succussfully installed on the switch Activication code – This is a unique key that is delivered once a license has been purchased and is used to register and generate a Certificate of Entitlement. Revision 0419 5 ‐ 29 ICX 150 Software Upgrade and Licensing License Available Platform Licensed Feature License Install Options License Delete Options Default Package Possible Packages ICX 7150‐24/48 L3 PREM, PoD 4x1g, 2x10g, 4x10gr 2x10g, 4x10gr 4x1G 4x1G, 2x10G, 4x10GR ICX 7150‐48ZP L3 PREM, PoD 2x10g, 8x10gr 8x10gr 2x10G 2X10G, 8x10GR ICX 7150‐C12 L3 PREM, PoD 2x1g, 2x10gr 2x10gr 2x1G 2x1G, 2x10GR ICX 7250 L3 PREM PoD l3‐prem 2x10g, 8x10g l3‐prem 2x10g, 8x10g l3‐base l3‐base, l3‐prem l3‐ base‐2x10G l3‐prem‐2x10G l3‐base‐8x10G l3‐prem‐8x10G ICX 7450 L3 PREM MACSec l3‐prem macsec l3‐prem macsec l3‐base l3‐base, l3‐prem l3‐base‐macsec l3‐prem‐macsec ICX 7650 L3 PREM MACSec l3‐prem macsec l3‐prem macsec l3‐base l3‐base, l3‐prem, l3‐base‐macsec l3‐prem‐macsec ICX 7750 L3 PREM L3 PREM L3 PREM l3‐base l3‐prem ICX 7850 L3 PREM l3‐prem l3‐prem l3‐base l3‐base, l3‐prem Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 30 Software licensing enables premium features in the software, such as premium Layer 3 features. Most switch families have multiple license that can be applied to them allowing for specific advanced features or capabilities. Once a package is chosen (fulfilling the environments requirements) they can be ordered and can be activated on the switch. Switches can have unique license requirement so please refer to the ICX license guide for additional license information including stacking ports and limitations. Revision 0419 5 ‐ 30 ICX 150 Software Upgrade and Licensing Licensing Rules • The following licensing rules apply to all ICX devices that support Self‐Authenticated Upgrade (SAU) software licensing: • A license is not tied to a specific device – It can be removed from one device and redeployed on another device • Licensed features can be activated prior to obtaining a valid license and used for a trial period of 45 days, based on an agreement to obtain a license – Trial licenses for all licensed features are built into the device – Enabling any licensed feature will activate a 45‐day trial period – A trial license cannot replace or supersede a normal license • More than one license can be installed per device concurrently Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 31 The Self‐Authenticated Upgrade process allows for many of the license options to be reused by removing the feature from one switch and redeployed in another. The is handy when replacing a failed switch or if a switch is being repurposed. Licensed features can be installed prior to the purchase of a license however it will be considered a temporary trial license until the valid license is purchased and applied to the switch. As mentioned many switch families have multiple license options and can be installed on the switch at the same time however you will receive an error if the same license is applied providing the same enablement of a feature or feature set. Revision 0419 5 ‐ 31 ICX 150 Software Upgrade and Licensing Licensing Configuration Tasks The following tasks must be performed in the following order 1. Order the desired license 2. Obtain your license Activation Code, which will be delivered via email 3. Log in to the Ruckus Support portal (https://support.ruckuswireless.com) to generate the Certificate of Entitlement (CoE) 4. Install the SAU license on the Ruckus device add the CoE serial number 5. Verify that the license is installed Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 32 To obtain a valid license it will need to be ordered allowing for an activation code will be sent. Next you will access the Ruckus support portal and obtaining a Certificate of Entitlement which will tie the serial number of the switch. This CoE will contain a serial number that references this association of license and switch which will allow you to proceed with the install of the SAU license and adding the CoE serial number into the switch. You can then verify the install and be able to verify the feature is enabled. Lets walk through these steps in more detail. Revision 0419 5 ‐ 32 ICX 150 Software Upgrade and Licensing Certificate of Entitlement (CoE) • The following procedure demonstrates how to generate a CoE – Log into Ruckus support portal at https://support.ruckuswireless.com/ Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 33 Once your activation code is sent from your order being placed you will proceed to the ruckus support site at support.ruckuswireless.com. There you will click on the activate purchase link on the right of the page. Revision 0419 5 ‐ 33 ICX 150 Software Upgrade and Licensing Certificate of Entitlement (CoE) (cont.) • Enter the Activation Code received by email, and click Validate • Software license details appear – Accept the terms and conditions – Click Activate Purchase Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 34 The site will prompt you for your activation code which you can validate to ensure the activation code enables the license ordered. Once verified you will activate the purchase and a certificate of entitlement will be generated. This serial number will be entered when the license is being enabled on the switch. Revision 0419 5 ‐ 34 ICX 150 Software Upgrade and Licensing Adding a Software License • Enter the license install perpetual command, followed by the unit number and the purchased license name Ruckus# license install perpetual 1 4x10gr Syntax: license {delete|install} perpetual [unit id] [license name] • Add the license serial number to the switch license installed Ruckus# license set serial 1 icx7150 PR24235324 Syntax: license set serial [unit ID] [switch type] [license serial number] • You can confirm the license is installed Ruckus# show license installed Unit License Name L3 Prem PoD 1 2X10GR Yes Yes Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Speed 10G Ports 2 MACsec NA SerialNo(L3/ICX7150) SerialNo(PoD/MACsec) PR24235324 NA 35 Connect to the switch and with the CoE license serial number you will then use the license install perpetual command to add the feature to the switch. As you can see with the syntax this command can also be used to remove a license from a switch if it can be reused. Next you will configure the serial number of the CoE certificate using the license set serial command shown. Once these two steps are completed the CoE serial number will be displayed as part of the show license installed command output, and also available via SNMP. Revision 0419 5 ‐ 35 ICX 150 Software Upgrade and Licensing Displaying License Features • Display the license Ruckus # show license Unit License Name L3 Premium Port Speed Upgrade 1 2X10GR Yes Yes Speed 10G Ports 2 MACsec NA Ruckus# show version Copyright (c) 2017 Ruckus Wireless, Inc. All rights reserved. UNIT 1: compiled on Nov 20 2018 at 00:09:55 labeled as SPS08080d (25968884 bytes) from Primary SPS08080d.bin SW: Version 08.0.80dT211 Compressed Boot-Monitor Image size = 786944, Version:10.1.14T225 (mnz10114) Compiled on Thu Nov 15 06:59:22 2018 HW: Stackable ICX7150-C12-POE ========================================================================== UNIT 1: SL 1: ICX7150-C12-2X10GR POE 12-port Management Module Serial #:FEK3237N0B4 Software Package: BASE_SOFT_PACKAGE Current License: 2X10GR P-ASIC 0: type B160, rev 11 Chip BCM56160_B0 ========================================================================== <Output Truncated> Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 36 Once a license is loaded, you can use the show license command to view a list of installed licenses. Information provided in the show license output indicates if the license is a combo license or for a specific feature. The output includes: • The name of the license installed and for what unit • Features of the license • If it is a port speed license it will indicate what speed it provides • The amount of ports it is good for Finally, there is the capacity, which is the port capacity of a Ports on Demand (PoD) license. The capacity differs on each ICX platform. Revision 0419 5 ‐ 36 ICX 150 Software Upgrade and Licensing Configuring PoD on an Interface (ICX 7150/7250) • PoD ports require the port speed to be added to a port • After license has been installed: – Insert the 10‐Gbps optic transceiver – Enter the speed-duplex 10g-full command on a single, multiple or an interface range Ruckus(config)# interface ethernet 1/2/2 Ruckus(config-if-e10000-1/2/2)# speed-duplex 10g-full • The show pod displays the license configurations for all PoD ports on the switch Ruckus# show pod Unit-Id: 1 PoD license capacity: 8 PoD license capacity used: 1 PoD-ports Lic-Available Lic-Used 1/2/1 Yes no 1/2/2 Yes Yes 1/2/3 Yes no 1/2/4 Yes no 1/2/5 Yes no 1/2/6 Yes no 1/2/7 Yes no <Output Truncated> Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 37 To take advantage of the PoD license on the 7150 and 7250 ICX switch the new speed has to be manually set on the ports. This is performed after the license is installed and the 10Gbps optic is installed in the switch. Once both are installed enter the interface command line and use speed-duplex 10g-full command to enable. Once saved in the config the port will remain at 10G until modified. Revision 0419 5 ‐ 37 ICX 150 Software Upgrade and Licensing Summary • Attendees should now be able to: – Discuss the upgrade considerations when upgrading a ICX switch • Use the Target Path Selection Guide to find which software version is right for your device – Discuss the Software Image Files – Describe the simplified upgrade process – Perform the process of verifying the current software version – Perform a software upgrade using both legacy and Unified FastIron Image processes – Describe and install Software Licensing Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 38 This concludes the Software Upgrade & Licensing module. You should now be able to: Discuss the upgrade considerations when upgrading a ICX switch • Use the Target Path Selection Guide to find which software version is right for your device Discuss the Software Image Files Describe the simplified upgrade process Perform the process of verifying the current software version Perform a software upgrade using both legacy and Unified FastIron Image processes Describe and install Software Licensing Revision 0419 5 ‐ 38 ICX 150 Software Upgrade and Licensing End of Module 5: Software Upgrade & Licensing Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved This completes the Software upgrade and licensing module. I encourage you to continue to the next module of the ICX 150 Implementer course. Thank you. Revision 0419 5 ‐ 39 ICX 150 Revision 0419 Software Upgrade and Licensing 5 ‐ 40 ICX 150 Device Access & Management Module 6: Device Access & Management Revision 0419 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved This module will introduce you to ICX device access and management Revision 0419 6‐1 ICX 150 Device Access & Management Objectives • After completing this module you will be able to: – Describe the different methods available for device connection including the console port, Telnet, SSH, and Web management access – Describe the function of the management port – Know how to create local user accounts and passwords – Describe and configure Simple Network Management Protocol (SNMP) – Explain how to connect ICX devices to SmartZone network controller Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 2 After completing this module you will be able to: • Describe the different methods available for device connection including the console port, Telnet, SSH, and Web management access. • Describe the function of the management port • Know how to create local user accounts and passwords, • Describe and configure Simple Network Management Protocol (SNMP) • Configure an ICX switch to connect to and be managed by the SmartZone network controller Revision 0419 6‐2 ICX 150 Device Access & Management Access Management Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Now let’s discuss access management on the ICX. Revision 0419 6‐3 ICX 150 Device Access & Management Access Management • There are several methods which can be used to access ICX devices: – – – – – – Serial console port Telnet SSH (Secure Shell) Web management GUI SNMP‐based management applications Ruckus SmartZone SmartZone Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 4 There are several methods available to access ICX devices. You can use the serial console port, Telnet, Secure Shell (SSH), or the Web management GUI. Management applications that run SNMP version 1, 2, or 3 can also be used. As well as the newly added capability that allows an ICX switch to be managed by the Ruckus SmartZone network controller, which is traditionally known to manage Ruckus access points. Revision 0419 6‐4 ICX 150 Device Access & Management Console Connection • ICX devices have the following console ports – ICX 7150, 7650 and 7850 – USB Type‐C – ICX 7250, 7450 and 7750 – Mini‐USB • Use the provided console cable to connect to a PC running terminal emulation software – Session parameters should be set to: • Baud rate: 9600 bps • Data bits: 8 • Parity: None • Stop bits: 1 • Flow control: None Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 5 Different ICX families of switches have different types of console ports. For the 7000 series, there is a mini‐USB serial ports and USB‐C ports. ICX devices with mini‐USB serial ports ship with a console cable to connect the device to a PC running a terminal emulation software, like Putty. Devices with USB‐C ports will require the user to provide the cable. Regardless of the ICX model, the connection parameters for the session are the same: the baud rate should be 9600 bits per second, the data bits are 8, the stop bit is 1, and parity and flow control should be set to none. Revision 0419 6‐5 ICX 150 Device Access & Management Remote Access Options • Telnet access to CLI – NOT secure – plain text login & activity – Can open multiple sessions – Disabled by default in 8.0.90, enabled prior • SSH access to CLI – – – – Secure – encrypted login and activity Can open multiple sessions Recommended method for CLI access Enabled by default in 8.0.90, disabled prior • Web management GUI (Web GUI) – HTTP/HTTPS access – Secure when using HTTPS encrypted login and activity – Can open multiple read‐only sessions Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 6 For remote access, you have three options: The first method is a Telnet session. It is important to note that Telnet is not secure. It uses plain text to transport both username and password information, as well as command activity. Starting in release 8.0.90, Telnet is disabled by default. In previous versions it was enabled by default. The second method is Secure Shell (SSH). SSH provides a secure, encrypted connection for both login and command activity. Ruckus recommends that you use SSH for remote CLI access. Starting in release 8.0.90, SSH is enabled by default. In previous versions it was disabled by default. The third method is to use HTTP or HTTPS to access the Web management GUI (Web GUI). When using HTTPS, your connection to the GUI is encrypted, so it provides the same security benefits as SSH does for the CLI. Revision 0419 6‐6 ICX 150 Device Access & Management Management IP Address • On Layer 2 switches, the management IP address and the default gateway are assigned globally, only one per switch – For example: Switch(config)# ip address 192.22.33.45/24 Switch(config)# ip default-gateway 192.22.33.1 • On Layer 3 switches, each IP address is assigned at the interface level, not at the global level – The IP address of any interface on the router can be used for management – For example: Router(config)# interface ethernet 1/1/9 Router(config-if-e1000-1/1/9)# ip address 192.22.33.45/24 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 7 When setting the management IP address on a Layer 2 switch, the address is configured globally, 1 per switch, using the ip address command, or for IPv6, using the ipv6 address command. Also, the default gateway can be set globally. You can configure an IPv4 and an IPv6 address for management access. On a Layer 3 switch running router code, each interface can be assigned an IPv4 and/or IPv6 address, and any of the interfaces can be used for management. Optionally, the ICX devices have an out‐of‐band management port which we will discussed on the next slide. Revision 0419 6‐7 ICX 150 Device Access & Management Management Port • ICX devices have an out‐of‐band management port to manage devices without interfering with in‐band ports • Can be used for remote management, as well as downloading images and configurations • The following command configures the management port – The management port number is always 1 Ruckus(config)# interface management 1 • The management port is not part of any VLAN • Protocols are not supported on the management port • Creating a management VLAN disables the management port on the device Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 8 The management port is an out‐of‐band port that customers can use to manage their devices without interfering with the in‐band ports. The management port is widely used to download images and configurations, for Telnet sessions, and for Web management. Use the interface management 1 command to configure the port. The management port is always the # 1. The following rules apply to management ports: • Only packets that are specifically addressed to the management port MAC address or the broadcast MAC address are processed by the Layer 2 switch or Layer 3 switch. All other packets are filtered out. • A packet received on the management port is not sent to any in‐band ports, and no packets received on in‐band ports are sent to a management port. • The management port is not part of any VLAN. • Configuring a strict management VRF disables certain features on the management port. • Protocols are not supported on the management port. • Creating a management VLAN disables the management port on the device. Revision 0419 6‐8 ICX 150 Device Access & Management Enabling & Displaying Telnet • Enable Telnet from global CONFIG mode Ruckus(config)# telnet server – Disable Telnet Ruckus(config)# no telnet server • Display Telnet configuration and connections Ruckus(config)# show telnet Telnet server status: Enabled Telnet connections (inbound): 1 established, client ip address 192.168.1.200, user is super, privilege super-user using vrf default-vrf. 19 second(s) in idle <Output Truncated> • Optional features such as authentication retries, listening port and idle timeouts can be configured Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 9 In previous releases the Telnet server is enabled by default. Beginning with release 8.0.90, the Telnet server is disabled by default. The command to enable Telnet is telnet server. This is entered in the global CONFIG mode. Use the no form of the command to disable Telnet. Remember to save your changes. The show telnet command will show you the status of Telnet, the number of connections, and client connection information. Revision 0419 6‐9 ICX 150 Device Access & Management SSH Support • SSHv2 server and client functions can be performed on ICX devices • Implementation of SSHv2 server supports three kinds of user authentication: – DSA challenge‐response authentication – RSA challenge‐response authentication – Password authentication (local) • Beginning with release 8.0.90, SSH server is enabled by default • Restrictions of the above authentication types as well as access filtering can be specified • Optional features such as authentication retries, listening port and idle timeouts can be configured Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 10 ICX devices support SSHv2. The implementation of SSH server supports three kinds of user authentication: • DSA (Digital Signature Algorithm) challenge‐response authentication, where a collection of public keys are stored on the device. Only clients with a private key that corresponds to one of the stored public keys can gain access to the device using SSH server. • RSA challenge‐response authentication, where a collection of public keys are stored on the device. Only clients with a private key that corresponds to one of the stored public keys can gain access to the device using SSH server. • Password authentication, where users attempting to gain access to the device using an SSH client are authenticated with passwords stored on the device or on a TACACS+ or RADIUS server. You can adjust the following SSH server settings on the device: • Number of SSH server authentication retries • User authentication method the device uses for SSH server connections • Whether or not the device allows users to log in without supplying a password • Port number for SSH server connections • SSH server login timeout value • A specific interface to be used as the source for all SSH server traffic from the device • Maximum idle time for SSH server sessions • Disable 3‐DES support Revision 0419 6 ‐ 10 ICX 150 Device Access & Management Enable/Disable SSH • Beginning with release 8.0.90, SSH is enabled by default with the following settings: – Authentication type: RSA – Modulus (key size): 2048 bits • Was disabled by default in previous releases • SSH can be disabled at the Global CONFIG level: Ruckus(config)# crypto key zeroize [rsa | dsa] • Use rsa or dsa to delete a specific key. If not specified, both are deleted. • It can be re‐enabled with: Ruckus(config)# crypto key generate rsa modulus 2048 – Syntax: crypto key generate [ dsa | rsa [ modulus key-size ] ] • Modulus: 1024 or 2048 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 11 Beginning with release 8.0.90, the SSH server is enabled on an ICX device by default. The default authentication type is RSA with 2048 bit modulus. The SSH server can be disabled by entering the crypto key zeroize command at the global CONFIG level. If disabled, SSH can be re‐enabled using the crypto key generate command followed by the algorythm (DSA or RSA) and the modulus, which can be 1024 bits or 2048 bits. Revision 0419 6 ‐ 11 ICX 150 Device Access & Management SSH Authentication • Authentication takes place by either sharing the generated key, or by client password challenge – Password challenge requires that AAA be configured for “local” login, and a matching username and password created on the device. The following is the default configuration in release 8.0.90: Ruckus# show run | include aaa aaa authentication web-server default local aaa authentication login default local Ruckus# show run | include username username super password ..... – Additional users can be configured with the following command: Ruckus(config)# username icx-admin priv 0 password Testpwd • AAA configuration is covered in a separate Security and Monitoring presentation Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 12 Authentication takes place by either sharing the generated key, or by client password challenge. On an ICX running firmware version 8.0.90 is booted from a factory default configuration, the user super is created. The default password for this user is sp‐admin. This password is required to be changed on initial login to the device. The show run output here shows that the web‐server and device login now require a local user account to permit access. There is also a username entry for the default username of super. In releases prior to 8.0.90, the password challenge method required you to manually configure AAA for “local” login, and you must configure a matching username and password on the device. Users are created at the global CONFIG level. The example here creates a user named icx‐admin. Note that the privilege of 0 creates a Super User account. We will discuss these privileges later in this presentation. Revision 0419 6 ‐ 12 ICX 150 Device Access & Management Displaying SSH Configuration • Use the show ip ssh config command to verify SSH parameters configured Ruckus(config)# show ip ssh config SSH server : Enabled Default SSH Port SSH port : tcp\22 and authentication Host Key : RSA 2048 Encryption : aes256-cbc, aes192-cbc, aes128-cbc, aes256-ctr, aes192-ctr, aes128-ctr, 3des-cbc Permit empty password : No Authentication methods : Password, Public-key, Interactive Authentication retries : 3 Login timeout (seconds) : 120 Authentication methods configured Idle timeout (minutes) : 0 SCP : Enabled SSH IPv4 clients : All SSH IPv6 clients : All SSH IPv4 access-group : 12 ACL 12 is configured and SSH IPv6 access-group : applied to SSH access SSH Client Keys : Client Rekey : 0 Minute, 0 KB Server Rekey : 0 Minute, 0 KB Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 13 The show ip ssh config command displays the status of the SSH server, either enabled or disabled, as well as the TCP port being used. The default SSH port is 22. Next, you will see the type of host key being used, the default is RSA 2048, and the types of encryption being used. This example, shows all the default encryption types. Then we see the authentication information, including the methods being used, and the number of retries. Also shown are any IPv4 or IPv6 ACLs applied to SSH access. Here we see ACL 12 has been applied. Revision 0419 6 ‐ 13 ICX 150 Device Access & Management Web Management • By default, HTTP access to the Web GUI is enabled on all ICX devices • HTTP access can be disabled: Ruckus(config)# no web-management http • For enhanced security HTTPS can be enabled Ruckus(config)# web-management https • Web management can be limited only to specific VLAN Ruckus(config)# web-management enable vlan 10 • The example limits web access to VLAN 10 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 14 By default, HTTP access to the Web GUI is enabled. This method of management can be disabled with the no web-management http command. For the more security conscious administrators, you can enable HTTPS access using the same web-management command followed the https parameter. Additionally, Web GUI access can be restricted to a specific VLAN with the webmanagement enable vlan command followed by the VLAN ID, which will be the only VLAN to allow access. Revision 0419 6 ‐ 14 ICX 150 Device Access & Management Web Management Configuration – Release 8.0.90 • With the 8.0.90 release, by default, the Web GUI uses local user accounts for access • The following is the default configuration: Ruckus# show run | include aaa aaa authentication web-server default local aaa authentication login default local Ruckus# show run | include username username super password ..... username icx-admin password ..... Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 15 Beginning with release 8.0.90, the default method of accessing the Web GUI is logging with the default user: super. As you can see in the output AAA authentication is enabled for the web‐server and uses local accounts. The second output shows the default user that is configured on a factory default ICX. Additional local users can be created to allow other forms or access. Local users will be covered later in this presentation. In previous releases, the default usernames were based on SNMP community string settings. Beginning with release 8.0.90, there are no longer any default SNMP community configurations on an ICX switch. Revision 0419 6 ‐ 15 ICX 150 Device Access & Management Privilege EXEC Passwords • By default, passwords are not assigned to the Privileged EXEC (enable) level – Allowing super‐user access to all commands and settings • Three levels of authorization can be assigned to a user’s Privileged EXEC access – Permissions depend on which password is entered • The three levels are: – Super User: Complete read and write access to the system • Generally reserved for system administration • This is the only level that that allows password configuration • Must be set before any other passwords can be set – Port Configuration: Read and write access for interface configuration but not for global parameters • The user can also use show commands – Read‐only: Access to Privileged EXEC mode, but only with read access • No configuration is allowed at this access level Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 16 By default, the CLI Privilege EXEC mode is not protected by passwords. Do not confuse this with device authentication. Device authentication allows you to communicate with the CLI in User EXEC mode. The enable password is used to restrict what you can do once you have access. To secure enable access, you need to assign passwords. There are three types of passwords that can be created, each giving different levels of access. The three levels are Super User, Port Configuration and Read‐Only. • Super User can be considered administrative access, with complete read and write access to the system. This is the only level that that allows password configuration, and it must be set before any other passwords can be created. • Port Configuration allows for read and write access for interface configuration but not for global parameters. This user can also use show commands. • Read‐only allows access to Privileged EXEC mode, but only with read access. Revision 0419 6 ‐ 16 ICX 150 Device Access & Management Privilege EXEC Passwords (cont.) • Passwords may be up to 32 characters in length, are case sensitive, and cannot begin with a number, for example: – Super User Ruckus(config)# enable super-user-password AdM1naCCe$$ – Port Configuration Ruckus(config)# enable port-config-password P0rta((es$ – Read‐only Ruckus(config)# enable read-only-password Re@daC(e$s • If a password has not been set, a warning is displayed Ruckus> enable No password has been assigned yet... • Syntax: enable [super-user-password | read-only-password | port- config-password] <text> Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 17 Passwords can be up to 32 characters long and are case sensitive. Passwords cannot begin with a number. Here we see configuration examples of each type of password. Once a password, or passwords, are configured and you go from User EXEC mode to Privilege EXEC mode using the enable command, you will be prompted for a password. And depending on which password you enter, you will be provided with that type of access. If a password has not been created, you will see a message that no password has been assigned yet. Syntax: enable [super-user-password | read-only-password | portconfig-password] <text> Revision 0419 6 ‐ 17 ICX 150 Device Access & Management User Access Control • Up to 32 local user accounts can be created to allow access to management functions including: – Telnet and SSH connections – Web management GUI – SNMP access • You can assign a username a password, or use the nopassword parameter when creating the user account • A Privilege EXEC level can be assigned for each user account – 0 = Super User – 4 = Port Configuration – 5 = Read‐only Ruckus(config)# username PortConfig privilege-level 4 password KLMpwd Ruckus(config)# username No-Changes privilege-level 5 nopassword Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 18 The system also allows for the creation of up to 32 local user accounts. Usernames can be up to 48 characters in length. Local user accounts provide greater flexibility for controlling management access to Ruckus devices than do management Privilege EXEC (enable) passwords and SNMP community strings. You can continue to use the Privilege EXEC passwords and the SNMP community strings as additional means of access authentication. You can assign each user a password using the password parameter followed by the password string. Passwords can be up to 48 characters. You can also use the nopassword parameter to allow the user to log in with out providing a password. Optionally, you can assign each username a Privilege EXEC level as discussed previously. If a privilege level is not specified, the user defaults to Super User. Revision 0419 6 ‐ 18 ICX 150 Device Access & Management Controlling Access • Use the following commands to restrict SNMP, Telnet, SSH or Web GUI access to a single IP address: Ruckus(config)# Ruckus(config)# Ruckus(config)# Ruckus(config)# snmp-client 209.157.22.14 telnet client 209.157.22.26 ssh client 209.157.22.27 web-client 209.157.22.12 • Or use the all‐client command to restrict access of all of the above Ruckus(config)# all-client 209.157.22.69 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 19 Once remote access is enabled for SNMP, Telnet, SSH, or the Web GUI, you can restrict access to a specific IP addresses. Enter up to 10 different IP addresses per service. You must enter the command for each address. Optionally, you can use the all-client command to restrict access for all four services. Revision 0419 6 ‐ 19 ICX 150 Device Access & Management Access Filtering • Telnet, SSH and SNMP access can be limited to specific client source IP addresses using Access Control Lists (ACL) – Create an ACL Ruckus(config)# Ruckus(config)# Ruckus(config)# Ruckus(config)# access-list access-list access-list access-list 12 12 12 12 permit host 10.157.22.98 permit 10.157.23.0/24 permit 10.157.24.0/24 deny any log – Apply the ACL to access service Ruckus(config)# ssh access-group 12 Ruckus(config)# telnet access-group 12 Ruckus(config)# web access-group 12 Ruckus(config)# snmp-server community private rw 12 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 20 You can also limit access to the remote access services using an ACL. First create the ACL with the IP addresses or subnets you want to restrict access to, then apply the ACL to the service (SSH, Telnet, SNMP, or Web GUI). Remember that ACLs have an implicit deny at the end, dropping packets that do not match the previous permit statements. In this example, we have configured the deny statement with the log parameter allowing us to capture any attempts from unauthorized client source addresses. Revision 0419 6 ‐ 20 ICX 150 Device Access & Management Password Recovery • Recovering from a lost password requires direct access to the serial port and a system reset – This procedure can only be accomplished from the console port • To recover from a lost password: – Start a CLI session over the serial interface on the device, and reload the device by cycling its power – From the CLI established session you will see the initial boot sequence during system startup – Enter “b” to enter the boot monitor mode Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 21 Recovering from a lost password requires direct access to the console port and a system reset. To recover from a lost password, start a CLI session over the console interface, and manually power‐cycle the device. From the CLI established session you will see the initial boot sequence during system startup. Enter “b” to enter the boot monitor mode. Revision 0419 6 ‐ 21 ICX 150 Device Access & Management Password Recovery (cont.) • Enter no password at the prompt ICX7150-Boot> no password OK! Skip password check when the system is up. – This command will bypass the system password check once and cannot be abbreviated (this will not erase any existing passwords) • Boot the system ICX7150-Boot> boot 1 device 0 offset 0x0, size 0xc0000 BOOTING image from Primary <Output Truncated> Ruckus> • Once the console prompt reappears, enter configuration mode and assign a new password • Save the new password using write memory Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 22 Footnote 1: In releases prior to 8.0.90 is necessary to indicate which flash to boot from with the boot system flash [primary | secondary] command. At the boot monitor prompt, enter the no password command. This command will bypass the system password check once and cannot be abbreviated (this will not erase any existing passwords). Next, issue the boot command. Once the console prompt reappears, enter global CONFIG mode and assign a new password. Finally, use the write memory command to save the new password. If you do not save the new password, the next login session will revert to the old password. Revision 0419 6 ‐ 22 ICX 150 Device Access & Management Simple Network Management Protocol (SNMP) Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Our next topic is Simple Network Management Protocol (or SNMP). Revision 0419 6 ‐ 23 ICX 150 Device Access & Management SNMP Management Applications • ICX devices can be managed by the Ruckus SmartZone Network Controller 1, or third party management applications which support SNMP v1/v2 or SNMPv3 • SNMP v1/v2c, prior to release 8.0.90 – By default, when an ICX device is configured as an SNMP server, the read‐only (RO) community string is set to public – Read‐write (RW) access is only permitted when a RW community string is explicitly configured – Multiple read‐only and read‐write community strings can be created • SNMP v1/v2c, release 8.0.90 defaults – By default, the SNMP server is enabled – There are no pre‐configured community strings – Multiple read‐only and read‐write community strings can be created Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 24 Footnote 1: ICX management using the SmartZone Network Controller was first introduced in SmartZoneOS 5 and ICX firmware version 8.0.80. ICX devices can be managed by the Ruckus SmartZone network controller or third‐party management applications as long as they support SNMP version 1, 2, or 3. SNMP is a set of protocols for managing complex networks. SNMP sends messages called protocol data units (PDUs), to different parts of a network. SNMP‐compliant devices, called agents, store data about themselves in Management Information Bases (MIBs) and return this data to the SNMP requesters. Ruckus’s private MIBs and MIB Guide can be found on the Ruckus website at: ruckuswireless.com SNMPv1 or v2 uses a community‐based security approach with different community strings (think passwords) for read‐only and read‐write access. You can assign other SNMP community strings and indicate if the string is read‐only or read‐write. Community strings can be configured as encrypted or clear. By default, the string is encrypted. Revision 0419 6 ‐ 24 ICX 150 Device Access & Management SNMP Management Applications (cont.) • SNMPv3 – – – – Defined in RFCs 3411 to 3415 Strengthens security of SNMPv1 and SNMPv2c Provides secure access to devices by authenticating and encrypting packets over the network The security features provided in SNMPv3 include: • • • • • Encryption of protocol data units (PDUs) Authentication of the users sending the PDUs Specify users access to tables in a read‐only, read‐write, or notify role The creation of views and associating user groups to various views Communication with both authentication and encryption Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 25 SNMP version 3 made significant improvements in security and manageability by introducing three major concepts: • The first is the User‐Based Security Model or USM. Instead of having generic group keys as with version 2, version 3 allows you to define individual username/password combinations for user authentication. You can optionally enable encryption. The standard also defines timeliness checks. Since SNMP messages are often time‐critical, making sure that messages are current is important for accuracy of information. • The second is the Transport Security Model or TSM which uses the Public Key Infrastructure for access authentication and encryption. PKI uses certificates to identify devices, and those certificates must be generated and managed by a Certificate Authority. TSM provides the same benefits as USM, using certificates rather than username/password strings. • Finally, version 3 introduced the concept of View‐Based Access Control. The administrator, can group specific MIB objects into views, then use groups to define who can access a view or set of views. For each group, you can specify an action of read‐write or read‐only. Revision 0419 6 ‐ 25 ICX 150 Device Access & Management SNMPv1/v2 Configuration Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved We’ll begin with the configuration of SNMPv1/v2. Revision 0419 6 ‐ 26 ICX 150 Device Access & Management Configuring SNMP v1/v2 • Configure SNMP by configuring community strings – Strings can be up to 32 characters – Specify whether the string is read‐only (ro) or read‐write (rw) • Examples: – Configure the read‐only community string of lookaccess Ruckus(config)# snmp-server community lookaccess ro – Configure a read/write community string of allaccess Ruckus(config)# snmp-server community allaccess rw Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 27 To configure version 1 and 2, you need to setup community strings using the snmpserver community command, followed by the community string which can be up to 32 characters long. Then, specify if the string is read‐only using the ro parameter, or read‐ write using the rw parameter. Beginning with release 8.0.90, there is no default read‐only or read‐write community strings. You can configure as many read‐only and read‐write community strings as you need. The number of strings you can configure depends on the memory available on the device. There is no practical limit. Note that the SNMP server is enabled by default, however if there are no community strings configured, there will be no SNMP v1/2 access to the device. Revision 0419 6 ‐ 27 ICX 150 Device Access & Management SNMP Server Parameters • Specify an SNMP trap receiver – Host that receives SNMP notifications of events Ruckus(config)# snmp-server host 10.2.2.2 version v2c community • Traps for specific events can be disabled Ruckus(config)# no snmp-server enable traps trap_name • Change the holddown time for SNMP traps – The delay after startup before an ICX device begins sending traps, allowing L2/L3 protocol convergence Ruckus(config)# snmp-server enable traps holddown-time time DECIMAL <1..600> Seconds • Default: 60 seconds Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 28 You can specify a trap receiver to ensure that all SNMP traps sent by the Ruckus device go to the same host, or multiple hosts, on the network. This is done with the snmp-server host command. In the command you specify a host, the SNMP version and additional information specific to the version selected. All traps are enabled by default. However, specific traps can be disabled, if desired. Specific traps are disabled with the no snmp-server enable traps command, followed by the desired trap to be disabled. The traps vary based on whether the device is running switch or router code. Finally, you can disable the holddown timer for traps to be sent after the device starts up. This allows the configured Layer2 and Layer3 protocols to converge before traps are sent. This is meant to allow network stability before sending messages to remote devices. To adjust the holddown timer from the default of 60 seconds use the snmp-server enable traps holddown-time command followed by the time in seconds, ranging from 1 to 600 seconds. Details about all of the configurable options for each of these commands can be found in the Ruckus FastIron Management Configuration Guide. Revision 0419 6 ‐ 28 ICX 150 Device Access & Management Displaying SNMP Settings Ruckus(config)# show snmp server Status: Enabled Contact: TAC Support 1-800-555-4357 Location: Community(ro): ..... Configured community Community(rw): ..... strings are encrypted Max Ifindex per module: 64 Traps Cold start: Enable Link up: Enable Link down: Enable Authentication: Enable Power supply failure: Enable Fan failure: Enable All traps are Fan speed change: Enable Module inserted: Enable enabled by default Module removed: Enable Redundant module state change: Enable Temperature warning: Enable STP new root: Enable STP topology change: Enable MAC notification: Enable MAC-AUTH notification: Enable VSRP: Enable Configured trap receivers MRP: Enable UDLD: Enable VRF: Enable link-oam: Enable cfm: Enable nlp-phy: Enable Total Trap-Receiver Entries: 1 Trap-Receiver IP-Address Version Port-Number Comm-or-Security 1 10.255.243.60 v1 162 ..... Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 29 Use the show snmp server command to view if community strings are configured. Remember community strings are encrypted by default, so it will likely only display as dots. You can also see a list of all enabled traps. This example is of from an ICX device running switch code. Different traps will be included in the router codes. You can also see any IP addresses of trap receivers, if they are configured. Revision 0419 6 ‐ 29 ICX 150 Device Access & Management SNMPv3 Configuration Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Now we will look at configuring SNMP version 3. Revision 0419 6 ‐ 30 ICX 150 Device Access & Management SNMPv3 Configuration Steps 1. Define engine ID (optional) 2. Create Views – Include or exclude OIDs for MIB objects 3. Create Groups – Assign views to groups – Authentication method – Encryption 4. Define Users – Assign to group – Authentication method – Encryption Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 31 To configure SNMP version 3, follow these steps: • First, you can optionally define a non‐default engine ID. • Then, create your views. You need to have a MIB browser or a list of OIDs available in order to configure the views. • Next, create the groups and assign the views you want available to each group. • Finally, define the SNMP users. You can use both the User‐based Security Model and the Transport Security Model. You’ll need to define the authentication method, optionally enable encryption, and assign the user to a group. Revision 0419 6 ‐ 31 ICX 150 Device Access & Management Define Engine ID • During system start up, a default engine ID is generated Ruckus(config)# show snmp engineid Local SNMP Engine ID: 800007c703d4c19e1f31db Engine Boots: 32 Engine time: 57498 Engine uptime: 1 hour(s) 35 minute(s) 49 second(s) • Use the following command to change the default engine ID, used by SNMPv3 – The local parameter indicates that engine ID to be entered is the ID of this device, representing an SNMP management entity Ruckus(config)# snmp-server engineid local 800007c70300e05290ab60 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 32 A default engine ID is generated during system start up. To determine the default engine ID of the device, enter the show snmp engineid command and find the line that begins with “Local SNMP Engine ID”. Once you have located the engine ID, use the snmp-server engineid local command to define the ID. It is important to note that if the engine ID is changed after users have been created, those users must be reconfigured after setting the new engine ID. Revision 0419 6 ‐ 32 ICX 150 Device Access & Management Creating Groups, Users, and Views • The OID structure is a tree. If you include an object with sub‐branches, those sub‐branches will also be included in the view SNMP MIB Object Tree View name: All IP Information View name: All Interface Information View name: Traffic Counters Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 33 Let’s look at how users, groups, and views fit together. A view is a list of SNMP Object Identifiers, or OIDs. The administrator determines how to group these OIDs. The OID structure is a tree, so if you include an object with sub‐branches, those sub‐ branches will also be included in the view. The understanding of SNMP OIDs is critical to the implementation of SNMP v3. This is an advanced topic and therefore beyond the scope of this course. Revision 0419 6 ‐ 33 ICX 150 Device Access & Management Defining Views • SNMP views are named groups of MIB objects to be associated with users to allow limited access for viewing and modification of SNMP statistics and system configuration • Configure SNMP views, using the following commands: Group: NetAdmins View View Users Ruckus(config)# snmp-server view Support1 system included Ruckus(config)# snmp-server view Support1 system.2 excluded Syntax: [no]snmp-server view name mib_tree included | excluded Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 34 SNMP views are named groups of MIB objects to be associated with users to allow limited access for viewing and modifying SNMP statistics and system configuration. To create a view, use the snmp-server view command followed by the viewname and mib_tree. Then specify if you want to included or exclude the MIB in the view. If you include a tree, but do not want some of the objects (or branches) within that tree, you can use the exclude parameter for those objects. Revision 0419 6 ‐ 34 ICX 150 Device Access & Management Defining Groups • Groups map users to views – For each group, you can configure a read view, a write view, or both – Users mapped to a group will use the views for access control • Configure an SNMP group, using the following command Group: NetAdmins View View Users Ruckus(config)# snmp-server group NetAdmins v3 auth read all write all Syntax: [no] snmp-server group groupname { v1 | v2c | v3 { auth | noauth | priv } } [ access {standard-ACL-id | ipv6 ipv6-ACLname } ] [ read viewname ] [ write viewname ] Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 35 A group is a list of views. You can have one or more views per group, and you can use the same view in multiple groups. The v1 , v2c , or v3 parameter indicates which version of SNMP is used. In most cases, you will be using v3, since groups are automatically created in versions 1 and 2 through community strings. The auth or noauth parameter determines whether or not authentication will be required to access the supported views. If auth is selected, then only authenticated packets are allowed to access the view. Selecting noauth means that no authentication is required to access the specified view. Selecting priv means that an authentication password will be required from the users. The access standard-ACL-id parameter is optional. It allows incoming SNMP packets to be filtered based on the standard ACL attached to the group. IPv6 ACLS can be applied with the ipv6 ipv6-ACL-name option. The read viewname or write viewname parameter is optional. It indicates that users who belong to this group have either read or write access to the MIB. The viewname variable is the name of the view to which the SNMP group members have access. If no view is specified, then the group has no access to the MIB. The value of viewname is defined using the snmp-server view command discussed previously. The SNMP agent comes with the default view of all, which provides access to the entire MIB; however, it must be specified when creating the group. The all view also allows SNMPv3 to be backwards compatible with SNMPv1 and 2. Revision 0419 6 ‐ 35 ICX 150 Device Access & Management Defining Users • Create SNMP users and map the user to the group – Define the type of authentication for SNMP access Group: NetAdmins – Specify the type of encryption to encrypt View the privacy password – Users mapped to a group will use the views for access control View • Configure an SNMP user, using the following Users command Ruckus(config)# snmp-server user bob NetAdmins v3 access 2 auth md5 bobmd5 priv des bobdes Syntax: [no] snmp-server user name groupname v3 [ [ access standard-ACLid ] [ [ encrypted ] [auth md5 md5-password | sha sha-password ] [ priv [ encrypted ] des des-password-key | aes aespassword-key ] ] ] Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 36 The next step is to create SNMP users and map them to the groups. Use the snmpserver user command followed by the username and the groupname, and the v3 parameter. The access standard-ACL-id parameter is optional. It indicates that incoming SNMP packets are filtered based on the ACL attached to the user account. The encrypted parameter means that the MD5 or SHA password will be a digest value. MD5 has 16 octets in the digest. SHA has 20. The digest string has to be entered as a hexadecimal string. In this case, the agent need not generate an explicit digest. If the encrypted parameter is not used, the user is expected to enter the authentication password string for MD5 or SHA. The agent will convert the password string to a digest, as described in RFC 2574. The auth md5 or sha parameter is optional. It defines the type of encryption that the user must have to be authenticated. The md5-password and sha-password define the password the user must use to be authenticated. These password have a minimum of 8 characters. The priv [encrypted] parameter is optional after you enter the MD5 or SHA password. The priv parameter specifies the encryption type (DES or AES) used to encrypt the privacy password. If the encrypted keyword is used, either enter des followed by a 16‐octet DES key in hexadecimal format, or enter aes followed by the AES password key. Revision 0419 6 ‐ 36 ICX 150 Device Access & Management ICX Management with SmartZone Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Finally, let’s discuss ICX management with the Ruckus SmartZone network controller. Revision 0419 6 ‐ 37 ICX 150 Device Access & Management ICX Management with SmartZone Overview • Single pane of glass – ICX On‐Premise Management Solution is designed for managing the ICX 7K switches • The solution is modelled after SZ based controller solution of Ruckus AP’s – The ICX would identify the SZ controller based on DHCP discovery or configuration and connect • In the first release only monitoring of Switches will be supported • Key Features – – – – Switch registration and authentication Inventory Network health monitoring & alarms Switch Firmware update Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved – Switch Config file – Backup & Restore – Clustering and High availability – Hierarchical switch groups 38 Ruckus SmartZone has been enhanced to provide a single pane of glass view for managing Ruckus ICX switches and access points. The ICX management portion is designed to provide the same look and feel as the one that has been used for APs for a long time. An ICX device can discover the SMartZone network controller though static configuration, as we will review here or through DHCP, which is beyond the scope of this course. As of ICX release 8.0.90 and SmartZone release 5.0, only monitoring, configuration management and firmware upgrade are supported. But with each new release of SmartZone the capabilities are expected to expand into full ICX configuration. Some of the key features include: • Switch registration and authentication • Inventory • Network health monitoring & alarms • Switch Firmware update • Switch Config file – Backup & Restore • Clustering and High availability • Hierarchical switch groups Revision 0419 6 ‐ 38 ICX 150 Device Access & Management Connecting to SmartZone Network Controller • ICX connects to SmartZone in order below: – Statically configured active list of SmartZone network controllers – Learned through DHCP Option 43 – Statically configured passive list of SmartZone network controller • Configuration commands – Active List of SmartZone controllers Ruckus(config)# sz active-list IP-address1 [IP-address2] [IP-address3] – Passive List of SmartZone controllers Ruckus(config)# sz passive-list IP-address1 [IP-address2] [IP-address3] – Disable SmartZone management Ruckus(config)# sz disable – Disconnect from current SmartZone controller Ruckus# sz disconnect SZ Disconnect initiated… Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 39 The ICX switch will attempt to connect to SmartZone by sending a query to SmartZone IP addresses in the following order: • SmartZone IP addresses configured on the ICX switch using the sz active command • SmartZone IP addresses received through DHCP Option 43 • Backup SmartZone IP addresses configured on the ICX switch using the sz passive command You configure Active List of SmartZone controllers with the sz active-list command followed by up to three SmartZone controller IP addresses. There is no configuration necessary for DHCP, by default. You configure Passive List of SmartZone controllers with the sz passive-list command followed by up to three SmartZone controller IP addresses. You can disable SmartZone management completely with the sz disable command. And you can disconnect from the currently connected SmartZone controller with the sz disconnect command. This would be used in cases where you change which controller you want managing the ICX device. Also note that the sz disconnect command is run from privileged EXEC mode, not global config like the others. Revision 0419 6 ‐ 39 ICX 150 Device Access & Management SmartZone Connection and Management • On successful connection to the SmartZone controller a CLI message is displayed Ruckus# ################################ # Welcome to vSZ # ################################ • Sessions used by SmartZone to manage the switch – Telnet • For administrative operations – currently only image download – Syslog • All syslogs generated by switch are sent to SZ, which gets classified based on user preferences – SNMP • The SZ Queries the Switch operational status periodically (every 5 mins) via the SNMP Channel Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 40 On successful connection to the SmartZone network controller, a message will displayed indicating connection. Once connected, the SmartZone network controller uses the following connections to manage an ICX device: • Telnet – For administrative operations – currently only image download • Syslog – All syslog messages generated by switch are sent to SZ, which gets classified based on user preferences • SNMP – The SZ Queries the Switch operational status every 5 minutes Revision 0419 6 ‐ 40 ICX 150 Device Access & Management Displaying SmartZone Connection Status ICX7250-24 Switch# show sz status ============ SZ Agent State Info =================== Config Status: None Operation Status: Enabled State: SZ SSH CONNECTED Prev State: SZ SSH CONNECTING Event: NONE Active List : 10.176.187.195 DHCP Option 43 : Yes DHCP Opt 43 List : 10.176.160.115 Passive List : 10.176.160.120 Merged List : 10.176.187.195, 10.176.160.115, 10.176.160.120 Merged Idx: 1 IP : 10.176.160.115 SZ IP Used : 10.176.187.195 SZ Query Status : Response Received SSH Tunnel Status - : Tunnel Status : Established CLI IP/Port : 127.255.255.253/43951 SNMP IP/Port : 127.255.255.254/13573 Syslog IP/Port : 127.0.0.1/20514 Timer Status : Not Running Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 41 The show sz status command displays various details of the management connection. This includes the state, highlighted here. It also shows all known SmartZone controllers whether learned through statically defined active and standby lists as well as any learned through DHCP option 43. Lastly, it shows the status of all of the tunnels used to manage the ICX device. Revision 0419 6 ‐ 41 ICX 150 Device Access & Management Summary • You should now be able to: – Describe the different methods available for device connection including the console port, Telnet, SSH, and Web management access – Describe the function of the management port – Know how to create local user accounts and passwords – Describe and configure Simple Network Management Protocol (SNMP) – Explain how to connect ICX devices to SmartZone network controller Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 42 You should now be able to: • Describe the different methods available for device connection including the console port, Telnet, SSH, and Web management access. • Describe the function of the management port • Know how to create local user accounts and passwords • Describe and configure Simple Network Management Protocol (SNMP) • Configure an ICX switch to connect to and be managed by the SmartZone network controller Revision 0419 6 ‐ 42 ICX 150 Device Access & Management End of Module 6: Device Access & Management Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Revision 0419 6 ‐ 43 ICX 150 Revision 0419 Device Access & Management 6 ‐ 44 ICX 150 Device Security and Monitoring Module 7: Device Security & Monitoring Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved This module will cover Device security and monitoring Revision 0419 7‐1 ICX 150 Device Security and Monitoring Objectives • After completing this module, you will be able to: – Use Authentication, Authorization, and Accounting (AAA), RADIUS and TACACS+ to secure an ICX device – Enable 802.1X to provide port‐based network access control using authentication – View system log (Syslog) messages to monitor an ICX device – Collect a show tech-support or supportsave file – Use sFlow to collect traffic information Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 2 After completing this module, you will be able to: • Use Authentication, Authorization, and Accounting (AAA), RADIUS and TACACS+ to secure an ICX device • Enable 802.1X to provide port‐based network access control using authentication • View system log (Syslog) messages to monitor an ICX device • Collect a Show Tech‐support or Supportsave file • Use sFlow to collect traffic information Revision 0419 7‐2 ICX 150 Device Security and Monitoring Device Security Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Let’s start with a look at device security. Revision 0419 7‐3 ICX 150 Device Security and Monitoring Authentication, Authorization, and Accounting (AAA) • AAA is a term for a framework for intelligently controlling access to computer resources, enforcing policies, and auditing usage • Authentication provides a way of identifying a user – The AAA server compares a user's authentication credentials with other user credentials stored in a database – If the credentials match, the user is granted access – If the credentials differ, authentication fails and network access is denied • Authorization maintains what a user is allowed to do • Accounting is a method of tracking user behavior Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 4 AAA is a term for a framework for intelligently controlling access to computer resources, enforcing policies, and auditing usage generally using a remote server running the RADIUS or TACACS/TACACS+ protocol. Authentication provides a way of identifying a user, typically by having the user enter a unique, valid user name and password before access is granted. RADIUS stands for Remote Authentication Dial‐in User Service, and is a client/server protocol that runs in the application layer, using UDP as transport. The Remote Access Server, the Virtual Private Network server, the Network switch with port‐based authentication, and the Network Access Server, are all gateways that control access to the network, and all have a RADIUS client component that communicates with the RADIUS server. TACACS stands for Terminal Access Controller Access‐Control System, commonly used in Unix networks, and is a remote authentication protocol used to communicate with a remote authentication server. TACACS+ offers multiprotocol support, such as IP and AppleTalk. Normal operation fully encrypts the body of the packet for more secure communications. It is not backwards compatible with TACACS. It is a Cisco proprietary enhancement to the original TACACS protocol, and has, for all intents and purposes, replaced TACACS. Revision 0419 7‐4 ICX 150 Device Security and Monitoring Factory Default Authentication Behavior • The following configuration is present in the factory default configuration of an ICX switch running release 8.0.90 aaa authentication web-server default local aaa authentication login default local enable aaa console no telnet server username super password ******* (default = sp‐admin) • aaa authentication – Specifies a service and methods for authenticating access to that service – Services include web management interface (web-server) and Telnet/SSH access to CLI (login) – Method is local (local username) for both • enable aaa console – Ensures console port requires authentication • no telnet server – Disables the Telnet server • username – Sets user and password allowed authentication access Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 5 The configuration displayed here is present in the factory default configuration of an ICX switch running release 8.0.90. The aaa authentication command specifies a service and methods for authenticating access to that service. These services include web management interface (web-server) and Telnet/SSH access to CLI (login). The enable aaa console command ensures console port requires authentication. The no telnet server command disables the Telnet server. The username command and password define a local user account that is allowed authentication access. Revision 0419 7‐5 ICX 150 Device Security and Monitoring AAA Configuration • The AAA process can be configured to use the below authentication methods/servers – – – – – – RADIUS TACACS or TACACS+ Local user accounts Enable (Privilege EXEC level) Line (Telnet) None • Authentication servers are required to be identified in a device if used for AAA services Ruckus(config)# radius-server host 10.157.22.99 Ruckus(config)# tacacs-server host 10.94.6.161 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 6 The AAA process can be configured to use these authentication methods/servers: • For the RADIUS server, you also must identify the server to the device using the radius-server command. • For a TACACS/TACACS+ server, you can use either parameter. You also must identify the server to the device using the tacacs-server command • You configure a local user name and password on the device. Local user names and passwords are configured using the username command. • Enable (Privilege EXEC Level) gives you super‐user control. You would use the password you configured on the device. The enable password is configured using the enable super-userpassword command. • Line (Telnet): This is the password you configure for Telnet access. The Telnet password is configured using the enable telnet password command • None: Means no authentication is used. The device automatically permits access. Multiple servers for an authentication method can be configured however they will be used in the order they were entered into the configuration. If the first is not available the next server entry will be used. Revision 0419 7‐6 ICX 150 Device Security and Monitoring AAA Methodology • Authentication methods can be listed in order of preference – If a remote server is not available the next method will be attempted • Use the login parameter to use AAA authentication for access by either console or Telnet – Try the TACACS+ server, then the local database, then allow access Ruckus(config)# aaa authentication login default tacacs+ local none Ruckus(config)# enable telnet authentication • Use the enable parameter to use AAA authentication for access to the Privilege EXEC level of the CLI – Try the RADIUS server, then the local user database Ruckus(config)# aaa authentication enable default radius local Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 7 Up to 7 authentication methods can be configured and are considered in the order they are listed. If the first authentication method is successful, the software grants access and stops the authentication process. If the access is rejected by the first authentication method, the software denies access and stops checking. However, if an error occurs with an authentication method, the software tries the next method on the list, and so on. For example, if the first authentication method is the TACACS+ server but the link to the server is down, the software will try the next authentication method in the list. If an application method is working properly but the password (and username, if applicable) is not known to that method, this is not a system error. The authentication attempt stops, and the user is denied access. Once AAA authentication preferences are configured they can be applied to an access method. In addition to the examples shown here, AAA can be used for SNMP, 802.1X and Web GUI access. Use the commands aaa authentication snmp-server default, aaa authentication dot1x default and aaa authentication webserver default followed by the desired authentication methods. You should exercise great caution when configuring authentication method lists. It is possible to lock yourself out from access to the switch if each of the methods in the list are not properly configured. Revision 0419 7‐7 ICX 150 Device Security and Monitoring IEEE 802.1X Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Next, we will take a look at port security using the IEEE 802.1X standard Revision 0419 7‐8 ICX 150 Device Security and Monitoring 802.1X Overview • Designed to provide port‐based network access control at the network edge • Network access is blocked until client credentials are provided to authentication server • 802.1X Highlights: – 802.1x compliant client devices provide username/password • Also allows non‐compliant/headless devices based on MAC address – Dynamic VLAN assignment – Restrict client to specific VLAN on authentication failure • The ICX implementation of 802.1X supports the following RFCs: – RFC 2284 PPP Extensible Authentication Protocol (EAP) – RFC 2865 Remote Authentication Dial In User Service (RADIUS) – RFC 2869 RADIUS Extensions Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 9 ICX devices support the IEEE 802.1X standard for authenticating devices attached to LAN ports. Using 802.1X port security, you can configure a device to grant access to a port based on information supplied by a client to an authentication server. When a user logs on to a network that uses 802.1X port security, the Ruckus device grants (or does not grant) access to network services after the user is authenticated by an authentication server. The user‐based authentication in 802.1X provides an alternative to granting network access based on a user's IP address, MAC address, or sub network. Extensible Authentication Protocol On the LAN (or EAPOL), encapsulates the Extensible Authentication Protocol (EAP) for delivery on the Ethernet network. EAP is the protocol used by 802.1X for authentication communication, and is referenced in RFC 2284. Revision 0419 7‐9 ICX 150 Device Security and Monitoring 802.1X Operation • Device roles in an 802.1X configuration: – Client/Supplicant PAE – Network client device requiring access – Authenticator PAE – Ruckus ICX switch – Authentication Server – RADIUS server • Using Extensible Authentication Protocol over LAN (EAPOL): – Clients provide authentication credentials to authenticator – Authenticator send credential to authentication server for validation – If authenticated, network access is granted to the client • Controlled and uncontrolled ports – Uncontrolled ports allow EAPOL message exchange during authentication, no user traffic – Controlled ports allow user traffic after successful authentication Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 10 A physical port on the device using 802.1X has two virtual access points: a controlled port and an uncontrolled port. The controlled port provides full access to the network. The uncontrolled port provides access only for EAPOL traffic between the client and the authentication server. When a client is successfully authenticated, the controlled port is opened to the client. Before a client is authenticated, only the uncontrolled port on the authenticator is open. The uncontrolled port allows only EAPOL frames to be exchanged between the client and the authentication server. The controlled port is in the unauthorized state and allows no traffic to pass through. During authentication, EAPOL messages are exchanged between the supplicant and the authenticator Port Access Entity (PAE), and RADIUS messages are exchanged between the authenticator PAE and the authentication server which is a RADIUS server. If the client is successfully authenticated, the controlled port becomes authorized, and traffic from the client can flow through the port normally. Revision 0419 7 ‐ 10 ICX 150 Device Security and Monitoring 802.1X Example • Supplicant PAE – Supplies client information to Authenticator PAE using EAP encapsulated in EAPOL • Authenticator acts as a client to the RADIUS authentication server • RADIUS server authenticates user – On success, port transitions to Controlled • User traffic flows – On failure, port remains Uncontrolled • User traffic still blocked Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 11 Here we see 802.1X device roles and how they communicate. When the client initiates network access, credentials are passed to the ICX switch encapsulated in EAP over LAN (EAPOL) messages. The authenticator uses RADIUS messages to pass this information to the authentication server, which determines whether the client can access services provided by the authenticator. If the client is successfully authenticated by the RADIUS server, the port transitions to a Controlled port. If authentication fails, or when the client logs off, the port becomes unauthorized again and transitions to Uncontrolled, allowing EAPOL messages but no user traffic. Ruckus's 802.1X implementation also supports dynamic VLAN assignment. If one of the attributes in the Access‐Accept message sent by the RADIUS server specifies a VLAN identifier, and this VLAN is available on the Ruckus device, the client's port is moved from its default VLAN to the specified VLAN. When the client disconnects from the network, the port is placed back in its default VLAN. When a client that supports 802.1X attempts to gain access through a non‐802.1X‐enabled port, it sends an EAP start frame to the Ruckus device. When the device does not respond, the client considers the port to be authorized, and starts sending normal traffic. Revision 0419 7 ‐ 11 ICX 150 Device Security and Monitoring 802.1X Configuration for Supplicant PAE • Identify the RADIUS server to the Ruckus device Ruckus(config)# radius-server host 10.157.22.99 auth-port 1812 acct-port 1813 default key mirabeau dot1x Syntax: radius-server { hostip-addr | ipv6-addr | server-name } [ auth-port num | acct-port num |default ] [ key string ] [ dot1x ] • Assigning the authentication method Ruckus(config)# aaa authentication dot1x default radius • Enable 802.1X on switch and specify ports Ruckus(config)# authentication Ruckus(config-authen)# dot1x enable Ruckus(config-authen)# dot1x enable ethernet 1/1/11 to 1/1/16 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 12 To enable 802.1X, first configure the RADIUS server, or servers, being used for authentication. Provide the IP address and the authentication port for the server, the default port is 1812. Also specify the default RADIUS key string followed by the dot1x parameter. The RADIUS key is configured globally using the radius‐server key command followed by a 1‐32 character string. Next, configure the AAA authentication parameters for 802.1X, the default method is RADIUS. Finally, configure 802.1X on the Ethernet interfaces by accessing the authentication configuration sub‐level, enabling dot1x globally, then enable the desired interface or range of interfaces. Revision 0419 7 ‐ 12 ICX 150 Device Security and Monitoring Device Monitoring Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Next we will take a look at some system monitoring tools including system logging, show tech, supportsave, and sFlow. Revision 0419 7 ‐ 13 ICX 150 Device Security and Monitoring System Logging Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Let’s start with system logging using the Syslog. Revision 0419 7 ‐ 14 ICX 150 Device Security and Monitoring System Logging (Syslog) Overview • Ruckus ICX switches maintain local Syslog database which can be viewed using the show logging command • By default, local Syslog database is erased on system reboot or power loss • By default, the local Syslog database retains 50 messages – Can be changed to 1 to 1000 messages – The change requires a reload of the device Ruckus(config)# logging buffered 1000 Ruckus(config)# write memory Ruckus(config)# exit Ruckus# reload Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 15 Devices write messages to a local system log (Syslog), which by default stores 50 messages. Older messages will be flushed to make room for new messages (FIFO). You can change the number of messages the Syslog buffer can store, the value is 1 to 1000 messages. If you make a change to the Syslog buffer, you must save the configuration and reload the device for the change to take effect. If you decrease the size of the buffer, the software clears the buffer before placing the change into effect. If you increase the size of the Syslog buffer, the software will clear some of the older locally buffered Syslog messages. Revision 0419 7 ‐ 15 ICX 150 Device Security and Monitoring Remote Syslog Servers • Defined in RFC 5424, Syslog can send event messages to a remote logging server using UDP port 514, by default • Sending to a remote server ensures logging events are saved, even after a system reboot • For example, log messages may be sent to a Syslog server at IP address 10.255.252.10 Ruckus(config)# logging host 10.255.252.10 – Up to six external servers can be configured – Messages are written to the local Syslog and the remote server Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 16 You can specify the IP address or host name of up to six external Syslog servers. When you specify a Syslog server, the Ruckus device writes the messages to both to the local system log and to the Syslog server. Using a Syslog server ensures that the messages remain available even after a system reload. The local Syslog is cleared during a system reload or reboot, but the Syslog messages sent to the Syslog server remain on the server. Revision 0419 7 ‐ 16 ICX 150 Device Security and Monitoring Real‐Time Display of Syslog Events • Enable real‐time display of Syslog messages to the serial console Ruckus(config)# logging console – Enter no logging console to turn it off • Both logging console and terminal monitor commands are required to monitor on Telnet and SSH – Command is a toggle, enter terminal monitor to turn logging on Ruckus# terminal monitor Syslog trace was turned ON SYSLOG: <9>device, Power supply 2, power supply on left connector, failed SYSLOG: <14>device, Interface ethernet 6, state down SYSLOG: <14>device, Interface ethernet 2, state up – Enter terminal monitor again to turn logging off Ruckus# terminal monitor Syslog trace was turned OFF Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 17 To view a real‐time display of Syslog messages on your console, use the logging console command at the CONFIG level. To turn this feature off, use no logging console command. If you are logged in remotely using SSH or Telnet, you will not see the Syslog messages on your screen. To see the messages, you need to configure the logging console command and then run the terminal monitor command at the Privilege EXEC level. This only applies to the current active Telnet or SSH session. Does not affect any other active session. To turn this off you toggle the terminal monitor command. Revision 0419 7 ‐ 17 ICX 150 Device Security and Monitoring Disabling Message Levels • Message levels have the following values in order of severity: – – – – Alerts (A) Critical (C) Debugging (D) Emergencies (M) – – – – Errors (E) Informational (I) Notifications (N) Warnings (W) • The example shows that all levels are being logged Ruckus# show logging Syslog logging: enabled (0 messages dropped, 0 flushes, 0 overruns) Buffer logging: level ACDMEINW, 3 messages logged level code: A=alert C=critical D=debugging M=emergency E=error I=informational N=notification W=warning • Individual message levels can be disabled Ruckus(config)# no logging buffered warning – The example disables warning (W) messages – Message levels are disabled on an individual basis – Changes also apply to messages sent to external Syslog servers Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 18 Ruckus software writes syslog messages at the following severity levels: • Emergencies • Alerts • Critical • Errors • Warnings • Notifications • Informational • Debugging In the show logging command output shown here you can see that all levels are being logged, as designated by the first letter of each level, "A" for Alerts etc. You can disable specific message levels using the no logging buffered command followed by the desired level. The example disables Warning messages from being logged. These changes also apply to messages sent to the external Syslog servers. Revision 0419 7 ‐ 18 ICX 150 Device Security and Monitoring Show Tech‐Support Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Next we will take a look at collecting technical support data using the show techsupport command. Revision 0419 7 ‐ 19 ICX 150 Device Security and Monitoring show tech-support Output • The show tech-support command displays the following information: – – – – – – – – – – Header for all the show commands Running configuration Image version Port status Port counters Static and dynamic log buffers dm statistics Boot, monitor, and system Registers information Possible stack trace – – – – – – – – – – Active stack (if applicable) Last packet (Application Data) Possible data structure MCT cluster details License details Stacking information Dot1x DHCP snooping SSH System Health Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 20 When calling Ruckus Technical Support (TAC) with an issue, the first thing they will ask for is a “show tech”. The show tech-support command displays the output of several show commands at once. This output can then be sent to Ruckus TAC. The output from this command varies depending on the device configuration. The default information includes the following information on this slide. Take some time to view this slide, then advance to the next slide • • • • • • • • • • • • • • • • • • • • Revision 0419 Header for all the show commands Running configuration Image version Port status Port counters Static and dynamic log buffers dm statistics Boot, monitor, and system Registers information Possible stack trace Active stack (if applicable) Last packet (Application Data) Possible data structure MCT cluster details License details Stacking information Dot1x DHCP snooping SSH System Health 7 ‐ 20 ICX 150 Device Security and Monitoring show tech-support Example Ruckus# show tech-support ========================================================================== BEGIN : show running-config The start of each show CONTEXT : CONSOLE#0 : CONFIG command output is TIME STAMP : 23:10:57.051 GMT+00 Tue Jan 04 2000 designated by BEGIN: HW/SW INFO : ICX7150-C12-POE/SPS08090 ========================================================================== Current configuration: ! <Output Truncated> ========================================================================== The end of each show TIME STAMP : 23:10:57.072 GMT+00 Tue Jan 04 2000 command output is END : show running-config designated by END: TIME TAKEN : 12702394 ticks (12702394 nsec) ========================================================================== ========================================================================== BEGIN : show version CONTEXT : CONSOLE#0 : HW INFO TIME STAMP : 23:10:57.072 GMT+00 Tue Jan 04 2000 HW/SW INFO : ICX7150-C12-POE/SPS08090 ========================================================================== <Output Truncated> Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 21 The format of the show tech-support output is modified to include a header for each of the subcommands which gets called from the CLI to help in automated parsing and lookup of the output. The header contains the following keywords: • BEGIN ‐ which indicates the start of the subcommand output. If the command is an internal command, a textual description of the command is displayed. • CONTEXT ‐ indicates where the subcommands are executed (INTERNAL, MP, MP‐OS, LP, or LP‐OS). • TIME‐STAMP ‐ A time stamp, with millisecond granularity, helps in determining the time difference between separate runs of the same command. • HW/SW INFO ‐ Indicates the hardware and software version information of the device. The footer contains the following information: • TIME STAMP ‐ A time stamp, with millisecond granularity, helps to determine the time difference between separate runs of the same command. If NTP or local clock is not set in a device, then header displays Epoch time in the TIMESTAMP field. Epoch time is a universal time which starts from Jan 1, 1970. Therefore, for Linux platforms, the Epoch time format is 00:00:00.000 GMT+00 Thu Jan 01 1970. For non‐Linux platforms, the Epoch time format is Jan 01 00:00:00.000. • END ‐ Indicates the sub‐command which has completed execution. • TIME TAKEN ‐ Indicates the total time taken in nanoseconds for the command execution. In addition to the header, the show clock command is run at the beginning and the end of the show tech for elapsed time calculation. Revision 0419 7 ‐ 21 ICX 150 Device Security and Monitoring show tech-support Options • There are several options that can be added to the output of show tech-support show tech-support [ acl | cluster | cpu | l2 | l3 { ipv4-uc | ipv6-uc } | license | memory | multicast | multicast6 | openflow | packet-loss | poe | stack ] – For example, the packet-loss option can be used to add packet statistic debug information to the output Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 22 Additional options can be added to the show tech output that may be specifically related to the type of issue you are collecting data for. These include: • acl – Generates system and debugging information specific to ACL configurations and counters. • cluster – Generates system and debugging information specific to cluster configurations. • cpu – Generates CPU‐related information. • license – Generates license‐related information. • l2 – Generates system and debugging information specific to Layer 2 configurations. • l3 – Generates system and debugging information specific to Layer 3 configurations. • memory – Generates memory‐related information of the device. • multicast – Generates system and debugging information specific to Layer 2 and Layer 3 multicast configurations. • multicast6 – Generates system and debugging information specific to Layer 2 and IPv6 Layer 3 multicast configurations • openflow – Displays Openflow related details. • packet‐loss – Generates packet statistics‐related debugging information. • poe – Generates system and debug information related to Power over Ethernet configurations. • stack – Generates system and debugging information specific to stacking configurations. Revision 0419 7 ‐ 22 ICX 150 Device Security and Monitoring SupportSave Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved When the information in the show tech-support is not enough, TAC may have you run a SupportSave. Revision 0419 7 ‐ 23 ICX 150 Device Security and Monitoring Supportsave • Supportsave is useful when collecting a large amount of debug information for troubleshooting purposes – Often requested Ruckus technical support when troubleshooting a issue • Advantages over a show tech – Allows you add custom commands (show or debug) to collect specific data that is not included in show tech-support – Allows the transfer of collected data to an external server such as a Trivial File Transfer Protocol (TFTP) server • If you add a large number of custom commands to the supportsave, it may collect a large amount of data – Try not to collect a supportsave during peak network activity Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 24 Another useful troubleshooting tool is Supportsave. By default the supportsave command collects the same information found in the show tech-support command, but it allows you to add custom show and debug commands to collect specific data not found in a show tech-support. If you add a large number of custom commands to the Supportsave, it may greatly increase the file size. If possible, do not collect the Supportsave during peak network activity. When supportsave is executed, it collects all the required logs and information and saves it to an external TFTP server. On an ICX stack, you do not need to run the supportsave command on all the members in a stack, you only need to run it from the active controller. The active controller will collect logs from all stack members and send them to the TFTP server. Revision 0419 7 ‐ 24 ICX 150 Device Security and Monitoring Supportsave • Supportsave parameters supportsave [all | os | platform | l2 | l3 | custom | core | system | infra] [display | tftp_server_IP] tftp_server_relative_pathname [user_tag] – Specify which logs to collect • all ‐ all related log files • os ‐ operating system (OS) related information • platform ‐ platform related information • l2 ‐ Layer 2 related information • l3 ‐ Layer 3 related information – Specify output destination (display or TFTP server) • Options include – user_tag – a string to uniquely identify the supportsave file – tftp_server_IP – TFTP server where logs are uploaded Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 25 As previously mentioned, by default, the Supportsave collects the same information found in the show tech‐support, but it can be customized to collect even more by specifying which logs or customer commands to collect. By using the custom parameter, you can enter a list of custom command data to collect. A few of the different log types are listed here, for a full list, please refer to the ICX documentation on the Ruckus website. Once you have specified the logs and command information to collect, you can use the user_tag parameter to name the Supportsave file, and specify the IP address of the TFTP server. Revision 0419 7 ‐ 25 ICX 150 Device Security and Monitoring Supportsave Limitations • Only one supportsave can be executed at a time • When supportsave is being collected, other CLIs are not allowed on that session – Other sessions can be used to execute other commands • Use supportsave show to view the status of the file collection • Use supportsave cancel to terminate the file capture Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 26 At any given time, only one Supportsave can be run. If you have a Telnet session and run the supportsave command you will see a progress bar indicating the progress of the file collection. Once the Supportsave is run, the Telnet session is blocked for other commands. However, other Telnet sessions to the same switch can be used to execute commands. The supportsave show command gives the status of the file collection, and supportsave cancel will terminate file capture. Revision 0419 7 ‐ 26 ICX 150 Device Security and Monitoring sFlow Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Our final topic in this module is sFlow. Revision 0419 7 ‐ 27 ICX 150 Device Security and Monitoring sFlow Overview • sFlow is a Industry standard system for collecting information about traffic flow patterns and quantities for a set of devices – Ruckus supports sFlow v5 by default(RFC 3176) • Configure an ICX device to perform the following tasks: – Sample packet flows – Collect packet headers from sampled packets to gather ingress and egress information on these packets – Compose flow sample messages from the collected information – Relay messages to an external device known as a collector Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 28 sFlow is a industry standard system for collecting information about traffic flow patterns and quantities of packets for a set of devices. Ruckus supports sFlow version 5, which replaces version 4 in RFC 3176. You can configure a Ruckus device to perform the following tasks: • Collect sample packet flows. • Collect packet headers from sampled packets to gather ingress and egress information about these packets. • Compose flow sample messages from the collected information. • Relay messages to an external device known as a collector. Revision 0419 7 ‐ 28 ICX 150 Device Security and Monitoring sFlow Deployment • Sample data is collected from inbound traffic on ports enabled for sFlow • Real time at central collector(s) – Support for up to 4 collectors – IPv4 and IPv6 supported Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 29 Ruckus ICX devices support sFlow packet sampling of inbound traffic only. These devices do not sample outbound packets. However, ICX devices support byte and packet count statistics for both traffic directions. sFlow is supported on all Ethernet ports (10/100 Mbps, 1 GbE, and 10 GbE). The ICX has support for up to 4 sFlow collectors, which can be configured by IPv4 and IPv6 addresses. Revision 0419 7 ‐ 29 ICX 150 Device Security and Monitoring sFlow Components • Sampling rate – Is the average ratio of the number of packets incoming on an sFlow‐enabled port, to the number of flow samples taken from those packets (1 in every N packets) • sFlow sampling requires increased LP CPU usage and can affect switch performance in some configurations – Best Practice • Begin with a conservative capture ratio and scale up as needed to ensure that the management CPU is not overwhelmed • Polling interval – The polling interval defines how often sFlow byte and packet counter data for a port is sent to the sFlow collectors Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 30 The sampling rate is the average ratio of the number of packets incoming on an sFlow‐ enabled port. The sampling rate is a fraction in the form of 1/N, meaning that, on average, one out of every N packets is sampled. The sflow sample command at the global CONFIG level or port level specifies the value of N, the denominator of the fraction. Thus a higher number for the denominator means a lower sampling rate since fewer packets are sampled. Likewise, a lower number for the denominator means a higher sampling rate because more packets are sampled. For example, if you change the denominator from 512 to 128, the sampling rate increases, because four times as many packets will be sampled. It is important to note that setting a high sampling rate can have a detrimental result in switch performance. The polling interval is how often sFlow byte and packet counter data for a port is sent to the sFlow collector. The sFlow collector is the external device to which you are exporting the sFlow data. If multiple ports are enabled for sFlow, the Ruckus device staggers transmission of the counter data to smooth performance. For example, if sFlow is enabled on two ports and the polling interval is 20 seconds, the Ruckus switch will send counter data every ten seconds with data for one of the sFlow enabled ports. Revision 0419 7 ‐ 30 ICX 150 Device Security and Monitoring Sflow Configuration • Enable sFlow on the switch Ruckus(config)# sflow enable • Specify sFlow collectors Ruckus(config)# sflow destination 10.10.10.1 • Change the polling interval and sampling rate (optional) – Globally Ruckus(config)# sflow polling-interval 30 Ruckus(config)# sflow sample 6144 – Individual port sample rates Ruckus(config-if-e1000-1/1/1)# sflow sample 4096 • Configure sFlow collection on interfaces Ruckus(config)# interface ethernet 1/1/1 to 1/1/8 Ruckus(config-mif-1/1/1-1/1/8)# sflow forwarding Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 31 The process for configuring sFlow starts with enabling sFlow globally. Next, configure the sFlow collectors, up to 4 of them, using the sflow destination command followed by the IP address of the collector. You have to enter this command for each collector. The default UDP port used to listen for sFlow data is 6343. This can be changed by specifying a port after the IP address of the destination. Syntax: [no] sflow destination ip-addr [dest-udp-port] Next, configure the polling interval and sampling rate. The default polling interval is 20 seconds. You can change the interval to a value from 1 to any higher value. The interval value applies to all interfaces on which sFlow is enabled. If you set the polling interval to 0, counter data sampling is disabled. Syntax: [no] sflow polling-interval secs You can change the default global sampling rate. You also can change the rate on an individual port basis, overriding the global sampling rate. The default rate is 2048. Care should be taken in choosing a sampling rate. If you change the denominator from 2048 to 512, for example, the sampling rate increases four times. In other words, the lower the number chosen for the sample, the higher the increase in system utilization. Syntax: [no] sflow sample num Finally, configure sFlow forwarding on the interfaces. Revision 0419 7 ‐ 31 ICX 150 Device Security and Monitoring Summary • You should now be able to: – Use Authentication, Authorization, and Accounting (AAA), RADIUS and TACACS+ to secure an ICX device – Enable 802.1X to provide port‐based network access control using authentication – View system log (Syslog) messages to monitor an ICX device – Collect show tech‐support or Supportsave outputs – Use sFlow to collect traffic information Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 32 This concludes the Device Security and Monitoring module. You should now be able to: • • • • • Revision 0419 Secure an ICX device using AAA Configure 802.1x on Ethernet interfaces Describe the different levels of Syslog messages Explain the difference between Show Tech‐support and Supportsave files Describe how sFlow can collect traffic flowing through an ICX device 7 ‐ 32 ICX 150 Device Security and Monitoring End of Module 7: Device Security & Monitoring Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved This is the end of Module 8, Device Security and Monitoring. Revision 0419 7 ‐ 33 ICX 150 Revision 0419 Device Security and Monitoring 7 ‐ 34 ICX 150 Layer 2 Fundamentals Module 8: Layer 2 Fundamentals Revision 0419 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Welcome to the ICX 150 Implementor course. This course consists of 12 modules and is based on the FastIron 8.0.90 software release. Subjects discussed in this course concentrate on the Implementor functions within a network environment however does not represent all functions or capabilities of an ICX switch. In this module we will discuss Layer 2 Fundamentals. So, let’s get started Revision 0419 8‐1 ICX 150 Layer 2 Fundamentals Objectives • After completing this module, you should be able to: – – – – – Configure VLANs and associate tagged and untagged ports Describe and configure Virtual Routing Interfaces (VE ports) Describe Link Aggregation Groups and the supported types on ICX devices Configure LAGs on ICX devices Explain how to effectively manage LAGs along with member ports of a LAG Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved After completing this module, you should be able to: Configure VLANs and associate tagged and untagged ports Describe and configure Virtual Routing Interfaces (VE ports) Describe Link Aggregation Groups and the supported types on ICX devices Configure LAGs on ICX devices Explain how to effectively manage LAGs along with member ports of a LAG Revision 0419 8‐2 ICX 150 Layer 2 Fundamentals VLAN Configuration Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved We’ll start with how to configure VLANs on the Ruckus ICX devices. Revision 0419 8‐3 ICX 150 Layer 2 Fundamentals 149_VLANs.png VLANs • ICX devices support port‐based and protocol‐based VLANs – The Default VLAN is 1 – By default, all interfaces belong to VLAN 1 – The Default VLAN can be changed using the command: default-vlan-id vlanid For more details on ICX VLANs, please refer to the Ruckus FastIron Layer 2 Switching Configuration Guide, on: • VLAN ID range is 1 to 4095 www.ruckuswireless.com. – Reserved VLANs: 4087, 4090, and 4093 for Ruckus internal, and VLAN 4094 for Single STP Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved ICX devices support port‐based and protocol‐base VLANs. By default VLANs are port‐based and this module focuses on port‐based VLANs. For more details on ICX VLANs, please refer to the Ruckus FastIron Layer 2 Switching Configuration Guide, on www.ruckuswireless.com. On all ICX devices, VLAN 1 is considered the Default VLAN and it is a port‐based VLAN. All ports start out as members of VLAN 1. The Default VLAN can be changed using the default-vlan-id command. Valid VLAN IDs are 1 through 4095, though some IDs are reserved. VLAN ID 4094 is reserved for Single Spanning Tree, and VLANs 4087, 4090, and 4093 are reserved for Ruckus internal functions. Revision 0419 8‐4 ICX 150 Layer 2 Fundamentals VLANs with 802.1Q Tagging • VLAN tagging allows multiple VLANs to span switches over a single physical link – When VLANs span multiple switches, a trunk data link is required between the switches providing VLAN tagging • Provides VLAN membership information within the frame when forwarded to other devices • Example Configuration: Ruckus2(config)# vlan 10 Ruckus2(config-vlan-10)# Ruckus2(config-vlan-10)# Ruckus2(config-vlan-20)# name GRAY tagged e 1/1/9 vlan 20 tagged e 1/1/9 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved VLAN tagging is necessary when VLAN traffic is forwarded on the same link between two switches know as a trunk. Frames moving between switches are tagged so that the next switch in the traffic flow path knows the destination VLAN of the frame. In any part of the network that are or need to be VLAN‐aware include VLAN tags. The VLAN tag represents the VLAN membership of the frame's port or the port/protocol combination, depending on whether the network uses port‐based or port‐and‐protocol‐based VLAN classification. The VLAN ID that is in the tag enables each device that receives the frame to determine which VLAN the frame belongs to. Each frame must be distinguishable as being within exactly one VLAN. A port that is a member of only one VLAN, like a end device port, can be associated with a VLAN however it is added as untagged. We will discuss untagged ports next. Creating VLANs is done at the global CONFIG level using the vlan command followed by a VLAN ID. Again, valid IDs are from 1 to 4095. Optionally, you can configure a name for each VLAN using the name parameter. VLAN names can be up to 32 characters long, and can have spaces as long has the name is put in double quotations. The next step is to add the ports to the VLAN as either tagged or untagged. Here we have added interface 1/1/9 as tagged to both VLAN 10 and VLAN 20. Notice that VLAN 10 was configured with a name, but VLAN 20 was not. Remember, VLAN names are optional. Revision 0419 8‐5 ICX 150 Layer 2 Fundamentals VLANs without 802.1Q Tagging 153_vlans‐no‐tagging.png • Without VLAN tagging, when multiple VLANs are configured on a switch: – – – – Each VLAN requires dedicated uplinks for each VLAN between switches Bandwidth on the dedicated ports might not be fully utilized Higher cost due to port requirements Impossible if a high number of VLANs Untagged VLAN are configured • Example Configuration: Association association Ruckus2(config)# vlan 10 Ruckus2(config-vlan-10)# untagged e 1/1/9 Ruckus2(config-vlan-10)# vlan 20 Ruckus2(config-vlan-20)# untagged e 1/1/12 Ruckus2(config-vlan-20)# vlan 4 Ruckus2(config-vlan-4)# untagged e 1/1/12 Error! Port 1/1/2 is already untagged member of non default VLAN 3 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved It is possible for connected switches to have a port associated with a singe VLAN which will send and receive packets with no tag. When doing so, these are considered untagged frames and the end device is unaware of its VLAN association and simply forwards and receives untagged frames. For VLAN consistency between the two devices the directly connecting interfaces must configured on the same VLAN and traffic associated with that particular VLAN is being forwarded. Optionally if you want to make a VLAN migration each end can be different associated with different VLANs. Because the VLAN ID is not being included in the frames being forwarded each device will simply associate the incoming traffic to the VLAN the incoming port is assigned to. As you can see by this example, each VLAN requires a dedicated uplink which is not very efficient or scalable, and in most cases the ports are under‐utilized. The configuration of untagged interfaces use the untagged command before the associated port the VLAN is being assigned to. Notice in this example, we have two VLANs (10 and 20), being applied to two different interfaces which are being added as untagged. This is because only one VLAN can be associated as untagged on an interface otherwise you will receive an error as we see when trying to apply Interface 12 as an untagged member of VLAN 4. Revision 0419 8‐6 ICX 150 Layer 2 Fundamentals Mixed VLAN Traffic (tagged/untagged) • Ports are members of the default VLAN (default VLAN 1) • Ports can be an untagged member of 1 VLAN and a tagged member of 1 or more VLANs • Ports when assigned as tagged in a VLAN will remain untagged in its current VLAN assignment – Port has to be exclusively removed as an untagged member of a VLAN to drop untagged frames Ruckus(config)# vlan 1 Ruckus(config-vlan-1)# no untagged ethernet 1/2/2 Ruckus(config-vlan-1)# no untagged ethernet 1/3/1 Error! Port 1/3/1 is member of default VLAN only. Cannot remove Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Configuring an interface to be a tagged member of the non‐default VLAN allows it to accept VLAN tagged frames. Any untagged frames received on the same interface are accepted and forwarded within its default VLAN membership. In previous firmware version prior to FastIron 8.0.80 this process was configured using the dual mode command. In FastIron 8.0.80 or newer when an untagged membership of an interface is removed from a non‐default VLAN, the interface will be added back to the default VLAN as an untagged interface. Additionally an interface will be moved to the default VLAN when the last non‐ default VLAN is disassociated from the interface (tagged or untagged). In order for an interface to be removed from the default VLAN it has to be associated with a non‐default VLAN first otherwise you will receive an error when trying to remove it from its default VLAN as shown. Revision 0419 8‐7 ICX 150 Layer 2 Fundamentals Multi‐range VLAN – You can specify the VLAN number and range using the to keyword between two num options that specify the VLAN ID • To create a continuous range of VLANs, enter command such as the following. Ruckus(config)# vlan 2 to 7 Ruckus(config-mvlan-2-7)# • Discontinuous VLANs Ruckus(config)# vlan 2 4 7 Ruckus(config-mvlan-2*7)# • Continuous and discontinuous VLANs together Ruckus(config)# vlan 2 to 7 20 25 Ruckus(config-mvlan-2*25)# Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Similar to configuring a range of interfaces, VLANs can be configured independently or a range of VLANs if needed. Here are a few examples Revision 0419 8‐8 ICX 150 Layer 2 Fundamentals Virtual Routing Interfaces • Integrated Switch Routing (ISR) – Ability to route between VLANs with virtual routing interfaces (VEs) • Virtual Interfaces (VE) are logical routing interfaces used to route L3 protocol traffic between VLANs – Configure a VE on each VLAN that needs routing capabilities • Routing parameters are configured on the VE, allowing for routing outside the local switch – Parameters include: • IPv4/v6 addresses • Static routing associated with the VE (next‐hop) • Routing protocols such as OSPF providing dynamic routing to and from the VLAN • L3 redundancy protocols such as VRRP/VRRP‐E Values not bound to the same ID # – It is required that the switch run ICX routing software for this feature to work Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Ruckus allows the ability to route between VLANs which is called Integrated Switch Routing (or ISR). ISR enables VLANs configured on the ICX to forward traffic between VLANs by routing traffic using Layer 3 interfaces. ISR eliminates the need for an external router by routing between VLANs internally using virtual routing interfaces known as Virtual Ethernet or VEs. For routing between VLANs to take place a separate VE belonging to a different Layer 3 subnet to be associated to each VLAN you want to route packets. Routing parameters, , next‐hop static routing, routing protocols, and Layer 3 redundancy protocols can be configured on the VE Note that in our example, VLAN 22 does not have the same ID value as its router interface (ve 20). When configuring these parameters they are not required to match, however it is a best practice to do so. Revision 0419 8‐9 ICX 150 Layer 2 Fundamentals Configuring Routable VLANs • Configure port‐based VLAN – Associate tagged or untagged ports – Define Virtual Interface (VE) Ruckus(config)# vlan 10 Ruckus(config-vlan-10)# tagged e 1/1/1 to 1/1/2 Ruckus(config-vlan-10)# router-interface ve 10 • Enter into VE interface configuration – Assign an IP address – Associate routing protocols Ruckus(config)# interface ve 10 Ruckus(config-ve-1)# ip address 10.1.1.1/24 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved First steps to allow routing between VLANs is to create and associate VE interface to a VLAN and then assign it an IP address. Create the VE under the VLAN configuration using the router-interface ve command with a VE ID. For ICX devices, valid VE numbers are 1 to 4095. However, the total number of virtual routing interfaces that are configured must not exceed the system‐max limit. Once the VE interface is created, enter into the VE configuration to set the IP address and any other routing parameters. The routing parameters and the syntax for configuring them are the same as when you configure a physical interface for routing. ICX devices require you to assign interfaces to a VLAN before you can enter into the VE configuration level of the CLI. Although you can see the VE configured you will receive an error Error‐invalid ethernet interface number, until ports are assigned to the VLAN. The example shown here configures the VE interface for VLAN 10. ICX devices use the lowest MAC address on the device (the MAC address of port 1/1/1) as the MAC address for all ports within all virtual routing interfaces you configure on the device. Revision 0419 8 ‐ 10 ICX 150 Layer 2 Fundamentals Configuring Routable VLANs (cont.) Ruckus(config)# vlan 2 Ruckus(config-vlan-2)# untag eth 1/1/1 to 1/1/12 Ruckus(config-vlan-2)# router-interface ve 2 Ruckus(config-vlan-2)# interface ve 2 Ruckus(config-vif-2)# ip address 192.123.22.1/24 Ruckus(config-vif-2)# vlan 22 Ruckus(config-vlan-22)# untag eth 1/1/13 to 1/1/24 Ruckus(config-vlan-22)# router-interface ve 20 Ruckus(config-vlan-22)# interface ve 20 Ruckus(config-vif-20)# ip address 192.123.44.1/24 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Here we have the configuration examples for VLANs 2 and 22. Note that VLAN 22 does not have the same ID value as its router interface (ve 20). These are not required to match however it is best practice to do so. Revision 0419 8 ‐ 11 ICX 150 Layer 2 Fundamentals Link Aggregation Groups (LAG) Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Our next topic is Link Aggregation Groups, or LAGs. Revision 0419 8 ‐ 12 ICX 150 Layer 2 Fundamentals Link Aggregation Groups (LAG) • Link Aggregation Groups (LAG) allow the combining of multiple Ethernet links into a larger logical trunk • The switch treats the LAG as a single logical link – Increases bandwidth, stability, and port failure protection • LAG member ports must connect to the same adjacent switch – LAG requirements may vary for different platforms, such as the number of links in the LAG, specific port boundaries, etc. – Always check what is supported at both ends • The benefits of link aggregation: – – – – Increased bandwidth (The logical bandwidth can be dynamically changed as the demand changes) Increased availability Load sharing Rapid configuration and reconfiguration Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Link Aggregation Groups or LAGs have many names, such as trunks, NIC teaming, and port channels. In any case, LAGs allow the combining of multiple Ethernet links into a larger logical trunk. This provides benefits to the link by increasing its overall bandwidth, increases stability of the overall link since it is not dependent on just a single ports health which also provides increase failure protection. In a LAG, individual port members can fail but do not cause traffic interruption since other remaining healthy port members can still forward traffic. For ports to participate in a LAG, the physical links must have similar characteristics and must connect to the same adjacent switch or group of switches represented as one like in Multi‐Chassis‐Trunking. LAG requirements may vary for different platforms, such as the number of member in the LAG, specific port boundaries, etc., always check what is supported on the devices on both ends of the LAG. Revision 0419 8 ‐ 13 ICX 150 Layer 2 Fundamentals LAG Creation Rules • All ports configured in a LAG must have these same attributes – – – – – VLAN membership and port tag‐type (tagged/untagged) Port speed and duplex QoS priority L3 configuration (member ports) or Policy Based Routing (PBR) Are not configured as member ports of another LAG • Ruckus provides support for static and dynamic LAGs on the same switch • Starting in FastIron 8.0.61, all member ports of the LAG are treated as secondary ports – Physical port can be added or removed from the LAG without tearing down the LAG – LAG virtual interface is created when a LAG is configured – A mode called LAG virtual interface is introduced and the properties of the LAG can be modified using the respective commands in the LAG virtual interface mode (similar to an Ethernet interface) – The first physical port added to the LAG becomes the MAC provider for the LAG virtual interface Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved When combining ports into a LAG, the ports must have same attributes. LAG formation rules are checked when a new port is associate with the LAG. Items that will be checked are: • • • • VLAN membership and port tag‐type (tagged/untagged) Port speed and duplex QoS priority Layer 3 configuration. member ports cannot have L3 or Policy Based Routing (PBR) configured ICX devices support the use of static and dynamic LAGs on the same device. Revision 0419 8 ‐ 14 ICX 150 Layer 2 Fundamentals LAG Types • ICX devices support the following LAG types: – Dynamic LAG – uses Link Aggregation Control Protocol (LACP), to maintain aggregate links over multiple ports • LACP PDUs are exchanged between ports on each device to determine if the connection is still active • LAG shuts down ports whose connection is no longer active – Static LAG – groups are manually‐configured aggregate links containing multiple ports – Keep‐alive LAG – a single LACP port connection • Preferred method for detecting uni‐directional links across multi‐vendor devices instead of link keep‐alive (UDLD) • If the connection is no longer active, the ports are blocked Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved ICX devices support three types of LAGs. The first is a Dynamic LAG: – a dynamic LAG uses the Link Aggregation Control Protocol (LACP) to maintain aggregate links over multiple ports. LACP PDUs are exchanged between ports on each device to determine if the connection is still active. The LAG shuts down ports whose connection is no longer active. The second is a Static LAG. In a static LAG, groups are manually‐configured aggregate links containing multiple ports. The third type of LAG is a Keep‐alive LAG: this type of LAG is a single LACP port connection which is based on a standard rather than on a proprietary solution. It is the preferred method for detecting unidirectional links across multi‐vendor devices instead of link keep‐alive (UDLD). If it is determined that the connection is no longer active, the ports are blocked. This course focuses on the configuration of static and dynamic LAGs. Revision 0419 8 ‐ 15 ICX 150 Layer 2 Fundamentals Dynamic LAG • Dynamic link aggregation uses Link Aggregation Control Protocol (LACP), IEEE standard 802.3ad – Used to control the bundling of several physical ports to form a single logical link • LACP allows a device to negotiate an automatic bundling of links by sending Link Aggregation Control Protocol Data Units (LACP PDUs) to a directly connected device – Both devices must be configured to use LACP Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Dynamic LAGs use the IEEE 802.3ad standard for link aggregation. LACP is a mechanism for allowing ports on both sides of a redundant link to communicate to form a trunk. When link aggregation is enabled on a group of ports, the Ruckus ports can negotiate with the remote end ensuring proper configuration of each port member including verifying the physical ports are properly connected all performed by LACP on both devices. Ruckus ports follow the same configuration rules for dynamically created aggregate links as they do for statically configured LAGs. Revision 0419 8 ‐ 16 ICX 150 Layer 2 Fundamentals Static LAGs • A static LAG does not use LACP and essentially enables the ports to join a port channel • Static configuration is used when connecting to another switch or device that does not support LACP • When using a static configuration, a cabling or configuration mistake by either end of the LAG could go undetected and thus cause undesirable network behavior Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Static LAGs do not use a protocol to establish the connection like LACP, instead they are manually‐configured aggregate links containing multiple ports and assumes that the ports on the remote end are properly configured. This can lead to possible problems like wrong ports connected between the devices etc. since there is no verification process taking place. Static configuration is useful when connecting to another switch or device that does not support LACP. Because a static LAG does not use LACP, it essentially forces the ports to join a port channel, and the links come up automatically regardless of a configuration mistake. Revision 0419 8 ‐ 17 ICX 150 Layer 2 Fundamentals ICX LAG Specifications • ICX switches provide a large number of LAGs that can be configured on a switch or a switch stack with up to 16 port members per LAG Model Maximum number of LAGs Valid number of ports in a group Static LACP ICX 7850 ICX 7750 ICX 7450 ICX 7250 ICX 7650 256 256 1 to 16 NOTE The Ruckus ICX device can scale up to a maximum of 2048 LAG ports only ICX 7150 128 128 1 to 8 Ruckus ICX 7150 can scale up to 1024 and is also limited to the number of ports on the device Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved ICX switches provide a large number of LAGs that can be configured on a switch or a switch stack with up to 16 port members per LAG on all but ICX 7150 switches. Revision 0419 8 ‐ 18 ICX 150 Layer 2 Fundamentals LAG Configuration Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Now that we understand the benefits and the need for LAGs, let’s take a look at the LAG configuration. Revision 0419 8 ‐ 19 ICX 150 Layer 2 Fundamentals LAG Configuration Steps Create the LAG • The following configuration procedures are used to configure a LAG 1. 2. 3. 4. Creating a Link Aggregation Group (static, dynamic, keep‐alive) Adding Ports to a LAG Configuring the properties of the LAG on the LAG virtual interface (vLAG) Configuring LACP operation mode as active or passive (dynamic option) • The LACP operation mode is Active by default Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved The configuration of a LAGs starts with defining a LAG and identifying if it will be a dynamic, static or a keep-alive configured LAG. Next the LAG port members will be identified. Once the first port is associated with the LAG it is automatically deployed and the LAG virtual interface is automatically created. As a result you can now navigate to the newly created virtual LAG interface and configure parameters which are applied to all port members of the LAG. Other parameters that pertain to the LAG formation can be configure such as its active or passive mode when using LACP and others. Revision 0419 8 ‐ 20 ICX 150 Layer 2 Fundamentals LAG Configuration Steps Create the LAG 1. Create a LAG by giving it a name and defining it as static, dynamic or keep‐alive Ruckus(config)# lag blue1 dynamic id auto Syntax: [no] lag <name> [static | dynamic | keep-alive] [id <number/auto>] – The ID parameter is optional, value is 1 to 256 – The LAG ID can be automatically generated and assigned to a LAG using the auto option – LAG IDs are unique for each LAG in the switch 2. Add ports to the LAG Ruckus(config-lag-blue1)# ports e 1/1/9 to 1/1/11 LAG blue1 deployed successfully! – All port parameters must match for ports to be added to the LAG – Upon the addition of the first physical port to a LAG, a LAG virtual interface is created and is available for user configuration Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved The configuration of a LAGs starts with defining a name for the LAG and entering the keyword dynamic or static, depending on which type of LAG you are configuring followed by id and the id value. The auto parameter is optional and provides an id automatically. This example creates a LAG named “blue1” as dynamic, but it could easily be configured as static using the static keyword since they are configured in the same manner. The maximum length for a LAG name is 64 characters. The name can have spaces if you enclose the name in quotations. The LAG ID is optional, and valid IDs are 1 to 256. If you do not specify a LAG ID, the system generates one automatically when the auto option is used. LAG IDs are unique for each LAG in the local system, if you enter a duplicate ID, you will receive an error, and be told the next available ID: Error: LAG id 123 is already used. The next available LAG id is 2. The second step is to add your ports to the LAG, using the ports ethernet command. As mentioned previously, all port parameters must match for the ports to be successfully added to the LAG. Revision 0419 8 ‐ 21 ICX 150 Layer 2 Fundamentals LAG Configuration Steps (cont.) Configuring the LAG virtual interface 3. Configure a LAG virtual interface which allows you to enter the LAG virtual interface mode Ruckus(config)# interface lag 1 Ruckus(config-lag-if-lg1)# • You can configure the properties of the LAG on the LAG virtual interface – Changes made to the LAG virtual interface is propagated to all port members in the LAG • Examples of Layer 2 LAG configurations:1 Ruckus(config-lag-if-lg11)# Ruckus(config-lag-if-lg11)# Ruckus(config-lag-if-lg11)# Ruckus(config-lag-if-lg11)# Ruckus(config-lag-if-lg11)# spanning-tree 802-1w admin-pt2pt-mac spanning-tree root-protect speed-duplex stp-bpdu-guard stp-protect Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved The third step is to enter into the LAG virtual interface and configure LAG parameters. All configurations are done on the LAG virtual interface are then applied to all member ports in the LAG. When viewing the running configuration, it will show the LAG virtual interface similar to physical Ethernet ports in the configuration. Static LAGs are configured in the same manner as shown including port membership and layer 2 options. Footnote 1: For a complete list of configurations that can be used under the LAG virtual interface, refer to the ICX layer 2 configuration guide. Revision 0419 8 ‐ 22 ICX 150 Layer 2 Fundamentals LAG Virtual Anchor Speed • When ports are added to a LAG without manually configured speed: – LAG module chooses first “UP” ports operational speed as anchor speed • anchor speed can change depending on port bring‐up sequence – Configuration speed will be compared when port is added to a LAG against LAG’s anchor speed – LAG ports which comes up with different operational speed as compared to LAG anchor speed will be error disabled • LAG ports will be error disabled with reason lag-operSpeed-mismatch • Error disabled LAG port can be recovered using below methods, – Configuring auto error disable recovery for lag‐operSpeed‐mismatch reason • Port flapping can occur corrective action is taken to match operational speed against anchor speed – Disable and Re‐enabling the LAG interface – Applying an explicit speed configuration for LAG interface • It is a good practice to manually set speed of LAG under the vLAG interface if possible Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved When the LAG moves to operational state it will establish an anchor speed which is chosen by the first physical ports operation speed. It is important to note that if member ports are not manually set to the same port speed (not capable speed) the anchor speed can change based on the first up LAG ports operational speed. The reset of the anchor speed could potentially cause port of the LAG to become error disabled if a member is not capable of the anchor speed. Therefore it is a good practice to manually set speed of LAG under the vLAG interface establishing the expected anchor speed of the LAG. Revision 0419 8 ‐ 23 ICX 150 Layer 2 Fundamentals LAG Speed Configuration • To ensure LAG speed consistency between disable state and reboots: – Manually configure the vLAG port with a set speed which is applied to all members Ruckus(config-lag-if-lg1)# speed-duplex 1000-full – The configured speed will become the anchor speed for the LAG – Error message will be created if speed configured is not supported by at least one of the physical interfaces under LAG • Port will be err‐disabled if it cannot support the configured speed Ruckus(config-lag-if-lg10)# show interface ethernet 2/1/3 GigabitEthernet2/1/3 is ERR-DISABLED (lag-operSpeed-mismatch), line protocol is down Port down for 55 second(s) Hardware is GigabitEthernet, address is cc4e.246c.d7a9 (bia cc4e.246c.c982) Configured speed auto, actual unknown, configured duplex fdx, actual unknown Configured mdi mode AUTO, actual unknown Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Here is an example of manually setting the LAG anchor speed under the vLAG interface. Once configured the LAG speed will be consistent lowering the chance that member ports will become error disabled due to an anchor speed mismatch. Revision 0419 8 ‐ 24 ICX 150 Layer 2 Fundamentals Adding LAG to VLAN • VLAN association is applied to Virtual LAG interface Ruckus(config)# vlan 100 Ruckus(config-vlan-100)# untagged lag 1 Added untagged port(s) lag lg1 to port-vlan 100 • VLAN membership configured on vLAG is applied to all port members Ruckus# show interface e 1/1/9 GigabitEthernet1/1/9 is up, line protocol is up <Output Truncated> Untagged member of L2 VLAN 100, port state is FORWARDING <Output Truncated> • VLAN membership configuration is not allowed on physical port members Ruckus(config-vlan-100)# tagged e 1/1/9 Error - Vlan 100 Operation on Lag 1 Secondary port 1/1/9 is not Allowed. Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved LAGs VLAN membership is applied to the virtual LAG interface and is dynamically applied to all physical port members. Member ports will reflect the VLAN membership when displaying the physical port details. If VLAN membership is applied to port members you will receive an error. Revision 0419 8 ‐ 25 ICX 150 Layer 2 Fundamentals Disabling and Naming Physical Ports Within a LAG • You can disable an individual port within a LAG using the disable command within the LAG configuration Ruckus(config)# lag blue1 dynamic id 1 Ruckus(config-lag-blue1)# disable ethernet 1/1/9 • Configuration to physical member interfaces is disabled – Attempts to enter into the physical port changes to LAG configuration context Ruckus(config)# int e 1/1/9 Ruckus(config-lag-if-lg1)# • Assigning a name to a physical port within a LAG – Use the port-name command within the LAG configuration as shown in the following Ruckus(config)# lag blue1 Ruckus(config-lag-blue1)# Ruckus(config-lag-blue1)# Ruckus(config-lag-blue1)# dynamic id 1 port-name "Ruckus lag 1/3" ethernet 1/1/9 port-name "Ruckus lag 2/3" ethernet 1/1/10 port-name "Ruckus lag 3/3" ethernet 1/1/11 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved It is important to understand that any enabling/disabling of any of the physical port members of the LAG or the disabling of the LAG virtual port will disable the entire LAG. Disabling of an individual port member within a LAG is performed under the LAG configuration using the disable command. Ports disabled in this manner are still LAG port members however are not forwarding data for the given LAG. Enabling of the physical port in the LAG can be achieved using the enable ethernet command as well. Once a physical port is a member of a LAG configuration on the individual port is very limited. Therefore any configuration applied to the physical port is accomplished under the LAG including naming of the physical port. The name can be up to 255 characters long port name with spaces must be enclosed within double quotation marks Revision 0419 8 ‐ 26 ICX 150 Layer 2 Fundamentals Renaming or Removing Ports From an Existing LAG • Renaming an existing LAG – – – – Changing the name of an existing LAG will not cause any impact on the functionality of the LAG Rename the LAG using the update-lag-name command within the LAG configuration mode New name provided must be unique and unused LAG configuration mode will exit after successful name update Ruckus(config)# lag blue1 dynamic id 1 Ruckus(config-lag-blue1)# update-lag-name blue – LAG “blue1” name is now updated to the name “blue” • Removing a physical port from an existing LAG Ruckus(config)# lag blue static id 1 Ruckus(config-lag-blue)# no ports ethernet 1/1/9 – When you remove a port from an operational LAG, the physical port is disabled automatically Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Naming and identifying LAG and ports are very important and sometimes name change is required. ICX devices allow this without having to disable or recreate the LAG by using the update‐lag‐name command. Enter into the lag under its current name and issue this command to update the lag name to your preference. Other LAG maintenance might require you to remove physical ports from an existing LAG which can be performed while the LAG is still deployed. When using the no port ethernet command under the LAG stanza allows the port to be removed. To eliminate the possibility of loops in the environment the removed port is immediately disabled. Also new ports can be added to a LAG as well keeping in mind that for it to properly function it has to meet the requirements of the LAG discussed earlier. These include VLAN membership and speed to name a few. Revision 0419 8 ‐ 27 ICX 150 Layer 2 Fundamentals Displaying LAG Information • Use the show lag lag_name command to view LAG configuration and status Ruckus# show lag blue <Truncated Output> === LAG "blue" ID 1 (dynamic Deployed) === LAG Configuration: Ports: e 1/1/10 e 1/1/11 Port Count: 2 Lag Interface: lg1 Trunk Type: hash-based LACP Key: 20001 Deployment: HW Trunk ID 1 Port Link State Dupl Speed Trunk Tag Pvid Pri MAC Name 1/1/10 Up Forward Full 1G 1 No 100 0 609c.9fe6.0e48 Ruckus lag 1/2 1/1/11 Up Forward Full 1G 1 No 100 0 609c.9fe6.0e48 Ruckus lag 2/2 Port [Sys P] [Port P] [ Key ] [Act][Tio][Agg][Syn][Col][Dis][Def][Exp][Ope] 1/1/10 1 1 20001 Yes L Agg Syn Col Dis No No Ope 1/1/11 1 1 20001 Yes L Agg Syn Col Dis No No Ope Partner Info and PDU Statistics Port Partner Partner LACP LACP System ID Key Rx Count Tx Count 1/1/10 65535-0011.32a0.e8a1 9 48045 1309850 1/1/11 65535-0011.32a0.e8a1 9 48043 1309839 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved The show lag command can be used with or without a specific LAG name. If you do not reference a specific LAG, the system will display information for each LAG configured. Some important things to note in the output are: • Whether the LAG is deployed, and whether it is dynamic or static. For example, the output here shows the LAG as (dynamic deployed). Next, you can see the ports in the LAG and their status. • Note the Link, is it Up or Down? And the Layer 2 state, is it Forwarding or Blocking? • Also the LACP status of the port • Under Partner Info and PDU Statistics you want to see the Partner's MAC, and the LACP receive and transmit counters incrementing. • You can also use the brief option with the show lag command to provide high level information on all the LAGs configured on the switch. Revision 0419 8 ‐ 28 ICX 150 Layer 2 Fundamentals The LACP state are as follows: Sys P ‐ System Priority Port P ‐ Port Priority Key ‐ LACP key Act ‐ Identifies if ports are set to LACP Active (Yes) or Passive (No) Tio ‐ Timeout set to long (L) (default) or short (S) Agg ‐ Is the port set to aggregation mode Yes (Agg) No (No) Syn ‐ Is port in sync with what is being advertised in received LACP frames Yes (Syn) No (No) Col ‐ Collecting traffic received on port Yes (Col) No (No) Dis ‐ Sending traffic on the port Yes (Dis) No (No) Def ‐ Is port using received LACP PDU parameters (No) or default (admin defined) (Yes) parameters Exp ‐ Is port in expired state Yes/No Ope ‐ LACP port states Dwn ‐ Down (not active port in the LAG) Ina ‐ Port is transitioning to Ope state Ope ‐ Operational Revision 0419 8 ‐ 29 ICX 150 Layer 2 Fundamentals Displaying LAG Virtual Interface • Use the show interface lag # command to view port status – Ruckus# show interface lag 1 Lag lg1 is up, line protocol is up Configured speed Auto, actual 2G, configured duplex fdx, actual fdx Untagged member of L2 VLAN 100, port state is Forward BPDU guard is Disabled, ROOT protect is Disabled, Designated protect is Disabled STP configured to ON, priority is level0, mac-learning is enabled Mirror disabled, Monitor disabled Mac-notification is disabled VLAN-Mapping is disabled Member of active trunk ports 1/1/10,1/1/11,lg1, Lag Interface is lg1 Member of configured trunk ports 1/1/10,1/1/11,lg1, Lag Interface is lg1 Port name is blue 300 second input rate: 21664 bits/sec, 9 packets/sec, 0.00% utilization 300 second output rate: 7544800 bits/sec, 712 packets/sec, 0.37% utilization 101690811 packets input, 68742066511 bytes, 0 no buffer Received 29030 broadcasts, 169349 multicasts, 101492432 unicasts 0 input errors, 0 CRC, 0 frame, 0 ignored 0 runts, 0 giants 846052771 packets output, 1094990442930 bytes, 0 underruns Transmitted 2527876 broadcasts, 6848877 multicasts, 836676018 unicasts 0 output errors, 0 collisions Relay Agent Information option: Disabled Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved The show interface lag command shows the LAG virtual interface operational state similar to a physical interface output. Details such as VLAN membership, STP status, trunk membership and port statistics. Statistics displayed are a collection of all port members therefore if errors are displayed the show command can be issued on each physical port member to see which might be causing errors etc. Revision 0419 8 ‐ 30 ICX 150 Layer 2 Fundamentals Summary • You should now be able to: – – – – – Configure VLANs and associate tagged and untagged ports Describe and configure Virtual Routing Interfaces (VE ports) Describe Link Aggregation Groups and the supported types on ICX devices Configure LAGs on ICX devices Explain how to effectively manage LAGs along with member ports of a LAG Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved This concludes the module on VLANs and Link Aggregation Groups. You should now be able to: Configure VLANs and associate tagged and untagged ports Describe and configure Virtual Routing Interfaces (VE ports) Describe Link Aggregation Groups and the supported types on ICX devices Configure LAGs on ICX devices Explain how to effectively manage LAGs along with member ports of a LAG Revision 0419 8 ‐ 31 ICX 150 Layer 2 Fundamentals End of Module 8: Layer 2 Fundamentals Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved This completes the Ruckus Layer 2 Fundamentals module. I encourage you to continue to the next module of the ICX 150 Implementer course. Thank you. Revision 0419 8 ‐ 32 ICX 150 Layer 2 Redundancy Module 9: Layer 2 Redundancy Revision 0419 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Welcome to the ICX 150 Implementor course. This course consists of 12 modules and is based on the FastIron 8.0.90 software release. Subjects discussed in this course concentrate on the Implementor functions within a network environment however does not represent all functions or capabilities of an ICX switch. This module focuses on Layer 2 redundancy protocols, specifically Spanning Tree Protocol (STP) and Ruckus’s Multi‐Chassis Trunking (MCT).. So, let’s get started Revision 0419 9‐1 ICX 150 Layer 2 Redundancy Objectives • After completing this module, you will be able to: – – – – – – – Identify supported Spanning Tree Protocols Configure Spanning Tree and Rapid Spanning Tree Identify Ruckus enhanced features to Spanning Tree Describe Multiple Spanning Tree (MSTP) 802.1s and its purpose Describe the benefits of Multi‐Chassis Trunking (MCT) Understand and discuss MCT terminology Display MCT operational status Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 2 After completing this module, you will be able to: Identify supported Spanning Tree Protocols Configure Spanning Tree and Rapid Spanning Tree Identify Ruckus enhanced features to Spanning Tree Describe Multiple Spanning Tree (MSTP) 802.1s and its purpose Describe the benefits of Multi‐Chassis Trunking (MCT) Understand and discuss MCT terminology Display MCT operational status Revision 0419 9‐2 ICX 150 Layer 2 Redundancy Spanning Tree Protocols Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved We’ll start with Spanning Tree Protocol. Revision 0419 9‐3 ICX 150 Layer 2 Redundancy Spanning Tree Protocol Overview 153_spanning‐tree.png • All Spanning Tree standards are incorporated into IEEE 802.1Q‐2014 – Spanning Tree Protocol (STP), Rapid Spanning Tree Protocol (RSTP), Multiple Spanning Tree Protocol (MSTP) • IEEE 802.1D, original standard for Spanning Tree (STP) • Purpose of STP – Spanning Tree uses an algorithm to ensure a loop‐free topology by enabling a single path through any physical arrangement of switches. It detects redundant links, blocks redundant links, and allows for failover to redundant links. STP creates a loop‐free topology without disconnecting or disabling interfaces • Rapid Spanning Tree (RSTP) (802.1w) – An evolution of 802.1D – Provides rapid convergence and takes advantage of Spanning Tree’s point‐to‐point wiring configuration – Backward compatible with 802.1D • Multiple Spanning Tree (802.1s) – Allows multiple VLANs to be managed by a single STP instance Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 4 In 2014, the three main types of Spanning Tree, 802.1D (the original specification), 802.1w (Rapid Spanning Tree), and 802.1s (Multiple Spanning Tree) were all incorporated into the 802.1Q‐2014 specification. The original specifications are still commonly used when comparing the functionality of one version against another. Regardless of the version being used, the purpose of Spanning Tree is the same. Spanning Tree uses an algorithm to ensure a loop‐free topology by enabling a single path through any physical arrangement of switches. It detects redundant links, blocks redundant links, and allows for failover to redundant links. STP creates a loop‐free topology without disconnecting or disabling interfaces. Rapid Spanning Tree Protocol (RSTP) is seen as an evolution of the original standard. RSTP uses most of same terminology as 802.1D, and most of the parameters have been left unchanged so that users familiar with 802.1D can rapidly configure RSTP comfortably. RSTP is backward compatible to 802.1D in order to interoperate with legacy bridges on a per‐port basis In a mixed environment, the benefits that RSTP introduces are dropped. RSTP provides rapid convergence and takes advantage of Spanning Tree's point‐to‐point wiring configuration. Failure in one forwarding path does not affect other forwarding paths. RSTP improves the operation of Spanning Tree while maintaining backward compatibility. Then we have Multiple Spanning Tree (MSTP) it allows multiple VLANs to be managed by a single STP instance and supports per‐VLAN Spanning Tree. As a result, several VLANs can be mapped to a reduced number of Spanning Tree instances. This ensures a loop‐free topology for one or more VLANs that have similar Layer 2 characteristics. Revision 0419 9‐4 ICX 150 Layer 2 Redundancy Default STP Settings • Default Spanning Tree configuration for ICX devices – Switch code – 802.1D enabled globally – Router code – STP disabled globally • Newly configured VLANs in switch code will have 802.1D enabled by default • 802.1w (RSTP) can be enabled per VLAN, or per interface • Supported STP enhancements: – – – – – – Single Instance Spanning Tree (SSTP) Root Guard BPDU Guard STP Protect 802.1D Fast Port Span 802.1D Fast Uplink Span Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 5 By default, Ruckus ICX devices running Layer 2 code have 802.1D enabled globally, whereas, devices running Layer 3 code have STP disabled completely. To migrate to RSTP for faster recovery, you can enable RSTP on a per‐VLAN, or per‐port basis. When you create a port‐ based VLAN, the new VLAN STP state is the same as the default STP state on the device due to the same default values being applied. ICX devices support enhancements made to STP including, Single Instance Spanning Tree (SSTP), Root Guard, BPDU Guard, STP protect, 802.1D Fast Port Span, and 802.1D Fast Uplink Span . We will be discussing these features throughout this module. Revision 0419 9‐5 ICX 150 Layer 2 Redundancy Per‐VLAN Spanning Tree 153_PVST.png • STP uses Bridge Protocol Data Units (BPDUs) for operation – Pass from switch to switch, building and maintaining the tree • Devices run Per‐VLAN Spanning Tree (PVST) • Each VLAN maintains its own STP instance – PVST treats each VLAN as a separate network – On switch code, 802.1D is enabled on all added VLANs • Each device has a default VLAN (VLAN 1) with 802.1D enabled • Commands are run per VLAN – For example: show 802.1w detail vlan 2 show 802.1w detail vlan 33 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 6 Spanning Tree uses Bridge Protocol Data Units (BPDUs), for operation. These are the frames that pass from switch to switch, building and maintaining the tree for a given VLAN. By default Ruckus ICX devices run PVST on each VLAN when they are created. Per‐VLAN Spanning Tree (PVST) is an enhancement to a single instance of STP on a switch by allowing each VLAN create a different tree within the network. Meaning that PVST maintains a Spanning Tree instance for each VLAN configured and enables a link to be forwarding for some VLANs, but blocked others. Because PVST treats each VLAN as a separate network, it can load balance Layer 2 traffic by forwarding some VLANs on one trunk, and other VLANs on another trunk without causing a Spanning Tree loop. Revision 0419 9‐6 ICX 150 Layer 2 Redundancy Spanning Tree Protocol 802.1D Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Let’s take a look at configuring the original 802.1D standard. Revision 0419 9‐7 ICX 150 Layer 2 Redundancy Enabling STP (802.1D) • You can enable or disable STP on the following levels: – All ports in a port‐based VLAN • Ruckus(config)# vlan 222 • Ruckus(config-vlan-222)# no spanning-tree – On an individual port • Ruckus(config)# interface 1/1/1 • Ruckus(config-if-e1000-1/1/1)# no spanning-tree Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 8 As we previously mentioned, 802.1D is configured by default on VLAN 1 (default) on all switches running Layer 2 software, but is disabled completely on switches running Layer 3 software. Enabling or disabling 802.1D is performed within the VLAN as shown here and will apply to all ports that belong to that VLAN. If you want to disable STP on an interface you can do so within the interface stanza. Be aware that port settings override VLAN global settings. Thus, you can enable or disable STP on a specific port however it effects all spanning tree instances for all VLANs it may be a member of. Therefore caution should be taken when do so to ensure a loop is not created. Revision 0419 9‐8 ICX 150 Layer 2 Redundancy Changing STP Priority • When non‐default VLANs are created each can have their own bridge priority – Provides diverse forwarding paths in the layer 2 environment – Default priority value is 32768 • Change bridge priority per VLAN Ruckus-04(config)# vlan 222 Ruckus-04(config-vlan-222)# spanning-tree priority 40000 • Ports can also have a priority set to favor it over others – Path cost value specifies the value added to BPDUs received from that port – Change port priority and cost Path cost value • A 10 Mbps link has a cost of 100 • A 100 Mbps link has a cost of 19 • A 1 Gbps link has a cost of 4 • A 10 Gbps link has a cost of 2 Ruckus(config)# vlan 10 Ruckus(config-vlan-10)# spanning-tree ethernet 1/1/1 path-cost 15 priority 64 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 9 You can change the STP bridge priority on an ICX device, thus increasing its possibility to becoming the root bridge for a given VLAN. Because this is performed on a per VLAN basis, it allows different bridge priorities to be set on each configured VLAN. This provides the ability to create diverse bridge elections thus causing their layer 2 topology to form different paths. This not only allows better utilization of the redundant links but provides balance of the traffic over more links. Using the spanning-tree priority command enter a value from 0 to 65535 within each VLAN. The default priority is 32768. The bridge with the lowest value has the highest priority, thus setting a bridge to zero will cause it to have the highest priority. The last command we see here changes the path‐cost and priority for a specific interface. The path‐cost value specifies the port cost added to received BPDUs and helps calculate the path to the root bridge. STP prefers the path with the lowest cost. You can specify a value from 0 ‐ 65535. The default depends on the port type: • A 10 Mbps link has a cost of 100 • A 100 Mbps link has a cost of 19 • A 1 Gbps link has a cost of 4 • A 10 Gbps link has a cost of 2 The interface priority specifies the preference that STP gives this port relative to other ports for forwarding traffic out of the Spanning Tree. The value can be set from 0 to 240, the default is 128. The cost of using the port to reach the root bridge. When selecting among multiple links to the root bridge, STP chooses the link with the lowest path cost and blocks the other paths. Each port type has its own default STP path cost however if two ports have the same cost to the root bridge the one that receives a BPDU with the lower port priority will be chosen. Because of recent changes to the BPDU it is required that the port priority be set to a value divisible by 16. If you enter a port priority value that is not divisible by 16, you will received an error Error – STP Port Priority should be in steps of 16. Default port priority is 128 and can be configured in the range of 0 to 240. Revision 0419 9‐9 ICX 150 Layer 2 Redundancy 802.1D Show Commands Ruckus‐03 • Ports 5 and 7 are redundant links between switches with STP enabled on VLAN 222 1/1/5 1/1/7 Root VLAN 222 Ruckus-04# show spanning-tree vlan 222 STP instance owned by VLAN 222 1/1/5 Global STP (IEEE 802.1D) Parameters: VLAN Root ID ID Root Root Cost Port 222 8000cc4e24c0deb0 4 1/1/5 1/1/7 Ruckus‐04 Prio rity Hex 9c40 Max Age sec 20 Hello sec 2 Hold sec 1 Fwd dly sec 15 Last Chang sec 14 Chg Bridge cnt Address 58 609c9fe60858 Port STP Parameters: Port Num 1/1/5 1/1/7 Prio rity Hex 80 80 Path Cost State Fwd Trans Design Cost Designated Root Designated Bridge 4 4 FORWARDING BLOCKING 3 2 0 0 8000cc4e24c0deb0 8000cc4e24c0deb0 8000cc4e24c0deb0 8000cc4e24c0deb0 Syntax: show spanning-tree [blocked] [vlan vlan-id] | [pvst-mode] | detail [vlan vlan-id [ethernet slot/port ]] [begin expression | exclude expression | include expression ] Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 10 Use the show spanning-tree command to view 802.1D details. If you do not specify a VLAN, the output will show the details for each VLAN on the switch that has spanning tree enabled. This example: the show output is from switch Ruckus‐04 and displays the root bridge (Ruckus‐03) along with the local bridge priority (in HEX) along with its ID. Because we previously changed Ruckus‐04 bridge priority to 40000 (changed in decimal) from the default of 32768 it caused it not to become the root bridge. Additionally each port and its STP state along with the designated root and bridge are displayed as well. Because of the redundant links between these two bridges, port 1/1/5 is Forwarding, and 1/1/7 is Blocking. The Syntax is shown to see the granular output you can receive from this command. Revision 0419 9 ‐ 10 ICX 150 Layer 2 Redundancy 802.1D Show Commands (cont.) Ruckus-04# show span detail vlan 222 ethernet 1/1/5 Port 1/1/5 is FORWARDING Port - Path cost: 4, Priority: 128, Root: 0x8000cc4e24c0deb0 Designated - Bridge: 0x8000cc4e24c0deb0, Interface: 0, Path cost: 0 Active Timers - Message age: 0 BPDUs - Sent: 281, Received: 1335 Ruckus-04# show span detail vlan 222 ethernet 1/1/7 Port 1/1/7 is BLOCKING Port - Path cost: 4, Priority: 128, Root: 0x8000cc4e24c0deb0 Designated - Bridge: 0x8000cc4e24c0deb0, Interface: 2, Path cost: 0 Active Timers - Message age: 0 BPDUs - Sent: 274, Received: 1433 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 11 Use the show spanning-tree detail command (abbreviated here to show span) with a specific VLAN and port number to view even more STP information including, the port's priority, and number of BPDUs sent and received. Also shown is the BPDUs sent and received. Because the Ruckus‐03 switch is the root bridge there are many more BPDUs received than sent. Once the topology is established, only if a failure, a change in the topology or bridge priority change would cause these BPDUs to possibly to be sent by this interface. Revision 0419 9 ‐ 11 ICX 150 Layer 2 Redundancy Fast Port Span (802.1D) 149_fast‐port‐scan.png • Fast Port Span allows faster convergence on ports that are attached to edge devices • Enabled by default on ICX devices – To disable use Ruckus(config)# no fast port-span Syntax:(no) fast port-span exclude <ethernet | LAG> < LAG ID | STACKID/SLOT/PORT> • Because edge devices will not cause loops, state changes can be completed faster – Reduces the number of STP topology change notifications on the network1 • Performs the convergence in four seconds – Two seconds for listening – Two seconds for learning • Used in 802.1D only Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 12 Fast Port Span for 802.1D allows faster convergence on ports that are attached to end stations and therefore do not present the potential to cause a Layer 2 loop. Since the end stations do not generally cause forwarding loops, they can safely go through the STP state changes (Blocking to Listening to Learning to Forwarding) more quickly than is allowed by the standard STP convergence time of 30 seconds. This is beneficial for end stations to migrate quickly and to allow DHCP assignments to not time out. Fast Port Span performs the convergence on these ports in four seconds (two seconds for Listening and two seconds for Learning). Whereas, the original standard can take up to 30 seconds for convergence. With Fast Port Span configured, if the connection to the end node fails, Spanning Tree will re‐converge in 4 seconds. This can occur because the end nodes do not cause loops through their single connection. Footnote 1: When an end station attached to a Fast Span port comes up or down, the Ruckus device does not generate a topology change notification for the port. In this situation, the notification is unnecessary since a change in the state of the host does not affect the network topology. Revision 0419 9 ‐ 12 ICX 150 Layer 2 Redundancy Fast Port Span (cont.) • Fast Port Span functionality is disabled if the switch detects any of the following conditions on a port: a) b) c) d) It has an 802.1Q tag It is a member of a LAG The switch detects more than one MAC address on the port The switch sees an STP BPDU coming in on the port Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 13 Fast Port Span is overridden any time the switch detects any of the following conditions on a port: • it has an 802.1Q tag • it is a member of a LAG • the switch detects more than one MAC address on the port • or the switch sees an STP BPDU coming in on the port. Revision 0419 9 ‐ 13 ICX 150 Layer 2 Redundancy Fast Uplink Span (802.1D) • Provides features (similar to Fast Port Span) on uplink ports of a switch with redundant uplinks – Reduces delay of convergence of redundant link by allowing it to begin forwarding in one second • The new uplink port directly goes to forward mode (bypassing listening and learning modes) • Can be configured even if uplink is different vendor switch • To configure the group of uplink ports are identified on the ICX switch – All Fast Uplink Span‐enabled ports are members of a single Fast Uplink Span group – It is recommended to be used only on edge switches to avoid temporary bridge loops Ruckus(config)# fast uplink-span ethernet 1/1/1 to 1/1/4 – Within a VLAN Ruckus(config)# vlan 10 Ruckus(config-vlan-10)# untag ethernet 1/1/5 to 1/1/8 Ruckus(config-vlan-10)# fast uplink-span ethernet 1/1/5 to 1/1/8 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 14 The Fast Uplink Span feature enhances STP performance for wiring closet switches with redundant uplinks. Using the default value for the standard STP forward delay, convergence following a transition from an active link to a redundant link can take 30 seconds (15 seconds for listening and an additional 15 seconds for learning). You can use the Fast Uplink Span feature to decrease the convergence time for the uplink ports to another device to just one second. The new Uplink port directly goes to forward mode (bypassing listening and learning modes). the device at the other end of the link can be a Ruckus ICX device or another vendor’s switch. To configure the Fast Uplink Span feature, specify a group of ports that have redundant uplinks on the ICX switch. If the active link becomes unavailable, the Fast Uplink Span feature transitions the forwarding to one of the other redundant uplink ports in just one second. All Fast Uplink Span‐enabled ports are members of a single Fast Uplink Span group Active uplink port failure The active uplink port is the port elected as the root port using the standard STP rules. All other ports in the group are redundant uplink ports. If an active uplink port becomes unavailable, Fast Uplink Span transitions the forwarding of traffic to one of the redundant ports in the Fast Uplink Span group in one second bypassing listening and learning port states. Switchover to the active uplink port When a failed active uplink port becomes available again, switchover from the redundant port to the active uplink port is delayed by 30 seconds. The delay allows the remote port to transition to forwarding mode using the standard STP rules. After 30 seconds, the blocked active uplink port begins forwarding in just one second and the redundant port is blocked Revision 0419 9 ‐ 14 ICX 150 Layer 2 Redundancy Rapid Spanning Tree Protocol (RSTP) 802.1w Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Now let’s take a closer look at Rapid Spanning Tree. Revision 0419 9 ‐ 15 ICX 150 Layer 2 Redundancy RSTP Configuration 162_rstp‐config.png • Enable RSTP: Ruckus(config-vlan-2)# spanning-tree 802-1w • Define priorities: Ruckus(config-vlan-2)# spanning-tree 802-1w priority 4096 Ruckus(config-vlan-2)# spanning-tree 802-1w e 1/1/1 priority 16 • Define port parameters/function: Ruckus(config-vlan-2)# span 802-1w e 1/1/4 admin-edge-port Ruckus(config-vlan-2)# span 802-1w e 1/1/1 admin-pt2pt-mac Ruckus(config-vlan-2)# span 802-1w e 1/1/2 admin-pt2pt-mac Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 16 Because RSTP is disabled by default, you must enabled it on a per‐VLAN or per‐port basis. The example shown here enables RSTP on VLAN 2. To force a switch to be the root bridge, set the bridge priority to a low value/high priority value. The default bridge priority for RSTP is 8000 Hex (32768) as well. The example sets the RSTP instance to 4096 and the port e 1/1/1 priority to 16, vastly improving the possibility of this switch becoming the root bridge for this VLAN.. Edge ports are ports of a bridge that connect to end workstations or computers. Edge ports assume the Designated port role and do not anticipate any incoming BPDU activity. Setting a port as an edge port in RSTP eliminating an port flapping to cause any topology change events to take place since RSTP does not consider edge ports in the Spanning Tree calculation. Use the admin-edge-port command to configure a port as an edge port. To take advantage of the fast convergence time of RSTP, ports between switches should be explicitly configured as point‐to‐point links using the admin-pt2pt-mac command. The point‐to‐point link configuration increases the speed of re‐convergence by allowing the local switch to know this is a single connection to another switch. This parameter, however, does not auto‐detect whether or not the link is a physical point‐to‐point link Ports in the Discarding state are equivalent to the 802.1D Blocking state. The bridge on the right shown here is receiving BPDUs on ports 1/1/3 and 1/1/5 that have equivalent fields for: root bridge ID, path‐cost, and sender's bridge ID. They differ however, on the port ID. Since the port priority for port 1/1/1 on the root bridge has been set to 16 (default 128), the connected port (1/1/3) on the other switch goes into the Forwarding state, while port 1/1/5 goes into the Discarding state. Revision 0419 9 ‐ 16 ICX 150 Layer 2 Redundancy 802.1w Show Commands Ruckus(config)# show 802-1w IEEE 802-1w is not configured on port-vlan 1 --- VLAN 2 [ STP Instance owned by VLAN 2 ] ---------------------------Bridge IEEE 802.1W Parameters: Bridge Identifier hex 1000609c9fe60e40 Bridge MaxAge sec 20 Bridge Hello sec 2 RootBridge RootPath Identifier Cost hex 1000609c9fe60e40 0 Bridge Force FwdDly Version sec 15 Default tx Hold cnt 3 DesignatedBriRoot dge Identifier Port hex 1000609c9fe60e40 Root Max Age sec 20 Fwd Dly sec 15 Hel lo sec 2 Port IEEE 802.1W Parameters: Port Num 1/1/1 1/1/2 1/1/4 <--- Config Params --><-------------- Current state -----------------> Pri PortPath P2P Edge Role State DesignaDesignated Cost Mac Port ted cost bridge 16 20000 T F DESIGNATED FORWARDING 0 1000609c9fe60e40 128 20000 T F DESIGNATED FORWARDING 0 1000609c9fe60e40 128 20000 F T DESIGNATED FORWARDING 0 1000609c9fe60e40 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 17 The show 802-1w command (or show 8 for short) displays all RSTP information per VLAN. Important things to note in this output, are the Bridge Identifier, which is the MAC address of this bridge, and the Root Bridge Identifier which is the MAC address of the root bridge. Also the bridge priority has been lowered from the default value to the value of 4096 as shown in the previous slide. The first 4 numeric values in the bride identifier provide the bridge priority displayed in hex. In this example, the MACs are the same, which means that this is the root bridge. Also shown is the state of each port. In this case, all ports are Designated and Forwarding. Also notice the P2P MAC, and the Edge Port values are either “T” for true, or “F” for false, meaning the admin-pt2pt-mac parameter, or the admin-edge-port parameter is configured for the port. Each port has a priority and designated cost associated with it. The priority of port 1/1/1 is 16 causing it to be preferred over other ports to other switches while the other ports have the default priority of 128. Revision 0419 9 ‐ 17 ICX 150 Layer 2 Redundancy BPDU Guard (STP, RSTP and MSTP) • BPDU enforces the STP domain borders helping keep the topology predictable – Removes a node that reflects BPDUs back in the network eliminating the ability to participate in STP – Do not allow rouge switches to be attached and start participating in STP – It is a best practice to enable BPDU Guard on these edge ports • BPDU Guard disables an interface that expectedly receives BPDUs Ruckus(config)# interface 1/1/1 Ruckus(config-if-e1000-1/1/1)# stp-bpdu-guard • BPDU Guard disables the port by putting it into an Errdisable state – Log messages and a console messages are displayed Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 18 As we previously mentioned, in an STP environment, switches, end stations, and other Layer 2 devices use BPDUs to exchange information that STP uses to determine the best path for data flow. BPDU Guard, is an enhancement, which removes a node that reflects BPDUs back into the network. It enforces the STP domain borders and keeps the active topology predictable by not allowing any network devices behind a BPDU Guard‐enabled port to participate in STP. In most instances, it is not necessary for a connected device, such as an end station, to initiate or participate in Spanning Tree topology changes. Therefore, you can enable BPDU Guard on the port to which the end station is connected. If a BPDU is detected on the port, BPDU Guard will shut it down and put it into an Errdisable state. A log message is generated for each BPDU Guard violation, and a console message is displayed to warn the network administrator of the violation. BPDU guard is supported on tagged ports as long as it is tagged on both sides to the same VLAN Revision 0419 9 ‐ 18 ICX 150 Layer 2 Redundancy How BPDU Guard Works 162_BPDU‐guard.png • The port goes to Errdisable state, ensuring network stability – If no recovery interval is set the port will have to be manually “bounced” to recover: Ruckus(config)# interface 1/1/1 Ruckus(config-if-e1000-1/1/1)# disable Ruckus(config-if-e1000-1/1/1)# enable – A recovery interval can be configured to allow for auto recovery of port • Global Configuration Ruckus(config)# errdisable recovery cause bpduguard Ruckus(config)# errdisable recovery interval 20 (seconds) Root Bridge 3 Edge port with BPDU Guard enabled 1/1/1 1 Port 1/1/1 State Errdisable 2 Rogue BPDUs Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 19 In our example, BPDU Guard is enabled on the edge port to prevent BPDUs coming from a rogue switch that has been attached. When BPDUs are received on a BPDU Guard‐enabled port, the port goes to Errdisable state. The port can be brought out of the Errdisable state by either manually disabling and re‐enabling the port, or by configuring the errdisable recovery cause bpduguard command, along with a errdisable recovery interval. In this example we set the interval to 20 seconds. Now, after 20 seconds, the port will be put back in action. Displaying the BPDU guard status of ports can performed using: device# show stp‐bpdu‐guard BPDU Guard Enabled on: Interface Violation Port 1/1/1 No Port 1/1/2 No Port 1/1/3 No Port 1/1/4 No Port 1/1/5 No Port 1/1/6 No Port 1/1/7 No Port 1/1/8 No Port 1/1/9 No Port 1/1/10 No Port 1/1/11 No Port 1/1/12 Yes Port 1/1/13 No Revision 0419 9 ‐ 19 ICX 150 Layer 2 Redundancy Spanning Tree Root Guard (STP, RSTP and MSTP) • Ensures that the L2 topology does not change with the introduction of a STP device on an edge port • Superior BPDUs received from a Root Guard enabled port – – – – Port transitions to a ROOT-INCONSISTENT state Port is set to blocking/discarding Triggers Syslog message and SNMP trap No further traffic will be forwarded on the port • Once the port stops receiving superior BPDUs, Root Guard reverts the port back to a forwarding state using the STP algorithm • Root Guard should be configured on all ports where the root bridge should not appear Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 20 Spanning Tree Root Guard can be used to predetermine the location of the root bridge and prevent rogue or unwanted switches from becoming the root bridge. When Root Guard is enabled on a port, it keeps the port in a Designated role. If the port receives a superior BPDU, it puts the port into a ROOT‐INCONSISTANT state and triggers a log message and an SNMP trap. The ROOT‐INCONSISTANT state is equivalent to the BLOCKING state in 802.1D and to the DISCARDING state in 802.1w. No further traffic is forwarded on this port. Once the port stops receiving superior BPDUs, Root Guard automatically sets the port back to Learning, and eventually to a Forwarding state. Revision 0419 9 ‐ 20 ICX 150 Layer 2 Redundancy STP Root Guard – Configuration and How it Works • Configuring root guard Ruckus(config)# interface ethernet 1/1/5 Ruckus(config-if-e10000-1/1/5)# spanning-tree root-protect • When the port is put into ROOT‐INCONSISTANT state, data traffic is not forwarded Root Bridge 3 Port 1/1/1 Edge port with BPDU Guard enabled 1/1/1 1 State Root Inconsistent 2 BPDUs with superior Bridge ID Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 21 Here we see how Root Guard works. First, Root Guard is enabled on an edge port. ‘ Next the new switch is connected to the edge and begins sending BPDUs into the network, Then Root Guard detects the BPDUs and sets port 1/1/1 to ROOT‐INCONSISTANT. This halts traffic and prevents the BPDUs from entering the network and, potentially, forcing an election. Revision 0419 9 ‐ 21 ICX 150 Layer 2 Redundancy Multiple Spanning Tree (MSTP) 802.1s Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Our next topic is 802.1s, or Multiple Spanning Tree ‐ MSTP. Revision 0419 9 ‐ 22 ICX 150 Layer 2 Redundancy Multiple Spanning Tree Protocol Purpose • 802.1s defines an extension to the RSTP protocol • Provides scaling of spanning tree – Improves STP management by grouping multiple VLANs with similar layer 2 topologies together • Conserves switch resources allowing a reduced number of spanning‐tree instances known as Internal Spanning Tree (IST) – Isolates failures by limiting the STP topology change notifications within an STP group instance/region – Fast convergence by utilizing RSTP features allowing for rapid • Multiple spanning‐tree regions – ICX switches support up to 16 spanning tree instances in an MSTP enabled bridge • 16 different Layer 2 topologies supported • VLAN 4092 is reserved for instance 0, the Internal Spanning Tree (IST) Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 23 Multiple Spanning Tree Protocol (MSTP), is defined in IEEE standard 802.1s. Because of the overhead required for Spanning tree to function in a switch when large amount of STP instances is deployed it can put a strain on devices especially when many instances are deployed. Multiple Spanning Tree provides the ability to associate multiple VLANs with the same topology together into one instance of STP. Not only does the reduce the resource requirement in a switch but provides an effective way to deploy STP in a large scale such as with ISP or large layer 2 networks. Other advantages of MSTP include isolating link failures change notifications within a “region” cutting down on the advertisement of topology change notification within the STP instance instead of the whole STP environment. The Ruckus implementation supports up to 16 Spanning Tree instances in an MSTP enabled bridge which means that it can support up to 16 different Layer 2 topologies. The Spanning Tree algorithm used by MSTP is RSTP which provides quick convergence. VLAN 4092 is reserved for instance 0, which is the Internal Spanning Tree (IST) instance. We will discuss the IST on the next slide. Revision 0419 9 ‐ 23 ICX 150 Layer 2 Redundancy 802.1s Key Concepts • Common Spanning (CST) – Assumes one Spanning Tree instance for the entire bridged network regardless of the number of VLANs – In MSTP, a region appears as a virtual bridge that runs CST • Internal Spanning Tree (IST) – An MSTP bridge must handle at least these two instances: • One IST (instance 0) • One or more MSTIs (Multiple Spanning Tree Instances) – Instance 0 extends CST inside the MST region – IST always exists if the switch runs MSTP – Within each MST region, MSTP maintains multiple Spanning Tree instances • All switches in that region must run RSTP Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 24 Here are some of the key concepts of MSTP. First is Common Spanning Tree (or CST). CST is defined as one Spanning Tree instance for the entire bridged network regardless of the number of VLANs. In MSTP, a region appears as a virtual bridge that runs in the CST. Next, we have the Internal Spanning Tree (or IST) which extends the CST into the region. An MSTP bridge must handle at least these two instances: one IST and one or more Multiple Spanning Tree Instances (MSTIs). Ruckus's MSTP implementation allows for up to 16 instances within each region. The IST is always instance 0, which leaves 15 MSTIs which can be numbered from 1 to 4094. An older switch that only supports 802.1D may be added as a part of the CST but not inside a region; RSTP must be run within a region. Revision 0419 9 ‐ 24 ICX 150 Layer 2 Redundancy 802.1s Key Concepts (cont.) • Multiple Spanning Tree Instance (MSTI) – The MSTI is identified by an MSTid value between 1 and 4094 • Common and Internal Spanning Trees (CIST) – CIST is a collection of the ISTs in each MSTP region, and the CST that interconnects the MSTP regions and single spanning trees • MSTP Regions – Clusters of bridges that run multiple instances of the MSTP protocol – Multiple bridges detect that they are in the same region by exchanging their configuration information – One or more VLANs can be mapped to one MSTP instance, but a VLAN cannot be mapped to multiple MSTP instances Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 25 Each instance of Multiple Spanning Tree is identified by an MST identifier (MSTid). Valid MSTids are between 1 and 4094. Then we have the Common and Internal Spanning Tree (or CIST) which is the collection of the ISTs in each region and the CST that interconnects the regions and single Spanning Trees. MSTP regions are clusters of bridges that run multiple instances of the MSTP protocol. Multiple bridges detect that they are in the same region by exchanging their configurations, which includes, their instance to VLAN mapping, name, and revision‐level. Therefore, if you need to have two bridges in the same region, make sure these configurations match. It is important to note that one or more VLANs can be mapped to one MSTP instance (IST or MSTI), but a VLAN cannot be mapped to multiple MSTP instances. Revision 0419 9 ‐ 25 ICX 150 Layer 2 Redundancy Multiple Spanning Tree Regions Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 26 Using MSTP, the entire network runs a common instance of RSTP. Within that common instance, one or more VLANs can be individually configured into distinct regions. The entire network runs the common spanning tree instance (CST) and the regions run a local instance. The local instance is known as Internal Spanning Tree (IST). The CST treats each instance of IST as a single bridge. Consequently, ports are blocked to prevent loops that might occur within an IST and also throughout the CST. With the exception of the provision for multiple instances, MSTP operates exactly like RSTP. For example, the network shown here is configured with two regions: Region1 and Region2. The entire network is running an instance of CST. Each of the regions is running an instance of IST. In addition, this network contains Switch1 at the very top running MSTP that isn't configured in a region and is running in the CIST. In this configuration, the regions are each regarded as a single bridge to the rest of the network, as is Switch1. The CST prevents loops from occurring across the network. As a result, port e2 is blocked on switch6. Additionally, loops must be prevented in each of the IST instances. Within IST Region1, port e2 on switch4 is blocked to prevent a loop in that region. Within IST Region2, port e2 on switch3 is blocked to prevent a loop in that region. Once the system is configured for MSTP, CIST (sometimes referred to as instance 0) is created and all existing VLANs inside the MSTP scope are controlled by CIST. In addition, whenever a new VLAN is created inside the MSTP scope, it is put under CIST control by default. In the Ruckus MSTP implementation however, a VLAN ID can be pre‐mapped to another MSTI. A VLAN whose ID is pre‐mapped will attach to the specified MSTI instead of to the CIST when created. Once MSTP is configured, CIST always controls all ports in the system. (Configure the no spanning‐tree command under the specified interface configuration to keep a specific port from running MSTP.) An MSTP instance is configured with an MSTPid for each region. Each region can contain one or more VLANs. Revision 0419 9 ‐ 26 ICX 150 Layer 2 Redundancy 802.1s Show Commands • To display information about a specific MSTP instance: SW2# show mstp 1 MSTP Instance 1 - VLANs: 2 ---------------------------------------------------------------------------Bridge Max RegionalRoot IntPath Designated Root Root Identifier Hop Bridge Cost Bridge Port Hop hex cnt hex hex cnt 8001000cdb80af01 20 Port Pri PortPath Num Cost 1/3/1 128 2000 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 8001000cdb80af01 0 8001000cdb80af01 Root 20 Role State DesignaDesignated ted cost bridge MASTER FORWARDING 0 8001000cdb80af01 27 Use the show mstp command, followed by an instance number to display information about a specific MSTP instance. The output displays the ports in the instance, the ID of the bridge where the show command is run, and the ID of the root bridge along with their perspective priorities. Also shown are the ports in the instance along with their role, state, costs and priority. Revision 0419 9 ‐ 27 ICX 150 Layer 2 Redundancy 802.1s Show Commands (cont.) • To display information about the CIST instance: SW1# show mstp 0 MSTP Instance 0 (CIST) - VLANs: 1 ------------------------------------------------------------------Bridge Bridge Bridge Bridge Bridge Root Root Root Root Identifier MaxAge Hello FwdDly Hop MaxAge Hello FwdDly Hop hex sec sec sec cnt sec sec sec cnt 8000000cdb80af01 20 2 15 20 20 2 15 19 Root ExtPath Bridge Cost hex 8000000480bb9876 2000 Port Pri Num 3/1/1 128 PortPath P2P Cost Mac 2000 T RegionalRoot IntPath Bridge Cost hex 8000000cdb80af01 0 Designated Bridge hex 8000000480bb9876 Edge Role State DesignaPort ted cost F ROOT FORWARDING 0 Root Port 3/1/1 Designated bridge 8000000480bb9876 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 28 To display information for the entire CIST bridge network, use the show mtsp 0 command, as the CIST is instance 0 within the CST. As you can see the output of this command differs from the output of the show mstp command for an individual MSTI. This output includes the MSTP information for communication between all the MSTP regions. Revision 0419 9 ‐ 28 ICX 150 Layer 2 Redundancy Multi‐Chassis Trunking (MCT) Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Our next Layer 2 redundancy protocol is Ruckus’s Multi‐Chassis Trunking, or MCT. Revision 0419 9 ‐ 29 ICX 150 Layer 2 Redundancy Multi‐Chassis Trunking 162_MCT.png • Currently supported on ICX 7750 and 7850 • Expands the features of LAGs by: – Eliminates single point of failure • Providing switch level redundancy in addition to the link level redundancy provided by LAGs – Providing an active‐active connection for increased capacity and forwarding – Making the topology loop‐free without Spanning Tree • Other features: – Integrated loop detection, which allows all links to be active – Easy deployment without fundamentally changing the existing architecture – Sub second failure detection and allocation of traffic Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 30 MCT is an enhancement to Link Aggregation Control Protocol (LACP), IEEE standard 802.3ad and (802.1ax revision). MCT is supported on the ICX 7750 and 7850. Other ICX however can be used to connect to the MCT cluster to provide device level redundancy for its clients. A regular trunk or LAG is a switch‐to‐switch link that provides redundancy. A Multi‐Chassis Trunk is a trunk that initiates at a single MCT‐unaware switch and terminates at two MCT‐aware switches that form one MCT logical switch. From this picture here, we can see that each of the MCT‐unaware switches on the left have a trunk going to each of the MCT switches in the cluster. From the MCT logical switches point of view, these trunks are a single trunk. MCT is an Active‐Active network architecture. It provides high availability, high reliability and provides efficient utilization of bandwidth. Compared with a regular trunk which provides link‐level redundancy: If the trunk is one‐to‐one and the switch goes down, then the whole connection is lost. In addition to port‐level redundancy, MCT provides switch‐ level redundancy by extending the trunk across two switches providing high availability. Revision 0419 9 ‐ 30 ICX 150 Layer 2 Redundancy Multi‐Chassis Trunking (cont.) 162_MCT2.png • MCT is compatible with standard LAG operations – Any device that supports IEEE 802.3ad can be used at the edge • Edge devices: – Are transparent to the MCT protocol – Can be 3rd party vendor devices with LAG support Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 31 Edge devices are transparent to the MCT peers and protocol. An edge device can be any Ruckus, or 3rd party device that supports static LAG configuration, or the LACP 802.3ad standard. Revision 0419 9 ‐ 31 ICX 150 Layer 2 Redundancy MCT Terminology • Inter‐Chassis Link (ICL) ‐ a single‐port or multi‐port, 1 GbE, 10 GbE, or 40 GbE static LAG between two MCT cluster devices to communicate data flow and control messages between them • Cluster Communication Protocol (CCP) ‐ protocol used between MCT aware devices • MAC Database Update Protocol (MDUP) ‐ control plane protocol used to sync MAC entries between MCT cluster peers • Customer Client Edge Port (CCEP) ‐ ports on a cluster switch connecting it with cluster client • Customer Edge Port (CEP) ‐ a regular non‐MCT port on an MCT cluster switch Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 32 Lets take a look at some of the terminology of MCT. The ICL is the Inter‐Chassis Link between MCT logical peers. On ICX devices this must be a static LAG. It provides data flow and control messages between them. On the ICLs, two control routing protocols are being managed. One is a CCP which is Cluster Communication Protocol based on TCP. The other is the MAC Database Update Protocol (MDUP). Cluster Communication Protocol (CCP) provides reliable, point‐to‐point transport of cluster communication and sync between MCT peers. CCP works on TCP port 4175. Applications such as MAC Database Update between cluster peers can use CCP to synchronize their MAC tables. Applications (MAC Manager, STP, etc.) can register with CCP dynamically. Since CCP protocol is based on TCP, an IP address is needed for CCP to function. Peer nodes exchange session parameters (ClusterID, RBridgeID, Keep Alive time, Hold time, Fast failover). Once a keep alive message is exchanged, CCP will migrate into an UP state. MDUP is used to sync MAC addresses between the peers. ICL ports should not be untagged members of any VLAN. The ICL is a tagged Layer 2 link, which carries packets for multiple VLANs. An ICL is preferably a LAG that provides port level redundancy and higher bandwidth for cluster communication. Customer Client Edge Port (CCEP) are physical ports on one of the MCT cluster switches that is a member of the LAG interface to the MCT client. Ultimately another physical port of the LAG will also be connected to other switch in the MCT cluster. Although the physical port is connected to one of the MCT cluster switches a CEP port, or Customer Edge Port is not benefitting from the MCT features. Therefore a CEP port is a non‐MCT port that is not connected to a MCT client. However it still provides connectivity to the network. Revision 0419 9 ‐ 32 ICX 150 Layer 2 Redundancy MCT Terminology (cont.) • RBridge ‐ any device involved in the MCT cluster including peer or client • RBridgeID ‐ unique ID assigned to each MCT peer and client • MCT Peers: – Pair of physical switches which act as one logical switch – Edge switches or servers are connected via a LAG – LAGs are spread across the MCT pair • MCT Keep‐alive VLAN ‐ A VLAN configured to provide alternate communication between MCT peers during ICL/CCP failure Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 33 An RBridge is any device involved in the MCT cluster, including peer or client. Each RBridge in the cluster has a unique ID. The RBridgeID is a value assigned to MCT cluster devices and clients that uniquely identifies them and helps associate the source MAC address with an MCT device. Cluster RBridgeIDs cannot conflict with any client RBridgeID. Client RBridgeIDs should match between cluster peers on the same common client. MCT Peers are the pair of physical switches which act as one logical switch. Edge switches or servers are connected via a LAG. LAGs are spread across the MCT pair. The MCT Keep‐ alive VLAN is a VLAN configured to provide alternate communication between MCT peers during ICL/CCP failure. It is recommended that you set up ICL as a static LAG with at least two ports. This provides port‐level redundancy and higher bandwidth for cluster communication. An ICL cannot be a regular port link or an LACP trunk. It must be a single or multiple port static LAG. Revision 0419 9 ‐ 33 ICX 150 Layer 2 Redundancy Cluster Communication Protocol • Cluster Communication Protocol (CCP) – proprietary protocol providing reliable, point‐to‐ point transport between peers using TCP port 4175 – An IPv4 address is needed for CCP to function1 – Different applications use this connection for communication by registering with CCP dynamically • CCP comprises two main components: – CCP peer management: • Initialization, establishment, maintenance, and termination of TCP transport session between MCT peers – CCP client management: • Client port association, identification, and establishment • MAC learning (MAC Database Update Protocol (MDUP)) Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 34 Cluster Communication Protocol (CCP) is the Ruckus proprietary protocol that provides reliable, point‐to‐point transport to synchronize information between MCT cluster devices. It provides the default MCT control path between the two peer devices. CCP comprises two main components: CCP peer management and CCP client management. CCP peer management deals with establishing and maintaining a TCP transport session between peers, while CCP client management provides event‐based, reliable packet transport to CCP peers. Footnote1: IPv6 addressing is not supported in MCT Revision 0419 9 ‐ 34 ICX 150 Layer 2 Redundancy MCT MAC Learning • Client LAGs terminating on a MCT cluster cause MACs to be associated with multiple ports • MAC Database Update Protocol (MDUP) applies a cost and categorizes learned MACs based on the port type and location they are received – – – – CL: Cluster Local MACs CCL: Cluster Client Local MACs CR: Cluster Remote MACs CCR: Cluster Client Remote MACs • MAC Database (MDB) ‐ can have multiple MAC entries for the same address • Forwarding MAC Database (FDM) ‐ will only have the best MAC installed Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 35 As we have seen, LAGs are connected to multiple peers in a MCT cluster, this can cause the learning of MACs to be bound to multiple ports, either a local port or the ICL. To address this, the MACs are categorized based on what type of port they where learned on, a local or remote port. Each MAC type serves a purpose and allows for preferred MACs to be placed in the Forwarding MAC Database. For legacy MAC learning, we only maintain a Forwarding Database (FDB). But for a MCT switch, we maintain a FDB and an MAC Database (MDB). The best entries of the MDB get inserted into FDB. Cluster Local MACs, designated by CL, are MACs that are learned on the MCT VLAN and on CEPs locally. These MACs are synchronized to the cluster peer and are subject to aging. Cluster Remote MACs, designated by CR, are learned via MDUP messages from the peer (these are considered Cluster Local MACs on the peer). These MACs are always programmed on the ICL and do not age. They are deleted only when it is deleted from the peer. A MDB entry is created for these MACs with a cost of 1, and associated with the peer RBridgeID. Cluster Client Local MACs, designated by CCL, are locally learned on CCEP ports in MCT VLANs. Cluster Client Remote MACs, designated by CCR, are MACs that are learned via MDUP message from the peer (these are considered Cluster Client Local on the peer). These MACs are always programmed on the corresponding CCEP port and do not age. They are deleted only when it is deleted from the peer. A MDB entry is created for these MACs with the cost of 1, and are associated with the client and peer RBridgeIDs. Revision 0419 9 ‐ 35 ICX 150 Layer 2 Redundancy MCT MAC Learning (cont.) • MAC addresses learned (local or MDUP) are added to the MAC Database (MDB) – MAC addresses learned on the local cluster node are added to the local MDB with a cost of 0 – MAC addresses learned from the peer cluster node are added to the remote MDB with a cost of 1 • When multiple MACs exist in the MDB, the MAC with the lowest cost is selected and added to the forwarding database (FDB) Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 36 MACs learned locally or by MDUP are added to the MAC Database (or MDB). MAC addresses learned on the local cluster node are added to the local MDB with a cost of 0, and those learned from the peer cluster node are added to the remote MDB with a cost of 1. The MACs that are learned locally are given the highest priority or the cost of 0 so they are always selected as best MAC. Each MAC is advertised with a cost. Low cost MACs are given preference over high cost MACs. If a MAC moves from a CCEP port to a CEP port, a MAC move message is sent to the peer and the peer moves the MAC from its CCEP ports to the ICL links. Cluster local MACs are always given preference over cluster remote MACs. Revision 0419 9 ‐ 36 ICX 150 Layer 2 Redundancy Display Local MAC Addresses • Use the show mac‐address cluster command with the cluster ID to display all local MAC addresses for the cluster – – – – – – CL: Cluster Local MACs CCL: Cluster Client Local MACs CR: Cluster Remote MACs CCR: Cluster Client Remote MACs CML: Static MAC configured locally on the MCT VLAN CMR: Static MAC configured on the MCT VLAN on the peer side and has no associated local configuration Ruckus# show mac-address cluster 1000 Total Cluster Enabled(CL+CR+CCL+CCR) MACs: 1 Total Cluster Local(CL) MACs: 1 CCL: Cluster Client Local CCR:Cluster Client Total active entries from all ports = 1 Total static entries from all ports = 3 MAC-Address Port Type MCT-Type 0000.0022.3333 1/8/1 Static CML 0000.0022.3333 1/8/3 Static CML 0000.0022.3333 1/8/13 Static CML Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Remote CL:Local CR:Remote VLAN 20 20 20 37 Use the show mac-address cluster command with the cluster ID to display all local MAC addresses for the cluster. We've already looked at the different types of MAC addresses, but here we see two more. CML, which are static MACs configured locally on the MCT VLAN, and CMRs which are static MACs configured on the MCT VLAN on the peer side and has no associated local configuration. . Revision 0419 9 ‐ 37 ICX 150 Layer 2 Redundancy MCT VLANs • Session VLAN: Provides control channel for CCP – Ruckus recommends keeping only ICL ports in the Session VLAN – Layer 2 software, disable STP/RSTP on the Session VLAN – Layer 3 software, configure a virtual interface on the Session VLAN • Used to address the link between the MCT peers • MCT VLAN: VLANs identified and serviced by MCT to forward customer data through the MCT cluster – The ICL must belong to every single MCT VLAN to provide data path between two cluster switches – For MCT VLANs, MAC learning is disabled on ICL ports Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 38 MCT has two VLANs which are needed to function. The first is the MCT Session VLAN. This is the VLAN used by the cluster for control operations. CCP protocol runs over this VLAN. The interface can be a single link or LAG port. ICL ports are tagged in the session VLAN. It is recommended to use a high VLAN number that would not be touched by data VLANs. Note: MCT session VLAN's subnet will not be distributed in routing protocols using redistribute commands. The second are MCT VLANs. These are the VLANs on which MCT clients are operating. These VLANs are explicitly configured in the MCT configuration by the user. The ICL must belong to each MCT VLAN. For MCT VLANs, MAC learning is disabled on ICL ports, while MAC learning is enabled on the ICL port for non‐MCT VLANs. Any VLAN that has an ICL port is an MCT VLAN, even though if it does not have any clients. Revision 0419 9 ‐ 38 ICX 150 Layer 2 Redundancy Typical MCT Scenarios • MCT • Cascading MCT – Two peers (AGG‐MCT1 & AGG‐MCT2) form one MCT cluster with switches Edge‐1 – Edge‐4 acting as active clients Core‐1 AGG‐MCT1 Edge‐1 Edge‐2 Core‐MCT1 & Core‐MCT2 – Four links between the 2 MCT clusters form one trunk (LAG) Core‐2 Core‐MCT1 AGG‐MCT2 ICL Edge‐3 Single MCT Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved – Two MCT clusters: AGG‐MCT1 & AGG‐MCT2 and Edge‐4 AGG‐MCT1 Edge‐1 Core‐MCT2 ICL AGG‐MCT2 ICL Edge‐2 Edge‐3 Edge‐4 Cascading MCT 39 For MCT, there are two typical usage topologies. The first one is a single MCT. In this topology we have one cluster, AGG‐MCT1 and AGG‐MCT2. These two peers form one cluster and switches Edge‐1 through Edge‐4 act as clients connected to the cluster. Usually on this topology, the cluster switches are running Layer 2 code only, so it will act as switch and Layer 3 will be running on Core‐1 and Core‐2. Also supported is a cascading MCT topology. In this scenario, there are two clusters, AGG‐ MCT1 and AGG‐MCT2 form one cluster and Core‐MCT1 and Core‐MCT2 form another cluster. So, the four links between them form one trunk. In both instances a VRRP‐type of technology will be used to provide redundancy. Revision 0419 9 ‐ 39 ICX 150 Layer 2 Redundancy MCT Operation Active‐Active Topology, all nodes and all links forwarding traffic 2 Traffic is forwarded On SW1 local MCT LAG MCT Pair 1 Traffic is forwarded based on the hashing algorithm of the edge switch SW1 Server B MAC B Client A MAC A SW2 4 Traffic load balanced by the hashing algorithm on the server NIC 3 Learned MAC A On SW1 is communicated to SW2 across ICL 5 Traffic is forwarded on SW2 local MCT LAG Ethernet Traffic Ethernet Link Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 40 Let's take a look at MCT in action. In the example shown here, Client A is initiating a conversation with Server B. The Client A edge switch will employ a hashing algorithm to determine which egress port to use for forwarding the frame. Once received at an MCT peer (SW1 in the example) the frame is forwarded out of the egress port connected to the Server B switch. Simultaneously, SW1 will share the information for Client A's MAC address with SW2 over the ICL. The response from Server B to Client A is handled in the same way. The Server B switch will deploy a hashing algorithm to determine the egress port for forwarding (in this case the link to SW2). SW2 will forward out the local link towards Client A while simultaneously providing Server B's MAC information to SW1 over the ICL. Revision 0419 9 ‐ 40 ICX 150 Layer 2 Redundancy MCT Operation (cont.) Fast failover regardless of the failure type (link/module/node) due to detection at the physical level MCT Pair Server B MAC B Link failure detected at the access switch 1 SW1 Client A MAC A SW2 2 3 MCT switch has already learned MAC‐B address so can forward traffic without disruption Access switch hashing algorithm moves traffic to the remaining link of the LAG Normal Traffic Path Ethernet Link Alternate Traffic Path Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 41 Now we see a link failure occurring between the Client A switch and MCT peer, SW1. The link failure forces the Client A switch to forward traffic over the only remaining link (connecting to SW2). SW2 will forward the traffic out of it’s local Server B interface. The return traffic from Server B to Client A is not impacted by this link failure because the return traffic can be passed over the ICL link and then forwarded to client A from the SW2 connection. Revision 0419 9 ‐ 41 ICX 150 Layer 2 Redundancy MCT Show Commands Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Now that we’ve see how MCT operates, let’s take a look at the show commands to verify it is functioning. Revision 0419 9 ‐ 42 ICX 150 Layer 2 Redundancy Displaying MCT Configuration • Display cluster configuration MCT1# show cluster MCT config cluster MCT 1 rbridge-id 1 session-vlan 150 icl ICL ethernet 1/1/1 peer 1.1.1.2 rbridge-id 2 icl ICL deploy client Client1 rbridge-id 100 client-interface ethernet 1/1/3 deploy client Client2 rbridge-id 200 client-interface ethernet 1/1/5 deploy Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 43 Once the cluster is configured, you can use the show cluster <cluster ID> config command to view the configuration. Remember to make sure each client and the cluster are deployed. Revision 0419 9 ‐ 43 ICX 150 Layer 2 Redundancy Display MCT Cluster • Display cluster information MCT1(config)# show cluster 1 Cluster MCT 1 ============= Rbridge Id: 1, Session Vlan: 150 Cluster State: Deploy Client Isolation Mode: Loose Member Vlan Range: 2 ICL Info: --------Name Port Trunk ICL 1/1/1 1 Peer Info: ---------Peer IP: 10.1.1.2, Peer Rbridge Id: 2, ICL: ICL KeepAlive Interval: 10 , Hold Time: 90, Fast Failover Active Vlan Range: 2 Last Reason for CCP Down: Not Down Peer State: CCP Up (Up Time: 2 days: 1 hr: 6 min:48 sec) Client Info: -----------Number of Clients configured: 2 Name Rbridge-id Config Port Trunk FSM-State Client1 100 Deployed 1/1/3 2 Up Client2 200 Deployed 1/1/5 3 Up Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 44 The show cluster command displays a lot of useful information including this peers RBridgeID, the Session VLAN, and the cluster state, which is deploy. It also shows the ICL port number and the peer information. Notice that the Peer State is CCP Up. At the bottom of the output, are the clients. Notice that they are deployed. Revision 0419 9 ‐ 44 ICX 150 Layer 2 Redundancy Displaying Client Information • Display a list of clients and information MCT1# show cluster MCT client Client Info: -----------Number of Clients Configured: 2 Name Rbridge-id Config Client1 100 Deployed Client2 200 Deployed Configured clients by name and RBridgeID Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Client Ports and Trunk ID Port 1/1/3 1/1/5 State of the client, deployed or undeployed Trunk 2 3 FSM-State Up Up Finite State Machine status 45 The show cluster client command displays the client information including the client name, RBridgeID, state, primary port, number of ports in the LAG connected to the client and the FSM‐State. The FSM‐State displays status of the Finite State Machine (FSM). Valid states are: • Up – CCEP ports on both MCT peers are up. • Local Up – CCEP ports are up on local MCT peer, but down on remote peer. • Remote Up – CCEP ports are down on local MCT peer, but up on remote peer. • Admin Up – CCEP ports on both MCT peers are enabled and deployed but down. Revision 0419 9 ‐ 45 ICX 150 Layer 2 Redundancy Displaying Client Information • Display client details by client name or RBridgeID MCT1# show cluster MCT client Client2 Cluster MCT 1 ============= Cluster Information including, Rbridge Id: 1, Session Vlan: 150 RBridgeID, Session VLAN, Cluster State: Deploy and Member VLANs Client Isolation Mode: Loose Member Vlan Range: 2 Client Info: -----------Client: Client2, rbridge-id: 200, Deployed Client Port: 1/1/5, Trunk Id :3 Client portmask: ethe 1/1/5 State: Up Number of times Local CCEP down: 0 Number of times Remote CCEP down: 0 Number of times Remote Client undeployed: 0 Total CCRR packets sent: 2 Total CCRR packets received: 1 Client Information including, RBridgeID, client ports, and state Client statistics Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 46 Display more client details using the show cluster command followed by the cluster name and client name. Here we see the cluster information, as well as the client information and statistics. Revision 0419 9 ‐ 46 ICX 150 Layer 2 Redundancy Displaying CCP Information • Display a list of peers – You can also specify a peer by IP address to view information specific to that peer MCT1# show cluster MCT ccp peer PEER IP ADDRESS STATE --------------------------10.1.1.2 OPERATIONAL UP TIME -------------0 days: 2 hr:25 min:16 sec Peers by address State, none or operational, Up-time Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 47 To display a list of cluster peers, use the show cluster ccp peer command with the cluster name. Here we see that the peer at IP address 10.1.1.2 is operational, and the amount of time the peer has been up. Revision 0419 9 ‐ 47 ICX 150 Layer 2 Redundancy Displaying CCP Information (cont.) • Use the detail parameter to view more CCP information MCT1# show cluster MCT ccp peer detail **************Peer Session Details********************* IP address of the peer 10.1.1.2 Rbridge ID of the peer 2 Session state of the peer OPERATIONAL Next message ID to be send 287 Keep Alive interval in seconds 30 Hold Time Out in seconds 90 Fast Failover is enable for the session UP Time 0 days: 2 hr:25 min:16 sec Number of tcp packet allocations failed 0 Message Init Keepalive Notify Application Badmessages Send 3 2421 2 53 0 Receive 3 2415 0 37 0 TCP connection is up TCP connection is initiated by 10.1.1.1 TCP connection tcbHandle not pending TCP connection packets not received TCP connection packets not received **************TCP Connection Details********************* TCP Connection state: ESTABLISHED Maximum segment size: 1436 Local host: 10.1.1.1, Local Port: 12203 Remote host: 10.1.1.2, Remote Port: 4175 <Output Truncated> Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 48 Add the detail parameter, and you can see peer connection information as well as the communication between the peers on the TCP port. Here we see the TCP connection is ESTABLISHED. Revision 0419 9 ‐ 48 ICX 150 Layer 2 Redundancy Summary • Attendees should now be able to: – – – – – – – Identify supported Spanning Tree Protocols Configure Spanning Tree and Rapid Spanning Tree Identify Ruckus enhanced features to Spanning Tree Describe Multiple Spanning Tree (MSTP) 802.1s and its purpose Describe the benefits of Multi‐Chassis Trunking (MCT) Understand and discuss MCT terminology Display MCT operational status Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 49 This concludes the Layer 2 Redundancy module. You should now be able to: Identify supported Spanning Tree Protocols Configure Spanning Tree and Rapid Spanning Tree Identify Ruckus enhanced features to Spanning Tree Describe Multiple Spanning Tree (MSTP) 802.1s and its purpose Describe the benefits of Multi‐Chassis Trunking (MCT) Understand and discuss MCT terminology Display MCT operational status Revision 0419 9 ‐ 49 ICX 150 Layer 2 Redundancy End of Module 9: Layer 2 Redundancy Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved This completes the layer 2 redundancy module. I encourage you to continue to the next module of the ICX 150 Implementer course. Thank you. Revision 0419 9 ‐ 50 ICX 150 ICX Stacking Technology Module 10: ICX Stacking Technology Revision 0419 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved This module focuses on Ruckus stacking technology using the different ICX switches. Revision 0419 10 ‐ 1 ICX 150 ICX Stacking Technology Objectives • After completing this module, attendees should be able to: – Describe stacking technology and its benefits – Describe stacking features including long‐distance stacking and hitless stacking – Explain how to configure stacking using the interactive‐setup utility – Display stack information once the stack is formed – Explain how to replace and add new units to a stack Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 2 At the completion of this module you will be able to: • Describe stacking technology and its benefits • Describe stacking features including long‐distance stacking and hitless stacking • Explain how to configure stacking using the interactive‐setup utility • Display stack information once the stack is formed • Explain how to replace and add new units to a stack Revision 0419 10 ‐ 2 ICX 150 ICX Stacking Technology Stacking Benefits • Some of the benefits and features of stacking include: – – – – – – – Stacking without any additional hardware cards or software licenses1 Single point of management Standards‐based dual‐purpose stacking/uplink ports Trunk‐able stacking ports Large port density per stack Ring and linear topologies Interactive‐setup utility to make stacking configuration easy and secure – Packet switching in hardware between ports on stack units – Protocols operate on a stack in the same way as on a chassis‐based system Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 3 Footnote 1: Some ICX switch SKUs require a 10Gbps license to support stacking. Here we list some of the features and benefits of stacking: • Stacking on ICX devices does not require any additional hardware cards. Nor any stacking‐specific software licenses, however some ICX switches require a 10Gbps port licenses. • Stacking offers a single point of management with the active controller in the stack. • Most ICX models offer dual‐purpose ports for stacking or uplink. As well as, trunk‐ able stacking ports. • Stacking offers a large port density per stack. • ICX devices can be stacked in different topologies for your environment, including ring and linear. • The interactive‐setup utility makes stacking configuration easy and secure. • The Ruckus stacking technology allows for packet switching in hardware between ports on stack units. • And protocols operate on a stack in the same way as on a chassis‐based system. We’ll take a closer look at most of these features in this module. Revision 0419 10 ‐ 3 ICX 150 ICX Stacking Technology Stacking Topologies • Linear topology – End units of the stack use one stack port, leaving the other port for data • Ring topology – Ruckus recommended topology for redundancy and resiliency – All stack members must have two stacking ports Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 4 This slide shows the two supported topologies for a traditional stack. They are the ring and linear. In the linear topology there is a single stack cable connection between each switch that carries two‐way communications across the stack. In a ring topology, an extra cable is connected between the top and bottom switches forming a “ring” or “closed‐loop.” The closed‐loop cable provides a redundant path for the stack link, so if one link fails, stack communications can be maintained. Ring is the Ruckus recommended topology because it offers the best redundancy and the most resilient operation. Unicast switching follows the shortest path in a ring topology. When the ring is broken, the stack recalculates the forwarding path and then resumes the flow of traffic within a few seconds. Revision 0419 10 ‐ 4 ICX 150 ICX Stacking Technology Trunked Stacking • Stacking trunks can be configured to increase stacking bandwidth and provide better resiliency • As long as one port of the trunk is connected, communication between the neighboring units will continue • Traffic is load balanced to the trunk ports • If one stacking port on a trunk goes down, no stack election or topology changes occur – Traffic interruption should be in the sub‐second range • Stacking trunks range in size from 2‐6 ports, depending on switch model Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 5 A stack‐trunk increases the stacking port bandwidth up to 400 Gbps, depending on switch model, and provides better resilience than a single port‐to‐port link. As long as at least one port on the trunk is connected properly, communication between the neighboring units will work. Traffic is load balanced to the trunk ports. When only one stacking port on a trunk goes down, no stack election or topology changes should occur. The resulting traffic interruption time should be in the sub‐second range as the system detects that the port is down and re‐programs hardware. Stacking trunks range in size from 2‐6 ports, depending on switch model and other factors, which will be discussed later in this presentation. Revision 0419 10 ‐ 5 ICX 150 ICX Stacking Technology Stacking Hardware Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Lets start with an overview of the stacking hardware on the different Ruckus ICX switches. Revision 0419 10 ‐ 6 ICX 150 ICX Stacking Technology Valid Stack Port Sets • Beginning with release 8.0.90, stacking ports cannot be chosen arbitrarily • Valid‐stack‐port sets define the starting ports, in each direction of a stack, or stack trunk • Each ICX device has specific valid stack port sets View the release 8.0.90 Stacking Configuration Guide for a complete list of valid‐stack‐port sets on each ICX model Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved In previous releases of ICX firmware, you had some flexibility in determining which ports could be used for stacking. However, to maximize stack functionality, release 8.0.90 introduces a concept of valid stack ports. These ports define the single stack ports, one in each direction, or the first port in a stack trunk. Due to this change there is no longer a concept or configuration command defining a default‐stack‐port. Because of the flexibility and variance of ICX switch models, each may have several combinations of valid‐stack‐ports. Therefor, it is essential to review the Ruckus FastIron Stacking Configuration Guide for release 08.0.90 to identify all of the potential valid‐stack‐ port pairs on an ICX switch. The example here shows valid‐stack‐port pairs for the ICX 7750 and 7850. As you can see the ICX 7750 has several more valid‐stack‐port pairs than the 7850. Looking at how the valid‐stack‐ports are represented, you see two ports followed by a number. The ports identify a pair of ports that can be defined as stack‐ports. The third number indicates the maximum size of a stack trunk, if this stack‐port pair is selected. So as you can see, your selection of stack‐ports could impact the overall bandwidth increase available using stack‐trunks. Revision 0419 10 ‐ 7 ICX 150 ICX Stacking Technology ICX 7150‐C12P Stacking Hardware • 2 x 1/10 GbE SFP+ ports in slot 3: – x/3/1 and x/3/2 for stacking • Both ports can be upgraded to 10 GbE SFP+ – Stacking is only supported on 10 GbE ports x/3/1 x/3/2 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 8 The ICX 7150‐C12P has two 1/10 GbE SPF+ ports on the front of the device. These ports are in slot 3. These ports are the only vlaid‐stack‐port pair for this model of ICX 7150. If you do not use these ports for stacking, they can be used for uplink. Revision 0419 10 ‐ 8 ICX 150 ICX Stacking Technology ICX 7150‐48ZP Stacking Hardware and Trunks • 8 x 1/10 GbE SFP+ ports in slot 2: – x/2/1 to x/2/4 for stacking – x/2/5 to x/2/8 for uplink x/2/1 x/2/3 x/2/1 x/2/3 x/2/2 x/2/4 • All 8 ports can be upgraded to 10 GbE SFP+ – Stacking is only supported on 10 GbE ports • Valid‐stack‐port set is x/2/1 and x/2/3 • Stacked trunks can be formed on ports x/2/1 and x/2/2, ‐ and x/2/3 and x/2/4 Ruckus(config)# stack unit 1 Ruckus(config-unit-1)# stack-trunk 1/2/1 to 1/2/2 Ruckus(config-unit-1)# stack-trunk 1/2/3 to 1/2/4 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 9 The ICX 7150‐48ZP has eight 1/10 GbE SPF+ ports on the front of the device. The ICX 7150‐ 48ZP has only one valid‐stack‐port pair, ports x/2/1 and x/2/3. Stack trunks can be configured bundling ports x/2/1 and 1/2/2 in one direction and bundling ports x/2/3 and x/2/4 in the other direction. Any ports not used for stacking can be used for uplink. By default all eight of the ports in slot 2 are 1 GbE, but they can be upgraded to 10 GbE with a Ports on Demand software license. Stacking is only supported on 10 GbE ports. Revision 0419 10 ‐ 9 ICX 150 ICX Stacking Technology ICX 7150‐24 and ‐48 Stacking Hardware and Trunks • All other ICX 7150 models support the following stacking capabilities • 4 x 1/10 GbE SFP+ ports in slot 3: – x/3/1 to x/3/4 for stacking – All 4 ports must be license upgraded to 10 GbE • Stacking is only supported on 10 GbE ports x/3/1 x/3/3 and x/3/3 and x/3/4 x/3/1 x/3/3 Ruckus(config)# stack unit 1 Ruckus(config-unit-1)# stack-trunk 1/3/1 to 1/3/2 Ruckus(config-unit-1)# stack-trunk 1/3/3 to 1/3/4 x/3/2 x/3/4 • Valid‐stack‐port set is x/3/1 and x/3/3 • Stacked trunks can be formed on ports x/3/1 and x/3/2, ‐ Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 10 The remaining ICX 7150 24‐ and 48‐port variants support stacking on the 4 x1/10 SFP+ ports in sot 3. There is only one valid‐stack‐port pair for these and those are x/3/1 and x/3/3. In order to allow stacking all of the stack ports must be upgraded to 10 GbE, as stacking is not supported in 1 GbE mode. You can for stack port trunks using ports x/3/1 to x/3/2 and ports x/3/3 to x/3/4. The configuration example shows the stack-trunk command being employed to manually configure these ports as stack trunks. Manual configuration may not be necessary if you are using the stack interactive‐setup utility, which will be discussed later in this presentation. Revision 0419 10 ‐ 10 ICX 150 ICX Stacking Technology ICX 7250 Stacking Hardware • 8 x 1/10 GbE SFP+ ports in slot 2 • You can change the 4 stacking ports to use x/2/1 to x/2/4 or x/2/5 to x/2/8 • All 8 ports can be upgraded to 10 GbE SFP+ – Stacking is only supported on 10 GbE ports • Default valid‐stack‐port set is x/2/1 and x/2/3 – Can be changed to x/2/5 and x/2/7 x/2/1 x/2/3 x/2/5 x/2/7 Ruckus(config-unit-1)# stack-port 1/2/5 stack-port 1/2/5 replaces stack-port 1/2/1 and stack-port 1/2/3 Ruckus(config-unit-1)# stack-port 1/2/7 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 11 The ICX 7250 has eight 1 GbE SPF ports on the front of the device. These ports are in slot 2. Four ports are reserved for stacking, ports x/2/1 through x/2/4, and four ports are reserved for uplink, ports x/2/5 through x/2/8. If you do not uses all four ports for stacking, the other ports can be used for uplink. On the ICX 7250, stacking is only supported on 10 GbE ports. By default all eight ports in slot 2 are 1 GbE, but they can be upgraded to 10 GbE with a Ports on Demand software license. The default stacking ports are x/2/1 and x/2/3, but they can be changed to x/2/5 and x/2/7 using the stack-port command. This is a two‐step process, changing the stacking port to x/2/5 will result in stacking being disabled on ports x/2/1 and x/2/3. Next you are required to designate port x/2/7 as a stacking port by using the stack-port command again for the port. Revision 0419 10 ‐ 11 ICX 150 ICX Stacking Technology ICX 7250 Stack Trunks • Stacked trunks can be formed using the following port combinations: – If stacking is enabled on ports x/2/1 – x/2/4, trunks can be formed on ports x/2/1 to x/2/2, and x/2/3 to x/2/4 – If stacking is enabled on ports x/2/5 – x/2/8, trunks can be formed on ports x/2/5 to x/2/6, and x/2/7 to x/2/8 x/2/1 x/2/3 x/2/5 x/2/7 x/2/2 x/2/4 x/2/6 x/2/8 Ruckus(config-unit-1)# stack-port 1/2/5 stack-port 1/2/5 replaces stack-port 1/2/1 and stack-port 1/2/3 Ruckus(config-unit-1)# stack-port 1/2/7 Ruckus(config-unit-1)# stack-trunk 1/2/5 to 1/2/6 Ruckus(config-unit-1)# stack-trunk 1/2/7 to 1/2/8 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 12 As I mentioned the ports are divided in groups of four. Ports x/2/1 – x/2/4 on the left, and ports x/2/5 – x/2/8 on the right. You can create the following stack trunks: • If stacking is enabled on the default stacking ports (x/2/1 – x/2/4), trunks can be formed on ports x/2/1 to x/2/2, and x/2/3 to x/2/4 • If stacking is enabled on ports x/2/5 – x/2/8, trunks can be formed on ports x/2/5 to x/2/6, and x/2/7 to x/2/8 Revision 0419 10 ‐ 12 ICX 150 ICX Stacking Technology ICX 7450 Stacking Hardware • The two 1 x 40 QSFP+ modules on the back of the device are the default stacking ports for the ICX 7450 – Slots are number 3 and 4 from left to right – System default valid‐stack‐port set is x/3/1 and x/4/1 • Alternative valid‐stack‐port‐set is x/2/1 and x/2/3 x/3/1 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved x/4/1 13 The ICX 7450 has two 1 x 40 QSFP+ stacking ports on the rear of the device. These are the default stacking ports and are in slots 3 and 4 from left to right. These ports are numbered x/3/1 and x/4/1. Revision 0419 10 ‐ 13 ICX 150 ICX Stacking Technology ICX 7450 Stacking Hardware (cont.) • Slot 2 on the front of the ICX 7450 supports a 4 x 10 GbE SFP+ module for uplink or stacking – You can use front slot 2, or back slots 3 and 4 for stacking, not both – To use the 4 x 10 GbE ports, change the stacking‐ports from x/3/1 and x/4/1 to ports x/2/1 and x/2/3 using the stack-port command ICX7450-24P Router(config-unit-1)# stack-port 1/2/1 stack-port 1/2/1 replaces stack-port 1/3/1 and stack-port 1/4/1 Reload required to form a stack with Module 2 ports. Please write memory and then reload or power cycle. ICX7450-24P Router(config-unit-1)# stack-port 1/2/3 x/2/1 x/2/3 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 14 The ICX 7450 also has a 4 x 10 SFP+ module on the front of the device for uplink or stacking. These ports are in slot 2. You can create a stack using the default ports on the back of the device, or the ports in slot 2 shown here, but not both. You can change the stacking ports using the stack-port command. This is a two‐step process, changing the stacking port to x/2/1 will result in stacking being disabled on ports x/3/1 and x/4/1. Next you are required to designate port x/2/3 as a stacking port by using the stack-port command again for the port. You must change the stack ports from the back ports x/3/1 and x/4/1, to the front ports x/2/1 and x/2/3 if they are going to be used. A reload is required after changing the stack ports. Revision 0419 10 ‐ 14 ICX 150 ICX Stacking Technology ICX 7450 Stack Trunks • If the stack ports are changed to x/2/1 and x/2/3, two stack trunks can be formed, pairing ports x/2/1 to x/2/2, and x/2/3 to x/2/4 Ruckus(config-unit-1)# Ruckus(config-unit-1)# Ruckus(config-unit-1)# Ruckus(config-unit-1)# x/2/1 x/2/3 x/2/2 x/2/4 stack-port 1/2/1 stack-port 1/2/3 stack-trunk 1/2/1 to 1/2/2 stack-trunk 1/2/3 to 1/2/4 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 15 You can create two stacking trunks on the 7450 using the front ports, but remember, you have to define them as stack ports first. Two 2‐port trunks can be configured combining ports x/2/1 and x/2/2 together, and ports x/2/3 and x/2/4 together. Revision 0419 10 ‐ 15 ICX 150 ICX Stacking Technology ICX 7650 Stacking Hardware • By default, the two 100 GbE ports on the rear are the default stacking ports for the ICX 7650 – When rear ports are operating in 100 Gbps mode (default), the valid‐stack‐port pair is x/3/1 and x/3/2 x/3/2 x/3/1 – When rear ports are operating in 40 Gbps mode, the valid‐stack‐port pair is x/3/1 and x/3/3 x/3/3 x/3/1 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 16 On the ICX 7650, ports x/3/1 and x/3/2 are used for stacking when the ports are being used in 100 Gpbs mode, which is the default. However, the ports can also be configured to operate in 40 Gbps mode. In this case the valid‐stack‐port pair is ports x/3/1 and x/3/3. 40GbE mode is the only mode on the ICX 7650 that supports stack‐trunks. Note that the rear‐facing ports on the ICX 7650 are numbered from right‐to‐left. Revision 0419 10 ‐ 16 ICX 150 ICX Stacking Technology ICX 7650 Stack Trunks • When the rear ports are operating in 40 Gbps mode, two stack trunks can be formed between x/3/1 and x/3/2, and between x/3/3 and x/3/4 x/3/4 x/3/3 x/3/2 x/3/1 Ruckus(config) rear-module stack-40g Ruckus(config) write mem [ Reload required ] Ruckus(config-unit-1)# stack-trunk 1/2/1 to 1/2/2 Ruckus(config-unit-1)# stack-trunk 1/2/3 to 1/2/4 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 17 You can create stacking trunks on the 7650, but only when the rear port are operating in 40 Gbps mode. This a accomplished with the rear‐module stack‐40g command. The change in functionality requires a reset. Be sure to save your configuration before performing the switch reset. After the reboot, the valid‐stack‐ports will be x/3/1 and x/3/3. Then two 2‐ port trunks can be configured combining ports x/3/1 to x/3/2, and ports x/3/3 to x/3/4. Revision 0419 10 ‐ 17 ICX 150 ICX Stacking Technology ICX 7750 Stacking Hardware • The ICX 7750 has 2 slots containing 6 x 40 GbE ports that can be used simultaneously for stacking • Slot 2 on the front has ports x/2/1 to x/2/6 • Default valid‐stack‐port pair is x/2/1 and x/2/4 – Other valid‐stack‐port pairs include: • x/3/1, x/3/4 • x/2/1, x/3/1 • x/2/5, x/2/6 • x/3/5, x/3/6 • x/2/5, x/3/5 x/3/1 x/3/3 x/3/5 x/3/2 x/3/4 x/3/6 x/2/1 x/2/3 x/2/5 x/2/2 x/2/4 x/2/6 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 18 The 7750 has 2 slots with six 40 GbE ports, slot 2 on the front has ports x/2/1 to x/2/6, slot 3 on the rear has port x/3/1 to x/3/6. The default factory stacking ports are x/2/1 and x/2/4. There are various pairings of stack ports available on the ICX 7750, including those shown here. The pairing being selected affects the number of ports that can be configured in a stack‐trunk. Revision 0419 10 ‐ 18 ICX 150 ICX Stacking Technology ICX 7750 Stack Trunks • Configure up to 2 stack trunks on the ICX 7750 • Possibilities include: 6‐port Trunk 3‐port Trunk 2‐port Trunk x/2/1 through x/2/6 (down) x/3/1 through x/3/6 (up) x/2/1 through x/2/3 (down) x/2/4 through x/2/6 (up) x/2/5 through x/2/6 (down) x/3/5 through x/3/6 (up) x/3/1 through x/3/3 (down) x/3/4 through x/3/6 (up) Back Ports Front Ports x/2/1 x/2/3 x/2/5 x/2/2 x/2/4 x/2/6 x/3/1 x/3/3 x/3/5 x/3/2 x/3/4 x/3/6 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 19 On the ICX 7750, it is possible to configure up to two stack trunks. This chart shows the different options for creating 6‐port, 3‐port, or 2‐port trunks. Take a minute to review the chart, and continue when you are ready. NOTE: Stacking cannot be enabled on Ruckus ICX 7750 devices that have a breakout configuration on any 40 GbE ports, and vice versa. Revision 0419 10 ‐ 19 ICX 150 ICX Stacking Technology ICX 7850 Stacking Hardware • The ICX 7850‐32Q has 8 ports in slot 3 that can be used for stacking – The valid‐stack‐port pair is x/3/1 and x/3/5 x/3/1 x/3/5 • The ICX 7850‐48FS/F has 8 ports in slot 2 that can be used for stacking – The valid‐stack‐port pair is x/2/1 and x/2/5 x/2/1 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved x/2/5 20 All three variants of the ICX 7850 support 8 ports for stacking. On the ICX 7850‐32Q these ports are located in slot 3. On the two 48‐port versions, the stacking ports are located on slot 2. Therefore the default valid‐stack‐ports on the 7850‐32Q are ports x/3/1 and x/3/5. and on the 48‐port versions they are ports x/2/1 and x/2/5, Revision 0419 10 ‐ 20 ICX 150 ICX Stacking Technology ICX 7850 Stack Trunks • On the ICX 7850‐32Q stacking trunks of up to 4 ports can be configured using ports x/3/1 to x/3/4 and ports x/3/5 to x/3/8 x/3/1 x/3/3 x/3/5 x/3/7 x/3/2 x/3/4 x/3/6 x/3/8 • On the ICX 7850‐48FS/F stacking trunks of up to 4 ports can be configured using ports x/2/1 to x/2/4 and ports x/2/5 to x/2/8 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved x/2/1 x/2/3 x/2/5 x/2/7 x/2/2 x/2/4 x/2/6 x/2/8 21 All three models of ICX 7850 support 4‐port stacking trunks in each direction. The ICX 7850‐ 32Q supports these trunks on ports in slot 3. The ICX 7850‐48F/FS support these trunks on ports in slot 2. Revision 0419 10 ‐ 21 ICX 150 ICX Stacking Technology Long Distance Stacking Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Next we’ll look at how we can configure the distributed chassis solution with long distance stacking. Revision 0419 10 ‐ 22 ICX 150 ICX Stacking Technology Long Distance Stacking • Distances between stack units is extened: – Up to 40 kilometers using 40G QSFP‐ER4 optics – Up to 10 kilometers using 100G QSFP28 and 40G QSFP‐LR4 optics • Currently supported on: – – – – ICX 7450 ICX 7650 ICX 7750 ICX 7850 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 23 The long distance stacking, distributed chassis topology offers the ability to house stacking units in geographically separate locations, like different buildings, as shown here. Using 40G QSFP‐ER4 optics, distances up to 40 kilometers can be achived between stack units. !00G ports with QSFP28 optics and 40G ports with QSFP‐LR4 optics can reach distances of 10 kilometer. Long distance stacking is available on the ICX 7450, 7650, 7750, and 7850 switch models. Revision 0419 10 ‐ 23 ICX 150 ICX Stacking Technology 100‐Gbps Long Distance Stacking – 10 km • QSPF28 100‐Gbps ports support long distance stacking up to 10 kilometers – ICX 7650 supports 100‐Gbps long distance stacking up to 10km on ports x/3/1 and x/3/2 – ICX 7850‐32Q supports 100‐Gbps long distance stacking up to 10km on ports x/3/1 to x/3/8 – ICX 7850‐48FS/F supports 100‐Gbps long distance stacking up to 10km on ports x/2/1 to x/2/8 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 24 The ICX 7650 and both variants of the ICX 7850 support 100‐Gbps port speeds used for long distance stacking at distance up to 10 kilometers. The ICX 7650 supports 100‐Gbps long distance stacking on ports x/3/1 and x/3/2 when the rear slot is operating in the default 100 Gbps‐mode. The ICX 7850‐32Q supports 100‐Gbps long distance stacking on ports x/3/1 through x/3/8. ICX 7850‐48FS/F supports 100‐Gbps long distance stacking on ports x/2/1 through x/2/8. Note: The distances reachable at these speeds is dependent on the optics installed in the QSFP28 interface. 10km distances require 100G‐QSFP28‐LR4 optics. Revision 0419 10 ‐ 24 ICX 150 ICX Stacking Technology 40‐Gbps Long Distance Stacking – Up to 40 km • QSPF‐ER4 optics on some ICX switches support long distance stacking up to 40 kilometers – QSFP‐LR4 optics in the same ports only support distances up to 10km – All ICX 7750 models support 40‐Gbps long distance stacking up to 40km on: • Front ports x/2/1 to x/2/6 • Rear ports x/3/1 to x/3/6 – ICX 7850‐32Q supports 40‐Gbps long distance stacking up to 40km on ports x/3/1 to x/3/8 – ICX 7850‐48FS/F supports 40‐Gbps long distance stacking up to 40km on ports x/2/1 to x/2/8 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 25 ICX devices that support QSFP‐ER4 optics support long distance stacking up to 40 km. These include the ICX 7750 and 7850. The ICX 7750 supports 40‐Gbps long distance stacking on ports x/2/1 through x/2/6 on the front of the unit and ports x/3/1 through x/3/6 on the back of the unit. The ICX 7850‐32Q supports 40‐Gbps long distance stacking on ports x/3/1 through x/3/8 ICX 7850‐48FS/F supports 40‐Gbps long distance stacking on ports x/2/1 through x/2/8 Note: The distances reachable at these speeds is dependent on the optics installed in the QSFP+ interface. 40km distances require 40G‐QSFP‐ER4 optics. Distances of 10km can be reached using these same interface with 40G‐QSFP‐LR4 optics. Revision 0419 10 ‐ 25 ICX 150 ICX Stacking Technology 40‐Gbps Long Distance Stacking – 10 km • QSPF‐LR4 optics on some ICX switches support long distance stacking up to 10 kilometers – ICX 7750 and 7850 devices that support QSFP‐ER4 for 40 km also support QSFP‐LR4 for 10 km – All ICX 7450 models support 40‐Gbps long distance stacking up to 10km on ports x/3/1 and x/4/1 – All ICX 7650 models support 40‐Gbps long distance stacking up to 10km on ports x/3/1 to x/3/4 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 26 The ICX 7750 and 7850 ports described on the previous slide also support stacking distances up to10km when using 40G‐QSFP‐LR4 optics. In addition to this, the ICX 7450 supports 40‐Gbps long distance stacking on ports x/3/1 and x/4/1 on the back of the unit. The ICX 7650 supports 40‐Gbps long distance stacking on ports x/3/1 through x/3/8 which are also on the rear of the unit. Note: The distances reachable at these speeds is dependent on the optics installed in the QSFP interface. 10km distances require 40G‐QSFP‐LR4 optics. Revision 0419 10 ‐ 26 ICX 150 ICX Stacking Technology Stacking Cables & Optics https://www.ruckuswireless.com/ • Each ICX model supports different optics and cables for long distance and short distance stacking • Download the Ethernet Optics Family Datasheet and Support Matrix for the latest information on ICX optics and cable support for stacking Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 27 As we have just seen, the different ICX models support different optics and cables for long distance and short distance stacking. For the most up‐to‐date information on ICX optics and cable support for stacking, please download the Ethernet Optics Family Datasheet and Support Matrix. These can be found on the ruckuswireless.com website. Revision 0419 10 ‐ 27 ICX 150 ICX Stacking Technology Stacking Architecture Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Now that we have gone over the hardware components of stacking, let’s take a look at the architecture of stacking. Revision 0419 10 ‐ 28 ICX 150 ICX Stacking Technology Stack Roles • Active controller – Stack member with highest priority, handles stack management – Console redirection from all units to active controller • Standby controller – Stack member with 2nd highest priority – Will take over active controller duties if active controller fails • Member – Unit in the stack that is neither active nor standby controller – Eligible for election to standby or active controller if necessary Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 29 Switches in a stack have one of the following roles: • The active controller is the stack member with highest priority, and it handles all stack management through its console. Configuration of all stack units is directed from the active controller. • The standby controller is the stack member with 2nd highest priority. The standby takes over active controller duties if the active controller fails. • Member units are neither active nor standby controllers, but they are eligible for election to standby or active if necessary. Revision 0419 10 ‐ 29 ICX 150 ICX Stacking Technology Active Controller • The active controller handles all stack management including: – SW image downloads to stack members – Controlling the console – Building and propagating the Forwarding Database (FDB) to all stack members CLI CLI Config Config FDB SWFDB image SW image Active Controller – Configuring all system and interface‐level features – Pushing configuration to each stack member – Synchronizing runtime configuration to the standby controller – Sending incremental CLI changes to the standby controller – Insuring the standby controller receives a copy of all control packets and protocols running on the active controller Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 30 The responsibility of the active controller is to handle all stack management including: • Downloading software images to all stack members, and controlling the console for the entire stack. All stack configuration is done from the active controller, including all system and interface‐level features. The active controller then pushes the configuration to each stack member. • The active controller builds and propagates the Forwarding Database (FDB) to all stack members, synchronizes runtime configurations to the standby controller, and sends incremental CLI changes to the standby controller. • The active controller also insures that the standby controller receives a copy of all control packets and protocols running on the active controller. Revision 0419 10 ‐ 30 ICX 150 ICX Stacking Technology Stack Unit Assignment • During the active controller election process, switches are assigned a switch ID automatically – Switch ID does not designate physical switch position in the stack • Valid switch ID numbers are 1 through 12 • Switches that receive a different switch ID from the default of 1, reload and take the newly assigned ID • Switch IDs can be pre‐assigned or renumbered the using the stack interactive-setup command Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 31 During the active controller election process, switches are assigned a switch ID. This ID does not designate the switches physical position in the stack, it is just an identifier. All ICX switch families use switch IDs from 1 through 12. By default all switches have the ID of 1. Switches that receive a different ID from the active controller, reload and take the newly assigned ID. Switch IDs can be pre‐assigned or renumbered the using the stack interactivesetup command. Revision 0419 10 ‐ 31 ICX 150 ICX Stacking Technology Hitless Stacking Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Next we’ll take a look at the hitless stacking feature. Revision 0419 10 ‐ 32 ICX 150 ICX Stacking Technology Hitless Stacking Overview • A high availability feature set that ensures sub‐second or no loss of data traffic during the following events: – – – – Active controller failure or role change Software failure Addition or removal of units in a stack Removal or disconnection of the stacking cable between the active controller and the standby controller • Standby controller takes over the active role, and the system continues to forward traffic seamlessly • Enabled by default as of software version 8.0.20 – Use the hitless-failover command on earlier versions of software Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 33 Hitless stacking is a high availability feature set that ensures sub-second or no loss of data traffic during the following events: • • • • Active controller failure or role change. Software failure. Addition or removal of units in a stack. Removal or disconnection of the stacking cable between the active controller and the standby controller. During such events, the standby controller takes over the active role, and the system continues to forward traffic seamlessly, as if no failure or topology change has occurred. In software releases that do not support hitless stacking, events such as these could cause most of the units in a stack to reset, affecting data traffic. Hitless stacking is supported on ICX units in a traditional stack, and is enabled by default as of software version 8.0.20 and above. Revision 0419 10 ‐ 33 ICX 150 ICX Stacking Technology Supported Events • Events supported by hitless stacking: – – – – Active controller failure or role change Software failure Addition or removal of units in a stack Removal or disconnection of the stacking cable between the active controller and the standby controller • Events not supported by hitless stacking: – Unit ID change (during stack formation or using interactive‐setup) – Stack merge – Software upgrade • Can be disabled using the no hitless-failover enable command Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 34 Hitless stacking is supported during a switchover or failover. A hitless stacking switchover is a manually‐controlled (CLI‐driven) or automatic switchover of the active controller and standby controller without reloading the stack and without any packet loss to the services and protocols that are supported by hitless stacking. A switchover is activated by the stack switch‐over command. A switchover may also be activated by the priority command, depending on the configured priority value. A hitless stacking failover is an automatic, forced switchover of the active controller and standby controller because of a failure or abnormal termination of the active controller. During a failover, the active controller abruptly leaves the stack, and the standby controller immediately assumes the active role. As with a switchover, a failover occurs without the stack being reloaded. Unlike a switchover, a failover generally occurs without warning and is likely to result in sub‐second packet loss (although packets traversing the stacking link may be lost). The following events are not supported by hitless stacking because they require a software reload, which affects all data traffic: • A unit ID change, either when a stack is formed, or when a unit is renumbered using interactive‐setup. • A stack merge, because when the old active controller comes back up, it reboots. If it has fewer members than the present active controller, it loses the election, regardless of its priority. If it has a higher priority, it becomes the standby controller and is synchronized with the active controller. • Stack upgrade, because software cannot be upgraded on stack units without impact on traffic. Revision 0419 10 ‐ 34 ICX 150 ICX Stacking Technology Supported Protocols and Services • Protocols and services supported by hitless stacking: – – – – L2 switched traffic Layer3 IPv4 unicast routed traffic Layer3 IPv6 unicast ad multicast routed traffic Security • Some protocols require addition configuration to achieve truly hitless failover – For example, OSPF v2/v3 requires non‐stop routing to be enabled View the release 8.0.90 Stacking Configuration Guide for a complete list of protocols and services supported by hitless stacking Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 35 You can find a list of protocols that support hitless stacking in in the FastIron Ethernet Switch Stacking Configuration Guide. Revision 0419 10 ‐ 35 ICX 150 Revision 0419 ICX Stacking Technology 10 ‐ 36 ICX 150 Revision 0419 ICX Stacking Technology 10 ‐ 37 ICX 150 ICX Stacking Technology Manual Hitless Switchover • Use the stack switch-over command to switchover from the active controller to the standby controller without reloading the stack • There is no packet loss to the services and protocols supported by hitless stacking • A manual switchover could also be accomplished by lowering the priority of the active controller Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 38 A switchover is activated by the stack switch-over command, but it can also be activated by lowering the priority of the active controller to a value lower than the priority of the current standby controller. Revision 0419 10 ‐ 38 ICX 150 ICX Stacking Technology Stack Formation Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Revision 0419 39 10 ‐ 39 ICX 150 ICX Stacking Technology Stack Formation Methods 1. Stack interactive‐setup utility – Gives you control over the design of your stack topology – The switch where the stack interactive-setup command is run becomes the active controller 2. Stack zero‐touch provisioning – – – – All member units must be “clean” with no startup or running configuration Member units are pre‐connected Device where stack zero-touch-enable is run will become the active controller Equivalent to selecting option 2 of stack interactive-setup where all suggested values are accepted 3. Manual stack configuration – Configure stacking on each unit individually, and enable stacking – ID assignment is determined by the sequence in which you physically connect the units Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 40 There are three ways to form a stack. The first is the interactive‐setup utility which we will be focusing on in this course. Using the interactive‐setup tool gives you control over the design of your stack topology without having to apply configuration changes to each unit in the stack. The switch where the stack interactive-setup command is run, becomes the active controller. The second method is stack zero‐touch provisioning. When you enable stack zero‐touch provisioning on pre‐cabled stack of switches, the unit you start the provisioning on becomes the active controller and the rest of the stack forms automatically. This method requires that you start with clean units (except for the active controller), that do not contain startup or run time configurations. This perfoms the same activity as selecting option 2 of the stack interactive‐setup utility where all default suggestions are accepted automatically, without administrative input. The third method is manual stack configuration. With this method, you configure every unit individually, and enable stacking on each unit. Once the units are connected together, they will automatically operate as a stack. With this method the unit with the highest priority becomes the active controller, and ID assignment is determined by the sequence in which you physically connect the units. Revision 0419 10 ‐ 40 ICX 150 ICX Stacking Technology Stack Interactive‐Setup Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Now we’ll take a look at stack formation using stack interactive‐setup. Revision 0419 10 ‐ 41 ICX 150 ICX Stacking Technology Interactive‐setup Utility • Follow these steps to form a stack using interactive‐setup 1. Connect the devices using the stacking ports and cables 2. Power on the units 3. Configure stack enable on the intended Active controller at the global CONFIG level Ruckus(config)# stack enable 4. Define stack‐ports on the intended Active controller – if using non‐default valid‐stack‐port pairs Ruckus(config)# stack unit 1 Ruckus(config-unit-1)# stack-port 1/2/5 stack-port 1/2/5 replaces stack-port 1/2/1 and stack-port 1/2/3 Ruckus(config-unit-1)# stack-port 1/2/7 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 42 Let’s take a look at the steps to form a stack using the interactive‐setup utility. First you need to connect the devices using the correct stacking ports and cables, then you need to power on the units. Next, you enable stacking on the unit you want to be the active controller. You do this with the stack enable command at the global CONFIG level. If you are using stack ports that are not the default valid‐stack‐port pair, configure them now. This is done with the stack-port command in the stack unit configuration context. Revision 0419 10 ‐ 42 ICX 150 ICX Stacking Technology Interactive‐setup Utility (cont.) 5. Run the stack interactive-setup command – A proprietary discovery protocol begins the discovery process in both upstream and downstream directions Ruckus# stack interactive-setup You can abort stack interactive-setup at any stage by <ctrl-c> 0: quit 1: change stack unit IDs 2: discover and convert new units (no startup-config flash) to members 3: discover and convert existing/new standalone units to members 2&3 can also find new links and auto-trunk or convert chain(s) to ring. Please type your selection: 2 Probing topology to find clean units... T=2h45m53.1: Sending probes to ports: u1: 1/2/5 1/2/7, Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 43 The stack interactive‐setup is utility that walks you through creating and modifying ICX switch stacks. When the utility is launched, you are given 4 options. Option 0 allows you to quit the utility with no changes Option 1 allows the changing of stack unit IDs on existing device within an operational stack Option 2 allows the discovery and conversion of new “clean” ICX devices that have no startup‐config in the local flash into stack members Option 3 allows the discovery and conversion of existing or new standalone units into stack members Both options 2 and 3 are a capable of discovering new links, automatically configure stack‐ trunks and convert from linear stack to a ring. In this example we will choose option 2 to discover new units with no configuration. Probes will be sent out of the configured stack‐ports to discover stack‐capable devices. Revision 0419 10 ‐ 43 ICX 150 ICX Stacking Technology Accept the Topology 6. The example discovers a stack with a ring topology, enter y to accept the topology Existing stack: ============================================================ +---+ 2/5| 1 |2/7 +---+ Horizontal bars link to discovered units. Vertical bars link to stack units. Chain #0: ================================================================== #1: icx7250-24-port-management 609c.9f42.4100 #2: icx7250-48-port-management cc4e.24e0.5cd6 #3: icx7250-48p-poe-port-management cc4e.24e1.dc82 #4: icx7250-24p-poe-port-management 78a6.e121.10a4 1/2/5 1/2/7 | | | | 2/3 2/1 +---+ +---+ +---+ +---+ |#1 |2/1==2/3|#2 |2/1==2/3|#3 |2/1--2/3|#4 | +---+ +---+ +---+ +---+ Discovered 1 chain/ring Chain #0: Do you want to select this chain? (enter 'y' or 'n’): y Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 44 After the probes are sent, a topology will be discovered and displayed for you. First it displays an existing stack. Since this is a new stack, the devices in the existing stack is unit 1, the unit where the stack interactive-setup command was ran. It also shows the known stack‐ports. Next, it shows the discovered units. First they are listed in the order they were discovered and are given a number that will be referenced throughout the rest of the interactive‐setup process. It also displays the specific device model and MAC address. Beneath that is displayed the physical topology. At the top of this topology are the ports of the discovering device. Then each connection is drawn out and labeled, detailing all of the connecting ports between each discovered switch. Notice the numbering of each unit corresponds with the numbered list above. If the topology matches your intended design, select “y” for yes. If it does not match, check the physical connection between devices to make sure they connected properly. Revision 0419 10 ‐ 44 ICX 150 ICX Stacking Technology Automatic Creation of Stack Trunks • Trunks are automatically detected in the stack interactive‐setup process – Single stack ports are identified by “‐‐” – Stack trunks are identified by “==“ 1/2/5 1/2/7 | | | | 2/3 2/1 +---+ +---+ +---+ +---+ |#1 |2/1==2/3|#2 |2/1==2/3|#3 |2/1--2/3|#4 | +---+ +---+ +---+ +---+2 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 45 If the ICX switches in the stack support stack‐trunks and the connections are part of valid‐ stack‐port pairings the system will automatically detect the stack trunk links and configure them appropriately. Single stack links are identified by two dashes (‐‐) and stack trunks between units are identified by two equal signs (==). Revision 0419 10 ‐ 45 ICX 150 ICX Stacking Technology Accept or Assign the Unit IDs 7. Accept or define unit IDs • You can accept the default unit IDs or you can change them here • Pressing Enter accepts the suggested default #1: #2: #3: #4: icx7250-24-port 609c.9f42.4100, type icx7250-48-port cc4e.24e0.5cd6, type icx7250-48p-poe-port cc4e.24e1.dc82, icx7250-24p-poe-port 78a6.e121.10a4, an ID (No: an ID (No: type an ID type an ID Suggested stack unit number 0, default: 2): [Enter] 0, default: 3): [Enter] (No: 0, default: 4): [Enter] (No: 0, default: 5): [Enter] Device discovery order You selected 4 unit(s): #1: ID=2, #2: ID=3, #3: ID=4, #4: ID=5, Links U1--U2, #=1: Links U2--U3, #=2: Links U3--U4, #=2: Links U4--U5, #=1: Links U5--U1, #=1: <Output Truncated> 2/5--2/3 2/1--2/3 2/2--2/4 2/1--2/3 2/2--2/4 2/1--2/3 2/1--2/7 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 46 You are now given the option to accept the new unit IDs. This proceeds in the same sequence as the discovery process, beginning with discovered unit #1. Press the Enter key to accept them. If you do not accept the numbers, the system prompts you to enter different IDs, warns you that changing the IDs manually may modify the stack configuration, and recommends that you save the configuration and reload it after the stack is ready. After IDs are selected, notice the correlation between the discovered unit # and the ID assigned i.e. discovered unit #1 is assigned unit ID 2. Next, a summary is displayed, again indicating what ID each discovered units will take on and all of the links connecting each of the units together. Revision 0419 10 ‐ 46 ICX 150 ICX Stacking Technology Accept Topology 8. Review and accept the topology • Once topology is accepted the stack units will begin resetting and adding themselves to the stack #1 #2 #3 #4 +---+ +---+ +---+ +---+ +---+ -2/7| 1 |2/5--2/3| 2 |2/1==2/3| 3 |2/1==2/3| 4 |2/1--2/3| 5 |2/1| +---+ +---+ +---+ +---+ +---+ | | | |---------------------------------------------------------------| Proceeding will produce the above topology. Do you accept it? (enter 'y' or 'n'): y stack interactive-setup discovers 4 unit(s) and sends stack-port/trunk to chain 0: #1 609c.9f42.4100 U2, D0: 2/1 to 2/2, D1: 2/3 #2 cc4e.24e0.5cd6 U3, D0: 2/1 to 2/2, D1: 2/3 to 2/4 #3 cc4e.24e1.dc82 U4, D0: 2/1, D1: 2/3 to 2/4 #4 78a6.e121.10a4 U5, D0: 2/1, D1: 2/3 Ruckus# Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 47 Next, the full graphical view of the topology is displayed. This topology includes all units in the discovered stack, all ports connecting them and whether those connections are stack-ports or stack-trunks. Then the interactive-setup utility will ask if you would like to begin the process of producing the new stack. Select “y” for yes, if you accept. You will be displayed one final summary and the stack information will begin being pushed to all of the member units. They will all reset if needed and join the stack upon bootup. Revision 0419 10 ‐ 47 ICX 150 ICX Stacking Technology Stack Formation 9. Once the unit IDs are assigned, the active controller is elected, the stack is formed, and a standby controller is designated T=2h50m25.4: Election, was alone --> active, ID=1, pri=128, 5U(1-5), A=u1, nbr#=4 4, reason: u5: portup, , Debug: Apr 3 05:03:07 Detect stack unit 2 has different startup config flash, will synchronize it Debug: Apr 3 05:03:07 Detect stack unit 2 has different ssh rsahost key, will synchronize it Detect stack member 5 POE capable Debug: Apr 3 05:03:07 Detect stack unit 5 has different startup config flash, will synchronize it Debug: Apr 3 05:03:07 Detect stack unit 5 has different ssh rsahost key, will synchronize it T:2h50m27.1: Done hot swap: active controller u1 sets u2 to Ready. All entries are cleared on unit 1 for unit 5 <Output Truncated> Debug: Apr 3 05:03:17 T=2h50m35.9: Synchronize ssh rsa host key to u2 Debug: Apr 3 05:03:17 T=2h50m35.9: Synchronize ssh rsa host key to u3 Debug: Apr 3 05:03:17 T=2h50m35.9: Synchronize ssh rsa host key to u4 Debug: Apr 3 05:03:17 T=2h50m35.9: Synchronize ssh rsa host key to u5 T=2h51m30.2: Assigned unit 2 to be standby Debug: Apr 3 05:04:13 T=2h51m32.2: start running config sync to standby u2 Debug: Apr 3 05:04:15 T=2h51m33.5: Running config sync to standby u2 is complete Ruckus# write mem Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 48 Now that IDs have been assigned, the active controller is elected and the stack is formed. You can see here that the active controller has a stack ID of 1 and a priority of 128. You then see messages indicating detection of stack units as the finish reloading and join the stack. This includes messaging indicating the need to synchronize the startup‐config and SSH RSA host keys. The last phase of the process of building a new stack is choosing the standby controller. In a new stack, it should always be stack unit 2, and the running config will be synchronized to it from the active controller. Be sure to save the configuration with the write mem command when stack formation is complete. Revision 0419 10 ‐ 48 ICX 150 ICX Stacking Technology Displaying Stack Information • The show stack command displays stack topology information Ruckus# show stack T=2h7m44.5: alone: ID Type 1 S ICX7250-24P 2 S ICX7250-24 3 S ICX7250-48 4 S ICX7250-48P 5 S ICX7250-24P standalone, D: dynamic cfg, S: static Role Mac Address Pri State Comment active cc4e.24de.f3aa 128 local Ready standby 609c.9f42.4100 0 remote Ready member cc4e.24e0.5cd6 0 remote Ready member cc4e.24e1.dc82 0 remote Ready member 78a6.e121.10a4 0 remote Ready Stack Unit ID active standby +---+ +---+ +---+ +---+ +---+ -2/5| 1 |2/7--2/1| 5 |2/3--2/1| 4 |2/3==2/1| 3 |2/3==2/1| 2 |2/3| +---+ +---+ +---+ +---+ +---+ | | | -- represents stack-port == represents stack-trunk |---------------------------------------------------------------| connections ports Standby u2 - protocols ready, can failover Role history: N: standalone, A: active, S: standby, M: member U1: N->A->N->A Current stack management MAC is cc4e.24de.f3aa Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 49 You can display information about any and all of the members in a traditional stack by entering show commands from the active controller console. If you enter show commands from the console port of a unit that is not the active controller, the information may not be displayed correctly. The show stack command displays general information about a traditional stack, including the stack topology. You can also view additional information using the detail parameter. You can see here that stack ID 1 is the active controller with a priority of 128, and stack ID 2 is the standby. The output also shows the topology of the stack including the connections between each unit. The stack ID is in the box, stack IDs are in hexadecimal (1‐9, A‐C) and the slot/port of the connection is on either side of the ID. Double hyphens (‐‐) designate single connections, and double equal signs (==) designate trunk ports. Revision 0419 10 ‐ 49 ICX 150 ICX Stacking Technology Stack Zero‐Touch Deployment Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Revision 0419 50 10 ‐ 50 ICX 150 ICX Stacking Technology Zero‐Touch Stack Deployment • The Zero‐touch deployment only works with “clean” ICX units – No startup‐config can be present • Essentially performs stack interactive-setup, option #2 with no user intervention and uses default selections • Follow the same initial steps as stack interactive‐setup – Connect devices – Power on devices – On unit intended to be the Active controller: • Enable stacking • Configure stack‐ports (if necessary) Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 51 The Zero‐touch deployment only works with “clean” ICX units that have no startup‐config present. The utility essentially performs stack interactive‐setup, option #2 with no user intervention and automatically applies the default selections. The initial setup steps are the same as stack interactive‐setup: • Connect devices • Power on devices • On unit intended to be the Active controller: • Enable stacking • Configure stack‐ports (if necessary) Revision 0419 10 ‐ 51 ICX 150 ICX Stacking Technology Zero‐Touch Deployment – Start Process • Start stack zero‐touch process ICX7250-24P Router(config)# stack zero-touch-enable – Zero‐touch stacking probes are sent every three minutes, so it may be necessary to wait for it to initialize ICX7250-24P Router(config)# Stack zero-touch-enable detects the following links: Links U1--U6, #=1: 2/1--2/3 Links U6--U5, #=1: 2/1--2/3 Links U5--U4, #=1: 2/1--2/3 Links U4--U3, #=2: 2/1--2/3 2/2--2/4 Links U3--U2, #=1: 2/1--2/3 Links U2--U1, #=1: 2/1--2/3 #1 #2 #3 #4 #5 +---+ +---+ +---+ +---+ +---+ +---+ -2/3| 1 |2/1--2/3| 6 |2/1--2/3| 5 |2/1--2/3| 4 |2/1==2/3| 3 |2/1--2/3| 2 |2/1| +---+ +---+ +---+ +---+ +---+ +---+ | | | |----------------------------------------------------------------------------| <Output Truncated> Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 52 The Zero‐touch stacking process is initiated with the stack zero-touch-enable command from the global configuration context. This process sends probes down stack‐ ports every three minutes. Therefor, it may be necessary to wait for feedback that it is discovering stack units. Keep in mind, there is no user intervention during this process. Whatever is discovered is automatically configured, so it is critical to ensure all cables between devices are connected properly before starting the zero‐touch process. Once units are discovered, information will begin displaying on the console. First it will display a list all of the discovered links between devices, including any stack‐trunks. Next you will see the topology drawn out, again showing stack‐ports and stack‐trunks. Revision 0419 10 ‐ 52 ICX 150 ICX Stacking Technology Zero‐Touch Deployment – Process Output • Output Continued stack zero-touch discovers #1 609c.9f42.4100 U6, D0: #2 609c.9f41.be5c U5, D0: #3 cc4e.24e0.5cd6 U4, D0: #4 cc4e.24e1.dc82 U3, D0: #5 78a6.e121.10a4 U2, D0: 5 unit(s) and sends stack-port/trunk to chain 0: 2/1, D1: 2/3 2/1, D1: 2/3 2/1 to 2/2, D1: 2/3 2/1, D1: 2/3 to 2/4 2/1, D1: 2/3 <Output Truncated> T=8m42.7: Assigned unit 2 to be standby Debug: Apr 12 05:51:35 T=8m44.7: start running config sync to standby u2 Debug: Apr 12 05:51:36 T=8m46.3: Running config sync to standby u2 is complete ICX7250-24P Router(config)# Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 53 Finally we see a message very much like the one seen when using the stack interactive‐ setup utility where a summary is displayed of the devices that will be instructed to reload with the stack parameters shown. After the stack units reload, messages detailing synchronization of startup‐config files and RSA keys will be displayed, just like the stack interactive‐setup utility. And finally it will display the synchronization to the standby unit to signal process completion. Revision 0419 10 ‐ 53 ICX 150 ICX Stacking Technology Zero‐Touch Deployment – Display Results • Display zero‐touch deployment results ICX7250-24P Router(config)# show stack T=16m15.2: alone: standalone, D: dynamic cfg, ID Type Role Mac Address Pri 1 S ICX7250-24P active cc4e.24de.f3aa 128 2 D ICX7250-24P standby 78a6.e121.10a4 0 3 D ICX7250-48P member cc4e.24e1.dc82 0 4 D ICX7250-48 member cc4e.24e0.5cd6 0 5 D ICX7250-24P member 609c.9f41.be5c 0 6 D ICX7250-24 member 609c.9f42.4100 0 S: static State Comment local Ready remote Ready remote Ready remote Ready remote Ready remote Ready active standby +---+ +---+ +---+ +---+ +---+ +---+ -2/1| 1 |2/3--2/1| 2 |2/3--2/1| 3 |2/3==2/1| 4 |2/3--2/1| 5 |2/3--2/1| 6 |2/3| +---+ +---+ +---+ +---+ +---+ +---+ | | | |----------------------------------------------------------------------------| Standby u2 - protocols ready, can failover Role history: N: standalone, A: active, S: standby, M: member U1: N->A Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 54 Here we can see the completed stack with all discovered units, stack‐ports and stack‐ trunks. This was all created without any user intervention, only to start the zero‐touch discovery process with the stack zero-touch-enable command. Revision 0419 10 ‐ 54 ICX 150 ICX Stacking Technology Zero‐Touch Deployment – Disable Upon Completion • The zero‐touch process will continue running every three minutes as long as it is enabled • After discovery completes, disable the feature with the no zero-touch-enable command ICX7250-24P Router(config)# no stack zero-touch-enable ICX7250-24P Router(config)# write mem Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 55 Lastly we have an important note on the behavior of zero‐touch‐enable. It was stated earlier that it sends discovery messages out stack ports every three minutes, well after you complete your discovery, it continues to send discovery probes every three minutes. That is why it should be disabled with the no stack zero-touch-enable command as soon as the discovery is finished. And once this is complete, the configuration should be saved with the write memory command. Revision 0419 10 ‐ 55 ICX 150 ICX Stacking Technology Stack Unit Addition & Replacement Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Revision 0419 56 10 ‐ 56 ICX 150 ICX Stacking Technology Adding a New Unit to a Stack • Install a new unit in a stack using stack interactive-setup • This method can be applied to clean units (option 2) or units that have existing configurations (option 3) 1. 2. Connect the new unit to the stack by connecting the appropriate stacking ports Run stack interactive-setup on the active controller, and assign an ID to the new unit • The active controller resets the new unit 3. Once the new unit boots and joins the stack, enter the write memory command on the active controller Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved You can add, remove, or replace stack units using interactive‐setup or manually using static configuration. The recommended method is to connect units to the stack before you supply power to the units; however, you can also connect powered units. Installing a new unit in a stack using stack interactive‐setup can be applied to clean units or units that have existing configurations. 1. Connect the new unit to the stack by connecting the appropriate stacking ports. 2. Run stack interactive-setup on the active controller, and assign an ID to the new unit. The active controller resets the new unit. 3. Once the new unit boots and joins the stack, enter the write memory command on the active controller. Revision 0419 10 ‐ 57 ICX 150 ICX Stacking Technology Adding a New Unit to a Stack (Cont.) • To maintain sequential stack, install new unit between first and last unit in stack • New units inserted in the middle of a stack, for example between existing units 2 and 3, cause non‐sequential numbering Ruckus# show stack ID Type 1 S ICX7250-24P 2 S ICX7250-24 3 S ICX7250-24P 4 S ICX7250-48 5 S ICX7250-48P 6 S ICX7250-24P Role active standby member member member member Mac Address Pri State cc4e.24de.f3aa 128 local 609c.9f42.4100 0 remote 78a6.e121.10a4 0 remote cc4e.24e0.5cd6 0 remote cc4e.24e1.dc82 0 remote 609c.9f41.be5c 0 remote Comment Ready Ready Ready Ready Ready Ready active standby +---+ +---+ +---+ +---+ +---+ +---+ -2/5| 1 |2/7--2/1| 5 |2/3--2/1| 4 |2/3==2/1| 3 |2/3--2/1| 6 |2/3--2/1| 2 |2/3| +---+ +---+ +---+ +---+ +---+ +---+ | | | |----------------------------------------------------------------------------| Standby u2 - protocols ready, can failover Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Revision 0419 10 ‐ 58 ICX 150 ICX Stacking Technology Replacing a Stack Unit ‐ Automatically • Replacing a stack unit automatically with a clean unit 1. 2. Enter the show stack command on the active controller, and check for an "S" beside the unit to confirm that the configuration for the unit you are replacing is static1 Remove the old unit from the stack • Although the unit is absent, the provisional configuration for the unit is still retained on the active controller 3. 4. Make sure that the hardware (module) configuration of the replacement unit is identical to the hardware configuration of the unit you removed Connect the new unit to the stack using the same stacking ports as the old unit • If the replacement unit configuration matches the configuration retained on the active controller, the active controller resets the new unit • The new unit becomes a member and joins the stack, and the stack keeps its original topology Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 59 Footnote 1: If the configuration is not static, enter the write memory command to change all dynamic configurations to static. A static configuration remains after the unit is removed. Replacing a stack unit automatically with a clean unit: 1. Enter the show stack command on the active controller, and check for an "S" beside the unit to confirm that the configuration for the unit you are replacing is static. 2. Remove the old unit from the stack. Although the unit is absent, the provisional configuration for the unit is still retained on the active controller. 3. Make sure that the hardware (module) configuration of the replacement unit is identical to the hardware configuration of the unit you removed. 4. Connect the new unit to the stack using the same stacking ports as the old unit. If the replacement unit configuration matches the configuration retained on the active controller, the active controller resets the new unit. The new unit becomes a member and joins the stack, and the stack keeps its original topology. Revision 0419 10 ‐ 59 ICX 150 ICX Stacking Technology Replacing a Stack Unit Using Interactive‐setup • The replacement can be added using Interactive‐setup 1. Enter the show stack command on the active controller, and check for an "S" beside the unit to confirm that the configuration for the unit you are replacing is static1 2. Remove the old stack unit from the stack 3. Connect the new unit to the existing stack using the same stacking ports as the old unit 4. Enter the stack interactive-setup command • Select interactive‐setup option 2 if the replacement unit is a clean unit • Select interactive‐setup option 3 if the replacement unit contains configuration 5. Stack interactive‐setup suggests an ID based on matching the new unit with the static configurations • You can overwrite the suggested ID by entering the ID of the old unit 6. The active controller resets the unit, and it joins the stack Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 60 Footnote 1: If the configuration is not static, enter the write memory command to change all dynamic configurations to static. A static configuration remains after the unit is removed. To replace a stack unit with stack interactive‐setup, perform the following steps: 1. Enter the show stack command on the active controller, and check for an "S" beside the unit to confirm that the configuration for the unit you are replacing is static. 2. If the configuration is not static, enter the write memory command to change all dynamic configurations to static. A static configuration remains after the unit is removed. 3. Remove the old stack unit from the stack. 4. Connect the new unit to the existing stack using the same stacking ports as the old unit. 5. Enter the stack interactive‐setup command. Select interactive‐setup option 2 if the replacement unit is a clean unit. Select interactive‐setup option 3 if the replacement unit contains configuration. Stack interactive‐setup suggests an ID based on matching the new unit with the static configurations. You can overwrite the suggested ID by entering the ID of the old unit. 6. The active controller resets the unit, and it joins the stack. Revision 0419 10 ‐ 60 ICX 150 ICX Stacking Technology Summary • Attendees should now be able to: – Describe stacking technology and its benefits – Describe stacking features including long‐distance stacking and hitless stacking – Explain how to configure stacking using the interactive‐setup utility – Display stack information once the stack is formed – Explain how to replace and add new units to a stack Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 61 This concludes the Stacking module. You should now be able to: • Describe stacking technology and its benefits • Describe stacking features including long‐distance stacking and hitless stacking • Explain how to configure stacking using the interactive‐setup utility • Display stack information once the stack is formed • Explain how to replace and add new units to a stack Revision 0419 10 ‐ 61 ICX 150 ICX Stacking Technology End of Module 10: ICX Stacking Technology Revision 0419 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved This concludes the ICX Stacking Technology module. Revision 0419 10 ‐ 62 ICX 150 Power Over Ethernet Module 11: Power over Ethernet Revision 0419 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Welcome to the ICX 150 Implementor course. This course consists of 12 modules and is based on the FastIron 8.0.90 software release. Subjects discussed in this course concentrate on the Implementor functions within a network environment however does not represent all functions or capabilities of an ICX switch. This module discusses Power over Ethernet (PoE), and how to configure PoE on the different Ruckus ICX devices. So, let’s get started Revision 0419 11 ‐ 1 ICX 150 Power Over Ethernet Objectives • After completing this module, attendees will be able to: – – – – – Describe the function of Power over Ethernet (PoE) Understand the capabilities of each Ruckus ICX family Configure PoE on Ruckus campus switches Change the various features offered on an ICX PoE interface Display PoE information Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 2 After completing this module, you will be able to: Describe the function of Power over Ethernet (PoE) Understand the capabilities of each Ruckus ICX family Configure PoE on Ruckus campus switches Change the various features offered on an ICX PoE interface Display PoE information Revision 0419 11 ‐ 2 ICX 150 Power Over Ethernet PoE Overview • Power over Ethernet (PoE) is the method for transferring electrical power, as well as data, to remote devices such as VoIP phones or video cameras • Ruckus ICX switches have embedded PoE technology, and are considered power‐sourcing equipment (PSE) • A PSE is the source of power, or the device that integrates the power onto the network • A powered device (PD), is an Ethernet device that requires power and is situated on the end of the cable opposite the PSE PD VoIP Phone Ruckus PSE ICX 7250‐48P PD Security Camera Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 3 Power over Ethernet is a method whereby power is transmitted to Ethernet‐connected equipment from a central switch. By using the existing CAT 5 (or better) cabling, the need for AC power (and wiring costs) can be eliminated. The switch is also able to control power distribution to the powered devices allowing sophisticated uninterruptible power management for vital systems. Ruckus ICX switches offer PoE technology and are what we call power‐sourcing equipment, or PSEs. The devices being powered by the switch are called powered devices, or PDs. PDs include devices like VoIP telephones or security cameras. Revision 0419 11 ‐ 3 ICX 150 Power Over Ethernet PoE Specifications • Ruckus PoE devices are compliant with both the 802.3af and 802.3at standards – 802.3af (PoE) ‐ provides 15.4 watts (44 to 50 volts) from the power‐sourcing device – 802.3at 2008 (PoE+) ‐ provides 30 watts (52 to 55 volts) from the power‐sourcing device – 802.3at 2009 (High PoE) ‐ provides 60 watts for High PoE and 95 watts for Power over HDBase‐T (PoH) • Ruckus devices that support PoH allocate 95 watts for PoE+, High PoE, and PoH PDs • Ruckus PoE devices support autodiscovery, to detect if a PD is 802.3af‐ or 802.3at‐ compatible Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 4 Ruckus PoE devices are compliant with both the 802.3af and 802.3at specifications. The 802.3af specification defined the original standard for delivering power over the existing network cabling infrastructure, providing up to 15.4 watts (44 to 50 volts) of power to powered devices. The 802.3at specification expanded the standard to support higher power levels for more demanding powered devices. 802.3at provides 30 watts (52 to 55 volts) to the powered devices. In 2009, the 802.3at standard was expanded to support even greater power levels, which provides 60 watts for High PoE devices, and 95 watts for Power over HDBase‐ T (or PoH). Except where noted, we use will be using the term PoE to refer to PoE, PoE+, and High PoE. PoE autodiscovery is a detection mechanism that identifies whether or not an installed device is 802.3af‐ or 802.3at‐compatible. When you plug a device into an interface that is capable of providing inline power, the autodiscovery mechanism detects whether or not the device requires power and how much power is needed. Revision 0419 11 ‐ 4 ICX 150 Power Over Ethernet Ruckus ICX PoE Switches • ICX 7150 Series – 7150‐12P – 7150‐24P – 7150‐48P/PF PoE/PoE+ 12 ports PoE/PoE+ 24 ports PoE/PoE+ 48 ports – 7150‐48ZP PoE/PoE+ 32 ports • 16 PoH / PoE / PoE+ 802.3bt ready ports1 PoE capable ports are in orange PoH capable ports are in yellow • ICX 7250‐24P and ICX 7250‐48P – PoE/PoE+ support on 24‐port and 48‐port models Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 5 The Ruckus ICX series of switches offers several different PoE configurations. PoE models are designated by the “P” at the end of the switch name. The 7150‐12P provides fanless 12‐port options with PoE support on the copper interfaces with a 124 W PoE Budget. The 7150P has 24‐port and 48‐port options with PoE support on the copper interfaces with a 370 W PoE Budget. The 7150PF has 48‐port options with PoE support on the copper interfaces with a 740 W PoE Budget. The 7150PF has 32‐ports with PoE support with on the copper interfaces with 16 of them providing PoH 820.3bt support. Provides a 1480 W (2 PSU) PoE Budget. Class 4 PoE+ power (30 watts) to every port and PoH power (90 watts) on eight dedicated ports. All ICX switches providing 802.3bt ports (90 W per port) are compatible with PoE/PoE+/Cisco uPoE The 7250 has 24‐port and 48‐port options with PoE support on the copper interfaces with 370W and 740W budget respectively. Footnote 1: Up to 90W per port, IEEE 802.3bt standard finalized in September 2018. Compatible with uPoE Revision 0419 11 ‐ 5 ICX 150 Power Over Ethernet Ruckus ICX PoE Switches • ICX 7450‐24P, ICX 7450‐48P – PoE/PoE+ support on 24‐port and 48‐port models – 8 PoH ports highlighted in yellow • ICX 7650‐48P, ICX 7650‐48ZP – Both provide 48x PoE/PoE+ ports – 7650‐48P 8x PoH/802.3bt ready ports – 7650‐48ZP 24x PoH/802.3bt ready ports PoH Capable Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 6 The 7450 also has 24‐port and 48‐port options with PoE support on the copper interfaces, and it offers PoH support on the 8 ports highlighted in yellow on the switch. Both provide 1500W AC / 516W DC PoE budget when using two power supplies. Finally, we have the ICX 7650‐48P and ICX 7650‐48ZP provide 48 PoE+ ports but also designates ports for PoH support. The 7650‐48P provides 8 PoE/+/PoH ports and the 7650‐ 48ZP provides 24 PoE/+/PoH ports. Both providing1500 W PoE Power budget when using two power supplies. As you can see, the ICX 7750 is not included in the PoE product portfolio, this is because the 7750 is Ruckus’s Campus Fabric core/aggregation device where PoE is not required. However, with the introduction of IEEE standard 802.1br, for Switch Port Extender, or what Ruckus calls Campus Fabric, you can configure and monitor PoE functionality from the core ICX 7750 in a distributed stack. This feature is supported on ICX 7750 control bridge devices and ICX 7450 port extender devices. PoE can now be managed and monitored from a single point for all connected port extenders with the PoE driver running on an ICX 7450 and the configuration and monitoring run from an ICX 7750 device. Please refer to the Campus Fabric module on the Ruckus website for more information. Revision 0419 11 ‐ 6 ICX 150 Power Over Ethernet PoE Delivery Methods 162_PWWNs.png 162_twisted‐pairs2.png • There are two methods for delivering PoE as defined in the 802.3af and 802.3at specifications – Endspan ‐ used by Ruckus PoE devices, delivers power through the Ethernet ports on a power‐sourcing device • Power and data signals travel along the same pairs of wires at different frequencies Switch with Power over Ethernet ports – Midspan ‐ power is supplied by an intermediate power‐sourcing device placed between the switch and the PD IP Phone Switch Intermediate Device IP Phone Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 7 There are two methods for delivering PoE as defined in the 802.3af and 802.3at specifications. The first is Endspan. Endspan is the Ruckus solution as the Ruckus PoE device delivers power through the Ethernet ports to the PDs. Here, power and data signals travel along the same pairs of wires at different frequencies In the Midspan method, power is supplied by an intermediate power‐sourcing device placed between the switch and the PD. Here, power travels on the unused spare pairs of wires, while data travels on the other wire pairs. ICX switches support PoE on 10, 100, and 1000 Mbps along with multi‐gigabit ports, each with PoH up to 90 watt capabilities Revision 0419 11 ‐ 7 ICX 150 Power Over Ethernet PoE Types Type 1 Commonly known as: PoE Standard: IEEE 802.3af Maximum power provided: 15.4W Type 2 Commonly known as: PoE+, PoE Plus Standard: IEEE 802.3at Maximum power provided: 30W Type 3 Commonly known as: 4‐pair PoE, 4P PoE, PoE++, UPOE Standard: IEEE 802.3bt Maximum power provided: 60W Type 4 Commonly known as: higher‐power PoE, POH Standard: IEEE 802.3bt Maximum power provided: 100W • Class 5 and higher utilizes 4 twisted pairs to provide power • Backwards compatibility to existing PDs are supported with Type 3 / Type 4 PSEs – Traditional 2 pair – 4 pairs allowing cable power losses being reduced Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 8 The third revision of the IEEE standard of power transfer of low voltage over Ethernet is known as 802.3bt. As mentioned earlier the previous PoE Standards known as 802.3af (2003) introduced 13W to network devices. 802.3at introduced in 2009 increased the power up to 25.5W delivery. The new 802.3bt standard increases the power significantly by providing devices up to 71.3W by utilizing 4‐pairs of the Ethernet connection. The newly introduced Type 3 / Type 4 PSEs still provide backwards compatibly to PDs however they may utilize 4 pairs to deliver the lower power to PDs, lower cable losses to half the normal loss. PoE Type 1 uses two pairs for power delivery to many lower‐powered devices. Common type 1 devices include VoIP phones, sensors, minimal antenna APs and simple IP cameras. PoE Type 2 provide devices additional power that can be handled by the Type 1 standard. Type 2 is backwards compatible but provides needed power to devices including multifunction IP cameras capable of Pan, Tilt, and Zoom (PTZ) features, higher antenna APs and minimal LCD displays. PoE Type 3 uses all four twisted pairs in the Ethernet cable supplying the needed power of current PoE devices including videoconferencing appliances, remote switches, APs requiring high power and automated entry management devices. PoE Type 4 supplies up to 100W of power for devices which has the ability to power laptops along with large displays including TVs as well as cameras that deploy fans or heaters. Revision 0419 11 ‐ 8 ICX 150 Power Over Ethernet Power Classes for Powered Devices • PoE autodiscovery is a detection mechanism that identifies whether an installed device is 802.3af‐ or 802.3at‐compatible – A power class identifies the maximum power consumption of a PD will receive from the PSE – PSEs perform power classification by inducing a specific voltage to the PD and measuring the current consumption • Power classes include any power loss through the cables • PDs that do not support classification are assigned class 0 (UnknownClass) Power (watts) from Power-Sourcing Equipment Class Usage PoE PoE+ PoH 0 Default 15.4 15.4 15.4 1 Optional 4 4 4 2 Optional 7 7 7 3 Optional 15.4 15.4 15.4 4 Optional 15.4 30 60/ Overdrive 95 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 9 Adding to the four existing classes (1‐4) four new are introduced providing 8 different classes. Ruckus PoE switches however still allocate power using a 4 class system identified in the table. Specific class allocations can be configured on ICX interfaces allowing for greater control of PoE budget and power consumption. The power class listed includes any power loss through the cables. The following table shows the different power classes and their respective power consumption needs. For example, a PoE port with a power class of 3, or 15.4 watts, receives a maximum of 12.95 watts of power after 2.45 watts of power is lost through the cable. This is compliant with the IEEE 802.3af and 802.3at specifications for delivering inline power. Devices that are configured to receive less PoE power, for example, a class 1 device, which receives 4.0 watts of power, will experience a lower rate of power loss through the cable. Revision 0419 11 ‐ 9 ICX 150 Power Over Ethernet External Power Supplies • Optional external power supplies (EPS) are available for ICX 7250 devices to provide the increased PoE power requirements • ICX‐EPS4000 provides additional power for up to 16 ICX 7250 switches Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 10 Ruckus offers external power supplies (or EPS) for the ICX family of switches. External power supplies can be used for system power redundancy and increased PoE/PoE+ power budget. The ICX-EPS4000 can provide power for up to 16 ICX 7250 switches. All 7250 24‐port and 48‐port devices are supported on the EPS4000, except for the ICX 7250‐24G (non‐PoE device). Revision 0419 11 ‐ 10 ICX 150 Power Over Ethernet PoE Firmware Files And Features (FI 08.0.70) • PoE devices require specific PoE firmware – Beginning with FastIron 08.0.70 release, a unified PoE firmware is used across the supported devices – During PoE firmware installation power to the connected PDs is disabled until update is complete Product PoE Firmware File ICX 7150, ICX 7250, ICX 7450, ICX 7650 Feature icx7xxx_poe_02.1.0.b002.fw ICX 7150 ICX 7250 ICX 7450 ICX 7650 ICX 77501 ICX 7850 Auto PoE firmware upgrade 8.0.70 8.0.70 8.0.70 8.0.70 8.0.70 No PoE enabled by default 8.0.70 8.0.70 8.0.70 8.0.70 8.0.70 No Power over HDBaseT (PoH) 8.0.612 No 8.0.20 8.0.70 No No uPoE 8.0.612 No 8.0.20 8.0.70 No No PoE+ (802.3at) 8.0.60 8.0.30 8.0.20 8.0.70 No No PoE (802.3af) 8.0.60 8.0.30 8.0.20 8.0.70 No No Detection of PoE power requirements advertised through CDP 8.0.60 8.0.30 8.0.20 8.0.70 No No No Maximum power level for a PoE power‐consuming device for LLDP‐MED or CDP 8.0.60 8.0.30 8.0.20 8.0.70 No Power class for PoE power‐consuming device 8.0.60 8.0.30 8.0.20 8.0.70 No No Power limit per port 8.0.60 8.0.30 8.0.20 8.0.70 No No Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 11 PoE compatibility and features are unique to each switch depending on the software release it is running. Traditional updates to software can require an additional PoE firmware to be updated depending on the release however with the new ICX Unified FastIron Image the individual PoE firmware is no longer required but rather included in the UFI file. If you are updating software of an ICX switch other than FastIron 8.0.90 please check the release notes to see if a PoE firmware update is required. Footnote 1: In 08.0.50, when the ICX 7750 is a control bridge (CB) in a campus fabric configuration, it supports PoE to the control plane Footnote 2: Supported on the ICX 7150 Z Series only Revision 0419 11 ‐ 11 ICX 150 Power Over Ethernet Unified FastIron Image (UFI) Firmware and PoE • New image format introduced in FI Release 8.0.80 known as Unified FastIron Image (UFI) – Combines both the FastIron application image and boot code – POE Firmware is bundled as part of the application image • No longer its own image and does not need to up upgraded independently – UFI bundle contains below components/packages 1. Application image 2. Application image’s signature file 3. U‐boot 4. Python libraries 5. HTTP package 6. DHCP package 7. <Any other package in future> Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 12 As mentioned the UFI file now includes all necessary files including the PoE application image allowing for assurance that the UFI software you are using has the correct PoE firmware allowing you to take advantage of all the PoE capabilities of the ICX switch. Revision 0419 11 ‐ 12 ICX 150 Power Over Ethernet PoE Configuration Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Now let’s take a look at the configuration of PoE. Revision 0419 11 ‐ 13 ICX 150 Power Over Ethernet Enabling/Disabling PoE • All PoE capable ports are enabled by default introduced in FI 08.0.70 Release • To enable/disable a port to provide inline power at the interface configuration: Ruckus(config)# interface ethernet 1/1/1 Ruckus(config-if-e1000-1/1/1)# inline power Ruckus(config)# interface ethernet 1/1/1 Ruckus(config-if-e1000-1/1/1)# no inline power • It is best practice to disable inline power on ports where it is not required – Limiting power on PoH capable ports is recommended if PoH devices are not deployed on the port Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 14 PoE is enabled by default but can be disabled using the inline power command. It is a best practice to only provide PoE features on interfaces where it is required. Depending on the number of PoE‐configured interfaces that have powered devices connected, CPU utilization will increase slightly, though typically PoE does not affect the functionality of other features on the switch. To disable PoE the Syntax on a port level is: [no] inline power Disabling PoE capabilities on non PoE required ports is recommended along with limiting power on PoH ports to assure your PoE budget is predictable. More details on disabling the PoH capabilities will be discussed later in this module. Revision 0419 11 ‐ 14 ICX 150 Power Over Ethernet Power Levels for PoE Interfaces • By default, ICX PoE devices pre‐allocate 15.4W for PoE ports, 30W for PoE+ ports, and 95W for PoH ports • The maximum amount of power that the switch will supply at each port can be manually configured – Power class – Maximum power level • Cannot configure both on the same interface • Setting the power level on a port does not take power loss during transmission into consideration Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 15 When PoE is enabled on a port to which a power consuming device or PD is attached, by default, a Ruckus PoE device will supply 15.4 watts of power at the RJ‐45 port, minus any power loss through the cables. A PoE+ device will supply either 15.4 or 30 watts of power (depending on the type of PD connected to the port), minus any power loss through the cables. If desired, you can manually configure the maximum amount of power that the Ruckus PoE device will supply at the RJ‐45 port. Revision 0419 11 ‐ 15 ICX 150 Power Over Ethernet Configuring Power Classes • To set the power class for a port, use the power‐by‐class command at the interface level Ruckus(config)# interface ethernet 1/1/1 Ruckus(config-if-e1000-1/1/1)# inline power power-by-class 3 Class Usage 0 Power (watts) from Power-Sourcing Device Standard PoE PoE+ PoH Default 15.4 15.4 15.4 1 Optional 4 4 4 2 Optional 7 7 7 3 Optional 15.4 15.4 15.4 4 Optional 15.4 30 60/ Overdrive 951 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 16 As we mentioned previously, the PoE switch will pre‐allocate 15.4 watts of power to a PoE port, 30 watts of power to a PoE+ port, and 95 watts of power to a PoH port. However, you can use the power-by-class command to set the desired power class per interface, thus configuring the amount of power sent to the attached PD. Footnote1: For PoH ports, the range is 1000‐95000mW. By default maximum range is 60000mW and in PoE overdrive mode up to 95000mW is supported. Will discuss the overdrive feature later in this module. Revision 0419 11 ‐ 16 ICX 150 Power Over Ethernet Power Levels for PoE Interfaces (cont.) • The Ruckus PoE device will adjust the power on a port only if there are available power resources • If power resources are not available, the following message displays on the console and in the Syslog: PoE: Failed power allocation of 30000 mwatts on port 1/1/21. Will retry when more power budget. Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 17 There are two ways to configure the power level for a PoE power consuming device, configuring a power class, or configuring a maximum power level. Both of these cannot be configured on the same port. The Ruckus PoE device will adjust the power on a port only if there are available power resources. If power resources are not available, a message displays on the console and in the Syslog that POE failed the power allocation for a specific port. It also states that it will try to allocate power again when more power budget is available. Revision 0419 11 ‐ 17 ICX 150 Power Over Ethernet Configuring Maximum Power Level • Configure the maximum power level for a PoE port: Ruckus# configure terminal Ruckus(config)# interface ethernet 1/1/1 Ruckus(config-if-e1000-1/1/1)# inline power power-limit 14000 – The example configures inline power on interface 1/1/1, and sets the maximum power level to 14,000 milliwatts (14 watts) • Maximum power level values: – PoE ‐ 1000 through 15,400, the default is 15,400 – PoE+ ‐ 1000 through 30,000, the default is 30,000 – PoH ‐ 1000 through 95,000, the default is 95,000 • Value is adjusted to nearest multiple of 5 • Configuring a power level higher than the default, could damage the PD Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 18 The second way to configure the power level, is to set a maximum power level using the inline power power-limit <power level> command. The <power level> variable is the maximum power level in number of milliwatts. The following values are supported: • PoE – Enter a value from 1000 through 15,400. The default is 15,400. • PoE+ – Enter a value from 1000 through 30,000. The default is 30,000. The example enables inline power on interface 1/1/1, and sets the PoE power level to 14,000 milliwatts (14 watts). Note! Setting a power level higher than what the attached PD can support could damage the device. Revision 0419 11 ‐ 18 ICX 150 Power Over Ethernet Enabling Cisco Discovery Protocol (CDP) • Some power consuming devices use Cisco Discovery Protocol (CDP) to advertise power requirements – Ruckus switches are compatible with other vendors’ power consuming devices – They can detect and process power requirements for these devices automatically – CDP packet interception is disabled by default on all interfaces • Configure the Ruckus device to use CDP: Ruckus# configure terminal Ruckus(config)# cdp run – If CDP packet interception is to be disabled for an individual interface, the configuration is applied in interface configuration mode Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 19 Many power‐consuming devices, such as Cisco VoIP phones and other vendors' devices, use the Cisco Discovery Protocol (CDP) to advertise their power requirements to power‐ sourcing devices like Ruckus PoE devices. Ruckus power‐sourcing equipment is compatible with Cisco and other vendor's power consuming devices, and can detect and process power requirements for these devices automatically. If you configure a port with a maximum power level or a power class for a power consuming device, the power level or power class will take precedence over the CDP power requirement. Therefore, if you want the device to adhere to the CDP power requirement, do not configure a power level or power class on the port. Configure the cdp run command globally to enable CDP. Revision 0419 11 ‐ 19 ICX 150 Power Over Ethernet PoE Overdrive • Not part of the IEEE standard (Ruckus proprietary enhancement) • Allows the Class 0 and Class 4 PD to negotiate for power greater than 30‐watt allocation – PoE overdrive is a per port configuration and can be configured on a range of ports – PoE overdrive on PoE+ ports is available only for Ruckus PD Ruckus AP (PDs) Ruckus ICX (PSEs) R720 ICX 7150 R730 ICX 74501 • PoE overdrive is disabled by default ICX 7650 – PoE+ ports that support overdrive through LLDP‐MED messages, (automatically enabled) – To avoid power cycle caused by auto enablement manually overdrive mode Ruckus(config)# interface ethernet 1/1/1 to 1/1/5 Ruckus(config-mif-1/1/1-1/1/5)# inline power overdrive Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 20 Overdrive feature allows the Class 0 and Class 4 PD to negotiate for power greater than 30‐ watt allocation. The maximum power that can be processed based on LLDP‐MED negotiation is limited to the hardware capability of the PSE. If the PD negotiates for power more than the hardware limit, the PSE allocates only up to the hardware capability of the PSE. PoE overdrive is disabled by default. When Ruckus PDs negotiate for power greater than 30‐watt allocation on PoE+ ports that support overdrive through LLDP‐MED messages, PoE overdrive gets automatically enabled and will be displayed in the configuration. When the port mode dynamically changes to overdrive mode, the power is cycled (off and on) on the port. To avoid PD reload, manually apply the inline power overdrive configuration on the port before connecting the PD. PoE overdrive is a per port configuration and can be configured on a range of ports. Do note that when the PD that requires overdrive is disconnected, the port mode changes back to non‐overdrive mode. If the port mode dynamically changes to overdrive mode, the inline power overdrive configuration is not displayed in the running configuration. When the PD that requires overdrive is disconnected, the port mode changes back to non‐ overdrive mode. If the port mode dynamically changes to overdrive mode, the inline power overdrive configuration is not displayed in the running configuration. Footnote 1: ICX 7450 only support overdrive on its PoH ports. Revision 0419 11 ‐ 20 ICX 150 Power Over Ethernet PoE Overdrive (cont.) • Overdrive can be configured on PoE and PoH capable ports – Power allocation is as follows based on the switch ICX Platforms PoH Ports Overdrive ‐ Max Power Capability PoE+ Ports Overdrive ‐ Max Power Capability ICX 7450 (all PoE SKUs) 1 to 8 95W 9 to 48 NA ICX 7650‐48P 1 to 8 9 to 48 ICX 7150‐48ZP 1 to 16 17 to 48 ICX 7650‐48ZP 25 to 48 1 to 24 None All PoE ports ICX 7150‐24P, ICX 7150‐ 48P, ICX 7150‐C12P, ICX 7250‐24P, ICX 7250‐48P 45W1 NA Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 21 By default, the initial power allocation is 60W on PoH port and 30W on PoE+ port. With PoE overdrive configuration, the initial power allocation is 95W on PoH ports and 30W on PoE+ ports. When the PD that requires overdrive is disconnected, the port mode changes back to non‐overdrive mode. If the port mode dynamically changes to overdrive mode, the inline power overdrive configuration is not displayed in the running configuration. Footnote1: Only Ruckus PDs can go up to 45W. Revision 0419 11 ‐ 21 ICX 150 Power Over Ethernet PoE Power Priority Configuration • Power priority can be configured in the event that power is not available to provide power to all PoE enabled ports: – Priorities are set per port – Higher priority ports are allocated power first – Priority values: • 3 ‐ Low priority • 2 ‐ High priority • 1 ‐ Critical priority • To configure the power priority for a PoE port: Ruckus(config)# interface ethernet 1/1/1 Ruckus(config-if-e1000-1/1/1)# inline power priority 2 – The example enables inline power on interface 1/1/1 and sets the inline power priority to high (2) Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 22 In a configuration where PoE power consuming devices collectively have a greater demand for power than the PoE power supply or supplies can provide, the ICX PoE switch must place the PoE ports that it cannot power in standby or denied mode (waiting for power) until the available power increases. The available power increases when one or more PoE ports are powered down, or, if applicable, when an additional PoE power supply is installed in the switch. When PoE ports are in standby or denied mode and the switch receives additional power resources, by default, the device will allocate newly available power to the standby ports in priority order, with the highest priority ports first, followed by the next highest priority ports, and so on. Within a given priority, standby ports are considered in ascending order, by slot number then by port number, provided enough power is available for the ports. For example, PoE port 1/1/1 should receive power before PoE port 1/2/1. However, if PoE port 1/1/1 needs 12 watts of power and PoE port 1/2/1 needs 10 watts of power, and 11 watts of power become available on the device, the device will allocate the power to port 1/2/1 because it does not have sufficient power for port 1/1/1. Use the inline power priority command to set a priority for a port. The priority values are 1 to 3, with 1 being the highest or most critical. Revision 0419 11 ‐ 22 ICX 150 Power Over Ethernet Enabling PoE on LAG Ports • ICX switches support PoE on LAG ports – Apply inline power to a member port with a specific power class Ruckus(config)# inline power ethernet 1/1/1 power-by-class 3 – Configure another member port with default config Ruckus(config)# inline power ethernet 1/1/2 – Configure another member port with a power priority Ruckus(config)# inline power ethernet 1/1/3 priority 2 – Configure another member port, specifying a maximum power level Ruckus(config)# inline power ethernet 1/1/4 power-limit 12000 – Configure overdrive support on a member port Ruckus(config)# inline power ethernet 1/1/1 overdrive Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 23 PoE is available on LAG ports using the inline power ethernet command, this command is done in global CONIFIG mode. Once a LAG is created and deployed, you can enable inline power on each secondary port in the LAG. Each port can be configured with different power settings. The example here, configures inline power on first port 1/1/1, with a power class of 3. Next, the secondary ports are configured. Notice that each port is configured differently. The first option, configures secondary port 1/1/2 with the default inline power settings, as no other power parameters are set. The second option, configures secondary port 1/1/3 with a power priority of 2. And the third option, configures secondary port 1/1/4 with a maximum power level of 12000 mWatts. Revision 0419 11 ‐ 23 ICX 150 Power Over Ethernet Support for PoE Legacy Devices • Legacy devices are not compliant with 802.3af or 802.3at • On a non‐stackable device, configure at the global level: Ruckus(config)# no legacy-inline-power • On a stackable device, configure at the stack unit level: Ruckus(config)# stack unit 2 Ruckus(config-unit-2)# no legacy-inline-power Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 24 Ruckus PoE devices automatically support most legacy PDs that are not compliant with 802.3af and 802.3at. If desired, you can disable or re‐enable support for legacy PoE power consuming devices on a global basis. When you disable legacy support, 802.3af and 802.3at compliant devices are not affected. The no legacy-inline-power command does not require a software reload if it is entered prior to connecting the PDs. If the command is entered after the PDs are connected, the configuration must be saved (write memory) and a software reloaded is needed for the change to take effect. To re‐enable support for legacy power consuming device after it has been disabled, enter the legacy-inline-power command. View the running configuration to see if support for PoE legacy devices is enabled or disabled. Revision 0419 11 ‐ 24 ICX 150 Power Over Ethernet Displaying PoE Information • Use the show inline power command to view PoE operational information Total PoE power supply capacity, and available power Ruckus# show inline power Power Capacity: Total is 720000 mWatts. Current Free is 384000 mWatts. Power Allocations: Requests Honored 146 times Port Admin Oper ---Power(mWatts)--- PD Type PD Class Pri Fault/ State State Consumed Allocated Error -------------------------------------------------------------------------1/1/1 On On 6385 7000 802.3af Class 2 3 n/a 1/1/2 On On 6479 7000 802.3af Class 2 3 n/a 1/1/3 On On 6479 7000 802.3af Class 2 3 n/a 1/1/4 On On 6573 7000 802.3af Class 2 3 n/a 1/1/5 On On 6479 7000 802.3af Class 2 3 n/a Milliwatts allocated to the <Truncated Output> port, and current Type of PD connected, -------------------------------------------------------------------------milliwatts the PD is and maximum amount of Total Is PoE enabled (on) or 306950consuming 33600 power the PD can receive disabled (off) on the port Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 25 Use the show inline power command to view PoE operational information. The output shows a lot of useful information including: • The total PoE power supply capacity and available power • The status of each PoE port, and if it is configured for PoE. • The Power (in milliwatts), being allocated to the port, and how many milliwatts the PD is consuming. • And finally, the type of PD connected, is it a 802.3af or 802.3at device, and what power class does the PD support. Revision 0419 11 ‐ 25 ICX 150 Power Over Ethernet Displaying PoE Power Supply Details • Use the show inline power detail command to view detailed information for the PoE power supplies Ruckus# show inline power detail PoE power supply Power Supply Data On stack 1: ++++++++++++++++++ details, including PoE Power Supply #1: firmware version Max Curr: 7.5 Amps Voltage: 54.0 Volts Capacity: 410 Watts POE Details Info. On Stack 1 : General PoE Data: Admin-On – ports enabled for inline power +++++++++++++++++ Admin-Off – ports not enabled for line power Firmware Version -------Oper-Off – ports not receiving inline power 02.1.0 Off-No-PD – ports where no PDs are connected Cumulative Port State Data: +++++++++++++++++++++++++++ #Ports #Ports #Ports #Ports #Ports #Ports #Ports Admin-On Admin-Off Oper-On Oper-Off Off-Denied Off-No-PD Off-Fault 24 0 0 24 0 0 0 Cumulative Port Power Data: Number of ports per +++++++++++++++++++++++++++ PoE priority, and total #Ports #Ports #Ports Power Power number of watts Pri: 1 Pri: 2 Pri: 3 Consumption Allocation consumed by PDs ----------------------------------------------0 0 24 679.371 W 720.0 W Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 26 Using the detail parameter with the show inline power command displays even more PoE information, including details about the PoE power supplies, as well as the current PoE firmware running on the switch. The output also shows the number of ports enabled for inline power, and the power consumption and allocation of the total number of ports. Revision 0419 11 ‐ 26 ICX 150 Power Over Ethernet Summary • You should now be able to: – – – – – Describe the function of Power over Ethernet (PoE) Understand the capabilities of each Ruckus ICX family Configure PoE on Ruckus campus switches Change the various features offered on an ICX PoE interface Display PoE information Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 27 This concludes the module on Power over Ethernet. You should now be able to Describe the function of Power over Ethernet (PoE) Understand the capabilities of each Ruckus ICX family Configure PoE on Ruckus campus switches Change the various features offered on an ICX PoE interface Display PoE information Revision 0419 11 ‐ 27 ICX 150 Power Over Ethernet End of Module 11: Power over Ethernet Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved This completes the Ruckus Power over Ethernet module. I encourage you to continue to the next module of the ICX 150 Implementer course. Thank you. Revision 0419 11 ‐ 28 ICX 150 ICX Campus Fabric Module 12: ICX Campus Fabric Revision 0419 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved This module will cover the ICX Campus Fabric. Revision 0419 12 ‐ 1 ICX 150 ICX Campus Fabric Objectives • After completing this module, you should be able to: – Describe the ICX Campus Fabric – Explain the components of the Campus Fabric – Configure Camps Fabric Control Bridge (CB) – Configure SPX Port Extenders (PE) using Interactive‐Setup and Zero‐Touch deployment – Use show commands to view the configuration of the SPX environment Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 2 After completing this module, you should be able to: • Describe the ICX Campus Fabric • Explain the components of the Campus Fabric • Configure Camps Fabric Control Bridge (CB) • Configure SPX Port Extenders (PE) using Interactive‐Setup and Zero‐Touch deployment • Use show commands to view the configuration of the SPX environment Revision 0419 12 ‐ 2 ICX 150 ICX Campus Fabric Overview • Switch Port Extender IEEE 802.1BR Control Bridge (CB) ICX 7650 & ICX 7750 – Extends a bridge, and the management of its objects, beyond its physical enclosure using 802 LAN technologies – Simplifying management by collapsing and unifying core, aggregation, and access functions – Managing Control Bridge (CB) and Port Extenders (PEs), in one domain with single point of management Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Port Extender (PE) ICX 7150, ICX 7250 & ICX 7450 3 Switch Port Extender (SPX) technology is covered in IEEE standard 802.1BR. This technology extends a bridge, and the management of its objects, beyond its physical enclosure using 802 LAN technologies. This technology collapses and unifies the core, aggregation, and access functions. SPX creates a single point of management for all devices in the environment we see here in the diagram. The Control Bridge (CB) on the top contains the ICX 7650 or 7750 devices which form a distributed stack, and the ICX 7150, 7250 and 7450 Port Extender (PE) devices on the bottom connecting to the CB. The master ICX in the Control Bridge becomes the this single point of management for the entire topology. Revision 0419 12 ‐ 3 ICX 150 ICX Campus Fabric Key Components Component Definition Control Bridge (CB) The CB has ports that link to one or more Port Extenders (PEs) Port Extender (PE) A dummy device that contains multiple ports. Forwards all traffic to a CB, they do not perform switching Access PE (Base PE) A PE connecting to end hosts. Located at the end of the CB‐PE chain SPX port PE port that links to CB or other PE Cascade port Egress CB port connecting to a PE Extended port PE port that serves as an access port to a host Control & Status Protocol (CSP) The SPX communication protocol between the CB master and the PEs Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 4 Let's take a look at the key components of the SPX environment. The CB consists of a traditional stack of ICX 7750 units, and is managed by the active controller in the stack. The CB has the ports that link to one or more Port Extenders (PEs), PEs are managed as virtual ports (or VPs) from the CBs perspective. An Access PE has ports connecting to network hosts. The CB handles traffic to and from PE ports as if these ports were local ports. A Port Extender (or PE) is a dummy device that contains multiple ports like the ICX 7450 that has 24 or 48 port models. PEs forward all traffic to the CB, they do not perform local switching. An access PE is located at the end of the CB‐PE tree. The SPX port is a PE port that links to the CB or another PE. SPX ports can be combined into a Link Aggregation Group (LAG) as we see here. The PE on the left connects to the CB with a 4 port Link Aggregation Group (LAG.) A Cascade port is an egress CB port connecting to a PE. The link between the cascade port and the PE port is configured and displayed as an SPX port or SPX LAG. An extended port is a PE port that serves as an access port to a host. Internal extended ports provide connectivity to the ports of the C‐VLAN component. External extended ports operate as ports of the extended bridge. Each internal extended port is linked through an E‐channel to an external extended port. Additional E‐channels provide linkage between an internal extended port and multiple external extended ports in support of multicast frame delivery. Control and Status Protocol (or CSP) serves as the SPX communication protocol between the CB master and the PE units in its control plane. Revision 0419 12 ‐ 4 ICX 150 ICX Campus Fabric Key Components (cont.) Component Definition Upstream port A PE port that connects to a transit PE toward the CB or directly to the CB. PE mode A special boot‐up role that causes a unit to perform as a dummy device Provisional‐PE mode A temporary mode activated with spx pe‐ enable, but the unit has not been reloaded E‐channel Bidirectional path between the external extended port and corresponding internal extended port E‐Channel Identifier (E‐CID) Identifies PE destination port in CSP. ME‐CID for multicast E‐Tag Tag added to SPX packets that contains an E‐ CID Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 5 Continuing with the key components we have the upstream port. An upstream port is a PE port that connects to a transit PE toward the CB or directly to the CB. An upstream port is an "ingress" port from the perspective of the CB. Next, we have PE mode. A unit operating in PE mode does not parse the startup configuration flash during boot‐up. The unit does not perform local switching, it only runs protocols available to a PE, such as LLDP. Most commands and configurations are blocked. Provisional‐PE mode is a temporary mode created when a user manually configures the spx pe‐enable command, but has not yet reloaded the unit. Because the unit previously booted up in regular mode, it continues to perform as a regular device until the next reload. That is, the unit still acts like a regular switch or router. Although, most commands or configuration are blocked the same way as in PE mode. An E‐channel is a bidirectional path between an external extended port and corresponding internal extended port. E‐channels are identified by E‐Channel ID (or E‐CID), IDs range from 0x1000 to 0x3FFF. E‐Channels can be point‐to‐point, point‐to‐multipoint, or multipoint‐to‐point links. An ME‐CID is a multicast E‐channel Identifier which carries a value of 0x1000 to 0x3FFF to indicate a specific multicast channel. The E‐CID or ME‐CID are inserted into an E‐tag which is carried in SPX packets. Revision 0419 12 ‐ 5 ICX 150 ICX Campus Fabric PE Standalone and PE Chain Topologies Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 6 Here we see two common campus fabric topologies. On the left, we have a Control Bridge (CB) stack in a ring topology with members directly attached to Port Extender (PE) units. The directly connected PE units supply extended port connectivity to end devices. On the right, we have a very similar configuration with a Control Bridge stack ring, but in this example the directly connected PEs function as transit PEs forming an SPX chain. Each SPX chain is capable of supporting 6 Port Extender (PE) units. Revision 0419 12 ‐ 6 ICX 150 ICX Campus Fabric CB‐PE LAG Topology • A single SPX LAGs can be configured from a Port Extender to one or more Control Bridge units Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 7 The topology shown here is a single SPX Link Aggregation Group (LAG) shared across multiple CB members. One PE unit can be connected to more than one CB unit when the connection is configured as a single LAG. If one of the connected units in the CB fails, the PE unit still maintains a connection to the CB. In the following figure, PE 17 is connected to more than one CB unit by a single LAG. Revision 0419 12 ‐ 7 ICX 150 ICX Campus Fabric PE Ring Topology • Connections between two PE chains or connecting end of chain back to CB creates a ring Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 8 Lastly we have the PE ring topology. A redundant SPX link can be connected from a CB unit to the edge PE of an existing PE chain or between two edge PEs of two existing PE chains to form a PE ring. You can combine ICX 7150, ICX 7250, and ICX 7450 devices in a PE ring just as you can in a PE chain. The topology shows a Control Bridge stack ring between CB1 and CB2. PE17 and PE19 have SPX LAG trunks up to the CBs. PE18 and PE20 have SPX LAG trunks to PE17 and PE19, respectively, forming two PE chains. To complete the ring, an SPX LAG trunk is connected between the two PEs at the end of each chain to form a ring. The same rules apply to a PE ring as PE chains, there can be no more than six PE units in a ring. Revision 0419 12 ‐ 8 ICX 150 ICX Campus Fabric Un‐supported Topology – Redundant PE Links • A single PE unit cannot be used to form a ring • If a single PE is connected to multiple CB devices, and not a single LAG, one of the SPX link paths will be blocked A complete list of supported and unsupported physical configurations can be found in the FastIron Campus Fabric Configuration Guide at www.ruckuswireless.com Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 9 Certain physical configurations are not supported in a campus fabric implementation. You cannot connect a PE unit to a Control Bridge with multiple SPX links or trunks. Likewise, you cannot connect a PE unit to another PE unit with multiple SPX links or trunks. If you attempt to configure a redundant link between a CB unit and a PE unit or between two PE units in a chain, the configuration is error‐disabled because the second link creates a loop. Correct the problem by adding the second link to a single SPX LAG. A complete list of supported and unsupported physical topologies can be found in the FastIron Campus Fabric Configuration Guide on the Ruckus website. Revision 0419 12 ‐ 9 ICX 150 ICX Campus Fabric CB & PE Control Plane Bring‐up • Single CB and PE discovery Control Bridge (CB) 4. CB validates the topology, assigns unit ID and starts CSP 1/1/1 1. Configure CB mode, define SPX LAG on CB 1/1/4 4x10G SPX LAG 17/2/1 3. PE sends LLDP with port extender (PE) TLV Host A 2. Configure PE mode, define SPX LAG on PE *ICX interactive-setup I utility automates these steps C(2-4) 17/2/4 PE Host B 1G host link (down) • An interactive setup utility is available to automate steps 2‐4 in this process and is the preferred method of adding PEs to an ICX Campus Fabric Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 10 Let’s take a look at the steps to configure SPX and the process it goes through to form the Campus Fabric. The example is only showing a single switch CB attached to a single PE. First, we configure the CB for SPX and define the port (or ports) to the PE, which in this case is a 4‐port LAG. Second, we have the option to configure the PE for SPX and define the LAG to the CB. Third, the PE sends an LLDP packet to the CB with the Port Extender TLV. Fourth, the CB validates the topology, assigns the unit IDs and starts CSP communication. Steps 2 through 4 in this process have been automated using an interactive‐setup utility available in release 8.0.90. The interactive‐setup utility is the preferred method of adding PEs to an ICX Campus Fabric. Revision 0419 12 ‐ 10 ICX 150 ICX Campus Fabric CB & PE Control Plane Bring‐up (cont.) Single point of management Control Bridge (CB) 8. PE port up/ready for applications 1/1/1 5. CSP creates VP, and assigns E-CID for each PE port 1/1/4 4x10G SPX LAG 17/2/1 7. Once PE is ready, it brings up data ports 6. Programming forwarding entry for each PE port PE 17 17/1/1 (E-CID 1) Host A 17/2/4 17/1/2 (E-CID 2) I C Host B 1G host link (up) Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 11 Continuing on. Fifth, CSP creates a virtual port (VP) for each PE extended port and assigns it an E‐CID. Sixth, each SPX port on the PE programs a forwarding entry. Seventh, once the PE is up and ready, it brings up the data ports. Finally, in step 8, the CB validates that the PE is up and ready for application traffic. Now, we have a single point of management for the SPX environment. Revision 0419 12 ‐ 11 ICX 150 ICX Campus Fabric Packet Walk‐through CB and PE Data Path 1. Host A pings Host B 2. PE adds E‐CID 1 to the packet received from Host A, and sends packet to CB over SPX LAG 3. CB performs look‐up for MAC B, destination 17/1/2. Adds E‐CID 2 and sends to PE over SPX LAG 4. PE performs look‐up for E‐CID 2 forwarding entry, finds destination port 17/1/2, removes E‐CID and sends packet to Host B Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 12 Now, let’s take a look at a packet walk‐through in the SPX environment. In this topology we have a four member control bridge stack ring. PE 17 is connected to two of the CB units through a single SPX LAG. Host A and Host B are each connected directly to PE17 extended ports and the E‐CIDs for each port are shown. 1. Host A pings Host B. 2. The packet arrives at the PE, and the PE adds E‐CID 1 to the packet, and sends the packet to the CB over SPX LAG. 3. The packet arrives at the CB, and the CB performs a MAC look‐up for MAC B, which is destinated for port 17/1/2. It adds E‐CID 2 to the packet and sends it to the PE over the SPX LAG. 4. The packet arrives at the PE, and the PE performs a look‐up of the E‐CID 2 forwarding entry, and finds destination port 17/1/2. 5. It removes the E‐CID and sends the packet to Host B. Revision 0419 12 ‐ 12 ICX 150 ICX Campus Fabric Port Extender ‐ CSP Control & Status Protocol • CB configures all of the forwarding tables for each downstream switch – Occurs at PE initialization – No additional programming required as a result of MAC learning/aging • PE CSP is transported over Edge Control Protocol (ECP) • ECP runs on top of LLDP at L2 • PE CSP communications are connection‐ oriented, enabling retransmission if a command or response is lost Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 13 In the SPX environment, the CB configures all of the forwarding tables for each downstream switch. This occurs at PE initialization, and no additional programming is required as a result of MAC learning and aging. PE Control & Status Protocol (CSP is) transported over Edge Control Protocol (or ECP), which runs on top of LLDP at Layer 2 and provides ACK and retransmit responses. PE CSP communications are connection‐oriented, enabling retransmission if a command or response is lost Revision 0419 12 ‐ 13 ICX 150 ICX Campus Fabric Deployment Considerations • No local switching on PE ports • Maximum 4 VLANs per PE port (including Default VLAN) • No IP addressing on physical PE port (VEs are supported) • If Spanning Tree is enabled on CB, it requires a reload • During manual initialization, ICX PEs require write memory and reload to enter PE mode • Only 1 SPX link/LAG allowed between PEs • No speed configuration allowed on SPX ports Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 14 When deploying a Campus Fabric, there are some considerations to keep in mind. First, as we have said, there is no local switching on the PE ports, all data and control packet processing is done at the CB. Also, there is a maximum 4 VLANs per PE port, this includes the Default VLAN. And, there is no IP addressing on physical PE ports, although, virtual router interfaces (or VEs) are supported. If Spanning Tree is enabled on the Control Bridge, it requires you to reload the device. During initialization, manually configured ICX PE devices will require you to save the configuration with the write memory command, then reload the device to enter into PE mode. You are allowed only one SPX link or SPX LAG between PE devices Finally, you cannot configure speed on SPX ports. Revision 0419 12 ‐ 14 ICX 150 ICX Campus Fabric Topology Scalability • Scalability limits in a single Campus Fabric domain as of version 8.0.90 – – – – Maximum 4 CB stack units (ICX 7650 and 7750) Maximum 8 PE chains Maximum 6 PE units per chain or ring Maximum of 16 stand‐alone PEs • In addition to 8 PE chains – Maximum 36 PE units per domain – Maximum PE ports is 1,728 per domain Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 15 As of ICX software version 8.0.90, there are a few capability limits in a single SPX domain: • There can be a maximum of four Control Bridge stack units, which can be ICX 7650 or 7750 stacks. • There can be a maximum of 8 Port Extender chains with each chain having a maximum of 6 units. • In addition to PE chains, there is a maximum of 16 stand‐alone PEs. • The total number of PE units, whether stand‐alone or in PE chains is 36. • If you have the maximum number of units and each stack units has 48 ports, that has the potential to provide support for 1,728 ports for connecting devices. Revision 0419 12 ‐ 15 ICX 150 ICX Campus Fabric Configuration & Confirmation Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 16 Now that we have an understanding of how the SPX environment works, let’s take a look at the configuration. Revision 0419 12 ‐ 16 ICX 150 ICX Campus Fabric Campus Fabric Configuration Overview • To configure a Campus Fabric domain, the following steps must be completed: 1. Configure and connect two to four ICX 7650 devices or two to four ICX 7750 devices in a traditional stack, or configure a standalone ICX 7650 or ICX 7750 • Configuring two or more devices in a stack provides redundancy for the control bridge (CB) 2. Enable and configure the ICX 7650 or ICX 7750 stack or standalone device as a CB 3. Connect ICX 7150, ICX 7250, or ICX 7450 PE devices to the CB 4. PE configuration options: • SPX Interactive Setup • Zero‐touch Deployment • Manually enable and configure the ICX 7150, ICX 7250, or ICX 7450 devices as PE units Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 17 Configuring a campus fabric is a fairly straight‐forward process. First you configure your ICX 7650 or 7750 devices into a stack, or single unit if you prefer. Stacking however provides redundancy to the CB. Next you enable the device or stack as a CB. Then you connect your ICX 7150, 7250 and/or 7450 devices to the CB. Lastly, you have three choices of how to convert your ICX 7150, 7250 or 7450 devices to PEs. • SPX interactive‐setup – The recommended method for Campus Fabric configuration. SPX interactive‐setup is a tool that can be used even in more complex deployments to convert PE candidates in router or switch mode to PE units. The tool allows you to select PE IDs and configure SPX ports and LAGs. SPX interactive‐setup recognizes some invalid SPX topologies that cannot be handled by zero‐touch deployment and requests user input to convert them to valid topologies. SPX interactive‐setup also allows you to change PE IDs interactively without detaching cables or shutting down units. • Zero‐touch deployment – Converts clean PE candidates in router or switch mode to active PE units without user intervention. In supported topologies, zero‐touch detects potential PE units, assigns them IDs, defines SPX ports or LAGs, and reloads them as PE units. • Manual deployment – In some situations, you may choose to configure the Campus Fabric domain manually. For example, in manual configuration, there is no requirement that configured ports be non‐base module ports. Manual configuration is recommended if connecting candidate PE units involves LAGs or loops. Multiple links between two candidate PEs cause packet looping. You can use manual configuration to create an SPX LAG for multiple links before physically connecting links. Revision 0419 12 ‐ 17 ICX 150 ICX Campus Fabric Enabling Control Bridge Mode • SPX Control Bridge (CB) can be enabled on ICX 7650 or 7750 single units or stacks • SPX CB can be enabled on the unit or stack with the spx cb-enable command ICX7750-48C Router# configure terminal ICX7750-48C Router(config)# spx cb-enable LLDP is globally disabled on enabling of SPX mode System is now in 802.1br control bridge (CB) mode. Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 18 We start in global CONFIG mode on the active controller for the ICX 7650 or 7750 stack that will serve as the Control Bridge, and enter the spx cb-enable command. The CB must be running LLDP to support a Campus Fabric environment. If LLDP is not already running, it is enabled on SPX ports by the spx cb-enable command. Enabling or disabling SPX does not affect LLDP on data ports, and enabling or disabling LLDP on data ports does not affect enabled SPX ports. Therefore you may see various LLDP related messages when executing the spx cb-enable command. The same configuration method is used whether it is a stack or stand‐alone CB unit. When creating the CB stack, the same port cannot be configured as a stacking port or trunk, and as an SPX port or SPX LAG. Output will confirm the system is now operating as an 802.1BR control bridge (CB). Revision 0419 12 ‐ 18 ICX 150 ICX Campus Fabric CB Configuration • Use the spx cb-configure command to enter CB configuration mode ICX7750-48C Router(config)# spx cb-config ICX7750-48C Router(config-spx-cb)# ? clear Clear table/statistics/keys end End Configuration level and go to Privileged level exit Exit current level max-vlans-per-pe-port Configure max allowed VLANs per PE port multi-spx-lag Configure two lags of a live link multi-spx-port Configure two ports of a live link no Undo/disable commands pe-id PE ID assignment provision quit Exit to User level show Show system information spx-lag Configure one CB lag spx-port Configure one or more CB ports write Write running configuration to flash or terminal zero-touch-enable actively send probe zero-touch-ports Configure zero touch ports <cr> Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 19 Once the CB is enabled, use the spx cb-configure command to enter into CB configuration mode. You can see that the prompt changes to reflect the CB configuration level. Here we use question mark help to view the different commands available for CB configuration. It is this configuration mode that you will configure specifics of the SPX domain, including defining SPX ports/LAGs, PE ID assignments and start the zero‐touch provisioning process. Revision 0419 12 ‐ 19 ICX 150 ICX Campus Fabric CB SPX Port/LAG Configuration • Configure SPX ports on CB connecting to the PEs ICX7750-48C Router(config-spx-cb)# spx-port 1/1/9 ICX7750-48C Router(config-spx-cb)# spx-port 1/1/10 1/1/20 to 1/1/24 – The spx-port command defines one or more separate PE devices • An SPX LAG can be configured for 2 to 16 ports ICX7750-48C Router(config-spx-cb)# spx-lag 2/1/10 to 2/1/11 3/1/10 – The spx-lag command defines connections to a single PE device • Optionally, give the SXP port or LAG a group name ICX7750-48C Router(config-spx-cb)# spx-port 1/1/10 pe-group finance ICX7750-48C Router(config-spx-cb)# spx-lag 2/1/10 to 2/1/11 3/1/10 pegroup marketing Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 20 Next, configure the SPX ports on the CB connecting to the PE devices. To do this, use the spx-port command, and specify the SPX port number. You can specify an individual port, or multiple ports with a space between each port, the ports can be listed in no particular order. Or, use the to parameter to list a range of ports. Instead of an SXP port, you can configure an SPX LAG using the spx-lag command and a range of ports. Like the individual port configuration, you can list each port with a space between them, or use the to parameter to list a range of ports. Please note that SPX LAGs are different than regular LAGs on the switch. It is not required to configure switching LAGs prior to configuring SPX LAGs. While both of these commands look similar, it is important to note that each port referenced in the spx-port command defines a separate PE device, while the spx-lag command defines all of the ports connecting to a single PE device. Optionally, you can give the SPX port or LAG a name in the form of a PE‐group name. This can be used to identify the PE chain connected to the SPX port or LAG. Use the pe-group command and enter a name. Revision 0419 12 ‐ 20 ICX 150 ICX Campus Fabric Valid Campus Fabric Topologies • Three valid PE topologies exist for connecting to a Campus Fabric domain Control Bridge – A single PE unit connected to the campus fabric domain CB through a spx‐link or spx‐trunk – A chain of PE units with a single unit at the end of the chain connected to the campus fabric domain CB through an spx‐link or spx‐trunk – A ring of PE units with each end of the chain connecting to the campus fabric domain CB through an spx‐link or spx‐trunk Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 21 PE connections to a configured campus fabric Control Bridge are required to adhere to one of three valid topologies. The first valid topology consists of a single Port Extender (PE) unit connected to the campus fabric domain Control Bridge through a single SPX link or a single SPX LAG trunk. The second valid topology consists of a chain of PE units with only the unit at one end of the chain connected to the campus fabric domain CB through single SPX link or using an SPX LAG trunk. The final valid topology is to use a ring of PE units with the units at each end of the chain connecting to the Control Bridge through single SPX link or using an SPX LAG trunk. Revision 0419 12 ‐ 21 ICX 150 ICX Campus Fabric SPX Interactive Setup – Invalid Topology Detection • Certain invalid configurations can be resolved using interactive‐setup – Utility will provide different options to make configuration valid Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 22 On of the great benefits of the SPX interactive‐setup utility is that it is capable of detecting invalid topologies. Not only does it detect, but it provides the administrator options to resolve the cause of invalidity. The interactive‐setup utility will analyze the topology and indicate which links could be removed to make the topology valid. Here see six invalid topologies that are not allowed in a campus fabric. • The first in invalid because the connection to the CB is from the end of a chain. • The second is invalid because a loop must connect to both ends of the PE chain. • The third and fourth are invalid because PE units are not allowed to form a loop between themselves, only to the CB. • The last two are invalid for multiple reasons and have several solutions for making them valid. And here are some of the examples of SPX interface removal options that may be presented if these topologies are discovered by the SPX interactive‐setup utility. Keep in mind most of these display one of many potential methods of making a PE topology valid. • The first topology can be resolved by disabling one of the PE‐to‐PE links on the PE at the start of the chain. • The second can be resolved by removing the SPX link connecting CB to the middle PE. • The third and fourth can be resolved by removing the looping connection on either side of the PE connected to the CB. • The last two have multiple resolutions that can discovered and resolved with SPX interactive‐setup. Revision 0419 12 ‐ 22 ICX 150 ICX Campus Fabric SPX Interactive‐Setup Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Revision 0419 23 12 ‐ 23 ICX 150 ICX Campus Fabric SPX Interactive Setup ‐ Launch • The spx interactive-setup command walks you through discovering PE devices, building a campus fabric and modifying existing fabrics ICX7750-48C Router# spx interactive-setup You can abort spx interactive-setup at any stage by <ctrl-c> 0: quit 1: change PE IDs 2: discover and convert new units (no startup-config flash) to PEs 3: discover and convert existing/new standalone units to PEs 2&3 can also find new links and convert chain(s) to ring. Please type your selection: Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 24 The SPX interactive setup is utility that walks you through creating and modifying campus fabrics. When the utility is launched, you are given 4 options. • Option 0 allows you to quit the utility with no changes • Option 1 allows the changing of PE IDs on existing device within the fabric domain • Option 2 allows the discovery and conversion of new PE units from ICX devices that have no startup‐config in the local flash • Option 3 allows the discovery and conversion of existing or new standalone PE units Both options 2 and 3 are a capable of discovering new links and the ability to convert a chain to a ring with minimal user intervention. Revision 0419 12 ‐ 24 ICX 150 ICX Campus Fabric SPX Interactive Setup ‐ Discovery • In the example, we will select option 2 to discover 6 new, unconfigured units – Probes are sent out of the ports identified as SPX ports with the spx-port command – Discovered devices are listed and the physical topology is displayed Please type your selection: 2 T=59m5.2: Sending probes to ports: u1: 1/1/1, Horizontal bars link to discovered units. Vertical bars link to CB or PEs. #1: #2: #3: #4: #5: #6: icx7250-24p-poe-port-management icx7250-24-port-management icx7250-24p-poe-port-management icx7250-48-port-management icx7250-48p-poe-port-management icx7250-24p-poe-port-management cc4e.24de.f3aa 609c.9f42.4100 609c.9f41.be5c cc4e.24e0.5cd6 cc4e.24e1.dc82 78a6.e121.10a4 1/1/1 | | [ Output Truncated ] Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 25 In this example we will go through the process of discovering 6 potential PE units that are ICX devices that have no configuration on them. So we will select option 2, which is used to discover and convert new units. Once selected, the CB begins sending probes out of all configured SPX ports. These are ports that were configured using the spx-port or spx-trunk commands in SPX CB configuration mode which we recently discussed. If any devices are discovered, they will be displayed in a list. Here we see there were 6 units discovered and their model information and system MAC address are displayed. Then a physical topology will be displayed, which we’ll look at next. Revision 0419 12 ‐ 25 ICX 150 ICX Campus Fabric SPX Interactive Setup – Discovered Topology • Does discovered topology match physical connections? 1/1/1 | | 1/1 +----+ +----+ +----+ +----+ +----+ -2/3| 1 |2/1--2/3| 2 |2/1--2/3| 3 |2/1--2/3| 4 |2/1==2/3| 5 |2/1| +----+ +----+ +----+ +----+ +----+ | | | | +----+ | ---------------------------------------------------------2/1| 6 |2/3+----+ Discovered 1 chain/ring Chain #0: Do you want to select this chain? (enter 'y' or 'n’): Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 26 A topology is presented starting from the CB, on port 1/1/1. If there were additional CBs in the topology, they would be displayed along the top. Then it shows the connections from each unit to the next. Notice that the interactive setup is also capable of discovering trunks between discovered PE units 4 and 5. Single SPX ports links are identified with dashes (‐) while discovered SPX trunk links are identified with equal signs (=). If this topology matches all of the devices you intended, select y, for yes. Revision 0419 12 ‐ 26 ICX 150 ICX Campus Fabric SPX Interactive Setup – Invalid Topologies • The discovered topology is evaluated against valid topologies – If invalid, interactive setup attempts to give you options to make it valid PE-PE Ring is an invalid topology 1/1/1 | | 1/1 +----+ +----+ +----+ +----+ +----+ -2/3| 1 |2/1--2/3| 2 |2/1--2/3| 3 |2/1--2/3| 4 |2/1==2/3| 5 |2/1| +----+ +----+ +----+ +----+ +----+ | | | | +----+ | ---------------------------------------------------------2/1| 6 |2/3+----+ [ Output truncated ] New units form a ring. If you want to select all units, you must remove a link. Type the link to be removed: 0: no, 1: (#6 2/1 -- #1 2/3), 2: (#1 2/1 -- #2 2/3) (default: 0): 1 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 27 Next, interactive compares the discovered topology against valid topologies. If the topology is invalid, the interactive setup utility will provide options to make the topology valid. In the example, the connection between PE switches forms a ring. this is an invalid topology because PE units, by themselves, cannot form a ring. In this scenario, there are two links that can be removed to make the topology valid. The interactive setup utility will provide you with a selection to pick which solution you would like to choose. We will choose option 1, to remove the SPX link between PE #1 and PE #6. Please note this only specifies that the port will not be configured as an SPX port. It will still be an enabled switching port on both devices and is connected. Which may cause a problematic loop condition. In this case, it might be best to physically disconnect this link between units 1 and 6 as well. Revision 0419 12 ‐ 27 ICX 150 ICX Campus Fabric SPX Interactive Setup – Modified Topology • Does discovered topology match physical connections? Type the link to be removed: 0: no, 1: (#6 2/1 -- #1 2/3), 2: (#1 2/1 -- #2 2/3) (default: 0): 1 #1: icx7250-24p-poe-port-management cc4e.24de.f3aa #2: icx7250-24-port-management 609c.9f42.4100 #3: icx7250-24p-poe-port-management 609c.9f41.be5c #4: icx7250-48-port-management cc4e.24e0.5cd6 #5: icx7250-48p-poe-port-management cc4e.24e1.dc82 #6: icx7250-24p-poe-port-management 78a6.e121.10a4 1/1/1 | | 1/1 +----+ +----+ +----+ +----+ +----+ | 1 |2/1--2/3| 2 |2/1--2/3| 3 |2/1--2/3| 4 |2/1==2/3| 5 |2/1+----+ +----+ +----+ +----+ +----+ | | +----+ | | 6 |2/3+----+ Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 28 After the selection, the interactive setup utility will display the new SPX topology. Notice that the connection between unit #1 and unit #6 is not longer present, indicating it will not be configured as an SPX port. Again, please note this only specifies that the port will not be configured as an SPX port. It will still be an enabled switching port on both devices and is connected. Which may cause a problematic loop condition. In this case, it might be best to physically disconnect this link between units 1 and 6 as well. Revision 0419 12 ‐ 28 ICX 150 ICX Campus Fabric SPX Interactive Setup – Define PE IDs • Next, define the PE ID of each discovered unit #1: #2: #3: #4: #5: #6: icx7250-24p-poe-port cc4e.24de.f3aa, icx7250-24-port 609c.9f42.4100, type icx7250-24p-poe-port 609c.9f41.be5c, icx7250-48-port cc4e.24e0.5cd6, type icx7250-48p-poe-port cc4e.24e1.dc82, icx7250-24p-poe-port 78a6.e121.10a4, type an ID an ID (No: type an ID an ID (No: type an ID type an ID (No: 0, default: 0, default: 18): (No: 0, default: 0, default: 20): (No: 0, default: (No: 0, default: 17): [Enter] [Enter] 19): [Enter] [Enter] 21): [Enter] 22): [Enter] You selected 6 unit(s): #1: ID=17, #2: ID=18, #3: ID=19, #4: ID=20, #5: ID=21, #6: ID=22, #1 #2 #3 #4 #5 +----+ +----+ +----+ +----+ +----+ 1/1/1--1/1| 17 |2/1--2/3| 18 |2/1--2/3| 19 |2/1--2/3| 20 |2/1==2/3| 21 |2/1+----+ +----+ +----+ +----+ +----+ | #6 | +----+ | | 22 |2/3+----+ Proceeding will produce the above topology. Do you accept it? (enter 'y' or 'n’): Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 29 Next, the interactive setup utility will allow you to define the PE ID of each unit in the discovered chain or ring. The first unit will default to PE ID of 17. You can change it here or accept the default by pressing the Enter key. The valid range of PE IDs is from 17 to 56. If you modify a PE ID of one of the units, the next unit will default to next number in sequence. For example, if you select PE ID 25, the next PE will default to PE ID 26. I the example here, all of the default values were selected and the topology is redrawn with chosen PE IDs. Revision 0419 12 ‐ 29 ICX 150 ICX Campus Fabric SPX Interactive Setup – Confirm Topology • Does discovered topology match physical connections? Proceeding will produce the above topology. Do you accept it? (enter 'y' or 'n'): y spx spx #1 #2 #3 #4 #5 #6 interactive-setup discovers 1 chain (valid#= 1, selected#= 1) interactive-setup discovers 6 unit(s) and sends reload to chain 0: cc4e.24de.f3aa U17, D0: 1/1, D1: 2/1 609c.9f42.4100 U18, D0: 2/3, D1: 2/1 609c.9f41.be5c U19, D0: 2/3, D1: 2/1 cc4e.24e0.5cd6 U20, D0: 2/3, D1: 2/1 to 2/2 cc4e.24e1.dc82 U21, D0: 2/3 to 2/4, D1: 2/1 78a6.e121.10a4 U22, D0: 2/3 ICX7750-48C Router# Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 30 Finally, you confirm acceptance of the topology. After selecting yes, a summary of the discovery is displayed, including: • Then number of discovered chains of rings • The number of discovered units Then finally a summary of each discovered unit, which includes MAC address, the selected PE ID and the SPX links being used. At this point any newly discovered units that are converted to PEs will be reset to assume their configured roles. This may take a few minutes. The system log can be viewed to monitor the new devices joining the campus fabric. Revision 0419 12 ‐ 30 ICX 150 ICX Campus Fabric Displaying CB Configuration • show running-config on CB displays SPX units with module and SPX port details ICX7750-48C Router# show running-config Current configuration: ! ver 08.0.90T203 ! stack unit 1 module 1 icx7750-48-xgc-port-management-module module 2 icx7750-qsfp-6port-qsfp-240g-module stack-port 1/2/1 stack-port 1/2/4 spx unit 17 module 1 icx7250-24p-poe-port-management-module module 2 icx7250-sfp-plus-8port-80g-module spx-port 17/1/1 spx-port 17/2/1 spx unit 18 module 1 icx7250-24-port-management-module module 2 icx7250-sfp-plus-8port-80g-module spx-port 18/2/1 spx-port 18/2/3 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved spx unit 19 module 1 icx7250-24p-poe-port-management-module module 2 icx7250-sfp-plus-8port-80g-module spx-port 19/2/1 spx-port 19/2/3 spx unit 20 module 1 icx7250-48-port-management-module module 2 icx7250-sfp-plus-8port-80g-module spx-lag 20/2/1 to 20/2/2 spx-port 20/2/3 spx unit 21 module 1 icx7250-48p-poe-port-management-module module 2 icx7250-sfp-plus-8port-80g-module spx-port 21/2/1 spx-lag 21/2/3 to 21/2/4 spx unit 22 module 1 icx7250-24p-poe-port-management-module module 2 icx7250-sfp-plus-8port-80g-module spx-port 22/2/3 ! ! ! spx cb-enable spx cb-configure spx-port 1/1/1 pe-id 1/1/1 17 18 19 20 21 22 <Truncated Output> 31 To check your configuration on the CB use the show running-config command. The output displays the SPX units with details on installed modules and all SPX ports and LAGs. Revision 0419 12 ‐ 31 ICX 150 ICX Campus Fabric Displaying SPX Configuration From CB • show spx on CB displays the CB stack and PE unit/PE‐chain with a cascade port ICX7750-48C Router# show spx T=1h6m40.1: alone: standalone, D: dynamic ID Type Role Mac Address 1 S ICX7750-48XGC alone 609c.9f20.3b00 17 D ICX7250-24P spx-pe cc4e.24de.f3aa 18 D ICX7250-24 spx-pe 609c.9f42.4100 19 D ICX7250-24P spx-pe 609c.9f41.be5c 20 D ICX7250-48 spx-pe cc4e.24e0.5cd6 21 D ICX7250-48P spx-pe cc4e.24e1.dc82 22 D ICX7250-24P spx-pe 78a6.e121.10a4 cfg, S: static Pri State Comment 0 local Ready N/A remote Ready N/A remote Ready N/A remote Ready N/A remote Ready N/A remote Ready N/A remote Ready +---+ 2/1| 1 |2/4 +---+ +----+ +----+ +----+ +----+ +----+ 1/1/1--1/1| 17 |2/1--2/3| 18 |2/1--2/3| 19 |2/1--2/3| 20 |2/1==2/3| 21 |2/1+----+ +----+ +----+ +----+ +----+ | | +----+ | | 22 |2/3+----+ Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 32 With both CB and PEs configured, use the show spx command on the CB to view the details of each unit in the SPX environment including the active and standby members of the CB, and each PE. One field to pay attention to after running SPX interactive setup is the letter next to the unit ID. It will either be a “D” for dynamic or an “S” for static. A static PE unit has saved configuration in startup configuration flash. The PE unit continues to exist if the system reloads. A PE unit with dynamic configuration does not have its configuration stored in startup flash. Consequently, the dynamically configured PE configuration is removed when the system reloads. The bottom of the output shows the topology of the SPX environment. The IDs for each unit is in the box, and the connecting ports are on the outside of each box. Revision 0419 12 ‐ 32 ICX 150 ICX Campus Fabric Zero‐Touch Deployment Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved Revision 0419 33 12 ‐ 33 ICX 150 ICX Campus Fabric Zero‐Touch Deployment • The Zero‐touch deployment only works with “clean” candidate PE units – No startup‐config can be present • Essentially performs SPX Interactive‐setup, option #2 with no user intervention and uses default selections – Only works on valid topologies • Enable CB and configure zero‐touch ports ICX7750-48F ICX7750-48F ICX7750-48F ICX7750-48F Router(config)# spx cb-enable Router(config)# spx cb-config Router(config-spx-cb)# zero-touch-ports 1/1/3 1/1/16 Router(config-spx-cb)# zero-touch-enable Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 34 The Zero‐touch deployment only works with “clean” ICX units that have no startup‐config present. The utility essentially performs spx interactive‐setup, option #2 with no user intervention and automatically applies the default selections and only works on valid topologies. The initial setup steps are the same as stack interactive‐setup: 1. Enable control bridge functionality with the spx cb-enable command 2. Enter CB configuration mode with the spx cb-config command 3. Define the zero‐touch ports where PEs are/will be connected with the zero-touchports command 4. Then begin the zero‐=touch process with the zero-touch-enable command Revision 0419 12 ‐ 34 ICX 150 ICX Campus Fabric Zero‐Touch Deployment (cont.) • Messages display discovery progress ICX7750-48F Router(config-spx-cb)# Send reload to chain0: #2 CC4E.24DC.E9CE ID=18, D0: 2/3, D1: 2/5 to 2/6 2/8 #1 CC4E.24DC.F166 ID=17, D0: 2/5 to 2/6 2/8, D1: 2/4 T=12m23.5: Add spx-port 1/1/16 for a discovered unit to join T=12m23.6: Add spx-port 1/1/3 for a discovered unit to join PE-port=17/2/4 CB-port=1/1/16 Sica Unit id:17, PoD License Capacity:8 PE-port=18/2/3 CB-port=1/1/3 Sica Unit id:18, PoD License Capacity:8 Stack unit 18 Power supply 1 is up Stack unit 18 Power supply 2 is down Stack unit 17 Power supply 1 is up Stack unit 17 Power supply 2 is down Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 35 If connected to the console messages will display indicating the status of the zero‐touch provisioning process. Nearly all of these outputs are after the discovery of PE devices. It will typically start wit the sending of a reload command to units. Then when the units come back up as PEs, the remaining messages providing information about: • PEs joining the campus fabric • Ports connecting CB to PE • Licensing on PE units • Power supply statuses of PE units Revision 0419 12 ‐ 35 ICX 150 ICX Campus Fabric Zero‐Touch Deployment (cont.) • Display results ICX7750-48F Router(config-spx-cb)# show spx T=20m3.1: alone: standalone, D: dynamic cfg, S: static ID Type Role Mac Address Pri State Comment 1 S ICX7750-48XGF alone cc4e.24d2.2c00 0 local Ready 17 D ICX7250-24 spx-pe cc4e.24dc.f166 N/A remote Ready 18 D ICX7250-24 spx-pe cc4e.24dc.e9ce N/A remote Ready +---+ 2/1| 1 |2/4 +---+ +----+ +----+ 1/1/3--2/3| 18 |2/5==2/5| 17 |2/4--1/1/16 +----+ +----+ • After discovery completes, disable zero-touch-enable, remove zero-touch-ports and save configuration ICX7750-48F Router(config-spx-cb)# no zero-touch-enable ICX7750-48F Router(config-spx-cb)# no zero-touch-ports 1/1/3 1/1/16 ICX7750-48F Router(config-spx-cb)# write mem Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 36 The show spx output displays the details of the newly added PE units. When first added the configuration for each PE unit will display a “D” for dynamic. Executing a write memory command should be executed to save the configuration to flash. Lastly, after the discovery is completed, zero‐touch discovery probes will continue being sent out of the configured zero‐touch‐ports. That is why it should be disabled with the no zero-touch-enable and no zero-touch-ports commands as soon as the discovery is finished. And once this is complete, the configuration should be saved with the write memory command. Revision 0419 12 ‐ 36 ICX 150 ICX Campus Fabric Summary • Attendees should now be able to: – Describe the ICX Campus Fabric – Explain the components of the Campus Fabric – Configure Camps Fabric Control Bridge (CB) – Configure SPX Port Extenders (PE) using Interactive‐Setup and Zero‐Touch deployment – Use show commands to view the configuration of the SPX environment Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 37 Now that we have completed this module, you should be able to: • Describe the ICX Campus Fabric • Explain the components of the Campus Fabric • Configure Camps Fabric Control Bridge (CB) • Configure SPX Port Extenders (PE) using Interactive‐Setup and Zero‐Touch deployment • Use show commands to view the configuration of the SPX environment Revision 0419 12 ‐ 37 ICX 150 ICX Campus Fabric End of Module 12: ICX Campus Fabric Revision 0419 Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved This concludes the ICX campus Fabric training module. Revision 0419 12 ‐ 38 ICX 150 ICX Campus Fabric Appendix A: PE Manual Configuration Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 39 This appendix covers the manual configuration of the PE units. Revision 0419 12 ‐ 39 ICX 150 ICX Campus Fabric Switch Port Extender Modes • Regular mode: a standalone ICX 7150, 7250 or 7450 unit behaves like a normal (pre‐SPX) routing or switching device • Provisional‐PE mode: an ICX PE‐capable unit enters provisional‐PE mode after the user configures the spx pe-enable command but has not reloaded the unit – The unit acts like a non‐SPX switch or router • PE mode: the SPX‐enabled unit boots‐up in PE mode and operates as a dummy SPX device – It does not parse startup‐config flash upon boot‐up – It runs protocols only available to a PE unit, such as LLDP – It does not perform local switching Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 40 PE devices go through these modes of operation during the enabling of SPX: All units start in Regular mode, where a standalone ICX 7450 unit behaves like a normal pre‐SPX enabled routing or switching device. Then it enters Provisional‐PE mode. This is when the user has configured the spx peenable command but has not reloaded the unit. The unit is still acting like a non‐SPX switch or router. Once the unit is reloaded, it boots into PE mode, and starts acting like a PE. The unit operates as a dummy device. It does not parse startup‐config flash upon boot‐up and it only runs protocols available to a PE unit, such as LLDP. The PE does not perform local switching, and most commands, including configuration commands, are blocked. Revision 0419 12 ‐ 40 ICX 150 ICX Campus Fabric PE Configuration Port Extender Units (ICX 7150, 7250 and 7450) • Configure each PE using spx pe-enable ICX7450-48P Router# configure terminal ICX7450-48P Router(config)# spx pe-enable Enter provisional PE mode. CLI is limited to spx unit 1. After finishing all configuration, please "write memory" and reload this unit to be a PE. – System enters Provisional‐PE mode – In Provisional‐PE mode, the text [Provisional_PE] is appended to the front of the system prompt • Optionally, suggest a PE‐ID for the PE [Provisional-PE]ICX7450-48P Router(config)# spx suggested-id 20 – IDs are from 17 to 56 – May be overridden by the CB Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 41 Now let's configure the PE devices. We start in global CONFIG mode with the spx pe-enable command. And the system then enters the Provisional‐PE mode. Now the system automatically assigns the 2 default SPX ports. The default SPX PE ports can be changed on a device in Provisional‐PE mode, which we will see on the next slide. You can configure a suggested ID (from 17 to 56) on the PE unit before it joins the CB. However, the suggested ID may be overridden by the CB if it matches a reserved configuration. The PE unit will be assigned the PE ID from the reserved configuration instead of the suggested ID. If the suggested is already in use on another active PE, or if the ID exists in a saved configuration, the PE will not be assigned the suggested ID. Revision 0419 12 ‐ 41 ICX 150 ICX Campus Fabric PE Configuration (cont.) • The following parameters can be changed on the PE from Provisional‐PE mode – Change the default SPX ports [Provisional-PE]ICX7450-48F Router(config-spx-unit-1)# no spx-port 1/2/3 spx-port 1/2/3 is removed. [Provisional-PE]ICX7450-48F Router(config-spx-unit-1)# spx-port 1/2/4 – Configure an SPX LAG on PE [Provisional-PE]ICX7450-48F Router(config-spx-unit-1)# spx-lag 1/2/1 to 1/2/2 – Optionally, assign a Name to the PE unit (on PE) [Provisional-PE]ICX7450-48F Router(config-spx-unit-1)# pe-name finance Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 42 As I just mentioned, there are some configurations that can be preformed in Provisional‐PE mode. First, you can change the default SPX PE ports. In our example on this slide, notice that the prompt has [Pro‐PE] prepended to it. This signifies that the device is in Provisional‐PE mode. Now, you can change the default ports using the no spx-ports command followed by the default SPX port number, then use the spx-port command followed by the desired port or ports. Also from Provisional‐PE mode, you can configure an SPX LAG. Use the spx-lag command followed by the port range. As we saw with the CB configuration, a range of ports can be listed with a space between them, or you can use the parameter “to” to specify a sequence of ports. Optionally, you can assign a name to the PE using the pe-name command. Revision 0419 12 ‐ 42 ICX 150 ICX Campus Fabric Displaying PE Configuration • show running-config on PE can only be used in Provisional‐PE mode – In PE mode the console is not available, it can only be accessed through the CB [Pro-PE]ICX7450-48F Router(config-spx-unit-1)# show running-config Current configuration: ! ver 08.0.40b1T213 ! spx pe-enable spx suggested-id 20 pe-name finance spx unit 1 module 1 icx7450-48f-sf-port-management-module module 2 icx7400-xgf-4port-40g-module module 4 icx7400-qsfp-1port-40g-module spx-lag 1/2/1 to 1/2/2 spx-port 1/2/4 <Truncated Output> Copyright 2019 – ARRIS Enterprises, LLC. All rights reserved 43 To check your configuration, use the show running-config command on the PE in Provisional‐PE mode to view the changes made. This can only be done from Provisional‐PE mode because the console will not be available once the changes are saved and the system is reloaded into PE mode. Revision 0419 12 ‐ 43 ICX 150 Revision 0419 ICX Campus Fabric 12 ‐ 44