Professional Documents
Culture Documents
Version: 3.02.20
ZTE CORPORATION
No. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: +86-755-26771900
Fax: +86-755-26770801
URL: http://support.zte.com.cn
E-mail: 800@zte.com.cn
LEGAL INFORMATION
Copyright © 2017 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties. Any reproduction or
distribution of this document or any portion of this document, in any form by any means, without the prior written
consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by
contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided “as is”, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose,
title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the
use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit the ZTE technical support website http://support.zte.com.cn to inquire for related information.
The ultimate right to interpret this product resides in ZTE CORPORATION.
Revision History
Figures............................................................................................................. I
Tables ............................................................................................................ III
Glossary .........................................................................................................V
II
Intended Audience
This manual is intended for:
Chapter 1, PFC Configuration Describes the PFC principle, and the configuration commands,
maintenance commands, and configuration instances of the
ZXR10 5960.
Chapter 2, ETS Configuration Describes the ETS principle, and the configuration commands,
maintenance commands, and configuration instances of the
ZXR10 5960.
Chapter 3, QCN Configuration Describes the QCN principle, and the configuration
commands, maintenance commands, and configuration
instances of the ZXR10 5960.
Chapter 5, DCBX Configuration Describes the DCBX principle, and the configuration
commands, maintenance commands, and configuration
instances of the ZXR10 5960.
Chapter 6, VXLAN Configuration Describes the VXLAN principle, and the configuration
commands, maintenance commands, and configuration
instances of the ZXR10 5960.
Chapter 7, FCoE Configuration Describes the FCoE principle, and the configuration
commands, maintenance commands, and configuration
instances of the ZXR10 5960.
Chapter 9, OpenFlow Configuration Describes the OpenFlow principle, and the configuration
commands, maintenance commands, and configuration
instances of the ZXR10 5960.
Chapter 10, ESM Configuration Describes the ESM principle, and the configuration
commands, maintenance commands, and configuration
instances of the ZXR10 5960.
Conventions
This manual uses the following conventions.
Italics Variables in commands. It may also refer to other related manuals and documents.
Bold Menus, menu options, function names, input fields, option button names, check boxes,
drop-down lists, dialog box names, window names, parameters, and commands.
Constant Text that you type, program codes, filenames, directory names, and function names.
width
[] Optional parameters.
{} Mandatory parameters.
II
1.1 Overview
Priority-based Flow Control (PFC) is a mechanism to prevent network congestion in data
center networks.
PFC evolves from the pause frame mechanism (as defined by the 802.3ad standard).
In the pause frame mechanism, all the traffic has the same priority, while in the PFC
mechanism, eight priorities (0-7) are provided in accordance with CoS (as defined by
IEEE 802.1p). PFC provides pause frame mechanisms for the traffic of each priority
independently.
Data of each priority has a particular traffic threshold in the receive buffer. If the traffic of
a priority exceeds its threshold and the PFC mechanism is enabled for this priority, a PFC
pause frame is triggered and sent to the sending station. For the operating principle of the
PFC mechanism, see Figure 1-1.
After receiving the PFC pause frame, the sending station stops the transmission of data
of the priority specified in the frame, to prevent buffer overflow.
1-1
There is a delay from the time when a PFC pause frame is sent to the time when the frame
works. Enough buffer space is required to store data delivered to the receiving station
within this period of time.
Field Description
DA 01-80-C2-00-00-01
EtherType 0x8808
FCS Checksum
The priority enable vector field contains two octets. For the priority enable vector structure,
see Figure 1-3. The high-order eight bits are all zeros, and the low-order eight bits indicate
eight priorities. If e[n] is 1, the time[n] field is valid. If e[n] is 0, the time[n] field is invalid.
1-2
PFC Network
PFC is applied only to the end-to-end full-duplex links in data center networks. It may
cause congestion spreading, which thus limits the network size.
Figure 1-4 shows how congestion spreading occurs. When a station detects congestion
and thus sends PFC pause frames to the sending stations, the sending stations limit the
data transmission rate. Because these sending stations do not have sufficient buffer
spaces for receiving packets and thus also send PFC pause frames to upstream stations.
Finally, the congestion spreading occurs.
Untagged frames transmitted in the network are stored in the buffer for the flow of the
default priority. Therefore, it is recommended that PFC be disabled for the default priority.
1-3
Parameter Description
Command Function
Parameter Description
In enable mode, the willing parameter of the local end is 1, which means that the local end
is willing to accept the PFC configuration of the peer end. When the local end receives
the TLV of the peer PFC, if the willing parameter is 0, it means that the local end accepts
the configuration of the peer end. If the willing parameter is set to 1, the configuration
attributes of both ends depend on the end with a smaller MAC address.
1-4
For a description of the parameters in Steps 1 and 2, refer to the following table.
Parameter Description
Command Function
ZXR10#show dce pfc [{[interface <para>],[{local | Shows PFC information of a single or all
remote | config}]}] interfaces.
Parameter Description
Run the show dce pfc command to show the information of a single PFC.
1-5
Field Description
Configuration on switch A:
/*Run the following command to enable PFC on the xgei-0/1/1/1 port for priority level 6:*/
ZXR10(config)#pfc
ZXR10(config-pfc)#interface xgei-0/1/1/1
ZXR10(config-pfc-if-xgei-0/1/1/1)#priority 6 enable
Configuration on switch B:
/*Run the following command to enable PFC on the xgei-0/1/1/2 port for priority level 6:*/
ZXR10(config)#pfc
ZXR10(config-pfc)#interface xgei-0/1/1/2
1-6
ZXR10(config-pfc-if-xgei-0/1/1/2)#priority 6 enable
1-7
1-8
2.1 Overview
Enhanced Transmission Selection (ETS) is a mechanism to support priority-based
transmission and allocation of bandwidth amongst traffic classifications in data center
networks. Different services such as LAN, storage, trunk, and management have their
specific TCs, which have strict priorities and are allocated with particular bandwidths.
Operating Principle
ETS allocates a particular bandwidth to each TC, and allows bandwidth-sensitive and
packet-loss-sensitive services to share the network bandwidth. Services requiring
minimum latency must comply with strict priority and queueing principles.
ETS decides TC priorities, and one TC corresponds to multiple FIFO queues. Queue
scheduling in a TC is managed by 802.1Q queueing specifications. For example, if a logic
queue includes multiple FIFO queues, and these FIFO queues may be classified based
on priority, VLAN, or source port, then strict priority, weighted round robin, or others can
be used as the scheduling algorithm for scheduling of the FIFO queues of a logic queue.
ETS allows one or more priorities for one TC, and these priorities share the bandwidth
allocated to this TC. TC bandwidth is allocated on a percentage basis with the granularity
of 1%. The bandwidth that is allocated to a TC depends on the load in this TC. When the
offered load in a TC does not use up its allocated bandwidth, ETS allows other TCs to use
the available bandwidth.
If ETS is not enabled, strict priority is used for scheduling of queues in a TC. ETS, strict
priority, or other scheduling algorithms can be used for each TC, depending on the packet
loss, latency, and bandwidth requirements.
Application
For a typical application of ETS, see Figure 2-1. Traffic in a network is classified into the
following based on application type:
l LAN
l SAN
2-1
ETS allocates different bandwidths for the three types of traffic, to ensure that key data
can have the priority to use the available bandwidth when the bandwidth is insufficient.
Because IPC is sensitive to latency, strict priority is used without bandwidth limitation, while
50% and 50% are allocated to SAN and LAN respectively. For details, refer to Table 2-1.
IPC No Limit
SAN 50%
LAN 50%
ETS supports bandwidth share. If the offered load does not use up the allocated
bandwidth, ETS allows other TCs to use the available bandwidth. For the offered loads of
LAN, SAN, and IPC, refer to Table 2-2.
Time Segment T1 T2 T3
2-2
2-3
If a TC is allocated with the bandwidth, the algorithm of the TC can only be ETS. You
cannot set other algorithm for the TC. The storage restart and show run are supported.
Only when the corresponding TC algorithm is set to ETS algorithm, the bandwidth must
be configured for the TC. When the TC is the same, the new configuration replaces the
old configuration. When the bandwidth percentage of all TCs of an interface is 100, the
TC bandwidth configuration of this interface takes effect. That is to say, when you can
the TC bandwidth, the modification takes effect only when the sum of all TC bandwidths is
100. The system keeps the original configuration if some condition is not met. The storage
restart and show run are supported.
For a description of the parameters in Steps 3 to 8, refer to the following table.
Parameter Description
Command Function
2-4
Command Function
ZXR10#show dce ets [{[interface <para>],[{local | Shows ETS information of a single or all
remote | config}]}] interfaces.
The following is sample output from the show dce ets command:
ZXR10(config)#show dce ets xgei-0/1/1/1
------------------------------------------------
Interface Name: xgei-0/1/1/1
Local Configuration Information
ETS Willing: No
ETS TC Valid: No
ETS Remain Bandwidth: 100
ETS Shaper Algorithm Support: No
ETS MAX TC Support: 8
ETS Recommended TC Valid: No
ETS Recommended Remain Bandwidth: 100
ETS Priority Relation To TC
Priority[0]: 0
Priority[1]: 0
Priority[2]: 0
Priority[3]: 0
Priority[4]: 0
Priority[5]: 0
Priority[6]: 0
Priority[7]: 0
ETS TC Bandwidth
TC[0]: 0
TC[1]: 0
TC[2]: 0
TC[3]: 0
TC[4]: 0
TC[5]: 0
TC[6]: 0
TC[7]: 0
ETS TC Algorithm
TC[0]: 0
TC[1]: 0
TC[2]: 0
TC[3]: 0
TC[4]: 0
TC[5]: 0
2-5
TC[6]: 0
TC[7]: 0
ETS Recommended TC Bandwidth
TC[0]: 0
TC[1]: 0
TC[2]: 0
TC[3]: 0
TC[4]: 0
TC[5]: 0
TC[6]: 0
TC[7]: 0
ETS Recommended TC Algorithm
TC[0]: 0
TC[1]: 0
TC[2]: 0
TC[3]: 0
TC[4]: 0
TC[5]: 0
TC[6]: 0
TC[7]: 0
Remote Information
ETS Willing: No
ETS Shaper Algorithm Support: No
ETS MAX TC Support: 0
ETS Priority Relation To TC
Priority[0]: 0
Priority[1]: 0
Priority[2]: 0
Priority[3]: 0
Priority[4]: 0
Priority[5]: 0
Priority[6]: 0
Priority[7]: 0
ETS TC Bandwidth
TC[0]: 0
TC[1]: 0
TC[2]: 0
TC[3]: 0
TC[4]: 0
TC[5]: 0
TC[6]: 0
TC[7]: 0
ETS TC Algorithm
TC[0]: 0
2-6
TC[1]: 0
TC[2]: 0
TC[3]: 0
TC[4]: 0
TC[5]: 0
TC[6]: 0
TC[7]: 0
ETS Recommended Priority Relation To TC
Priority[0]: 0
Priority[1]: 0
Priority[2]: 0
Priority[3]: 0
Priority[4]: 0
Priority[5]: 0
Priority[6]: 0
Priority[7]: 0
ETS Recommended TC Bandwidth
TC[0]: 0
TC[1]: 0
TC[2]: 0
TC[3]: 0
TC[4]: 0
TC[5]: 0
TC[6]: 0
TC[7]: 0
ETS Recommended TC Algorithm
TC[0]: 0
TC[1]: 0
TC[2]: 0
TC[3]: 0
TC[4]: 0
TC[5]: 0
TC[6]: 0
TC[7]: 0
2-7
Priority[6]: 0
Priority[7]: 0
ETS TC Bandwidth
TC[0]: 0
TC[1]: 0
TC[2]: 0
TC[3]: 0
TC[4]: 0
TC[5]: 0
TC[6]: 0
TC[7]: 0
ETS TC Algorithm
TC[0]: 0
TC[1]: 0
TC[2]: 0
TC[3]: 0
TC[4]: 0
TC[5]: 0
TC[6]: 0
TC[7]: 0
Field Description
Purpose
l IPC traffic of cos 6 and cos 7 are provided with the top priority without bandwidth
limitation.
l SAN traffic of cos 3, cos 4, and cos 5 and LAN traffic of cos 0, cos 1, and cos 2 share
the bandwidth equally. If the allocated bandwidth for SAN or LAN is not fully used,
other TCs can use the available bandwidth.
2-8
Run the following commands to use an ETS profile and bind it to the xgei-0/1/1/1 port.
Configurations on switch A:
/*Configuring an ETS template*/
ZXR10(config)#ets
ZXR10(config-ets)#inter xgei-0/1/1/1
ZXR10(config-ets-if-xgei-0/1/1/1)#ets enable
/*IPC traffic of cos6 and cos 7 are provided with the top priority
without bandwidth limitation. The default value is TCO.*/
/*SAN traffic of cos3, cos 4, and cos 5 shares teh bandwidth (50%).*/
ZXR10(config-ets-if-xgei-0/1/1/1)#set priority 0 traffic-class 1
ZXR10(config-ets-if-xgei-0/1/1/1)#set priority 1 traffic-class 1
ZXR10(config-ets-if-xgei-0/1/1/1)#set priority 2 traffic-class 1
ZXR10(config-ets-if-xgei-0/1/1/1)#set configuration traffic-class 1 algorithm 2
ZXR10(config-ets-if-xgei-0/1/1/1)#set configuration traffic-class 1 band-width 50
/*LAN traffic of cos0, cos 1, and cos 2 shares the bandwidth (50%). */
ZXR10(config-ets-if-xgei-0/1/1/1)#set priority 3 traffic-class 2
ZXR10(config-ets-if-xgei-0/1/1/1)#set priority 4 traffic-class 2
ZXR10(config-ets-if-xgei-0/1/1/1)#set priority 5 traffic-class 2
ZXR10(config-ets-if-xgei-0/1/1/1)#set configuration traffic-class 2 algorithm 2
ZXR10(config-ets-if-xgei-0/1/1/1)#set configuration traffic-class 2 band-width 50
2-9
2-10
3.1 Overview
Quantized Congestion Notification (QCN) is an end-to-end backward congestion
notification mechanism to prevent network congestion in data center networks.
QCN includes QCN congestion detection and data frame sampling.
l Congestion management queues are checked for congestion detection. If congestion
is detected, Congestion Notification Messages (CNMs) are sent to end hosts.
l Data frames in congestion management queues are sampled. If CNMs are to be sent,
the information on sampled data frames will be included into the CNMs together with
the congestion level. If no CNM is to be sent, the information on sampled frames will
not be used.
The source MAC addresses of the sampled data frames are the destination addresses of
the CNMs. These CNMs are forwarded to the end hosts in Layer 2. Each CNM contains
the information on sampled data frames, so one CNM controls the traffic of only one data
stream. After receiving a CNM, the end host reduces the traffic transmission rate of the
corresponding stream, and other streams are not affected.
For the operating principle of QCN, see Figure 3-1. Traffic converges at the switch which
enables QCN. If there is congestion, the switch sends CNMs to notify end hosts to reduce
the traffic transmission rate.
3-1
3-2
The unit of QCN sampling interval (SI) is KB, which means a specific number of bytes
in the congestion management queues. When the traffic in the congestion management
queues reaches the sampling interval, the traffic is sampled and then reset to zero. A
smaller sampling interval means more frequent sampling.
The sample-base (base value of the sample interval) can be set on the ZXR10 5960, which
determines the sampling interval range. The sampling interval is affected by the congestion
level. A smaller sampling interval is required if serious congestion occurs.
If the sample-base is fixed and the sampling interval completely depends on the congestion
level, frames of the same stream may be sampled. Therefore, a random factor must be
included in the sampling interval calculation based on the congestion level.
CNM Frame
For the CNM frame structure, see Figure 3-2.
Field Description
VLAN-TAG VLAN tag, including Type, Priority, CFI, and VLAN ID.
CN-TAG A QCN field, which is included in data frames from the end host
that enables QCN. CN-TAG includes the CN-TAG type (0x22e9)
field (two bytes) and the Reflection Port ID (RPID) field (two bytes).
An RPID identifies a data stream.
3-3
Field Description
Qoffset Difference between the current queue length and queue length
threshold
The controlled flows in a congestion notification domain are called Congestion Control
Flows (CCFs), and only CCFs enters the congestion management queues.
3-4
Data flows inside or across a congestion notification domain can be divided into the
following:
ICP-ICP
Figure 3-5 shows data flows between two ICPs.
3-5
A data flow of priority 0 from terminal A to terminal B will enter a congestion management
queue on S1. Terminals A and B are both in CND-0, so the CN-TAG field is retained. If
there is congestion, switch S1 will send a CNM. If the priority is any value from 1 to 7, the
data flow will enter a non-congestion management queue, and no CNM will be sent even
if there is congestion.
Data flows from terminal B to terminal A are processed in the same way with those from
terminal A to terminal B.
ICP-ECP
Figure 3-6 shows the data flows between an ICP and an ECP.
A data flow of priority 0 from terminal B to terminal A will enter a congestion management
queue. If there is congestion, switch S1 will send a CNM. The destination station is an
ECP, so the CN-TAG field is removed. If the priority is any value from 1 to 7, the data flow
will enter a non-congestion management queue.
A data flow of priority 0 from terminal A to terminal B will be remapped to a flow of non-CNP.
If the priority is any value from 1 to 7, the data flow will enter a non-congestion management
queue.
ECP-ECP
3-6
A data flow of priority 0 from terminal A to terminal B will be remapped to a flow of non-CNP
and then enter a non-congestion management queue. If the priority is any value from 1 to
7, the data flow will enter a non-congestion management queue.
Data flows from terminal B to terminal A are processed in the same way with those from
terminal A to terminal B.
A packet from an ECP, which is of the same priority as that of the CNP, will be remapped
to a packet of non-CNP and then enter a non-congestion management queue. See Figure
3-8.
If packets from an ECP, which is of the same priority as that of the CNP, are not remapped,
the congestion notification domain will implement congestion management to these
packets. However, the peer end cannot respond properly to the CNM that the domain
sends, resulting in QCN failure.
Notes
Differences Between QCN and PFC
Both QCN and PFC are mechanisms to prevent congestion in data center networks. The
differences between PFC and QCN are as follows:
l PFC can control only the total transmission rate of data flows of the same priority,
while QCN can control the transmission rate of a specific data flow.
l PFC may result in congestion spreading, while QCN delivers CNMs to source ends
and congestion spreading would not easily occur.
3-7
l In the beginning of QCN detection, a few packet losses may occur, while PFC features
zero packet loss.
l If PFC and QCN are used concurrently, congestion spreading can be avoided and
congestion can be controlled effectively. See Figure 3-9.
3-8
à Broadcast
à Multicast
l Untagged packets will be assigned with the default priority, and it is necessary to
ensure that the default priority is not a CNPV.
l Packets generated by a switch (such as mirror packets or protocol packets) and
packets whose outer tags are added by a switch (such as tunnel packets and MPLS
packets) also need to be assigned with a priority other than CNPVs.
3-9
3-10
Parameter Description
For a description of the parameters in Steps 2 and 4, refer to the following table.
Parameter Description
Parameter Description
3-11
Command Function
ZXR10(config)#show dce qcn [{global |{[interface Shows QCN information of a single or all
<para>],[{local | remote | config}]}}] interfaces.
The following uses interface 1 as an example to show the output of the show dce qcn
command:
ZXR10(config-qcn-cnpv)#show dce qcn
--------------------------------------
QCN Global Information
QCN Priority: 6
QCN Enable Flag: 1
QCN CNPV Total: 1
QCN Get Statistic Interval: 10s
--------------------------------------
Interface Name: xgei-0/1/1/1
Local Information
CNPV :1
AlternatePriCfg :0
CnpdDefModeChoice :COMP
CnpdDefenseModeCfg :DISABLE
LldpInstanceChoice :COMP
QueueThreshold :26000
FeedbackWeight :1
MinSample :150000
AlternatePriOper :0
CnpdDefenseModeOper :EDGE
CnpdDefModeChoiceOper :MODE_COMP
------------------------------------
3-12
Configurations on switch A:
/*The congestion notification priority value is 2*/
ZXR10(config)#qcn
ZXR10(config-qcn)#qcn enable
ZXR10(config-qcn)#cnpv 2
ZXR10(config-qcn-cnpv)#defense-mode-choice admin
ZXR10(config-qcn-cnpv)#defense-mode interior-ready
ZXR10(config-qcn-cnpv)#alternate-priority 3
Configurations on switch B:
/*The congestion notification priority value is 2*/
ZXR10(config)#qcn
ZXR10(config-qcn)#cnpv 2
ZXR10(config-qcn-cnpv)#defense-mode-choice admin
ZXR10(config-qcn-cnpv)#defense-mode interior-ready
ZXR10(config-qcn-cnpv)#alternate-priority 3
3-13
3-14
4.1 Overview
Application Priority (AP) provides a mechanism to map different service applications to
different priorities. With AP, the ZXR10 5960 can change the priorities of incoming packets
and the cos (as defined by 802.1p) values of outgoing packets.
Service applications can be distinguished by Ethernet type or well-known TCP/
SCTP/UDP/ DCCP port number allocated by IANA. Upon receiving packets, the ZXR10
5960 classifies traffic into different classes based on Ethernet type or port number and
allocates a priority to the traffic of each application to provide different qualities of services.
For outgoing packets, the ZXR10 5960 can change the cos value of traffic from each
application.
The ZXR10 5960 uses AP classes to implement the AP function. One AP class can include
multiple AP rules. There are four types of rules:
l Matching the Ethernet type
l Matching the well-known TCP/SCTP port number
l Matching the well-known UDP/DCCP port number
l Matching the well-known TCP/SCTP/UDP/DCCP port number
4.2 Configuring AP
To configure AP on the ZXR10 5960, perform the following steps:
4-1
4.3 Maintaining AP
To maintain AP on the ZXR10 5960, run the following commands:
Command Function
The following is sample output from the show dce application-priority command:
ZXR10(config)#show dce application-priority
-------------------------------------------
Interface Name: xgei-0/1/1/1
Local Effective/Configuration Information
Type Value: 1
Protocol ID: 16537
Priority: 1
The application Telnet (TCP port number is 23) is on the DC Server. You can set the 802.1p
cos parameter of a packet to 7 based on the service requirements.
Configurations on switch A:
/*Configuring the xgei-0/1/1/1 interface */
ZXR10(config)#application-priority
ZXR10(config-app-pri)#interface xgei-0/1/1/1
4-2
4-3
4-4
5.1 Overview
The Data Center Bridging Exchange (DCBX) protocol is an automatic management
protocol for data center networks. With DCBX, configurations between peers can be
exchanged to ensure consistent configuration across the network and to configure the
DCB features of the peer device.
Figure 5-1 shows a DCBX application scenario. DCBX is normally used in data center
environments. As an information carrier, DCBX needs to coordinate with other data center
protocols to notify data center bridging parameters, such as ETS priority group and whether
PFC is supported and enabled.
5-1
DCBX uses the LLDP protocol to exchange configurations between neighbors, including
ETS, PFC, CN, and AP configurations. LLDP peer ports are uniquely identified by chassis
ID and port ID of the LLDPDU. DCBX is applicable only to peer-to-peer links. If multiple
LLDP peer ports exist, DCBX ignores the existence of all the peer ports.
Exchanged Parameters
Data center bridging parameters exchanged through DCBX are divided into the following
types:
l Informational parameters: including CN TLV and AP TLV. These parameters are not
involved in any DCBX state machine operation.
l Asymmetric parameters: including ETS configuration TLV and ETS recommendation
TLV. The normal result is that each end of the link does not necessarily have the same
configuration.
l Symmetric parameters: including PFC configuration TLV. The normal result is that
each end of the link have the same configuration.
5-2
l Configured TLV: provides the current operational state and willing bit. The willing bit
indicates whether the local device is willing to accept the specific parameter setting
from the remote end.
l Recommended TLV: provides a recommendation about the operation state of a
remote port, without consideration of the willing bit of the remote end. The remote
end does not necessarily accept the recommendation.
Figure 5-2 shows the state machine of the asymmetric parameter passing mechanism.
For a description of the state machine parameters, refer to Table 5-1.
Table 5-1 Parameter Descriptions for the State Machine of the Asymmetric Parameter
Passing Mechanism
Parameter Description
Local Willing Whether the local port is willing to accept the recommendation
from the remote end. It is included in the willing bit of the DCBX
TLV that the local port sends.
RemoteParam Indicates the recommendation TLV last received from the remote
end. The NULL value indicates that no recommendation TLV is
contained in LLDP messages or no LLDP message is received.
The symmetric parameter passing mechanism passes configuration TLVs only. Both ends
of the link sends respective configuration TLVs to each other, where the willing bit indicates
whether to accept the peer configuration TLV. If the willing bit is 0 in the received TLV and
1 on the local device, the local device accepts the peer configuration. If the willing bits of
both the local and remote devices are 1, the configuration depends on the TLV of the end
with a smaller MAC address.
5-3
Figure 5-3 shows the state machine of the symmetric parameter passing mechanism. For
a description of the state machine parameters, refer to Table 5-2.
Table 5-2 Parameter Descriptions for the State Machine of the Symmetric Parameter
Passing Mechanism
Parameter Description
Local Willing Whether the local port is willing to accept the recommendation
from the remote end. It is included in the willing bit of the DCBX
TLV that the local port sends.
Remote Willing rwTrue: indicates that the Willing bit was set in the last TLV
received.
rwFalse: indicates that the Willing bit was not set in the last TLV
received.
DCBX TLVs
Item Function
5-4
Item Function
PFC configuration TLV Indicates PFC configurations. It includes settings such as whether
to accept the remote configuration TLV, number of PFC-enabled
TCs, and whether PFC is enabled for each priority.
Parameter Description
5-5
Parameter Description
Command Function
The following is sample output from the show running-config dce command:
If the allocated bandwidth for SAN or LAN is not fully used, other TCs can use the available
bandwidth.
The DC server supports ETS and enables DCBX. The following example shows how to
configure ETS on switch A, and enable DCBX on the xgei-0/1/1/1 port so that switch A can
send ETS configuration TLV and recommendation TLV to the DC server.
5-6
Configurations on switch A:
/*LLDP function is enabled by default, so manual operation is not required.*/
/*Enabling the ETS configuration TLV for the DCBX*/
ZXR10(config)#lossless
ZXR10(config-lossless)#interface xgei-0/1/1/1 lldp-dest-mac
0180.c200.000e ets-cfg-tlv enable
/*Enabling the ETS recommended TLV for the DCBX.*/
ZXR10(config-lossless)#interface xgei-0/1/1/1 lldp-dest-mac
0180.c200.000e ets-reco-tlv enable
Configurations on Switch A:
/*Enabling the PFC function with the priority being 3 for the xgei-0/1/1/1
interface and accepting the remote configuration.*/
ZXR10(config)#pfc
ZXR10(config-pfc)#interface xgei-0/1/1/1
ZXR10(config-pfc-if-xgei-0/1/1/1)#priority 3 enable
ZXR10(config-pfc-if-xgei-0/1/1/1)#pfc-willing enable
5-7
Configurations on Switch B:
/*LLDP function is enabled by default, so manual operation is not required.*/
/*Enabling the PFC TLV for the DCBX*/
ZXR10(config)#lossless
ZXR10(config-lossless)#interface xgei-0/1/1/2 lldp-dest-mac
0180.c200.000e pfc-tlv enable
/*Enabling the PFC function with the priority being 3 and 4 for
the xgei-0/1/1/2 interface.*/
ZXR10(config)#pfc
ZXR10(config-pfc)#interface xgei-0/1/1/2
ZXR10(config-pfc-if-xgei-0/1/1/2)#priority 3 enable
ZXR10(config-pfc-if-xgei-0/1/1/2)#priority 4 enable
ZXR10(config-pfc-if-xgei-0/1/1/2)#pfc-willing enable
Configurations on switch A:
/*LLDP function is enabled by default, so manual operation is not required.*/
5-8
After the data synchronization, you can query the remote QCN information
through the xgei-0/1/1/1:
ZXR10(config-qcn)#show dce qcn interface xgei-0/1/1/1 remote
-------------------------------
Interface Name: xgei-0/1/1/1
Remote Information
CnpvFlag:00000100B
ReadyFlag:00000000B
------------------------------
Configurations of Switch B:
/*LLDP function is enabled by default, so no manual operation is required.*/
/*Enabling the DCBX for the xgei-0/1/1/2 interface*/
ZXR10(config)#lossless
ZXR10(config-lossless)#interface xgei-0/1/1/2 lldp-dest-mac
0180.c200.000e app-tlv enable
After the data synchronization, you can query the application priority
information of the xgei-0/1/1/1 interface:
ZXR10(config)#show dce application-priority
--------------------------------------------
Interface Name: xgei-0/1/1/1
Local Effective/Configuration Information
Type Value: 2
Port ID: 23
Priority: 7
Remote Information
5-9
Type Value: 1
Protocol ID: 35078
Priority: 3
5-10
6.1 Overview
The Virtual Extensible Local Area Network (VXLAN), based on IP networks, is a layer 2
VPN technology using MCAin UDP encapsulation, and applies to data center networks.
The VXLAN provides layer 2 interconnection for distributed physical sites and provides
service separation for different tenants by using the existing service providers and
enterprise IP networks.
The characters of the VXLAN are described as follows:
l Supports a number of tenants: uses 24-bit IDs, increasing greatly the number of
tenants. Ensures that L2 VLAN resources are sufficient.
l Easy to maintain: creates L2 networks by using IP networks, facilitating network
deployment and maintenance and making full use of existing IP network technologies.
For example, performs load sharing by using equivalent routes. Network deployment
becomes easy and cheap because only the edge devices of the IP core network need
VXLAN processing, while the center devices only forward messages in accordance
with IP headers.
6-1
frame. Where, the destination port number in the external UDP header is the VXLANUDP
port number. By default, the port number is 4789.
A VXLAN header consists of the following two parts:
l VXLAN: If the "I" bit is 1, the VXLAN ID in the header is valid. If the "I" bit is 0, the
VXLAN ID is invalid.
l VNID: Identifies a VXLAN network. It consists of 24 bits.
The tunnel-based VXLAN IP DSCP mapping involves the static VXLAN and VTEP tunnels:
l Static VXLAN tunnel: The static VXLAN tunnel is used as an underlay bearer tunnel.
l Vtep tunnel: The Vtep tunnel is used as an dynamic underlay bearer tunnel for the
establishment of the encapsulation and decapsulation ends of the tunnel.
There are three types of VXLAN IP DSCP mapping templates: Set0, Copy and Mapping.
l Set0 template: The outer IP DSCP values of the underlay packets are set to 0 without
considering the IP DSCP values of the overlay packets.
l Copy template: The outer IP DSCP values of the underlay packets are copied as the
IP DSCP values of the overlay packets.
6-2
l Mapping template: The IP DSCP values of the overlay packets are mapped to the
outer IP DSCP values of the underlay packets in accordance with the mapping
template configuration.
Note:
The mapping template can only be used in the VNI binding. The mapping command
in tunnels and VTEPs indicates that the services carried over the tunnels use the VNI
template instead of the Tunnel template.
The IP DSCP mapping is based on the following two modes: VNI and tunnel.
l Tunnel-based IP DSCP mapping: For all services carried over the tunnel, the DSCP
values of overlay packets are mapped to the DSCP values of the encapsulated
underlay packets in accordance with the mapping mode configured in the tunnel
without distinguishing the VXLAN forwarding instances.
l VNI-based IP DSCP mapping: For a service carried over the tunnel, the DSCP values
of overlay packets are mapped to the DSCP values of the encapsulated underlay
packets in accordance with the mapping mode configured in the VXLAN forwarding
instance.
Note:
The tunnel-based DSCP mapping has a higher priority than the VNI-based DSCP
mapping. Therefore, to apply the VNI mapping to a VXLAN instance carried over the
tunnel separately, the tunnel must be bound to the Mapping template and other VXLAN
mappings in the tunnel must be bound to the corresponding VNI templates.
6-3
ZXR10(config-vxlan)#interface vtep
<vtep-id>
6-4
ZXR10(config-vxlan)#interface
vxlan_tunnel <tunnel-id>
ZXR10(config-vxlan-tunnel)#interface
vxlan_tunnel <tunnel-id>
6-5
Parameter Description
Parameter Description
6-6
Parameter Description
Parameter Description
<l2-inteface> L2 interface
<l3-inteface> L3 Interface
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
6-7
Parameter Description
Parameter Description
Parameter Description
6-8
6-9
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Configuring Rate Limit for VXLAN Broadcast, Multicast, and Unknown Unicast
To configure the VXLAN broadcast, multicast, and unknown unicast on the ZXR10 5960,
perform the following steps:
Parameter Description
6-10
ZXR10(config-ipv4-vxlan-acl)#no
rule{<rule-id>|all}
6-11
Parameter Description
Parameter Description
6-12
Parameter Description
Parameter Description
6-13
Parameter Description
For a description of the parameters in Step 5 and 6, refer to the following table.
Parameter Description
Command Function
ZXR10#show vxlan instance <vni> Displays the instance configuration of the VXLAN.
ZXR10#show vxlan mapping-table <vni> Displays the mapping table of the VXLAN.
ZXR10#show vxlan vtep-instance vtep <vtep-id> Displays the configuration of the VTEP interface.
ZXR10#show mac vxlan <vni> Displays the learned VXLAN MAC forwarding
information.
6-14
Command Function
Configuration on S1:
/*Adds the port to the VLAN.*/
S1(config)#switchvlan-configuration
S1(config-swvlan)#interface xgei-0/1/1/15
S1(config-swvlan-if-xgei-0/1/1/15)#switchport mo trunk
S1(config-swvlan-if-xgei-0/1/1/15)#switchport trunk vlan 15
S1(config-swvlan-if-xgei-0/1/1/15)#exit
S1(config-swvlan)#interface xgei-0/1/1/17
S1(config-swvlan-if-xgei-0/1/1/17)#switchport mo trunk
S1(config-swvlan-if-xgei-0/1/1/17)#switchport trunk vlan 2000
S1(config-swvlan-if-xgei-0/1/1/17)#exit
S1(config-swvlan)#exit
6-15
Configuration on S2:
/*Adds the port to the VLAN.*/
S2(config)#switchvlan-configuration
6-16
S2(config-swvlan)#interface xgei-0/1/1/15
S2(config-swvlan-if-xgei-0/1/1/15)#switchport mo trunk
S2(config-swvlan-if-xgei-0/1/1/15)#switchport trunk vlan 15
S2(config-swvlan-if-xgei-0/1/1/15)#exit
S2(config-swvlan)#interface xgei-0/1/1/25
S2(config-swvlan-if-xgei-0/1/1/25)#switchport mo trun
S2(config-swvlan-if-xgei-0/1/1/25)#switchport trunk vlan 2000
S2(config-swvlan-if-xgei-0/1/1/25)#exit
S2(config-swvlan)#exit
6-17
S2(config-vxlan)#global-vxlan enable
S2(config-vxlan)#vxlan 1
S2(config-vxlan-1)#mapping-type l2-interface
S2(config-vxlan-1)#mapping-l2-interface xgei-0/1/1/25 2000
S2(config-vxlan-1)#exit
S2(config-vxlan)#interface vtep1
S2(config-vxlan-if-vtep1)#multicast-ip 225.0.0.1
S2(config-vxlan-if-vtep1)#mode no-discard-inner-vlan
S2(config-vxlan-if-vtep1)#source-interface loopback1
S2(config-vxlan-if-vtep1)#member-vxlan 1
S2(config-vxlan-if-vtep1)#exit
S2(config-vxlan)#exit
Configuration on S1:
/*Adds the port to the VLAN.*/
S1(config)#switchvlan-configuration
S1(config-swvlan)#interface xgei-0/1/1/15
S1(config-swvlan-if-xgei-0/1/1/15)#switchport mo trunk
S1(config-swvlan-if-xgei-0/1/1/15)#switchport trunk vlan 15
S1(config-swvlan-if-xgei-0/1/1/15)#exit
S1(config-swvlan)#interface xgei-0/1/1/17
S1(config-swvlan-if-xgei-0/1/1/17)#switchport mo trunk
S1(config-swvlan-if-xgei-0/1/1/17)#switchport trunk vlan 2000
S1(config-swvlan-if-xgei-0/1/1/17)#exit
S1(config-swvlan)#exit
6-18
S1(config)#interface vlan15
S1(config-if-vlan15)#ip address 15.1.1.1 255.255.255.0
S1(config-if-vlan15)#exit
Configuration on S2:
6-19
S2(config-swvlan-if-xgei-0/1/1/25)#switchport mo trun
S2(config-swvlan-if-xgei-0/1/1/25)#switchport trunk vlan 2000
S2(config-swvlan-if-xgei-0/1/1/25)#exit
S2(config-swvlan)#exit
6-20
Configuration on S1:
/*Adds the port to the VLAN.*/
S1(config)#switchvlan-configuration
S1(config-swvlan)#interface xgei-0/1/1/15
S1(config-swvlan-if-xgei-0/1/1/15)#switchport mo trunk
S1(config-swvlan-if-xgei-0/1/1/15)#switchport trunk vlan 15
S1(config-swvlan-if-xgei-0/1/1/15)#exit
S1(config-swvlan)#interface xgei-0/1/1/17
S1(config-swvlan-if-xgei-0/1/1/17)#switchport mo trunk
S1(config-swvlan-if-xgei-0/1/1/17)#switchport trunk vlan 2000
S1(config-swvlan-if-xgei-0/1/1/17)#exit
S1(config-swvlan)#exit
6-21
S1(config-ospf-1)#exit
Configuration on S2:
/*Enables VXLAN L3 forwarding mode and restarts the device.*/
S2(config))#esm-configuration
S2(config-esm)#vxlan-l3 mode all overlay-next-hop 6 overlay-interface 5
%Info 161208: Esm configuration has changed,please reload!
S2(config-esm)#exit
6-22
S2(config-swvlan)#interface xgei-0/1/1/17
S2(config-swvlan-if-xgei-0/1/1/17)#switchport mo trunk
S2(config-swvlan-if-xgei-0/1/1/17)#switchport trunk vlan 17,4000
S2(config-swvlan-if-xgei-0/1/1/17)#exit
S2(config-swvlan)#exit
/ *Runs IGP (for example, OSPF) to interconnect S1, S2, and S3 and
learn the loopback route of the opposite end.*/
S2(config)#router ospf 1
S2(config-ospf-1)#router-id 2.2.2.2
S2(config-ospf-1)#area 0
S2(config-ospf-1-area-0)#network 2.2.2.2 0.0.0.0
S2(config-ospf-1-area-0)#network 15.1.1.0 0.0.0.0
S2(config-ospf-1-area-0)#network 17.1.1.0 0.0.0.0
S2(config-ospf-1-area-0)#exit
S2(config-ospf-1)#redistribute connected
S2(config-ospf-1)#exit
6-23
S2(config-mcast-pim-if-vlan15)#exit
S2(config-mcast-pim)#interface vlan17
S2(config-mcast-pim-if-vlan17)#pimsm
S2(config-mcast-pim-if-vlan17)#exit
S2(config-mcast-pim)#exit
S2(config-mcast)#exit
Configuration on S3:
6-24
S3(config-if-loopback1)#exit
S3(config)#interface vlan17
S3(config-if-vlan17)#ip address 17.1.1.2 255.255.255.0
S3(config-if-vlan15)#exit
/ *Runs IGP (for example, OSPF) to interconnect S1, S2, and S3 and
learn the loopback route of the opposite end.*/
S3(config)#router ospf 1
S3(config-ospf-1)#router-id 3.3.3.3
S3(config-ospf-1)#area 0
S3(config-ospf-1-area-0)#network 3.3.3.3 0.0.0.0
S3(config-ospf-1-area-0)#network 17.1.1.0 0.0.0.0
S3(config-ospf-1-area-0)#exit
S3(config-ospf-1)#redistribute connected
S3(config-ospf-1)#exit
6-25
Figure 6-5 Example of VXLAN IP DSCP Mapping Configuration in Static Tunnel Mode
Configuration on S1:
/*Adds the ports to the VLAN.*/
S1(config)#switchvlan-configuration
S1(config-swvlan)#interface xgei-0/1/1/15
S1(config-swvlan-if-xgei-0/1/1/15)#switchport mo trunk
S1(config-swvlan-if-xgei-0/1/1/15)#switchport trunk vlan 15
S1(config-swvlan-if-xgei-0/1/1/15)#exit
S1(config-swvlan)#interface xgei-0/1/1/17
S1(config-swvlan-if-xgei-0/1/1/17)#switchport mo trunk
S1(config-swvlan-if-xgei-0/1/1/17)#switchport trunk vlan 2000
S1(config-swvlan-if-xgei-0/1/1/17)#exit
S1(config-swvlan)#exit
/*Creates a loopback interface and a common L3 interface.*/
S1(config)#interface loopback1
S1(config-if-loopback1)#ip address 1.1.1.1 255.255.255.255
S1(config-if-loopback1)#exit
S1(config)#interface vlan15
S1(config-if-vlan15)#ip address 15.1.1.1 255.255.255.0
S1(config-if-vlan15)#exit
/*Runs IGP (for example, OSPF) to interconnect S1 and S2 and learn
the loopback route of the opposite end.*/
S1(config)#router ospf 1
S1(config-ospf-1)#router-id 1.1.1.1
S1(config-ospf-1)#area 0
S1(config-ospf-1-area-0)#network 1.1.1.1 0.0.0.0
S1(config-ospf-1-area-0)#network 15.1.1.0 0.0.0.0
6-26
S1(config-ospf-1-area-0)#exit
S1(config-ospf-1)#redistribute connected
S1(config-ospf-1)#exit
/*Configure static tunnels.*/
S1(config)#interface vxlan_tunnel1
S1(config-if-vxlan_tunnel1)#exit
S1(config)#vxlan-tunnel-config
S1(config-vxlan-tunnel)#interface vxlan_tunnel1
S1(config-vxlan-tunnel-if-vxlan_tunnel1)#tunnel source ipv4 1.1.1.1
S1(config-vxlan-tunnel-if-vxlan_tunnel1)#tunnel destination ipv4 2.2.2.2
S1(config-vxlan-tunnel-if-vxlan_tunnel1)#exit
S1(config-vxlan-tunnel)#exit
/*Configures the VXLAN function.*/
S1(config)#vxlan
S1(config-vxlan)#global-vxlan enable
S1(config-vxlan)#vxlan 1
S1(config-vxlan-1)#mapping-type l2-interface
S1(config-vxlan-1)#mapping-l2-interface xgei-0/1/1/17 2000
S1(config-vxlan-1)#exit
S1(config-vxlan)#interface vxlan_tunnel1
S1(config-vxlan-if-vxlan_tunnel1)#member-vxlan 1
S1(config-vxlan-if-vxlan_tunnel1)#exit
S1(config-vxlan)#exit
/*Configures the vxlan ip dscp mapping function, and encapsulates the outer
data flows with dscp 10 inside the vxlan 1.*/
/*Configures the dscp mapping to 20. */
S1(config)# pm-qos
S1(config-pm-qos)#trust-dscp-vxlan vxlan-tunnel 1 mapping
S1(config-pm-qos)#trust-dscp-vxlan vni 1 mapping
S1(config-pm-qos)#conform-dscp-vxlan 10 20
S1(config-pm-qos)#exit
Configuration on S2:
6-27
S2(config)#router ospf 1
S2(config-ospf-1)#router-id 2.2.2.2
S2(config-ospf-1)#area 0
S2(config-ospf-1-area-0)#network 2.2.2.2 0.0.0.0
S2(config-ospf-1-area-0)#network 15.1.1.0 0.0.0.0
S2(config-ospf-1-area-0)#exit
S2(config-ospf-1)#redistribute connected
S2(config-ospf-1)#exit
/*Configure static tunnels.*/
S2(config)#interface vxlan_tunnel1
S2(config-if-vxlan_tunnel1)#exit
S2(config)#vxlan-tunnel-config
S2(config-vxlan-tunnel)#interface vxlan_tunnel1
S2(config-vxlan-tunnel-if-vxlan_tunnel1)#tunnel source ipv4 2.2.2.2
S2(config-vxlan-tunnel-if-vxlan_tunnel1)#tunnel destination ipv4 1.1.1.1
S2(config-vxlan-tunnel-if-vxlan_tunnel1)#exit
S2(config-vxlan-tunnel)#exit
/*Configures the VXLAN function.*/
S2(config)#vxlan
S2(config-vxlan)#global-vxlan enable
S2(config-vxlan)#vxlan 1
S2(config-vxlan-1)#mapping-type l2-interface
S2(config-vxlan-1)#mapping-l2-interface xgei-0/1/1/25 2000
S2(config-vxlan-1)#exit
S2(config-vxlan)#interface vxlan_tunnel1
S2(config-vxlan-if-vxlan_tunnel1)#member-vxlan 1
S2(config-vxlan-if-vxlan_tunnel1)#exit
S2(config-vxlan)#exit
/*Configures the vxlan ip dscp mapping function, and encapsulates the outer
data flows with dscp 10 inside the vxlan 1.*/
/*Configures the dscp mapping to 20. */
S1(config)# pm-qos
S1(config-pm-qos)#trust-dscp-vxlan vxlan-tunnel 1 mapping
S1(config-pm-qos)#trust-dscp-vxlan vni 1 mapping
S1(config-pm-qos)#conform-dscp-vxlan 10 20
6-28
S1(config-pm-qos)#exit
Figure 6-6 Example of VXLAN IP DSCP Mapping Configuration in Static Tunnel Mode
Configuration on S1:
/*Adds the ports to the VLAN.*/
S1(config)#switchvlan-configuration
S1(config-swvlan)#interface xgei-0/1/1/15
S1(config-swvlan-if-xgei-0/1/1/15)#switchport mo trunk
S1(config-swvlan-if-xgei-0/1/1/15)#switchport trunk vlan 15
S1(config-swvlan-if-xgei-0/1/1/15)#exit
S1(config-swvlan)#interface xgei-0/1/1/17
S1(config-swvlan-if-xgei-0/1/1/17)#switchport mo trunk
S1(config-swvlan-if-xgei-0/1/1/17)#switchport trunk vlan 2000
S1(config-swvlan-if-xgei-0/1/1/17)#exit
S1(config-swvlan)#exit
/*Creates a loopback interface and a common L3 interface.*/
S1(config)#interface loopback1
S1(config-if-loopback1)#ip address 1.1.1.1 255.255.255.255
S1(config-if-loopback1)#exit
S1(config)#interface vlan15
S1(config-if-vlan15)#ip address 15.1.1.1 255.255.255.0
S1(config-if-vlan15)#exit
/*Runs IGP (for example, OSPF) to interconnect S1 and S2 and learn
the loopback route of the opposite end.*/
S1(config)#router ospf 1
S1(config-ospf-1)#router-id 1.1.1.1
S1(config-ospf-1)#area 0
6-29
Configuration on S2:
6-30
S2(config)#interface loopback1
S2(config-if-loopback1)#ip address 2.2.2.2 255.255.255.255
S2(config-if-loopback1)#exit
S2(config)#interface vlan15
S2(config-if-vlan15)#ip address 15.1.1.2 255.255.255.0
S2(config-if-vlan15)#exit
/*Runs IGP (for example, OSPF) to interconnect S1 and S2 and learn
the loopback route of the opposite end.*/
S2(config)#router ospf 1
S2(config-ospf-1)#router-id 2.2.2.2
S2(config-ospf-1)#area 0
S2(config-ospf-1-area-0)#network 2.2.2.2 0.0.0.0
S2(config-ospf-1-area-0)#network 15.1.1.0 0.0.0.0
S2(config-ospf-1-area-0)#exit
S2(config-ospf-1)#redistribute connected
S2(config-ospf-1)#exit
/*Configure static tunnels.*/
S2(config)#interface vxlan_tunnel1
S2(config-if-vxlan_tunnel1)#exit
S2(config)#vxlan-tunnel-config
S2(config-vxlan-tunnel)#interface vxlan_tunnel1
S2(config-vxlan-tunnel-if-vxlan_tunnel1)#tunnel source ipv4 2.2.2.2
S2(config-vxlan-tunnel-if-vxlan_tunnel1)#tunnel destination ipv4 1.1.1.1
S2(config-vxlan-tunnel-if-vxlan_tunnel1)#exit
S2(config-vxlan-tunnel)#exit
/*Configures the VXLAN function.*/
S2(config)#vxlan
S2(config-vxlan)#global-vxlan enable
S2(config-vxlan)#vxlan 1
S2(config-vxlan-1)#mapping-type l2-interface
S2(config-vxlan-1)#mapping-l2-interface xgei-0/1/1/25 2000
S2(config-vxlan-1)#exit
S2(config-vxlan)#interface vxlan_tunnel1
S2(config-vxlan-if-vxlan_tunnel1)#member-vxlan 1
S2(config-vxlan-if-vxlan_tunnel1)#exit
S2(config-vxlan)#exit
/* Configures the rate-limiting function of the unknown unicast packets
(pps) in the outgoing VXLAN tunnel direction.*/
S1(config)#pm-qos
S1(config-pm-qos)#vxlan-limit tunnel sip 2.2.2.2 dip 1.1.1.1 out uuc pps 200
S1(config-pm-qos)#exit
6-31
6-32
7.1 Overview
The Fibre Channel Over Ethernet (FCoE) protocol applies to data centers.
The data centers using the FC SAN technology have separate LAN networks and SAN
networks. LAN networks are used for traditional Ethernet services and IP services, while
SAN networks are used for network storage.
To provide services for LAN networks and implement storage through SAN networks
simultaneously, the server must use a separate Ethernet NIC and a separate FC NIC.
The Ethernet switch, FC switch, and the corresponding cables should also be separate.
Therefore, more switches, NICs, and cables are required in a network, increasing device
investment and maintenance workload and causing poor expendability.
The FCoE protocol can solve the above problems. The server only needs to use Ethernet
NICs that support FCoE. PCF switches supporting FCoE can substitute traditional Ethernet
switches and FC switches simultaneously, integrate I/O, decrease the numbers of switches
and cables, lower the workload of network operation and maintenance, and reduce the
total cost.
7-1
ZXR10(config)#no interface vfc <vfcid> Deletes the VFC interface. This operation
may cause related deletion and virtual link
deletion, so be cautious when performing
this operation.
7-2
7-3
7-4
Parameter Description
Parameter Description
Parameter Description
For a description of the parameters in Steps 7 and 8, refer to the following table.
Parameter Description
Parameter Description
For a description of the parameters in Step 11, refer to the following table.
Parameter Description
For a description of the parameters in Step 12, refer to the following table.
Parameter Description
7-5
For a description of the parameters in Step 15, refer to the following table.
Parameter Description
For a description of the parameters in Step 17, refer to the following table.
Parameter Description
For a description of the parameters in Step 19, refer to the following table.
Parameter Description
For a description of the parameters in Step 20, refer to the following table.
Parameter Description
For a description of the parameters in Step 23, refer to the following table.
Parameter Description
Command Function
ZXR10#show fcoe interface all Displays the information about the VFC interface.
ZXR10#show fcoe interface vfc <1-255> Displays the information about the VFC interface.
ZXR10#show vsan vlan-mapping [vsan-id] Displays the mapping relationship between the
SVAN and VLAN.
7-6
Command Function
ZXR10#show vsan switchport [vsan <vsan-id>] Displays the interface members configured on
the VSAN.
ZXR10#show fcoe lep [vsan<vsan-id>] Displays the FIP registration information about
the switch.
ZXR10(config-vsan100)#fc-ping fcid <fcid> Specifies the FCID used by the Ping command.
Configuration on Switch A:
ZXR10(config)#interface vfc1
7-7
ZXR10(config-if-vfc1)#exit
ZXR10(config)#interface vfc2
ZXR10(config-if-vfc1)#exit
ZXR10(config)#interface vfc3
ZXR10(config-if-vfc1)#exit
ZXR10(config)#vsan100
ZXR10(config-vsan100)#exit
ZXR10(config)#fcoe
ZXR10(config-fcoe)#enable
ZXR10(config-fcoe)#interface vfc1
ZXR10(config-fcoe-if-vfc1)#bind-interface xgei-0/1/1/1
ZXR10(config-fcoe-if-vfc1)#switchport trunk vsan 100
ZXR10(config-fcoe-if-vfc1)#exit
ZXR10(config-fcoe)#interface vfc2
ZXR10(config-fcoe-if-vfc1)#bind-interface xgei-0/1/1/2
ZXR10(config-fcoe-if-vfc1)#switchport trunk vsan 100
ZXR10(config-fcoe-if-vfc1)#exit
ZXR10(config-fcoe)#interface vfc3
ZXR10(config-fcoe-if-vfc1)#bind-interface xgei-0/1/1/3
ZXR10(config-fcoe-if-vfc1)#switchport trunk vsan 100
ZXR10(config-fcoe-if-vfc1)#exit
ZXR10(config-fcoe)#fc-map 0xefc01
ZXR10(config)#vsan 100
ZXR10(config-vsan100)#fcoe-vlan 100
ZXR10(config-vsan100)#domain-id 2 static
ZXR10(config-vsan100)#fabric-name 00:00:00:00:00:00:00:01
ZXR10(config-vsan100)#fcid-allocation wwn 20:00:94:20:00:00:00:01 area-port-id 0102
ZXR10(config-vsan100)#fcid-allocation wwn 20:00:94:30:00:00:00:01 area-port-id 0103
ZXR10(config-vsan100)#fcid-allocation wwn 20:00:94:40:00:00:00:01 area-port-id 0104
ZXR10(config-vsan100)#name-service fcid 020101 port-name 20:00:10:94:00:00:00:01
node-name 10:00:10:94:00:00:00:01 fc-4 fcp
ZXR10(config-vsan100)#zone 100
ZXR10(config-vsan100-zone100)#member wwpn 20:00:94:20:00:00:00:01
ZXR10(config-vsan100-zone100)#member wwpn 20:00:94:30:00:00:00:01
ZXR10(config-vsan100-zone100)#exit
ZXR10(config-vsan100)#zoneset 100
ZXR10(config-vsan100-zoneset100)#member zone 100
ZXR10(config-vsan100)#zoneset activate 100
ZXR10(config-vsan100)#default-zone forbid
7-8
8.1 Overview
In FC Fabric networks, nodes must register to Fabric before communicating with the
devices in FC SAN networks. Node devices are physically point-to-point connected to FC
switches. The interface of a node device connected to the FC switch can be in up state
only after the node device successfully registers. Therefore, only the node devices that
successfully register can communicate with the devices in FC SAN networks.
FCoE increases network deployment flexibility. Because Transit switches can exist
between ENodes and FCF switches, connections between FCF switches and ENodes
are not point to point. An ENode device can communicate with the devices in FC SAN
networks through FCF switches even if the ENode device does not register. Assume
that two ENodes access to the same FCF switches through Transit switches. As long
as either ENode successfully register on the FCF switch, the interface of the FCF switch
turns in up state. The other unregistered ENode can communicate with the devices in FC
SAN networks through the FCF switch.
FCoE initialization Protocol (FIP) Snooping can solve the above problems. As a security
feature used on PCoE edge devices, this feature can only be used on Transit switches. FIP
Snooping ensures that messages from an ENode can only be forwarded to FCF switches
but not other ENodes by checking the MAC addresses in the messages. Only the FCoE
messages from registered ENodes can be forwarded to FCF switches by Transit switches.
FCoE messages from FCF switches can be forwarded to registered ENodes by Transit
switches only.
Figure 8-1 shows a typical FIP Snooping network. The ENode accesses to the FCF switch
through the Transit switch. In FIP Snooping networks, the Ethernet interfaces on Transit
switches support two modes: FCF mode and ENode mode. Ethernet interfaces connected
to ENodes must be configured to ENode mode, while Ethernet interfaces connected to
FCF switches must be configured to FCF mode. After the FIP Snooping function is enabled
on Transit switches and Ethernet interfaces are configured to correct modes, the system
can control messages between ENodes and FCF switches to ensure safe access and
communication.
8-1
Parameter Description
8-2
Command Function
ZXR10#show fip-snooping vlan [vlan] Displays the FIP Snooping configuration on the
VLAN.
ZXR10#show fip-snooping enode Displays the ENode information about the FIP
Snooping.
ZXR10#show fip-snooping fcf Displays the FCF information about the FIP
Snooping.
ZXR10#show fip-snooping session Displays the session information about the FIP
Snooping.
ZXR10(config-vsan100)#fc-ping fcid <fcid> Specifies the FCID used by the Ping command.
Configuration on FCF1:
ZXR10(config-fip-snoop)#enable
ZXR10(config-fip-snoop)#fcf-interface xgei-0/1/1/2
ZXR10(config-fip-snoop)#vlan 100
ZXR10(config-fip-snoop-vlan100)#enable
ZXR10(config-fip-snoop-vlan100)#fc-map 0xefc01
ZXR10(config-fip-snoop-vlan100)#end
ZXR10#
8-3
8-4
9.1 Overview
OpenFlow Overview
SDN is a new type of network architecture. It separates the control plane and data
forwarding plane and implements programmable control, implementing flexible flow
control and making the network as a more intelligent channel. OpenFlow is a new protocol
closely correlated to DSN, customized by the OpenNetwork Foundation (ONF). OpenFlow
is a forwarding-plane control protocol, used to describe the message specification and
interface specification between controllers and switches.
Terms of OpenFlow
An OpenFlow switch is constitute of the following parts:
l OpenFlow ports: used to transmit messages between OpenFlow processes and other
network nodes. OpenFlow switches are logically connected through OpenFlow ports.
l Flow table: Each flow table may has multiple entries, which are used to match and
forward messages.
l Group table: Each group table may has multiple entries. A flow can be specially
processed if it points to a group table entry through a flow table entry, for example,
select and all. One group can also point to another group.
l Meter table: A meter table has multiple entries. A meter entry can be defined based on
flows. Flow-based meter entries can help OpenFlow implement easy QoS function,
for example, rate limit.
l Secure channel: used to interact OpenFlow with Controllers.
9-1
Multiple logical OpenFlow switch instances can be configured on a physical switch, and
the instances are discriminated by instance IDs. Multiple controllers can be configured
on each logical switch. The logical switch connects to the controllers through connection
ports, and configures the flow table and group table for the SDN service port on the same
instance.
OpenFlow Port
A standard OpenFlow port is defined in three types: physical port, logical port, and
reserved port.
l The physical port is the hardware interface of the OpenFlow switch in most cases, for
example, the Ethernet interface of the switch. On virtualized OpenFlow switches, the
physical port can also be the virtual interface connected to the physical interface of
the switch.
l The logical port is not correlated to the hardware interface of the switch. The
interfaces are configured by other protocols or other modules of the switch, for
example, aggregation interfaces, loop interfaces, and tunnels.
l The reserved port is defined by forwarding operations, for example, forwarding
messages to Controller or Flood, or processing messages through non-OpenFlow
processes.
9-2
Match Fields Used to match data packets, including entrance port, data packet header, and the
optional meta data specified by the previous table.
Cooks Non-transparent data values selected by controllers. Used to collect filter flow
statistics, modify flows, and delete flows.
Instruction Description
Write-Actions Used to add a specified action to the action set. If the action already
exists in the action set, the action is overwritten.
Goto-Table Indicates the next table in the processing channel. The ID of the table
must be greater than the ID of the current table. Channel processing
can go along one direction only. This command cannot be included
in the entry of the last flow table.
Meter Instructs messages to match the specified Meter entry. You can set
meter bands to implement QoS, for example, implementing rate limit,
and resetting DSCP values.
Apply-Actions The action set is not modified, while the actions in apply-actions table
are executed immediately. Actions in the action set are executed
in the order of the action table.
Write-Metadata Writes meta data. Meta data is used to transmit information between
flow tables of the same switch. Used for flow table entries to match
messages.
The flow tables of an OpenFlow switch is numbered in order, starting from 0. The first flow
table is always processed first. Messages first match the entries in flow table 0. Based on
the matching result of the first table, other flow tables might be used.
When messages are processed by a flow table, the messages match the entries in the
flow table. If an entry is matched, the action set included in this entry is executed. The
instructions (Goto command) can deliver the messages to another flow table for similar
processing.
9-3
A flow table can only deliver messages to the flow table with a greater ID. Assembly line
processing goes along one direction only. The Goto command cannot be included in the
last flow table on the assembly line. If the matched entry does not deliver message to
another flow table, the assembly processing stops at this flow table. When assembly
processing stops, the message-related action set is executed and usually forwarded.
Figure 9-2 shows the processing flow of an OpenFlow Table
The flow table includes a special entry, that is, Table Miss. The Match Field of this entry is
a wildcard character, which can match any message. The match priority is 0, which means
that the entry is matched at last. If this entry does not exist, the messages not matching
any entry are discarded by default. You can set the aging time and maximum idle time for
a flow table entry. When either time is out, the system deletes this entry and notifies the
Controller of the deleted information about this entry in accordance with the flag. The two
time values can also be set to 0, which means that the entry will never age. In this case,
this entry can be deleted only after the Controller deliver the flowmodify command.
9-4
the commands in the flow table. One meter entry can correlate to multiple flow entries
simultaneously, and controls the total rate of the messages matched to these flow entries.
Each meter entry is constitute of the following components.
Meter Bands Unordered list of meter bands. Each meter band defines the rate on the band
and how to process messages.
Counters Counters are updated when messages are processed by meter entries.
Each meter entry may consist of one ore more meter bands. Each band processes
messages in accordance with the defined rate. When the message rate is lower than all
the rates specified by meter bands, this message will not be processed by any meter
band. Each meter bands group entry is constitute of the following components.
Rate Used to select a meter band. Defines the minimum rate at which data is
transmitted on the band.
Counters Counters are updated when messages are processed by meter bands.
9-5
9-6
9-7
Parameter Description
Parameter Description
Parameter Description
<Configure max backoff time> Interval at which the switch actively establishes a
link with a controller. Range: 1–90 seconds.
Parameter Description
Parameter Description
9-8
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
<The IPv4 address of the contr IPv4 address of the remote controller
9-9
Parameter Description
<Local switch port number> TCP destination port number of the local switch.
Range: 0–65535.
Parameter Description
9-10
Command Function
ZXR10show openflow ofls [ofls-name Displays the information about all the logical
<ofls-name>][detail] switches or the specified logical switches.
ZXR10show openflow ofls-flow-table of1.0 Displays the information about all the flow tables
[ofls-name <Logical switch name>][{[input_port or the specified tables matched by keys on the
{<Interface name>|controller|local}][src-mac logical switch configured on OpenFlow1.0.
<Source MAC address>][dst-mac <Destnation
MAC address>][eth-type <Ethernet frame
type>][vlan-id <VLAN ID>][vlan-pcp <VLAN
priority>][src-ip <Source IPv4 address>][dst-ip
<Destination IPv4 address>][ip-proto <IP protocol
number>][ip-tos <IP TOS>][src-tcp-port <Source
TCP port>][dst-tcp-port <Destination TCP
port>][output_port {<Interface name>|inport|norma
l|flood|all|controller|local}]}][detail]
ZXR10show openflow ofls-flow-table of1.3 Displays the information about all the flow tables
[ofls-name <Logical switch name>[table-id or the specified tables matched by keys on the
<Table id>]][{[input-interface {<Input interface logical switch configured on OpenFlow1.3.
name>|controller|local}][phy-input-interface
<Input physical name>][metadata <Metadata ID
>[metadata-mask <Metadata ID mask>]][src-mac
<Source MAC address>[src-mac-mask <Source
MAC address mask>]][dst-mac <Destination
MAC address>[dst-mac-mask <Destination
MAC address mask>]][eth-type <Ethernet frame
type>][vlan-id <VLAN ID>[vlan-id-mask <VLAN
ID mask>]][vlan-pcp <VLAN priority>][ip-dscp
<Diff serv code point>][ip-enc <ECN bits
of the IP header>][ip-proto <IPv4 or IPv6
protocol number>][src-ipv4 <Source IPv4
address>[src-ipv4-mask <Source IPv4
address mask>]][dst-ipv4 <Destination IPv4
address>[dst-ipv4-mask <Destination IPv4
address mask>]][src-tcp-port <Source TCP
port number>][dst-tcp-port <Destination TCP
port number>][src-udp-port <Source UDP
port number>][dst-udp-port <Destination UDP
port number>][src-sctp-port <Source SCTP
port number>][dst-sctp-port <Destination
SCTP port number>][icmpv4-type <Type
of ICMPv4>][icmpv4-code <Code of
ICMPv4>][arp-op <ARP operation code>][arp-spa
<Source IPv4 address in ARP>[arp-spa-mask
<Mask of source IPv4 in ARP>]][arp-tpa
9-11
Command Function
ZXR10show openflow ofls-group-table [ofls-name Displays the information about all the group
<Logical switch name>[group-id <Group id>]] tables or the specified entry matched by keys on
the logical switch configured on OpenFlow1.3.
ZXR10show openflow ofls-meter-table [ofls-name Displays the information about all the meter
<Logical switch name>[meter-id <Meter table id>]] tables or the specified entry matched by keys on
the logical switch configured on OpenFlow1.3.
The following is an example output from the show openflow ofls command:
ZXR10(config)#show openflow ofls
--------------------------------------------------------------------------------
OFLS Name : SW1
Datapath ID : 0x00000010d1177300
Probe Interval(s) : 10
Max Backoff(s) : 60
Controller Name : ZENIC
Main Connect is connected
IPv4 Addr : 177.168.21.100
9-12
VRF Name :
Port No : 6633
Protocol : TCP
Ports :
Port No Name
65537 vxlan_tunnel1
2 xgei-0/1/1/1
--------------------------------------------------------------------------------
The following is an example output from the show openflow ofls-flow-table of1.3 command:
ZXR10#show openflow ofls-flow-table of1.3
==============================================================================
OFLS Name : SW1
Table Type : FLOW TABLE
9-13
Idle Time Idle aging time. If no message matches this entry in this time, the entry is
deleted.
Hard Time Absolute aging time. If an entry lasts for a time longer than this time, this
entry is deleted.
Priority Priority.
The following is an example output from the show openflow ofls command:
ZXR10(config)#show openflow ofls
--------------------------------------------------------------------------------
OFLS Name : SW1
Datapath ID : 0x00000010d1177300
Probe Interval(s) : 10
Max Backoff(s) : 60
Controller Name : ZENIC
Main Connect is connected
IPv4 Addr : 177.168.21.100
VRF Name :
Port No : 6633
Protocol : TCP
Ports :
Port No Name
65537 vxlan_tunnel1
2 xgei-0/1/1/1
--------------------------------------------------------------------------------
9-14
The following is an example output from the show openflow ofls-group-table command:
ZXR10#show openflow ofls-group-table
==============================================================================
OFLS Name : SW1
Table Type : GROUP TABLE
Total Group Tables : 1
Total Group Entrys : 5
9-15
The following is an example output from the show openflow ofls-meter-table command:
ZXR10#show openflow ofls-meter-table
==============================================================================
OFLS Name : SW1
Table Type : METER TABLE
Total Meter Tables : 1
Total Meter Entrys : 1
9-16
Configuration flow:
1. Add interface xgei-0/1/1/1 to VLAN1000, and configure L3 interfaces on VLAN1000.
2. Create an OpenFlow logical switch instance sw1 on Switch A.
3. Bind ports xgei-0/1/1/2 and xgei-0/1/1/3 to sw1.
4. Configure the connections between the logical switch and controller.
Configuration commands:
/*Adds interface xgei-0/1/1/1 to VLAN1000, and configures L3 interfaces on VLAN1000.*/
Switch(config)#switchvlan-configuration
Switch(config-swvlan)#interface xgei-0/1/1/1
Switch(config-swvlan-if-xgei-0/1/1/1)#switch access vlan 1000
Switch(config-swvlan-if-xgei-0/1/1/1)#exit
9-17
Switch(config-swvlan)#exit
Switch(config)#interface vlan1000
Switch(config-if-vlan1000)#ip address 192.168.10.1/24
Switch(config-if-vlan1000)#exit
Configuration verification:
Information about the logical switch:
Switch#show openflow ofls
--------------------------------------------------------------------
OFLS Name : sw1
Datapath ID : 0x00000010d0177300
Probe Interval(s) : 60
Max Backoff(s) : 60
Controller Name : zenic
Main Connect is connected
IPv4 Addr : 192.168.10.100
VRF Name :
Port No : 6633
Protocol : TCP
Ports :
Port No Name
1 xgei-0/1/1/2
2 xgei-0/1/1/3
---------------------------------------------------------------------
9-18
10.1 Overview
ESM Overview
Ethernet Switch Mode (ESM) allocates the resources of shared entries in switches in
accordance with application scenarios to configure different entry specifications for the
device.
ESM Principle
The entries in the device chipset consist of two parts: entries with fixed specifications, and
entries with different specifications obtained from the different allocation modes of shared
resources. If a device uses a chipset similar to 72DL-H, the shared entry resource can
be used not only to expand the MAC table, but also to expand the ARP table and route
table. The entry can also configure whether the device supports IPv6 route entries whose
mask is more than 64 bits. In addition, the entry can configure ESM mode to determine
whether the device supports the VXLAN layer 3 forwarding function. If a device uses TM
device chipsets, configuring ESM mode can support the Trill property of DC, modify the
entry specifications of the MAC table, ARP table, and VLAN translation table.
If a device uses the 72DL-H chipset, the entry resources in the chipset include the fixed
32K MAC table, 16K ARP table, 16K route table, and shared entry resources of 256K.
The shared entry resources can be allocated to the MAC table, ARP table, and route table
in proportion in five modes. If all the shared resources are used to expand MAC entries,
the MAC entries of the device can be increased to 288K, that is, mode 0.If all the shared
resources are allocated to the route table, the route table can be increased to 128K, or a
maximum of 144K if the fixed 16K is counted. This mode is mode 4. Not all the shared
resources can be used to expand the ARP table. The ARP table can be expanded up to
120K, and other resources are used to expand the MAC table. This mode is mode 3.
In a TM device, the chipset has a total of 176K entry resources, which can be allocated to
the MAC table, ARP table, entrance VLAN translation table, exit VLAN translation table,
and Trill table. In different modes, different entry resources are allocated to the five tables.
10-1
However, the sum of the entry resources of the five table is always 176K. you can manually
specify the entry specification of each table by executing commands. Note that the number
of each entries must be a multiple of 4K.
ESM mode configuration takes effect only after the system is restarted.
l2 152K 16K 4K 4K 0K
l3 80K 80K 8K 8K 0K
udf Resources of 176K (shared by each entry) are allocated manually. The resource
of each entry must be a multiple of 4K.
10-2
For a description of the parameters in Steps 4 and 5, refer to the following table.
Parameter Description
Note:
Not all the type-5960 switches support ESM mode. If you cannot enter esm-configuration
mode from global mode, this type of device does not support ESM mode.
TM devices support ESM mode 1.
72DL-H series of device support ESM mode 2.
Modifying ESM mode parameters take effect after the device restarts.
10-3
Command Function
C Current mode
10-4
0K
udf N/A N/A N/A N/A
N/A
ipv6-128-prefix: 0(C) 0(R
ipv4 router table: 12000(C) 12000(R)
C Current mode
l2 L2 mode
l3 L3 mode
ipv6-128-prefix Number of IPv6 entries with masks longer than 64 bits supported by the
device
C Current mode
CR Current mode and the mode after the device restarts (mode 0)
10-5
Note:
After mode 0 is configured, the system prompts that you must reload the device to make
the modification take effect.
Prompt information:
“mode have changed from m2 to m0,You need reload to make it work!
%Info 161208: Esm configuration has changed,please reload!”
Configuration verification:
You can verify the configuration by using the show esm command:
ZXR10#show esm
C:Current mode R:Mode after reload CR:Mode current and after reload
10-6
The current mode is mode 2, the reload mode is mode 0 (there is a letter R next to M0),
the MAC entries can support up to 288K. Reload the device and execute the show esm
command. The following information is displayed, indicating the new configuration takes
effect:
ZXR10#show esm
C:Current mode R:Mode after reload CR:Mode current and after reload
mode mac arp lpm
-------------------------------------------------------------------------------
M0(CR) 288K 16K 0K
M1 224K 56K 0K
M2 160K 88K 0K
M3 96K 120K 0K
M4 32K 16K 128K
Configuration description:
Assume that you want to enable the VXLAN L3 forwarding function on the device.
Configuration flow:
1. Enter ESM configuration mode.
2. Configure VXLAN-L3 mode to any one but not none.
3. Reload the device.
Configuration command:
Configuration on the switch:
ZXR10(config)#esm-configuration
ZXR10(config-esm)#vxlan-l3 mode all overlay-next-hop 6 overlay-interface 4
Note:
After VXLAN-l3 mode is configured, the system prompts that you must reload the device
to make the modification take effect.
Prompt information:
“%Info 161208: Esm configuration has changed,please reload!”
Configuration verification:
10-7
You can verify the configuration by using the show esm-vxlan command:
ZXR10#sho esm-vxlan
C:Current mode R:Mode after reload CR:Mode current and after reload
underlay (egress/intf) = total (egress/intf) - overlay (egress/intf)
vxlan_l3 status vxlan_l3 mode vxlan_l3 ol egress vxlan_l3 ol interface
--------------------------------------------------------------------------------
(C) NONE 0k 0k
(R) ALL 24k 8k
(CR) N/A N/A N/A
The current mode is none, which means that the device does not support VXLAN L3
forwarding. The reload mode is All (there is a letter R next to ALL), which means that
the device supports SDN, EVPN, and PIM as the VXLAN L3 forwarding control plane. The
supported overlay-nexp-hop specification is 24K, and the overlay-interface specification
is 8K. Reload the device and execute the show esm-vxlan command to check the ESM
configuration. The following information is displayed, indicating the new configuration
takes effect:
ZXR10#show esm-vxlan
C:Current mode R:Mode after reload CR:Mode current and after reload
underlay (egress/intf) = total (egress/intf) - overlay (egress/intf)
vxlan_l3 status vxlan_l3 mode vxlan_l3 ol egress vxlan_l3 ol interface
--------------------------------------------------------------------------------
(C) ALL 24k 8k
(R) ALL 24k 8k
(CR) ALL 24k 8k
10-8
II
III
IV
SCTP
- Stream Control Transmission Protocol
SDN
- Software Defined Network
TC
- Traffic Classification
TCP
- Transmission Control Protocol
UDP
- User Datagram Protocol
WWPN
- World Wide Port Name