IBM Books

MAS V3.3 Protocol Config Ref Vol 1


Configuring and Monitoring Bridging

This chapter describes how to configure the adaptive source routing transparent (ASRT) bridge protocol and how to use the ASRT configuration commands. The chapter includes the following sections:


Accessing the ASRT Configuration Environment

To access the ASRT configuration environment, enter the protocol asrt command at the Config> prompt:

        Config>protocol asrt
        Adaptive Source Routing Transparent Bridge user configuration
        ASRT config>

ASRT Configuration Commands

The ASRT configuration commands allow you to specify network parameters for the ASRT bridge and its network interfaces. These commands also allow you to enable and configure the bridge IP Tunnel, ATM interface features, and NetBIOS.

The device must be restarted for the new configuration to take effect.
Note:The ASRT configuration commands are not effective immediately. They remain pending until you reload the device.

Enter the ASRT configuration commands at the ASRT config> prompt. Access the commands as follows:

Table 5 shows the ASRT configuration commands.

Table 5. ASRT Configuration Command Summary
Command Function
? (Help) Displays all the commands available for this command level or lists the options for specific commands (if available). See "Getting Help".
 Add   Adds station address entries to the permanent database, specific address mapping, LAN/WAN ports, multiaccess ports, protocol filters, duplicate MAC addresses, and a tunnel between end stations across an IP internetwork. 
 Ban   Allows access to the boundary access node (BAN) configuration prompt so that BAN configuration commands can be entered. 
 Change   Allows the user to change bridge and segment numbers. 
 Delete   Deletes station address entries, specific address mapping, LAN/WAN ports, protocol filters, duplicate MAC addresses, and a tunnel between end stations across an IP internetwork. 
 Disable   Disables the following functions: 
  • Bridging
  • Duplicate frames
  • Mapping between group and functional addresses
  • Propagation of Spanning Tree Explorer Frames
  • Source routing on a given port
  • Reception of spanning tree explorer frames over a tunnel
  • SR-TB conversion
  • Transparent (spanning tree) bridging function on a given port
  • Tunnel between bridges
  • Duplicate MAC address feature
  • Duplicate MAC load balancing
  • IPX Conversion
 Enable   Enables the following functions: 
  • Bridging
  • Duplicate frames
  • Mapping between group and functional addresses
  • Propagation of Spanning Tree Explorer Frames
  • Source routing on a given port
  • Reception of spanning tree explorer frames over a tunnel
  • SR-TB conversion
  • Transparent (spanning tree) bridging function on a given port
  • Tunnel between bridges
  • Duplicate MAC address feature
  • Duplicate MAC load balancing
  • IPX Conversion
 List   Displays information about the complete bridge configuration or about selected configuration parameters. 
 NetBIOS   Displays the NetBIOS configuration prompt. 
 Set   Sets the following parameters: 
  • Aging time for dynamic address entries
  • Bridge address
  • Maximum frame size for tunneling
  • Largest Frame (LF) bit encoding
  • Maximum frame size
  • Spanning tree protocol bridge and port parameters
  • Route Descriptor (RD) values
  • Filtering database size
  • Aging value for duplicate MAC address Routing Information Fields (RIFs)
  • Aging value for multiaccess database entries
  • IPX Conversion Mode
  • Ethernet Preference
 Tunnel   Allows access to the tunnel configuration prompt so that tunnel configuration commands can be entered. 
Exit Returns you to the previous command level. See "Exiting a Lower Level Environment".

Response to ASRT Configuration Commands

The ASRT configuration (Talk 6) commands are not effective immediately. They remain pending until you issue the reload command.

Add

Use the add command to add the following information to your bridging configuration:

For the bridge's IP tunnel feature, the add command lets you create an IP tunnel between end-stations across an IP internetwork. This tunnel is counted as only one hop between the end stations no matter how complex the path through the IP internet.

Syntax:

add
address . . .

 
dmac-addr

 
mapping . . .

multiaccess-port . . .

 
port . . .

 
prot-filter . . .

 
tunnel . . .

address addr-value
Adds unique station address entries to the permanent database. These entries are copied into the filtering database as permanent entries when the bridge is restarted. The addr-value is the MAC address of the desired entry. It can be an individual address, multicast address, or broadcast address. You are also given the option to specify the outgoing forwarding port map for each incoming port. Permanent database entries are not destroyed by the power off/on process and are immune to the aging settings. Permanent entries cannot be replaced by dynamic entries.

Valid Values: X'0000 0000 0000' to X'FFFF FFFF FFFF'

Default Value: none

The following sections present specific examples of how the add address command is used to manage address entries:

Adding an address

add address
Address (in 12-digit hex) []? 123456789013
    Exclude destination address from all ports?(Yes or [No]):
    Use same output port mapping for all input Ports?(Yes or [No]):
    Output port mapping:
       Input Port Number [1]?
       Bridge to all ports?(Yes or [No]):
       Bridge to  port 1  Yes or [No]:
       Bridge to  port 2  Yes or [No]:
       Bridge to  port 3  Yes or [No]:
       Bridge to  port 4  Yes or [No]:
       Bridge to  port 5  Yes or [No]:
       continue to another input port? (Yes or [No]): y
       Input Port Number [2]? 3
       Bridge to all ports?(Yes or [No]): y
       continue to another input port? (Yes or [No]): y
       Input Port Number [4]?
       Bridge to all ports?(Yes or [No]):
       Bridge to  port 1  Yes or [No]:
       Bridge to  port 2  Yes or [No]:
       Bridge to  port 3  Yes or [No]:
       Bridge to  port 4  Yes or [No]:
       Bridge to  port 5  Yes or [No]:
       continue to another input port? (Yes or [No]): n
    Source Address Filtering Applies? (Yes or No): y
    ASRT config>
Note:For any "Yes or No" question in the prompts, "No" is the default value. Press Return to accept the default value.

Exclude destination address ...
This prompt lets you set destination address filtering for that entry. Answering yes to the prompt causes filtering of any frames that contain this address as a destination address no matter which port it came from.

Use same output mapping...
Answering yes to this prompt lets you create one outgoing port map for all incoming ports rather than allowing for mapping to only specific ports. Answering no to this prompt causes further prompting (Input Port Number [1]?) to select each input port. From that specific input port prompt you can then create a unique port map for that input port.

Input Port 1, Port 2
Answering "No" to the previous prompt causes input port-by-input port prompting (Input Port Number [1]?) to select each input port and its associated outgoing bridge ports.

Bridge to all ports?
Answering yes to this prompt creates an outgoing port map that includes all ports. Thus, when a frame with this address as the destination address is received, it is forwarded to all outgoing forwarding ports except for the incoming port. The following are examples of how this is done according to the port map:

If a frame is received on port 1 and the port map indicates 1 (for port 1), the frame is filtered.

If the same frame is received on port 2 and the port map indicates 1 (for port 1), the frame is forwarded to port 1. If a frame is received on port 1 and the matching address entry's port map indicates 1, 2, or 3, the frame is forwarded to ports 2 and 3.

If the port map indicates no port (NONE/DAF), the frame is filtered. This is known as destination address filtering (DAF).

If no address entry is found to match the received frame, it is forwarded to all the forwarding ports except for the source port.

Bridge to Port 1, Port 2, etc.
This prompt lets you associate an address entry with that specific bridge port. Answering yes maps the address to the specified port so that the port is included in that address entry's port map. Answering no skips address mapping for that port.

continue to another bridge port?
This prompt lets you select the next input port to be configured.

Source address filtering
This allows for port-specific source address filtering (SAF). When SAF is applied (answer yes at the prompt), frames received with source addresses that match address entries in the filtering database that have source address filtering enabled will be discarded. This mechanism allows a network manager to isolate an end station by prohibiting its traffic to be bridged.

Enabling Destination Address Filtering For Entry

This example shows how to answer the command prompts to select destination address filtering for an entry:

    ASRT config>add address 000000334455
    Exclude destination address from all ports?(Yes or [No]): y
    Source Address Filtering Applies? (Yes or [No]): y
    ASRT config>

After adding the address entry, you can verify its status by using the list range command. The following example shows that no port map exists for that entry (in bold) and that destination address filtering (DAF) has been turned on.

    ASRT config>list range
    Start-Index [1]?
    Stop-index [3]?
    ADDRESS                 ENTRY TYPE      PORT MAP
    =======                 ==========      ========
    01-80-C2-00-00-00       REGISTERED      Input Port:  ALL PORTS
                                            Output ports:
 
    00-00-00-22-33-44       PERMANENT       Input Port:  3
                                            Output ports: 1, 2
                                            Input Port:  4
                                            Output ports:  1, 2
 
    00 00 00 33 44 55       PERMANENT       NONE/DAF

Output Port Map Created For Address Entry Having More Than One Input Port

This example shows how to answer the command prompts to create separate output port maps for an address entry that will have more than one input port.

    ASRT config> add address 000000123456
    Exclude destination address from all ports?(Yes or [No]):
    Use same output port mapping for all input Ports?(Yes or [No]):
    Input Port Number [1]? 1
    Bridge to all ports ?(Yes or [No]):
    Bridge to port 1 - Yes or [No]: y
    Bridge to port 2 - Yes or [No]: y
    Bridge to port 3 - Yes or [No]:
    continue to another input port ? (Yes or [No]): y
    Input Port Number [2]?
    Bridge to all Ports?(Yes or [No]):
    Bridge to Port 1 - Yes or [No]:
    Bridge to port 2 - Yes or [No]:
    Bridge to port 3 - Yes or [No]: y
    continue to another input port ? (Yes or [No]):
    Source Address Filtering Applies? (Yes or [No]):
    ASRT config>

After adding the address entry, you can verify its status by using the list range command. The following example shows an entry (in bold) that has ports 1 and 2 as input ports and has separate port maps for both input ports. Source address filtering (SAF) has also been enabled.

    ASRT config> list range
    Start-Index [1]?
    Stop-index [3]?
    ADDRESS                 ENTRY TYPE      PORT MAP
    =======                 ==========      ========
    01-80-C2-00-00-00       REGISTERED      Input Port:  ALL PORTS
                                            Output ports:
 
    01-80-C2-00-00-01       RESERVED        NONE/DAF
 
    00-00-00-12-34-56       PERM/SAF        Input Port:  1
                                                 Output ports: 1, 2
                                                 Input Port:  2
                                                 Output ports: 3

Single Output Port Map Created All Incoming Ports Associated With Address Entry

This example shows how to answer the command prompts to create a single output port map for all incoming ports associated with an address entry.

    ASRT config> add address 000000556677
    Exclude destination address from all ports?(Yes or [No]):
    Use same output port mapping for all input Ports?(Yes or [No]): y
       Bridge to all ports?(Yes or [No]): n
       Bridge to  port 1 - Yes or [No]: y
       Bridge to  port 2 - Yes or [No]: y
       Bridge to  port 3 - Yes or [No]:
    Source Address Filtering Applies? (Yes or [No]): y
    ASRT config>

After adding the address entry, you can verify its status by using the list range command. The example below shows an entry (in bold) that has a single port map for all incoming ports. Source address filtering (SAF) has also been enabled.

    ASRT config> list range
    Start-Index [1]?
    Stop-index [3]?
    ADDRESS                 ENTRY TYPE      PORT MAP
    =======                 ==========      ========
    01-80-C2-00-00-00       REGISTERED      Input Port:  ALL PORTS
                                            Output ports:
 
    01-80-C2-00-00-01       RESERVED        NONE/DAF
 
    00-00-00-55-66-77       PERM/SAF        Input Port:  ALL PORTS
                                            Output ports:  1, 2

 

dmac-addr addr-value
Adds up to 7 duplicate MAC address entries to the database. The addr-value is the MAC address of the desired entry. See "SR-TB Duplicate MAC Address Feature" for additional information about the duplicate MAC address feature.

Valid Values: X'0000 0000 0000' to X'FFFF FFFF FFFF'

Default Value: none

Example:

After adding the address, you can verify DMAC information by using the list dmac command.

ASRT config>add dmac-addr
Address (in 12-digit hex) []? 10005a777701
 
ASRT config>list dmac
Duplicate MAC address feature is    ENABLED
Load balance feature is    ENABLED
Age value for Duplicate MAC address :000000C8
Duplicate MAC ADDRESSES CONFIGURED
==================================
10-00-5A-66-66-02
10-00-5A-66-66-05
10-00-5A-77-77-01

mapping dlh-type type-field ga-address fa-address
Adds specific functional address to group address mapping for a given protocol identifier. The address mapping is converted only on destination addresses crossing Token Ring to Ethernet or conversely.
Note:For every Ether-type mapped value, the corresponding SNAP-type value should be added. This is necessary for bidirectional mapping.

dlh-type
(data-link-header type) is a choice for DSAP, Ether-type, or SNAP.

type-field
Protocol type field.
Destination Service Access Point (DSAP) protocol type is entered in the range 1-FE (hexadecimal).

DSAP Valid Values: X'1' to X'FE'

Common values are:

Protocol - SAP (hexadecimal value)

  • Banyan SAP - BC (used only for 802.5)
  • Novell IPX SAP - E0 (used only for 802.5)
  • NetBIOS SAP - F0
  • ISO Connectionless Internet - FE

DSAP Default Value: 1

Ethernet (Ether) protocol type is entered in the range 5DD-FFFF (hexadecimal).

Ethernet Valid Values: X'5DD' to X'FFFF'

Protocol - Ethernet type (hex value)

  • IP - 0800
  • ARP - 0806
  • CHAOS - 0804
  • Maintenance Packet Type - 7030
  • DECnet MOP Dump/Load - 6000
  • DECnet MOP Remote Console - 6002
  • DECnet- 6003
  • DEC LAT - 6004
  • DEC LAVC - 6007
  • XNS - 0600
  • Apollo Domain - 8019 (Ethernet)
  • Novell NetWare IPX - 8137 (Ethernet)
  • AppleTalk Phase 1 - 809B
  • Apple ARP Phase 1 - 80F3
  • Loopback assistance - 9000

Ethernet Default Value: 1

Subnetwork Access Protocol (SNAP) protocol type is entered in 10-digit hexadecimal format.

SNAP Valid Values: X'00 0000 0000' to X'FF FFFF FFFF'

Common values are:

  • AppleTalk Phase 2 08-00-07-80-9B
  • Apple ARP Phase 2 00-00-00-80-F3

SNAP Default Value: 00 0000 0800

ga-address
6-byte (12-digit hexadecimal) group/multicast address.

Valid Values: X'0000 0000 0000' to X'FFFF FFFF FFFF'

Default Value: none

fa-address
Functional address in noncanonical format. Functional addresses are locally administered group addresses. These are most commonly used in token-ring networks.

Valid Values: X'0000 0000 0000' to X'FFFF FFFF FFFF'

Default Value: none

Example:
ASRT config> add mapping dsap
Protocol Type in hex (1 - FE) [1]?
Group-Address (in 12-digit hex) [ ]?
Functional address (in noncanonical format) [ ]?

Example:
ASRT config> add mapping ether
Protocol Type in hex (5DD - FFFF) [0800]?
Group-Address (in 12-digit hex) []?
Functional address (in noncanonical format) [ ]?

Example:
ASRT config> add mapping snap
Address (in 10-digit hex) [0000000800]?
Group-Address (in 12-digit hex) []?
Functional address (in noncanonical format) [ ]?

multiaccess-port interface# port# segment# [bridge#] [virtual-segment#]
Adds a multiaccess port to the bridging configuration. This command associates a port number with a Frame Relay interface and enables the port for source route bridging.
interface#
Specifies the Frame Relay interface on which you are configuring the multiaccess port.

Valid values: any existing Frame Relay interface number

Default value: 0

port#
Specifies the bridge port number. This number must be unique among all configured bridge ports in the device.

Valid values: 1 to 254

Default value: next available port number

segment#
Specifies a 12-bit, hexadecimal, source routing segment number that represents the multiaccess segment. All bridges connected to the multiaccess segment must use the same segment number.

Valid values: X'001' to X'FFF'

Default value: X'001'

bridge#
Specifies a 4-bit, hexadecimal, source routing bridge number that represents this bridge on the multiaccess segment. This parameter is only required when enabling source routing for the first time. The bridge number should be unique among all bridges on the multiaccess segment.

Valid values: X'0' to X'F'

Default value: X'0'

virtual-segment#
Specifies a 12-bit, hexadecimal, source routing segment number. This parameter is only required when enabling source routing for the first time on more than two bridge ports or the first time you configure a multiaccess bridge port.

Valid values: X'001' to X'FFF'

Default value: X'001'

Example:

add multiaccess-port
Interface number [0]? 3
Port number [2]? 2
Segment number for the port in hex (1 - FFF) [001]? 200
Bridge number in hex (0-9, A-F) [0]? 1
Bridge Virtual Segment Number in hex (1-FFF) [001]? FFF

port interface# port#
Adds a LAN/WAN port to the bridging configuration. This command associates a port number with the interface number and enables that port's participation in transparent bridging.

Port Number Valid Values: 1 to 254

Port Number Default Value: none

Example: add a port
 
ASRT config> add port
Interface Number [0]?
Port Number [5]?

See "ATM Commands" for information about adding ATM ports and "Frame Relay Commands" for information about adding Frame Relay ports.

prot-filter snap ether dsap
Allows the bridge to be configured so that it can selectively filter packets based on their protocol type. Filters can be applied to all ports or only selected ports.

This parameter specifies protocol identifiers for which the received frames of that specific protocol are discarded exclusively without applying bridge logic. ARP packets for this protocol type will also be discarded. The protocol filter is applied only on the received packets. The protocol filters available include:

SNAP Packets
Subnetwork Access Protocol with protocol type entered in 10-digit hexadecimal format.

Ether Packets
Ethernet Type with the protocol type entered in the range 5DD-FFFF (hexadecimal).

DSAP Packets
Destination Service Access Point protocol with the protocol type entered in the range 0-FE (hexadecimal).

Notes:

  1. You cannot filter all SNAP format packets by adding a DSAP filter for type X'AA'. The encapsulated SNAP protocol(s) must be filtered individually. Consider using a sliding window filter. Refer to the chapter entitled "Using MAC Filtering" in Using and Configuring Features.

  2. You cannot configure protocol filters for a protocol that is routed over a specific interface if the interface is also configured for bridging.

Common protocol filters and their respective values are as follows.

DSAP Types
Protocol SAP (hexadecimal value)
Banyan SAP BC (used only for 802.5)
Novell IPX SAP E0 (used only for 802.5)
NetBIOS SAP F0
ISO Connectionless Internet FE

SNAP Protocol Identifiers
Protocol SNAP OUI/IP (10-digit)

AppleTalk Phase 2


08-00-07-80-9B


Apple ARP Phase 2


00-00-00-80-F3

Ethernet Types
Protocol Ethernet type (hex value)
IP 0800
ARP 0806
CHAOS 0804
Maintenance Packet Type 7030
DECnet MOP Dump/Load 6000
DECnet MOP Remote Console 6002
DECnet 6003
DEC LAT 6004
DEC LAVC 6007
XNS 0600
Apollo Domain 8019 (Ethernet)
Novell NetWare IPX 8137 (Ethernet)
Apple ARP Phase 1 80F3
Loopback assistance 9000

Example:
ASRT config> add prot-filter dsap (used for DSAP packets)
Protocol Type in hex (0 - FE) [1]?
   Filter packets arriving on all ports?(Yes or [No]):
   Filter packets arriving on  port 1 - Yes or [No]:
   Filter packets arriving on  port 2 - Yes or [No]:
   Filter packets arriving on  port 3 - Yes or [No]:
Port assignment Required, filter not added
ASRT config>

Example:
ASRT config> add prot-filter ether (used for Ethernet packets)
Protocol Type in hex (5DD - FFFF) [0800]?
   Filter packets arriving on all ports?(Yes or [No]):
   Filter packets arriving on  port 1 - Yes or [No]:
   Filter packets arriving on  port 2 - Yes or [No]:
   Filter packets arriving on  port 3 - Yes or [No]:
Port assignment Required, filter not added
ASRT config>

Example:
ASRT config>add prot-filter snap (used for SNAP packets)
Address (in 10-digit hex) [0000000800]?
Protocol Type in hex (5DD - FFFF) [0800]?
   Filter packets arriving on all ports?(Yes or [No]):
   Filter packets arriving on  port 1 - Yes or [No]:
   Filter packets arriving on  port 2 - Yes or [No]:
   Filter packets arriving on  port 3 - Yes or [No]:
Port assignment Required, filter not added
ASRT config>

tunnel port#
Creates the user-defined IP tunnel to a bridge port. The bridge tunnel allows source route bridge domains or transparent bridge domains to communicate across an IP network.

To allow IBM LAN and terminal traffic to merge with non-IBM traffic (that is, Novell) across a single backbone, the Source Routing Bridge Tunnel and SDLC (Synchronous Data Link Control) Relay features of the bridging device software encapsulate IBM traffic within industry-standard TCP/IP packets. The bridging device then routes these packets using an IP path or tunnel through large IP internetworks. The benefit is increased functionality and network utilization as well as higher network availability and increased ease of use.

End-stations see the IP path (the tunnel) as a single hop, regardless of the network complexity. This helps overcome the usual 7-hop distance limit encountered in source-routing configurations. It also lets you connect source-routing end-stations across non-source-routing media, such as Ethernet networks.

The bridging tunnel also overcomes several limitations of regular source routing including:

With the bridge tunnel feature enabled, the software encapsulates packets in TCP/IP packets. To the device, the packet looks like a TCP/IP packet. Once a frame is encapsulated in an IP envelope, the IP forwarder is responsible for selecting the appropriate network interface based on the destination IP address. This packet can be routed dynamically through large internetworks without degradation or network size restrictions. End-stations see this path, or tunnel, as a single hop regardless of the complexity of the internetwork.

The tunnel is transparent to the end stations. The bridging devices participating in tunneling treat the IP internet as one of the bridge segments. When the packet reaches the destination interface, the TCP/IP headers are automatically removed and the inner packet proceeds as a standard source routing packet.

Add Tunnel creates the user-defined IP tunnel to a bridge port. This tunnel is counted as only one hop between the bridges no matter how complex the path through the IP internet. To use the tunnel feature, the IP forwarder must be enabled.

Only one tunnel can be added. You must use a Port Number that is not used for any other LAN port. Once a Port Number is assigned to the bridging tunnel, all other bridging commands that need a port number as a parameter can be used to configure the tunnel characteristics. For tunnel-specific configuration, such as the IP addresses of the endpoints, use the tunnel command (see "Tunnel").

Transparent bridging is enabled on this port by default. Source routing can be enabled, however, by using the Enable Source-Routing option.

Example:
add tunnel 3
Port Number   [1] ? 3

Port Number
A unique port number that is not being used by the bridge.

BAN

Use the ban command to access the boundary access node (BAN) configuration prompt. BAN commands are entered at the BAN configuration prompt (BAN config>). See "BAN Configuration Commands" for an explanation of each of these commands.

Syntax:

ban

Example:
ban
BAN (Boundary Access Mode) configuration
BAN config>

Change

Use the change command to change source routing bridge and segment numbers in the bridging configuration.

Syntax:

change
bridge . . .

 
segment . . .

bridge new-bridge#
Changes bridge number in the bridging configuration.

Example: change bridge 3

segment old-segment# new-segment#
Changes segment number in the bridging configuration.

Example: change segment 2 3

Delete

Use the delete command to delete the following information from your bridging configuration:

For the IP tunnel feature, the delete port command with the corresponding port number for the tunnel removes the tunnel between bridges across an IP internetwork.

Syntax:

delete
address

 
dmac-addr

 
mapping . . .

 
port . . .

 
prot-filter . . .

address addr-value
Deletes an address entry from the permanent database. The address is the MAC address of the desired entry. Enter the addr-value (in 12-digit hexadecimal format) of the entry to be deleted and press Return. Reserved multicast addresses cannot be deleted. If you attempt to delete an address entry that does not exist, you will receive the message
Record matching that address not found

Valid Values: X'0000 0000 0000' to X'FFFF FFFF FFFF'

Default Value: none

Example: delete address

dmac-addr addr-value
Deletes duplicate MAC address entries from the database. The addr-value is the MAC address of the desired entry you want to remove.

Valid Values: X'0000 0000 0000' to X'FFFF FFFF FFFF'

Default Value: none

Example:

ASRT>list gamic
Duplicate MAC address feature is   DISABLED
Load balance feature is   DISABLED
Age value for Duplicate MAC address :00000096
Duplicate MAC ADDRESSES CONFIGURED
==================================
10-00-5A-66-66-00
10-00-5A-66-66-01
10-00-5A-66-66-02
10-00-5A-66-66-03
10-00-5A-66-66-04
10-00-5A-66-66-05
 
ASRT config>delete dmac-address
Address (in 12-digit hex) []? 10005a666600
Address deleted
 
ASRT config>list dmac
Duplicate MAC address feature is   DISABLED
Load balance feature is   DISABLED
Age value for Duplicate MAC address :00000096
Duplicate MAC ADDRESSES CONFIGURED
==================================
10-00-5A-66-66-01
10-00-5A-66-66-02
10-00-5A-66-66-03
10-00-5A-66-66-04
10-00-5A-66-66-05

mapping dlh-type type-field ga-address
Deletes specific address mapping for given protocol.

dlh-type
(data-link-header type) is a choice for DSAP, Ether-type, or SNAP.

type-field
Protocol type field.

Destination service access point (DSAP) protocol type is entered in the range 1-FE (hexadecimal).

Valid Values: X'1' to X'FE'

Common values are:

Protocol - SAP (hexadecimal value)

Default Value: 1

Ethernet (Ether) protocol type is entered in the range 5DD-FFFF (hexadecimal).

Valid Values: X'5DD' to X'FFFF'

Default Value: 1

Subnetwork Access Protocol (SNAP) protocol type is entered in 10-digit hexadecimal format.

Valid Values: X'00 0000 0000' to X'FF FFFF FFFF'

Common values are:

Default Value: 00 0000 0800

ga-address
6-byte (12-digit hexadecimal) group/multicast address.

Valid Values: X'0000 0000 0000' to X'FFFF FFFF FFFF'

Default Value: none

Example: delete mapping DSAP FE <group address>

port port#
Removes a port from a bridging configuration. Because the enable bridge command by default configures all LAN devices to participate in bridging, this command allows you to customize which devices should or should not participate in the bridging. The port number value normally is one greater than the interface number.

This command followed by the IP tunnel port# removes an IP tunnel from a bridging configuration.

Example: delete port 2

prot-filter snap ether dsap
Deletes previously specified protocol identifiers used in filtering. You can delete filters for all ports or selected ports. These filters include the following:

SNAP Packets
Subnetwork Access Protocol with protocol type entered in 10-digit hexadecimal format.

Ether Packets
Ethernet Type with the protocol type entered in a range of 5DD - FFFF (hexadecimal).

DSAP Packets
Destination service access point protocol with the protocol type entered in a range of 0-FE (hexadecimal).

Example:
ASRT config> delete prot-filter snap (used for SNAP packets)
Address (in 10-digit hex) [0000000800]?
   Delete filter on all ports?(Yes or [No]):
   Delete filter on  port 1 - Yes or [No]:
   Delete filter on  port 2 - Yes or [No]:
   Delete filter on  port 3 - Yes or [No]:

Example:
ASRT config> delete prot-filter ether (used for Ethernet packets)
Protocol Type in hex (5DD - FFFF) [0800]?
   Delete filter on all ports?(Yes or [No]):
   Delete filter on  port 1 - Yes or [No]:
   Delete filter on  port 2 - Yes or [No]:

Example:
ASRT config> delete prot-filter dsap (used for DSAP packets)
Protocol Type in hex (0 - FE) [1]?
   Delete filter on all ports?(Yes or [No]):
   Delete filter on  port 1 - Yes or [No]:
   Delete filter on  port 2 - Yes or [No]:
   Delete filter on  port 3 - Yes or [No]:

Disable

Use the disable command to disable the following bridge functions:

For the tunnel feature, the disable command disables a tunnel between end stations across an IP internetwork.

Syntax:

disable
bridge

 
dls

 
duplicate . . .

 
dmac-addr

 
dmac-load-balance

 
ethertype-ibmrt-pc

 
fa-ga-mapping

 
ibm8209-spanning-tree

 
ipx-conversion . . .

 
spanning-tree-explorer . . .

 
source-routing . . .

 
sr-tb-conversion

 
stp

 
transparent . . .

 
tree

 
ub-encapsulation

bridge
Disables bridging function entirely. This command does not remove previously configured bridging values, however.

Example: disable bridge

dls
Disables the operation of DLSw on the bridge. (The device running DLSw appears as a bridge to the end stations.) See "Using DLSw" for more details.

Example: disable dls

duplicate frame-type
Disables the creation of duplicate frames present in mixed bridging environments. When the SR-TB bridging feature is enabled on an 802.5 interface (with source routing and transparent bridging enabled), there are inconsistencies created when bridging frames to an unknown (or multicast) destination. The bridge does not know whether the destination is behind a source routing (only) or transparent bridge.

To remedy this situation, the bridge sends out duplicates of these frames (by default). One frame has source routing fields present (a spanning tree explorer RIF) and the other is formatted for transparent bridging (no RIF is present). The disable duplicate command lets you eliminate this duplication by allowing you to disable the creation of one of these types of frames. The disable duplicate command will not allow you to disable simultaneously both types of frames.

Entering STE after the command tells the bridge to refrain from sending out spanning tree explorer frames created for the source routing environment. Entering TSF after the command tells the bridge to refrain from sending out transparent spanning frames for the transparent bridging environment. In both cases, it is a situation where normally both types of frames would be sent out. Disabling transparent bridging on the interface also disables the creation of transparent frames.

Example: disable duplicate TSF

            Port Number [1]?

dmac-addr
Disables the duplicate MAC address feature.

Example: disable dmac-addr

ASRT>list dmac
Duplicate MAC address feature is    ENABLED
Load balance feature is    ENABLED
Age value for Duplicate MAC address :00000096
Duplicate MAC ADDRESSES CONFIGURED
==================================
10-00-5A-66-66-00
10-00-5A-66-66-01
10-00-5A-66-66-02
10-00-5A-66-66-03
10-00-5A-66-66-04
10-00-5A-66-66-05
 
ASRT config>disable dmac-addr
 
ASRT>list dmac
Duplicate MAC address feature is   DISABLED
Load balance feature is   DISABLED
Age value for Duplicate MAC address :00000096
Duplicate MAC ADDRESSES CONFIGURED
==================================
10-00-5A-66-66-00
10-00-5A-66-66-01
10-00-5A-66-66-02
10-00-5A-66-66-03
10-00-5A-66-66-04
10-00-5A-66-66-05

dmac-load-balance
Disables Duplicate MAC load balancing for the duplicate MAC address feature.

Example: disable dmac-load-balance

ASRT>list dmac
Duplicate MAC address feature is    ENABLED
Load balance feature is    ENABLED
Age value for Duplicate MAC address :00000096
Duplicate MAC ADDRESSES CONFIGURED
==================================
10-00-5A-66-66-00
10-00-5A-66-66-01
10-00-5A-66-66-02
10-00-5A-66-66-03
10-00-5A-66-66-04
10-00-5A-66-66-05
ASRT config>disable dmac-load-balance
ASRT>list dmac
Duplicate MAC address feature is   ENABLED
Load balance feature is   DISABLED
Age value for Duplicate MAC address :00000096
Duplicate MAC ADDRESSES CONFIGURED
==================================
10-00-5A-66-66-00
10-00-5A-66-66-01
10-00-5A-66-66-02
10-00-5A-66-66-03
10-00-5A-66-66-04
10-00-5A-66-66-05

ethertype-ibmrt-pc
Disables translation of SNA frames to Ethernet Type 2 format as used by IBM RTs running OS/2 EE.

Example: disable ethertype-ibmrt-pc

            Port Number [1]?

fa-ga-mapping
Disables group address-to-functional address (and conversely) mapping. You might under certain circumstances want to disable the mapping between group address and functional address globally.

Example: disable fa-ga-mapping

ibm8209-spanning-tree
Removes bridges from participating in spanning tree protocols with IBM 8209 bridges.

Example: disable ibm8209-spanning-tree

ipx-conversion
Globally disables conversion of Novell IPX frames when bridging between Ethernet/802.3 and Token-Ring (802.5) bridge ports. When disabled, Novell IPX frames can be bridged between end stations on the same media type through a backbone LAN of a different media type, but cannot be bridged between end stations on different media.

Example: disable ipx-conversion

spanning-tree-explorer port#
Disables a port from allowing propagation of spanning tree explorer frames if source routing is enabled. This command is used only if transparent bridging is not enabled on the port. In that case, it is automatically known in conformance with the transparent spanning tree.

Example: disable spanning-tree-explorer 2

source-routing port#
Disables source routing on a given port. This command is used to have an already-participating bridge interface discontinue source routing.

Example: disable source-routing 2

sr-tb-conversion
Disables conversion of source routed frame to transparent frame and vice versa.

Example: disable sr-tb-conversion

stp
Disables the Spanning Tree Protocol on the bridge. The default is enabled.

Example: disable stp

transparent port#
Disables transparent bridging function on the given port. This command is useful for cases where an alternative communication method such as source routing is desirable.
Note:This command might bring about an absurd configuration if not used correctly. For instance, using it on an Ethernet interface will result in disabling bridging function for that interface. This command is used to bring about SRB and SR-TB bridge function.

Example: disable transparent 2

tree port#
Disables STP participation for the bridge on a per-port basis.

Example: disable tree 1
Note:Disabling STP on a per-port basis can produce network loops because of the existence of parallel bridges.

ub-encapsulation
Disables Ungermann-Bass OUI encapsulation of XNS frames. XNS frames are forwarded to both Ethernet and Token Ring using SNAP encapsulation with an OUI of all zeros.

Example: disable ub-encapsulation

Enable

Use the enable command to enable the following bridging functions:

Syntax:

enable
bridge . . .

 
dls

 
duplicate

 
dmac-addr

 
dmac-load-balance

 
ethertype-ibmrt-pc

 
fa-ga-mapping

 
ibm8209-spanning-tree

 
ipx-conversion . . .

 
spanning-tree-explorer . . .

 
source-routing . . .

 
sr-tb-conversion

 
stp

 
transparent . . .

 
tree

 
ub-encapsulation

bridge
Enables transparent bridging function on all the LAN devices (interfaces) configured in the bridging device. The port numbers are assigned to each interface as the previous interface number plus 1. For example, if interface 0 is a LAN device its port number will be 1.

Example: enable bridge

dls
Enables the operation of DLSw on the bridge. The device running DLSw appears as a bridge to the end stations. See "Using DLSw" from more information.

Example: enable dls

duplicate frame-type
Enables the generation of duplicate STE (spanning tree explorer) frames or TSFs (transparent spanning frames). This command is available to offset the disable duplicate command. Duplicate frame generation is enabled by default. The enable duplicate command can be followed by a frame type of TSF or STE to specifically enable one of the frame types, or by the frame type BOTH, which yields the same behavior as not specifying a frame type for this parameter.

Example: enable duplicate STE

             Port Number [1]?

dmac-addr
Enables the duplicate MAC address feature. See "SR-TB Duplicate MAC Address Feature" for additional information about the duplicate MAC address feature.

Example with load-balancing:

ASRT config>enable dmac-addr
 
ASRT config>list dmac
Duplicate MAC address feature is    ENABLED
Load balance feature is   DISABLED
Age value for Duplicate MAC address :000000C8
Duplicate MAC ADDRESSES CONFIGURED
==================================
10-00-5A-66-66-01
10-00-5A-66-66-02
10-00-5A-66-66-03
10-00-5A-66-66-04
10-00-5A-66-66-05
 
ASRT config>enable dmac-load-balance
 
ASRT config>li dmac
Duplicate MAC address feature is    ENABLED
Load balance feature is    ENABLED
Age value for Duplicate MAC address :000000C8
Duplicate MAC ADDRESSES CONFIGURED
==================================
10-00-5A-66-66-01
10-00-5A-66-66-02
10-00-5A-66-66-03
10-00-5A-66-66-04
10-00-5A-66-66-05

Example (without load-balancing):

ASRT config>enable dmac-addr
 
ASRT config>list dmac
Duplicate MAC address feature is    ENABLED
Load balance feature is   DISABLED
Age value for Duplicate MAC address :000000C8
Duplicate MAC ADDRESSES CONFIGURED
==================================
10-00-5A-66-66-01
10-00-5A-66-66-02
10-00-5A-66-66-03
10-00-5A-66-66-04
10-00-5A-66-66-05

dmac-load-balance
Enables Duplicate MAC load balancing for the duplicate MAC address feature. See the discussion "SR-TB Duplicate MAC Address Feature" for a description of Duplicate MAC load balancing.

Example :

ASRT config>enable dmac-addr
 
ASRT config>list dmac
Duplicate MAC address feature is    ENABLED
Load balance feature is   DISABLED
Age value for Duplicate MAC address :000000C8
Duplicate MAC ADDRESSES CONFIGURED
==================================
10-00-5A-66-66-01
10-00-5A-66-66-02
10-00-5A-66-66-03
10-00-5A-66-66-04
10-00-5A-66-66-05
 
ASRT config>enable dmac-load-balance
 
ASRT config>li dmac
Duplicate MAC address feature is    ENABLED
Load balance feature is    ENABLED
Age value for Duplicate MAC address :000000C8
Duplicate MAC ADDRESSES CONFIGURED
==================================
10-00-5A-66-66-01
10-00-5A-66-66-02
10-00-5A-66-66-03
10-00-5A-66-66-04
10-00-5A-66-66-05

ethertype-ibmrt-pc
Enables translation of SNA frames to Ethernet Type 2 as used by IBM PC RTs running OS/2 EE. This will result in SNA frames being duplicated into both 802.3/802.2 and IBM-RT formats to unknown hosts on an Ethernet.

Example: enable ethertype-ibmrt-pc

             Port Number  [4]?

fa-ga-mapping
Enables group address to functional address (and conversely) mapping. This mapping is conducted when frames are forwarded between token ring and other media (except serial line). In the token-ring arena, functional addresses are more popular even though they are locally assigned group addresses due to restrictions in hardware. On other media, group addresses are widely used. Under normal circumstances group address to functional address mapping is inevitable.

Mapping is enabled by default if mapping addresses have been added. The enable/disable mapping lets users have a choice when it comes to deleting added map records.

Example: enable fa-ga-mapping

ibm8209-spanning-tree
Allows bridges to participate in spanning tree protocols with IBM 8209 bridges.

Example: enable ibm8209-spanning-tree

ipx-conversion
Globally enables conversion of Novell IPX frames when bridging between Ethernet/802.3 and Token-Ring (802.5) bridge ports. When enabled, Novell frames can be bridged between end stations on different media.

Example: enable ipx-conversion

spanning-tree-explorer port#
Enables the port to allow propagation of spanning tree explorer frames if source routing is enabled. This command is valid on token-ring and WAN ports only. This feature is enabled by default when source routing is configured on the port.

Example: enable spanning-tree-explorer 2

source-routing port# segment# [bridge#]
Enables source routing for a given port. This command is typically used when source routing on part of the bridge is required. If source routing is the only feature desired, transparent bridging on the interface should be disabled. For the first instance of the command, entering the bridge number is required. For subsequent times, this input is not required.

port#
Valid port participating in the bridge configuration.

Valid Values: X'0' to X'FFF'

Default Value: 1

segment#
12-bit number that represents the LAN/WAN to which media are attached. All the media on other bridges attached to this LAN/WAN must be configured with the same value. For correct operation of the source routing function, it is very important that all the bridges attached to this LAN/WAN have the same perspective of the LAN/WAN identification value.

bridge#
4-bit value unique among all the bridges attached to the same LAN/WAN. This value is required when source routing is enabled on the first interface. For later interfaces, this input is optional. It is recommended that the bridge# be unique on the segment.

Valid Values: X'0' to X'F'

Default Value: 1

Note:If the configuration is a situation where two segments have already been configured (that is a 1:N SRB configuration), you will be prompted for an additional virtual-segment# parameter.

Example: enable source-routing 2 1 1

sr-tb-conversion
This option enables conversion of source routing to transparent bridging frame format and vice versa. It allows for compatibility between source routing and transparent bridging domains. When this feature is enabled, the bridge lets source-routed frames be accepted into a transparent domain by stripping off the RIF field and converting them into transparent frames.

The bridge also gathers routing information concerning source routing stations from the passing source routing frames. This is obtained from the RIF. This RIF information is then used to convert a transparent frame to a source-routed frame. If an RIF is not available for a station, then the frame is sent out as a spanning tree explorer frame in the source routing domain.

In order for the conversion function to operate correctly, you must give the transparent bridging domain a segment number. All SR-TB bridges that are connected to this domain should also be configured with the same segment number.

TB-Domain Segment Number Valid Values: X'1' - X'FFF'

TB-Domain Segment Number Default Value: 1

The maximum transmission unit (MTU) is the number of octets per frame of data that can be transferred across a given physical network. When an IP datagram travels from one host to another, it can cross different physical networks. Some physical networks may have this set MTU, which will not allow long IP datagrams to be placed in on a physical frame. Fragmentation will occur when you attempt to transmit frames larger than that which the physical network can handle.

TB-Domain MTU Valid Values: 576 to 18000 bytes

TB-Domain MTU Default Value: 2048

Example: enable sr-tb-conversion

            TB-Domain Segment Number in hex(1 - FFF) [1]? 2
            Bridge Virtual Segment Number in hex[1 - FFF]? aa
            TB-Domain's MTU [1470]? 1455
            TB-Domain's MTU is adjusted to 1350

stp
Enables the spanning tree protocol on the bridge. This is the default.

Example: enable stp

transparent port#
Enables transparent bridging function on the given port. Under normal circumstances, this command is not necessary.

Example: enable transparent

Port Number [1]?

tree port#
Enables STP participation for the bridge on a per-port basis.

Example: enable tree 1

ub-encapsulation
Causes XNS Ethernet Type 2 frames to be translated into Token-Ring frames using the Ungermann-Bass OUI in the SNAP header. Token-Ring frames containing the UB OUI header will be forwarded to Ethernets as type 0x0600 Ethernet Type 2 frames rather than as 802.3/802.2 frames.

Example: enable ub-encapsulation

List

Use the list command to display information about the complete bridge configuration or to display information about selected configuration parameters.

Syntax:

list
address

 
bridge

 
dmac

 
filtering . . .

 
mapping . . .

multiaccess

 
permanent . . .

 
port . . .

 
prot-filter . . .

 
protocol

 
range . . .

address addr value
Reads an address entry from the permanent database. The addr value is the MAC address of the required entry. It can be an individual address, multicast address, or broadcast address. Permanent databases are not destroyed by the power off/on process and are immune to the aging settings. Permanent entries cannot be replaced by dynamic entries.

Valid Values: X'0000 0000 0000' to X'FFFF FFFF FFFF'

Default Value: none

Example: list address 000000123456

             0000-00-12-34-56    PERMANENT  Input Port:  1
                                            Output ports:  1, 2
                                            Input port:  2
                                            Output ports:  3
             ASRT config>

Address
Address entry in 12-digit hexadecimal format.

Entry Type

Permanent
Indicates that the entry is permanent in nature and will survive power on/offs or system resets.

Reserved
Indicates that the entry is reserved by the IEEE 802.1d committee for future use. Frames destined to reserved addresses are discarded.

Registered
Indicates that the entry is meant for the bridge itself.

SAF
Appears after the entry type if source address filtering has been configured.

Input Port
Displays the numbers of the input port or ports associated with that address entry.

Output Port
Displays the numbers of the output port or ports associated with that address entry. Displays "NONE/DAF" to indicate that destination address filtering applies because no ports have been selected to be associated with that address entry.

bridge
Lists all general information regarding the bridge.

Example: list bridge

Source Routing Transparent Bridge Configuration
===============================================
 
Bridge:  ENABLED                        Bridge Behavior: ADAPTIVE SRT
                 +----------------------------+
-----------------| SOURCE ROUTING INFORMATION |---------------------------
                 +----------------------------+
Bridge Number:         0A               Segments:          2
Max ARE Hop Cnt:       14               Max STE Hop cnt:  14
1: N SRB:              Active           Internal Segment:  0xFF6
LF-bit interpret:      Extended
                 +-------------------+
-----------------| SR-TB INFORMATION |-----------------------------------
                 +-------------------+
SR-TB Conversion:       Enabled
TB-Virtual Segment:     0x107               MTU of TB-Domain:   1470
                 +------------------------------------+
-----------------| SPANNING TREE PROTOCOL INFORMATION |------------------
                 +------------------------------------+
Bridge Address:        Default          Bridge Priority:     32768/0x8000
SRB Bridge Address:    Default          SRB Bridge Priority: 32768/0x8000
STP Participation:     IEEE802.1d and IBM-8209
                 +-------------------------+
-----------------| TRANSLATION INFORMATION |-----------------------------
                 +-------------------------+
FA<=>GA Conversion:    Enabled                UB-Encapsulation:  Disabled
DLS for the bridge:    Enabled
IPX Conversion:        Enabled
Conversion Mode:       Automatic
Ethernet Preference:   IEEE-802.3        
                 +------------------+
-----------------| PORT INFORMATION |------------------------------------
                 +------------------+
Number of ports added:  3
Port:   1      Interface:     0      Behavior:   STB only    STB:  Enabled
Port:   2      Interface:     1      Behavior:   STB & SRB   STB:  Enabled
 Circuit number: 16
Port:   3      Interface:     2      Behavior:   STB & SRB   STB:  Enabled
Circuit number: 18
 

Bridge
Indicates current state of bridge. Values are ENABLED or DISABLED.

Bridge Behavior
Indicates method of bridging being used by that bridge. The values include STB for transparent, SRB for source routing, and ADAPTIVE SRT for source-routing transparent conversion bridging.

Bridge Number
The unique number identifying a bridge. It is used to distinguish between multiple bridges connecting the same two rings.

Segments
Indicates the number of source-routing bridge segments configured for the source-routing domain.

Max ARE/STE Hop cnt
The maximum hop count for frames transmitting from the bridge for a given interface associated with source routing bridging.

1:N SRB
Indicates the current state of 1:N Source Routing as ACTIVE or NOT ACTIVE.

Internal Segment
Displays the virtual segment number configured for 1:N SRB bridging.

LF-bit interpretation
Indicates the largest Frame (LF) bit encoding interpretation mode if source routing is enabled in this bridge. This is listed as either BASIC or EXTENDED.

SR-TB Conversion
Indicates whether the source routing/transparent bridge frame conversion function is enabled or disabled.

TB-Virtual Segment
Indicates the segment number of the transparent bridging domain.

MTU for TB-Domain
Specifies the maximum frame size (maximum transmission units) the transparent bridge can transmit and receive.

Bridge address
Bridge address specified by the user (if set).

Bridge priority
A high-order 2-octet bridge address found in the Bridge Identifier, either the MAC address obtained from the lowest-number port or the address set by the Set Bridge command.

STP Participation
Displays the types of spanning tree protocols in which the bridge participates.

FA-GA conversion
Indicates whether FA-GA conversion is enabled or disabled.

UB Encapsulation
Indicates whether UB Encapsulation is enabled or disabled.

DLS for the bridge
Indicates if the Data Link Switch protocol is enabled or disabled in the bridge.

IPX Conversion
Indicates whether IPX Conversion is enabled or disabled.

Conversion Mode
Indicates the IPX Conversion Mode as either automatic or manual.

Ethernet Preference
Indicates the preferred Ethernet frame type used for IPX Conversion as IEEE-802.3 or Ethernet.

Number of ports added
Number of bridge ports added to the bridging configuration.

Port Number
A user-defined number assigned to an interface by the Add Port command.

Interface Number
Identifies devices connected to a network segment through the bridge. You must add at least two interfaces to participate in bridging. An interface number of 255 is used for bridging.

Port Behavior
Indicates method of bridging being used by that port, STB for transparent bridging and SRB for source route bridging.

VPI
Specifies the VPI associated with the ATM port.

VCI
Specifies the VCI associated with the ATM port.

Circuit Number
Specifies the DLCI associated with the Frame Relay port.

dmac
Displays the configured options for the duplicate MAC address feature.

Example: list dmac

Duplicate MAC address feature is    ENABLED
Load balance feature is   DISABLED
Age value for Duplicate MAC address :000000C8
Duplicate MAC ADDRESSES CONFIGURED
==================================
10-00-5A-66-66-01
10-00-5A-66-66-02
10-00-5A-66-66-03
10-00-5A-66-66-04
10-00-5A-66-66-05
 

filtering datagroup-option
The following general data groups can be displayed under the list filtering command:

All
Displays all filtering database entries.

Ethertype
Displays Ethernet protocol type filter database entries.

SAP
Displays SAP protocol filter database entries.

SNAP
Displays SNAP protocol identifier filter database entries.

The following examples illustrate each of the list filtering display options.

Example 1: list filtering all

     Ethernet type 0800 is routed on ports 1
     IEEE 802.2 destination SAP 42 is routed on ports 1
     IEEE 802 SNAP PID 00-00-00-08-00 is routed on ports 2-3

Descriptors used in explaining how packets are communicated include:

Routed
Describes packets passed to routing forwarder to be forwarded.

Filtered
Describes packets that are administratively filtered setting protocol filters that you set.

Bridged and routed
This describes a protocol identifier for which there is a protocol entity within the system that is not a forwarder. For example a link level echo protocol. Unicast packets from this protocol are bridged or locally processed if being sent to a registered address. Multicast packets are forwarded and locally processed for a registered multicast address.

All of these descriptors also apply to ARP packets with this Ethertype.

Example 2:
list filtering ethertype
Ethernet type (in hexadecimal), 0 for all [0]? 0800
Ethernet type 0800 is routed on ports 1

Example 3:
list filtering sap
SAP (in hexadecimal), 100 for all [100]? 42
IEEE 802.2 destination SAP 42 is routed on ports 1

Example 4:
list filtering snap
SNAP Protocol ID, return for all [00-00-00-00-00]?
IEEE 802 SNAP PID 00-00-00-08-00 is routed on ports 2-3

mapping add-type type-field
Lists specific address mapping for a given protocol.

Example: list mapping SNAP

            PROTOCOL TYPE           GROUP ADDRESS           FUNCTIONAL ADDRESS
            =============           =============           ==================
            123456-7890             12-34-56-78-90-12       12:34:56:78:90:12

add-type
Choice of either DSAP, Ether (Ethernet), or SNAP.

type-field
Protocol type field:

  • Destination Service Access Point (DSAP) protocol type is entered in the range 1-FE (hexadecimal).

  • Ethernet (Ether) protocol type is entered in the range of 5DD-FFFF (hexadecimal).

  • Subnetwork Access Protocol (SNAP) protocol type is entered in 10-digit hexadecimal format.

multiaccess
Displays the aging time for entries in the multiaccess database and displays the multiaccess bridge ports. See the output of the list port command for a description of the bridge port parameters.

Example: list multiaccess

Aging time (in seconds): 300
 
Port ID (dec)    : 238:02, (hex): 80-02
Port State       : Enabled
STP Participation: Disabled
Port Supports    : Source Route Bridging Only
SRB: Segment Number: 0x003       MTU:  2040     STE: Enabled
Assoc Interface  : 1
Path Cost        : 0

permanent
Displays the number of entries in the bridge's permanent database.

Example: list permanent

            Number of Entries in Permanent Database:  17

port port#
Displays port information related to ports that are already configured. Port# selects the port you want to list. Specifying no number selects all ports.

Example: list port

Port Id (dec)    : 128: 5, (hex): 80-05
Port State       : Enabled
STP Participation: Enabled
Port Supports    : NO Bridging
Assoc Interface  : 1
Path Cost        : 0
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Port Id (dec)    : 128: 6, (hex): 80-06
Port State       : FORWARDING
STP Participation: Enabled
Port Supports: Source Routing Bridging Only
SRB: Segment Number:  Ox116     MTU:  1979
STE Forwarding:  Auto
Assoc Interface #/name : 1/FR/0   Circuit number 16
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Port Id (dec)    : 128: 7, (hex): 80-07
Port State       : FORWARDING
STP Participation: Enabled
Port Supports: Source Routing Bridging Only
SRB: Segment Number:  Ox117     MTU:  1979
STE Forwarding:  Auto
Assoc Interface #/name : 1/FR/0   Circuit number 17
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Port ID (dec)    : 128: 2, (hex): 80-02
Port State       : Enabled
STP Participation: Enabled
Port Supports    : Transparent Bridging Only
Assoc Interface  : 0  VPI  0  VCI:    78
Path Cost        : 0
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Port ID (dec)    : 128: 3, (hex): 80-03
Port State       : Enabled
STP Participation: Enabled
Port Supports    : Transparent Bridging Only
Assoc Interface  : 2
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 Port ID (dec)    : 128: 1, (hex): 80-01
 Port State       : Enabled
 STP Participation: Enabled
 Port Supports    : Transparent Bridging Only
 Assoc Interface  : 0  VPI:   0  VCI:   795
 Path Cost        : 0
 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 Port ID (dec)    : 128: 4, (hex): 80-04
 Port State       : Enabled
 STP Participation: Enabled
 Port Supports    : Transparent Bridging Only
 Assoc Interface  : 0  Dest ATM Addr: 391122334455667788990011223344
                                                           5566778899
 Path Cost        : 0
 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 

Port ID
The ID consists of two parts: the port priority and the port number. In the example, 128 is the priority, and 1, 2, and 3 are the port numbers. In hexadecimal format, the low-order byte denotes the port number and the high-order byte denotes the priority.

Port state
Displays current state of the specified port or ports. This can be either ENABLED or DISABLED.

Port supports
Displays bridging method supported by that port (for example, transparent bridging).

SRB
Displayed only when SRB is enabled and lists source routing bridging information. This includes the SRB segment number (in hex), the Maximum Transmission Unit size, and whether the transmission of spanning tree explorer frames is enabled or disabled.

Duplicate Frames Allowed
Displays a breakdown and count of the types of duplicate frames allowed.

Assoc interface
Displays interface number associated with the displayed port. Also displays the VPI/VCI or the destination ATM address if the port exists on an ATM interface.

Path Cost
Cost associated with the port which is used for possible root path cost. The range is 1 to 65535.

prot-filter port#
Reads a current list of the filter protocol types. Filters can be listed selectively by port or all ports can be displayed at once. Port# selects the bridge port that you want to list.

Example: list prot-filter 1

            PORT 1
            Protocol Class   :  DSAP
            Protocol Type    :  01
            Protocol State:  :  Filtered
            Port Map         :  1, 2, 3

Port Number
Port number is displayed for each port if all ports are selected to be displayed.

Protocol Class
Displays protocol class (SNAP, Ether, or DSAP).

Protocol Type
Displays protocol ID in hexadecimal format.

Protocol State
Denotes that protocol is being filtered for selected port.

Port Map
Displays the numbers of the ports where this type of protocol filter is present.

protocol
Displays bridge information related to the spanning tree protocol.

Example: list protocol

IEEE 802.1d Spanning Tree Configuration:
 Bridge Identifier                : 32768/000000000000 (using port address)
 Bridge-Max-Age (in seconds)      : 20
 Bridge-Hello-Time (in seconds)   : 2
 Bridge-Forward-Delay (in seconds): 15
 
SRB Spanning Tree Configuration:
 Bridge Identifier                : 32768/000000000000 (using port address)
 Bridge-Max-Age (in seconds)      : 20
 Bridge-Hello-Time (in seconds)   : 2
 Bridge-Forward-Delay (in seconds): 15
 
Note:Each of these bridge-related parameters is also described in detail in the previous chapter.

Bridge Identifier
8-byte value in ASCII format. If you did not set the bridge address prior to displaying this information, the low order 6 bytes will be displayed as zero, denoting that the default MAC address of a port is being used. When a bridge has been selected as the root bridge, the bridge max age and bridge hello time are transmitted by it to all the bridges in the network via the HELLO BPDUs.

Bridge-Max-Age
Maximum age (period of time) that should be used to time out spanning tree protocol-related information.

Bridge-Hello-Timer
Time interval between HELLO BPDUs.

Bridge-Forward-Delay
Time interval used before changing to another state (should this bridge become the root).

range start-index stop-index
Reads a range of address entries from the permanent database. To specify this, first determine the size of the database by using the list permanent command. From this value you can then determine a "start index" value for your entry range. The start index is in the range from 1 to the size of the database. You can then choose a "stop index" for displaying a limited number of entries. This input is optional. If you do not specify the stop index, the default value is the size of the database.

Address entries contain the following information:

Example: list range

       Start-Index [1]? 1
       Stop-index [17]? 6
       ADDRESS                 ENTRY TYPE      PORT MAP
 
       =======                 ==========      ========
       01-80-C2-00-00-00       REGISTERED      Input Port:  ALL PORTS
                                               Output ports:
 
       01-80-C2-00-00-01       RESERVED        NONE/DAF
       01-80-C2-00-00-02       RESERVED        NONE/DAF
       01-80-C2-00-00-03       RESERVED        NONE/DAF
       01-80-C2-00-00-04       RESERVED        NONE/DAF
       01-80-C2-00-00-05       RESERVED        NONE/DAF

Address
6-byte MAC address of the entry.

Type of Entry
Specifies one of the following types:

  • Reserved - entries reserved by the IEEE 802.1d committee

  • Registered - entries consist of unicast addresses belonging to proprietary communications hardware attached to the box or multicast addresses enabled by protocol forwarders

  • Permanent - entries entered by the user in the configuration process which survive power on/offs or system resets

  • Static - entries entered by the user in the monitoring process that do not survive power on/offs or system resets and are ageless

  • Dynamic - entries "learned" by the bridge "dynamically" that do not survive power on/offs or system resets and that have an "age" associated with the entry

  • Free - locations in database that are free to be filled by address entries

Port Map
Displays outgoing port map for all incoming ports.

NetBIOS

Displays the NetBIOS configuration prompt. Enter netbios at the ASRT config> prompt to display the NetBIOS configuration prompt. See "NetBIOS Commands" for an explanation of each of the NetBIOS configuration commands.

Syntax:

netbios

Example:
netbios
NetBIOS Support User Configuration
NetBIOS config>
Note:If you have not purchased the NetBIOS filtering feature, you will receive the following message if you use this command:
         NetBIOS Filtering is not available in this load.

Set

Use the set command to set certain values, functions, and parameters associated with the bridge configuration. These include:

Syntax:

set
age

 
bridge

conversion-mode

ethernet-preference

 
dmac-age

filtering

 
lf-bit-interpretation . . .

 
maximum-packet-size . . .

multiaccess-age . . .

 
port

 
protocol bridge

 
protocol port . . .

 
route-descriptor-limit . . .

age seconds resolution
Sets the time for aging out dynamic entries in the filtering database when the port with the entry is in the forwarding state. This age is also used for aging RIF entries in the adaptive database in the case of an SR-TB bridge personality.

Enter the required value after each prompt and press Return.

Aging Time Valid Values: 10 to 1000000

Aging Time Default Value: 30

The resolution value specifies how often dynamic entries in the filtering database should be scanned to determine if they have exceeded their age limit as set by the aging timer.

Resolution Valid Values: 1 to 60 seconds

Resolution Default Value: 5 seconds

Example: set age

            seconds [300]  ?  400
            resolution [5] ?  6

bridge bridge-address
Sets the bridge address. This is the low-order 6-octet bridge address found in the bridge identifier. By default, the bridge-addr-value is set to the medium access control (MAC) address of the lowest-numbered port at initialization time. You can use this command to override default address and enter your own unique address.

Enter srb or tb to specify whether the source routing bridge (srb) or transparent bridge (tb) bridge address is to be affected.
Note:Each bridge in the network must have a unique address for the spanning tree protocol to operate correctly.
Attention:In cases where a serial line interface (or tunnel) is the lowest numbered port, it is mandatory to use this command so that the bridge will have a unique address when restarted. This process is necessary because serial lines do not have their own MAC address.

At the prompt, enter the bridge address in 12-digit hexadecimal format and press Return.

If you enter the address in the wrong format you will receive the message Illegal Address. If you enter no address at the prompt you will receive the message Zero length address supplied and the bridge will maintain its previous value. To return the bridge address to the default value, enter an address of all zeros.

Valid Values: 12 hexadecimal digits

Do not use dashes or colons to separate each octet. Each bridge in the network must have a unique address for the spanning tree protocol to operate correctly.

Default Value: 000000000000

Example: set bridge

            Bridge Address (in 12-digit hex)[]?

conversion-mode mode
Specifies the IPX conversion mode as either automatic or manual.

mode
When the conversion mode is set to automatic, the IPX frame type of each Ethernet/802.3 end-station is learned and stored in the filtering database and will be used on subsequent conversions to the Ethernet/802.3 MAC format. The Ethernet Preference parameter determines which IPX frame type to use when converting to the Ethernet /802.3 MAC format if one has not yet been learned.

When the Conversion Mode is set to manual, the value of the Ethernet Preference parameter specifies on which Ethernet/802.3 IPX frames the conversion is to be preformed.

Conversion-Mode Valid Values: automatic or manual

Conversion-Mode Default Value: automatic

Example: set conversion-mode manual

ethernet-preference preference
Specifies the preferred IPX frame type as either IEEE-802.3 or Ethernet.

preference
When the Conversion Mode is set to automatic, the IPX frame type of each Ethernet/802.3 end-station is learned and stored in the filtering database and will be used on subsequent conversions to the Ethernet/802.3 MAC format. The Ethernet Preference parameter determines which IPX frame type to use when converting to the Ethernet /802.3 MAC format if one has not yet been learned.

When the Conversion Mode is set to manual, the value of the Ethernet Preference parameter specifies on which Ethernet/802.3 IPX frames the conversion is to be preformed.

Ethernet-Preference Valid Values: ieee-802.3 or ethernet

Ethernet-Preference Default Value: ieee-802.3

Example: set ethernet-preference ethernet

dmac-age seconds
Sets the time for aging out RIF entries in the RIF table for duplicate MAC addresses. This value will be used for only the learned duplicate MAC addresses. For all other addresses, the value from the set age command will be used for aging.

Enter the desired value after each prompt and press Return.

DMAC Aging Time Valid Values: 10 to 1000000

DMAC Aging Time Default Value: 300

Example: set dmac-age

seconds [300]? 200
ASRT config>list dmac
Duplicate MAC address feature is   DISABLED
Load balance feature is   DISABLED
Age value for Duplicate MAC address :000000C8
Duplicate MAC ADDRESSES CONFIGURED
==================================
10-00-5A-66-66-01
10-00-5A-66-66-02
10-00-5A-66-66-03
10-00-5A-66-66-04
10-00-5A-66-66-05

filtering database-size
Sets the number of entries that can be held in the bridge filtering database.

Default Value: 1024 times the number of bridge ports.

For more information, see the list filtering command on page ***.

Example: set filtering

            database-size [2048]?

lf-bit-interpretation encode-mode
Sets the Largest Frame (LF) bit encoding interpretation if source routing is enabled in this bridge.

Example: set lf-bit-interpretation basic

Encode-mode
Entered as either basic or extended. In the basic mode only 3 bits of the routing control field are used. This is the common practice in source routing bridges that exist today. In extended mode, 6 bits of the routing control field are used to represent the maximum data unit that the bridge supports. The default value is extended. Extended and Basic nodes are compatible.

maximum-packet-size port# msdu-size
Sets the largest MAC service data unit (MSDU) size for the port, if source routing is enabled on this port. The MSDU value setting has no implication on traditionally transparent media. An MSDU value greater than the packet size configured in the device will be treated as an error.

If this parameter is not set, the default value used is the size configured as the packet size for that interface.

Valid Values: Specify an integer in the range 16 to 65535

Default Value: packet size set for the port

Example: set maximum-packet-size 1 4399

multiaccess-age seconds
Sets the time for aging out entries in the multiaccess database. The database is scanned at the rate set by the resolution parameter of the set age command.

Valid values: 1 to 1 000 000

Default value: 300

Example: set multiaccess-age

seconds [300]? 500

port block or disable
Begins the port's participation in the spanning tree protocol. This is done by entering a status value of "block." This places the port in the "blocked" status as a starting point. The actual state of the port will later be determined by the spanning tree protocol as it determines its topology. Entering a status value of "disable" removes the port from participating in the spanning tree.

Example: set port block

            Port Number [1]?

protocol bridge or port
Modifies the spanning tree protocol bridge or port parameters for a new configuration, or tunes the configuration parameters to suit a specific topology.

Enter "bridge" as the option to modify bridge parameters. The bridge-related parameters that can be modified with this command are described below.

Enter srb or tb to specify whether the source routing bridge (srb) or transparent bridge (tb) spanning tree protocol parameters are to be affected.

When setting these values, make sure that the following relationships exist between the parameters or the input will be rejected:
2 X (Bridge Forward Delay - 1 second) >= Bridge Maximum Age
Bridge Maximum Age >= 2 X (Bridge Hello Time + 1 second)

Example: set protocol bridge tb

            Bridge Max-Age [20]  25
            Bridge Hello Time [2]   3
            Bridge Forward Delay [15] 20
            Bridge Priority [32768]    1

Bridge Maximum Age
Maximum age (period of time) that should be used to time out spanning tree protocol-related information.

When this bridging device is selected as the root bridge in a spanning tree, the value of this parameter specifies how long other active bridges are to store the configuration bridge protocol data units (BPDUs) they receive. When a BPDU reaches its maximum age limit without being replaced, the active bridges in the network discard it and assume that the root bridge has failed. A new root bridge is then selected.

Dependencies

The setting of this parameter may be affected by the setting of the Bridge Hello Time parameter. In addition, the setting of this parameter may affect the setting of the Bridge Forward Delay parameter.

Valid Values: 6 to 40 seconds

Default Value: 20 seconds

Bridge Hello Timer
Time interval between HELLO BPDUs.

When this bridging device is selected as the root bridge in a spanning tree, this parameter specifies how often this bridge transmits configuration bridge protocol data units (BPDUs). BPDUs contain information about the topology of the spanning tree and reflect changes to the topology.

Dependencies

The setting of this parameter may affect the setting of the Max age parameter.

Valid Values: 1 to 10 seconds

Default Value: 2

Bridge Forward Delay
Time interval used before changing to another state (should this bridge become the root).

When this bridging device is selected as the root bridge in a spanning tree, the value of this parameter specifies how long active ports in all bridges remain in a listening state. When the forward delay time expires, ports in the listening state go into the forwarding state. State changes occur as a result of changes in the topology of the spanning tree, such as when an active bridge fails or is shut down.

The root bridge conveys this value to all bridges. This process ensures that all bridges are consistent between changes.

Dependencies

The setting of this parameter may be affected by the setting of the SRB Bridge Max Age parameter.

Valid Values: 4 to 30 seconds

Default Value: 15

Bridge Priority
A high-order 2-octet bridge address found in the Bridge Identifier - either the MAC address obtained from the lowest-numbered port or the address set by the Set Bridge command.

The bridge priority indicates the chances that this bridge will become the root bridge of the spanning tree. The lower the numerical value of the bridge priority parameter, the higher the priority of the bridge and the more likely it is to be chosen. The spanning tree algorithm chooses the bridge with the lowest numerical value of this parameter to be the root bridge.

Valid Values: 0 to 65535

Default Value: 32768

Enter port as the option to modify the spanning tree protocol port parameters. Enter the desired value at each prompt and press Return.

Example: set protocol port

            Port Number [1] ?
            Port Path-Cost (O for default) [0] ?   1
            Port Priority [128] ?   1

Port Number
Bridge port number; selects the port for which the path cost and port priority will be changed.

Path Cost
Cost associated with the port, which is used for possible root path cost.

Each port interface has an associated path cost, which is the relative value of using the port to reach the root bridge in a bridged network. The spanning tree algorithm uses the path cost to compute a path that minimizes the cost from the root bridge to all other bridges in the network topology.

This parameter specifies the cost associated with passing frames through this port interface, should this bridging device become the root bridge. Factor this value in when determining spanning tree routes between any two stations. A value of 0 instructs the bridging device to automatically calculate a path cost for this port using its own formula.

Valid Values: 1 to 65535

Default Value: 0 (means the cost will be calculated automatically)

Port Priority
Identifies port priority for the specified port. This is used by the spanning tree algorithm in making comparisons for port selection (which port offers the lowest cost path to the root bridge) and blocking decisions.

Valid Values: 0 to 255

Default Value: 128

route-descriptor-limit limit-type
Allows the user to associate a maximum Route Descriptor (RD) length for all route explorer (ARE) or spanning tree explorer (STE) frames forwarded by the bridge if source routing is enabled.

Example: set route-descriptor-limit ARE

Limit-type
Entered either as ARE or STE, depending on whether the RD-limit-value is applied to all route explorer (ARE) or spanning tree explorer (STE) frames. You will then be prompted for an RD-limit-value.

RD-limit-value
Specifies the maximum number of RDs that might be contained in the routing information field (RIF) of the frame type specified by the RD limit type.

The hop count for each frame is the number of bridges through which the frame has traveled so far. One RD is added to the Routing Information Field each time the frame passes through a bridge. Therefore, the number of RDs equals the number of hops. When the number of RDs (hops) exceeds the number of hops allowed by this parameter, the frame is discarded.

Valid Values: 0 to 14

Default Value: 14

Tunnel

Use the tunnel command to access the Tunnel configuration prompt. Tunnel configuration commands are entered at this prompt. See "Tunnel Configuration Commands" for an explanation of each of these commands.

Syntax:

tunnel

BAN Configuration Commands

This section describes all of the BAN (boundary access node) configuration commands. These commands let you configure BAN as an added feature to ASRT bridging or to DLSw.
Note:The BAN configuration commands are not effective immediately. They remain pending until you reload the device.

Configuration commands are entered at the BAN config> prompt. This prompt is accessed by entering the ban command at the ASRT config> or the DLSw config prompt. Table 6 shows the BAN configuration commands.

Table 6. BAN Configuration Commands
Command Function
? (Help) Displays all the commands available for this command level or lists the options for specific commands (if available). See "Getting Help".
Add Adds a BAN port.
Delete Deletes a BAN port.
List Displays all information concerning BAN ports.
Exit Returns you to the previous command level. See "Exiting a Lower Level Environment".

Response to BAN Configuration Commands

The BAN configuration (Talk 6) commands are not effective immediately. They remain pending until you issue the reload command.

Add

Use the add command to add a BAN port to the BAN configuration. If a port number is not supplied with the command, you are prompted for the port number.

Syntax:

add
port#

Example: add

            Port Number [0]? 3.
            Enter the BAN DLCI MAC Address []? 400012345678
            Enter the Boundary Node Identifier MAC Address [4FFF00000000]?
            Do you want the traffic bridged (b) or DLSw terminated (t) (b/t) [b]

Delete

Use the delete command to delete a BAN port from the BAN configuration. If a port number is not supplied with the command, you are prompted for the port number.

Syntax:

delete
port#

Example: delete 3

List

Use the list command to list information about all BAN ports. The information that is displayed includes the BAN port number, the MAC address for the BAN DLCI, and whether the frames handled by the port are bridged or the LLC is terminated by DLSw.

Syntax: list

list

Example: list

            bridge  BAN                Boundary           bridged or
            port    DLCI MAC Address   Node Identifier    DLSw terminated
            2       40:00:11:22:33:44  4F:FF:00:00:00:00  bridged
            3       40:00:55:66:77:88  4F:FF:00:00:00:00  bridged

Tunnel Configuration Commands

This section describes the Tunnel configuration commands. The Tunnel configuration commands allow you to specify network parameters for a tunnel that transmits bridging frames over IP.
Note:The tunnel configuration commands are not effective immediately. You must reload the device before they become effective.

Configuration commands for the tunnel are entered at the TNL config> prompt. This prompt is accessed by entering the tunnel command at the ASRT config> prompt. Table 7 shows the tunnel configuration commands.

Table 7. Tunnel Configuration Commands
Command Function
? (Help) Displays all the commands available for this command level or lists the options for specific commands (if available). See "Getting Help".
 Add   Adds the IP address of destination bridges participating in an IP unicast or multicast addressing configuration for bridging over IP. 
 Delete   Deletes the IP address of a destination bridge participating in an IP unicast or multicast addressing configuration for bridging over IP. 
 Join   Configures the device as a member of one or more multicast groups. 
 Leave   Removes the device as a member of multicast groups. 
 List   Displays the IP addresses of end-stations participating in an IP unicast or multicast addressing configuration for bridging over IP. Also displays the size (in number of bytes) of bridging packets being routed through an IP tunnel and whether or not multicast addressing is enabled or disabled. 
 Set   Sets a base multicast IP address for multicast tunneling on the device. 
Exit Returns you to the previous command level. See "Exiting a Lower Level Environment".

Response to Tunnel Configuration Commands

The tunnel configuration (Talk 6) commands are not effective immediately. They remain pending until you issue the reload command.

Tunneling and Multicast Packets

The bridging tunnel can be defined as either a unicast tunnel or a multicast tunnel. To define a unicast tunnel, use the add command to configure the IP address of the tunnel's endpoint. To define a multicast tunnel, use the set and join commands. For tunnel configurations where multicast packets are involved, the source address of the multicast packets must lie on a network segment that is capable of the Internet Group Management Protocol (IGMP).

IGMP is not defined on some interfaces such as ATM, X.25 and Frame Relay. This means that when you define a multicast tunnel on the device (for example, the MOSPF tunnel), you must ensure that one of the following conditions exists:

The first condition can be ensured by using the IP set router-id configuration command. The second condition can be ensured by using the IP set internal-ip-address configuration command.

In all cases, the second option is preferred and the first should be used only if some of the devices in the network do not like host addresses (this would happen in mixed vendor networks).

Add

Use the add command to add the IP address of end stations participating in a unicast IP addressing configuration.

For IP unicast addressing, the tunneling configuration requires that you supply IP addresses of destination bridges. This record will be used by the device software to convert the segment number in the routing information field (RIF) in a source-routed frame to the corresponding IP address of the destination bridge. For transparent bridging frames, it identifies the other endpoint of the tunnel.

Syntax: add

address
IP-address

Valid Values: a valid IP address

Default Value: none

Example: add address 128.185.144.37

Delete

Use the delete command to delete the IP address of bridges participating in a unicast or multicast IP addressing configuration.

Syntax:

delete
address IP-address

Valid Values: a valid IP address

Default Value: none

Example: delete address 128.185.144.37

Join

Use the join command to establish the device as a member of one or more multicast groups. A tunnel group may be one of three types: peer, client, or server. The tunnel group is defined by an integer tag. A bridge can belong to only one group type for each tag. A bridge cannot belong to both peer group 1 and server group 1, for example.

Syntax:

join
client-group group-number

 
peer-group group-number

 
server-group group-number

client-group group-number
Joins the client group with the given group number.

Valid Values: 0 to 64

Default Value: 0

Example: join client-group 3

peer-group group-number
Joins the peer group with the given group number.

Valid Values: 0 to 64

Default Value: 0

Example: join peer-group 5

server-group group-number
Joins the server group with the given group number.

Valid Values: 0 to 64

Default Value: 0

Example: join server-group 7

Leave

Use the leave command to remove the device as a member of multicast groups.

Syntax:

leave
server-group group-number

 
client-group group-number

 
peer-group group-number

server-group group-number
Leaves the server group with the given group number.

Valid Values: 0 to 64

Default Value: 0

Example: leave server-group 7

client-group group-number
Leaves the client group with the given group number.

Valid Values: 0 to 64

Default Value: 0

Example: leave client-group 3

peer-group group-number
Leaves the peer group with the given group number.

Valid Values: 0 to 64

Default Value: 0

Example: leave peer-group 5

List

Use the list tunnel command to display the IP addresses of bridges participating in an IP unicast or multicast addressing configuration for tunneling over IP. This command can also be used to display the current size of IP packets being sent through the tunnels and displays, whether or not IP is enabled or disabled.

Syntax:

list
address

 
all

address
Lists the IP addresses of bridges participating in an IP unicast or multicast addressing configuration for tunneling over IP.

Example: list address

            IP Tunnel Addresses
            128.185.179.51      128.185.170.51      128.185.142.39
            128.185.143.39       224.0.0.5

all
Lists all unicast IP addresses, configured multicast addresses, and the tunnel packet size.

Example: list all

            IP Tunnel Addresses
            128.185.179.51      128.185.170.51      128.185.142.39
            128.185.143.39       224.0.0.5
            Frame size for the tunnel 2120

Set

Use the set command to set the base multicast address of the device.

For IP multicast addressing, the tunneling configuration requires only the IP multicast address reserved for tunneling. Encapsulation uses three groups of IP multicast addresses. The first group is for sending all-routes explorer (ARE) frames, the second group for sending spanning tree explorer (STE) frames, and the third group for specifically routed frames (SRF).

Syntax:

set
base-multicast-address

base-multicast-address

Sets the base multicast IP address for multicast tunneling.

Valid Values: any valid class D IP address with the last two bytes set to 0.

Default Value: 224.186.0.0

Example: set base-multicast-address 224.10.0.0


Frame Relay Commands

To enable bridging over the Frame Relay interface, you must associate a DLCI number (also called a circuit number) with a bridge port. This is referred to as a Frame Relay point-to-point bridge port. You can also define a multiaccess bridge port associated with the Frame Relay interface itself. For further information, see "Configuring Multiaccess Bridge Ports".

Once a bridge port is configured, all the functions associated with bridge ports, including protocol filtering and address filtering are available.

For each Frame Relay point-to-point bridge port, you must specify either PVC or SVC. For PVC support you must specify the associated DLCI number. For SVC support, you must provide the SVC circuit name.

Response to Frame Relay Configuration Commands

The Frame Relay configuration (Talk 6) commands are not effective immediately. They remain pending until you issue the reload command.

At the ASRT config> prompt, use the following command to enable bridging for a Frame Relay circuit:

add port interface# port# circuit-id

interface#
The interface number of the Frame Relay interface.

port#
The unique bridge-specific number associated with the circuit.

Valid Range: 1 to 254

Default Value: none

circuit-id
The DLCI number for the PVC on which bridging is being enabled or the circuit name of the SVC on which bridging is being enabled.

The command associates a port number with the Frame Relay PVC identified by the circuit number or the Frame Relay SVC identified by the circuit name and enables that circuit's participation in transparent bridging.

Example: add a port on a Frame Relay interface (PVC)
 
ASRT config> add port
Interface Number [0]? 5
Port Number [7]? 7
Use FR PVC? [Yes]: yes
Frame Relay Circuit number [16]? 17

Example: add a port on a Frame Relay interface (SVC)
ASRT config> add port
Interface Number [0]? 5
Port Number [8]? 8
Use FR PVC? [Yes]: no
Frame Relay SVC Circuit Name []? 05svc020

ATM Commands

To enable bridging over the ATM interface, you must associate a VCC with a bridge port.

Once a bridge port is configured, all the function associated with bridge ports, including protocol filtering and address filtering are available.

You need to specify PVC or SVC support. For PVC support, you must specify the VPI and VCI of the PVC. For SVC support, you must provide the remote ATM address and the local selector byte.

At the ASRT config> prompt, use the following command to enable bridging on the ATM interface:

add port interface# port# VCC-id

interface#
The interface number of the ATM interface.

port#
The unique bridge-specific number associated with the VCC.

Valid Range: 1 to 254

Default Value: none

Once the port has been added on the ATM interface, the port number will identify the port to the ATM ARP client and to the VCC associated with this port.

See "Using ARP" for ATM ARP client configuration information.

vcc-id
To define a PVC, provide the VPI and VCI information. To define a SVC, provide the destaddr and selector information.

VPI
The VPI of the PVC on which bridging is enabled.

VPI Valid Values: 0 to 255

VPI Default Value: 0

VCI
The VCI of the PVC on which bridging is enabled.

VCI Valid Values: 0 to 65535

VCI Default Value: 0

destaddr
The destination ATM address of the SVC.

Destination ATM address Valid Values: any valid 20-byte ATM address

Destination ATM address Default Value: none

selector
The selector of the destination ATM address of the SVC.

Selector Valid Values: X'00' - X'FF'

Selector Default Value: X'00'

Example: add a port on an ATM interface (PVC)

ASRT config> add port
Interface number [0]?
Port number [1]?
Use PVC? [Yes]:
VPI, Range 0..255 [0]? 0
VCI, Range 0..65535 [0]? 795
 
 

Example: add a port on an ATM interface (SVC)

ASRT config> add port
Interface number [0]?
Port number [2]?
Use PVC? [Yes]:No
Destination ATM Address []? 3911223344556677889900112233445566778899
Selector, Range 00..FF [00]? 0A
ASRT config>
 

Accessing the ASRT Monitoring Environment

To access the ASRT monitoring environment, enter the protocol asrt command at the + (GWCON) prompt:

          +protocol asrt
          ASRT>

ASRT Monitoring Commands

This section describes the ASRT monitoring commands. These commands allow you to view and modify parameters from the active monitoring. Information you modify with the monitoring commands is reset to the SRAM configuration when you restart the bridging device.

You can use these commands to temporarily modify the configuration without losing configuration information in the bridge memory. The ASRT> prompt is displayed for all ASRT monitoring commands.

Monitoring commands for NetBIOS are entered at the NetBIOS> monitoring prompt. The NetBIOS prompt

is a subset of the major ASRT commands and is accessed by entering the ASRT netbios command explained later in this chapter.

Monitoring commands for NetBIOS are entered at the NetBIOS> monitoring prompt. The NetBIOS-filtering prompt

is a subset of the major ASRT commands.
Note:For commands requiring you to enter MAC Addresses, the addresses can be entered in the following formats:
IEEE 802 canonical bit order
00-00-00-12-34-56
IEEE 802 canonical bit order (shorthand format)
000000123456
IBM Token-Ring native bit order (noncanonical)
00:00:00:12:34:56

Table 8 shows the ASRT monitoring commands.

Table 8. ASRT Monitoring Commands Summary
Command Function
? (Help) Displays all the commands available for this command level or lists the options for specific commands (if available). See "Getting Help".
 Add   Adds permanent (static) address entries to the bridging device's permanent database. 
 BAN  Allows you to access the boundary access node (BAN) monitoring prompt for entering specific BAN monitoring commands. See Table 9 for a detailed description.
 Cache   Displays cache entries for a specified port. 
 Delete   Deletes MAC addresses entries from the bridging device database. 
 Flip   Flips MAC address from canonical to 802.5 (noncanonical or IBM) bit order. 
 List   Displays information about the complete bridge configuration or about selected configuration options. 
 NetBIOS   Displays the NetBIOS monitoring prompt. 
Exit Returns you to the previous command level. See "Exiting a Lower Level Environment".

Add

Use the add command to add static address entries and destination address filters to the bridging device's database. These additions to the database are lost when you restart the device.

Syntax:

add
destination-address-filter

 
static-entry

destination-address-filter mac_address
Adds a destination address filter to the bridging device's permanent database. Enter the command followed by the MAC address of the entry.

Example: add destination-address-filter

            Destination MAC address [00-00-00-00-00-00]?

static-entry mac_address input_port [output_ports]
Adds static address entries to the bridging device's permanent database. Enter the command followed by the MAC address of the static entry and the input port number (an optional output port number may also be entered). To create a static entry with multiple port maps (1 per input port), use this command several times.

Example: add static-entry

            MAC address [00-00-00-00-00-00]?  400000012345
            Input port, 0 for all [0]? 2
            Output port, 0 for none [0]? 3
            Output port, 0 to end [0]?

BAN

Use the ban command to access the BAN (Boundary Access Node) monitoring prompt. Enter the ban command from the ASRT> prompt.

Syntax: ban

Example: ASRT>ban

            BAN>

Once you access the BAN monitoring prompt, you can begin entering specific monitoring commands. To return to the ASRT> prompt at any time, enter the exit command.

Cache

Use the cache command to display the contents of a selected bridging-port routing cache. If the port does not possess a cache you will see the message Port X does not have a cache.

Syntax:

cache port#

Example: cache

            Port number [1]? 3
 
            MAC Address    MC*   Entry Type       Age  Port(s)
 
            00-00-93-00-C0-D0   PERMANENT          0  3 (TKR/1)
            00-00-00-11-22-33   STATIC             0  3 (TKR/1)

MAC Address
6-byte MAC address of the entry.

Entry Type
Specifies one of the following address entry types:

Reserved - entries reserved by the IEEE 802.1d Standard.

Registered - entries consist of unicast addresses belonging to proprietary communications hardware attached to the box or multicast addresses enabled by protocol forwarders.

Permanent - entries entered by the user in the configuration process which survive power on/offs or system resets.

Static - entries entered by the user in the monitoring process which do not survive power on/offs or system resets and are not effected by the aging timer.

Dynamic - entries "learned" by the bridge "dynamically" which do not survive power on/offs or system resets and which have an "age" associated with the entry.

Free - locations in database that are free to be filled by address entries.

Unknown - entry types unknown to the bridge. May be possible bugs and/or illegal addresses.

Age
Age in seconds of each dynamic entry. Age is decremented at each resolution intervals.

port(s)
Specifies the port number associated with that entry and displays the interface name (this will always be that of the interface having the cache).

Delete

Use the delete command to delete station (including MAC) address entries from the device's permanent database.

Syntax:

delete mac-address

Example: delete 00-00-93-10-04-15

Flip

Use the flip command to view specific MAC addresses in the canonical and noncanonical format by "flipping" the address bit order. This command is useful for translating IEEE 802.5 addresses in their typical noncanonical format to the canonical format universally used by the bridge monitoring and ELS (and vice versa).

Syntax:

flip MAC-address

Example: flip

            MAC address [00-00-00-00-00-00]? 00-00-00-33-44-55
            IEEE 802 canonical bit order:    00-00-00-33-44-55
            IBM Token-Ring native bit order: 00:00:00:CC:22:AA

List

Use the list command to display information about the bridging device configuration or to display information about selected configuration or bridging options.

Syntax:

list
adaptive . . .
 
bridge . . .
 
conversion . . .
 
database . . .
 
dmac
 
filtering . . .
multiaccess-database . . .
 
port
 
source-routing . . .
 
spanning-tree-protocol . . .
 
transparent . . .
 
tunnel . . .

adaptive datagroup-option [sub-option]
Lists all general information regarding the SR-TB bridge which converts between types of bridging. There are a number of general datagroup options which may be displayed under list adaptive. These include the following:

Example: list adaptive config

            Adaptive bridge:            Enabled
            Translation database size:  0
            Aging time:                 320 seconds
            Aging granularity           5 seconds
 
         Port  Segment  Interface   State     MTU
            1  001      TKR/1      Enabled   2052
            -  002      Adaptive   Enabled   1470
 

Adaptive bridge
Shows the current state of the SR-TB adaptive bridge. This value is displayed as either Enabled or Disabled.

Translation database size
Displays the current size of the SR-TB database, which contains MAC addresses and associated RIFs for the source-routing domain.

Aging time
Displays the aging timer setting in seconds. All SR-TB RIF database entries which exceed this time limit are discarded.

Aging granularity
Displays how often entries are scanned to look for expiration according to the aging timer.

Port
Displays the number of a port associated with conversion bridging.

Segment
Displays the source routing segment number assigned to the port associated with conversion bridging.

Interface
Identifies the device connected to a conversion bridge network segment.Also, displays the VPI/VCI if an ATM port and the DCI if a Frame Relay port.

State
Indicates the current state of the conversion bridge port.

MTU
Specifies the maximum frame size (from the end of the RIF to the beginning of the FCS) that the conversion bridge can transmit and receive.

Example:

list adaptive counters
Hash collision count: 28
Adaptive database entry count: 0
Adaptive database overflow  count: 0

Hash Collision Count
Displays number of addresses that were stored (hashed) to the same location in the hash table. This number is accumulative and reflects the total number of hash collision incidents that occurred. Increases in this number may indicate a potential table size problem.

Adaptive Database Entry Count
Displays the number of entries currently stored in the adaptive bridge database.

Adaptive Database Overflow Count
Displays the number of times that an address was overwritten as the conversion database table ran out of table space.

The database option of the list adaptive command lets you select certain portions of the adaptive bridge RIF database to display. This is due to the potential size of the database. The display options include the following:

  • Address - Displays the conversion bridge database related to that specific MAC address

  • All - Displays the entire database.

  • Port - Displays all conversion bridge entries a specific port.

  • Segment - Displays all conversion bridge entries associated with the port having the specified segment number.

The following examples illustrate each of the list adaptive database command options.
Note:These are only displayed if adaptive bridging is enabled.

Example: list adaptive database address mac-address

Example: list adaptive database all

Example: list adaptive database port segment#

Example: list adaptive database segment segment#

Each entry is displayed on two lines followed by a blank line. The following information is displayed for each entry:

Canonical address
Lists the MAC address of the node corresponding to this entry. This is displayed in IEEE 802 canonical (hexadecimal) format.

Interface
Displays the name of the network interface that learned this entry.

Port
Displays the port number of the port that learned this address entry.

Seg
Displays the number of the segment that learned this address.

Age
Displays the entry age in seconds.

RIF Type
Displays the RIF type as SRF, STE, or ARE.

RIF Direction
Displays the RIF direction as Forward or Reverse.

RIF Length
Displays the RIF length in bytes.

RIF LF
Displays the largest frame value encoded in the RIF.

IBM MAC Address
Shows the MAC address of the node corresponding to this entry. This is displayed in the "IBM" noncanonical bit order as typically labeled on 802.5 interfaces and used by the IP/ARP, IPX, and NetBIOS protocols.

RIF
Displays the Routing Information Field learned from this node.

adaptive database duplicate
Lists database entry of all duplicate MAC addresses. It displays primary and secondary RIFs for each duplicate MAC address.

Example: list adaptive database duplicate


Canonical Address  Interface  Port  Seg    Age  RIF: Type Direct   Length  LF IBM MAC Address    RIF
 
08-00-5a-ee-ee-ee  TKR/0         3  001    180       SRF  Forward  14  1470 90:00:5a:77:77:77  0e10fef0dcab001b960395029001  PRI. RIF(3)
 
                   TKR/2         5  003    185       SRF  Reverse  14  1470                    0c9070087109003bdcabfef00000  SEC. RIF(3)
 

bridge
Lists all general information regarding the bridge device configuration.

Example: list bridge

Bridge ID (prio/add):  32768/10-00-5A-63-01-00
Bridge state:          Enabled
UB-Encapsulation:      Disabled
Bridge type:           STB
Number of ports:       2
STP Participation:     IEEE802.1d
IPX Conversion:        Enabled
Conversion Mode:       Automatic
Ethernet Preference:   IEEE-802.3
**Bridge is enabled for Data Link Switching**
 
                                                      Maximum
Port  Interface      State  MAC Address         Modes   MSDU   Segment Flags
 
   1  Eth /0            Up  10-00-5A-63-01-00       T    1514          RD
   2  FR /0:16          Up  00-00-00-00-00-00     SRT    2038     001  RD
   2  FR /0:18          UP  00-00-00-00-00-00     SR     2038     002  RD
 
Flags: RE = IBMRT PC behavior Enabled, RD = IBMRT PC behavior Disabled
 
 
SR bridge number:      00a
SR virtual segment:    ff6 (1 : N SRB Active)
Adaptive segment:      107

Bridge ID
Unique ID used by the spanning tree algorithm in determining the spanning tree. Each bridge in the network is assigned a unique bridge identifier. The bridge priority is displayed in decimal followed by the hex address.

Bridge State
Indicates whether bridging is enabled or disabled.

UB-Encapsulation
Indicates whether UB Encapsulation is enabled or disabled.

Bridge Type
Displays the configured bridge type. This is displayed as NONE, SRB, TB, SRT, ADAPT, A/SRB, A/TB, or ASRT.

Number of Ports
Displays the number of ports configured for that bridge.

STP Participation
Describes the types of spanning tree protocol in which a bridge participates.

IPX Conversion
Indicates whether IPX Conversion is enabled or disabled.

Conversion Mode
Indicates the IPX Conversion Mode as either automatic or manual.

Ethernet Preference
Indicates the preferred Ethernet frame type used for IPX Conversion as IEEE 802.3 or Ethernet.

Port
Specifies a user defined number assigned to an interface by the add port command.

Interface
Identifies devices connected to a network segment through the bridge.

State
Indicates the current state of the port. This is displayed as UP or DOWN.

MAC address
Displays the MAC address associated with that port in canonical bit order.

Modes
Displays the bridging mode for that port. T indicates transparent bridging. SR indicates source routing. A indicates adaptive bridging.

MSDU
Specifies the maximum frame (data unit) size (including the MAC header but not the FCS field) the bridge can transmit and receive on this interface.

Segment
Displays the source routing bridge segment number assigned to that port (if any).

SR bridge number
Displays the user assigned source routing bridge number.

SR virtual segment
Displays the source routing bridge virtual segment number (if any).

Adaptive segment
Displays the number of the segment which is used in the source routing domain to route to the transparent domain (via conversion).

conversion datagroup-option

database datagroup-option
Lists the contents of transparent filtering databases. There are a number of datagroups which can be chosen to be displayed under the list database command. These include the following:

The following examples break down the list database command options. The first example also shows the related output.

Example: list database all

            MAC Address    MC*  Entry Type       Age  Port(s)
            00-00-00-00-AA-AA   Dynamic          295  4 (Eth/2)
            00-00-00-12-34-56   Perm/Source filter    2 (TKR/1)  ->  3-4
                                                      1-2
            00-00-00-22-33-44   Permanent             1-2
                                                      1-2
            00-00-00-33-44-55   Perm Dest filter      All
            00-00-00-55-66-77   Perm/Source filter    1-2,4
 
            00-00-93-10-04-15   Registered            1 (Eth/1)
            00-00-93-10-E4-F9   Dynamic          300  1 (Eth/1)
            00-00-93-90-04-A6   Dynamic          300  1 (Eth/1)
            00-00-A7-10-68-28   Dynamic          270  1 (Eth/1)
            01-80-C2-00-00-00*  Registered            1,3
            01-80-C2-00-00-01*  Reserved              All
            01-80-C2-00-00-02*  Reserved              All
            01-80-C2-00-00-03*  Reserved              All
            01-80-C2-00-00-0D*  Reserved              All
            01-80-C2-00-00-0E*  Reserved              All
            03-00-00-00-80-00*  Reserved              All
            08-00-17-00-35-F9   Dynamic/ETH-II        300  1 (Eth/1)
            08-00-17-00-4D-DA   Dynamic               300  1 (Eth/1)

Example: list database range

            First MAC address [00-00-00-00-00-00]? 00-00-93-00-C0-D0
            Last MAC address [FF-FF-FF-FF-FF-FF]? 01-80-C2-00-00-00
 
            MAC Address    MC* Entry Type      AGE  Port(s)
            00-00-93-10-04-15  Registered           1 (Eth/2)
            01-80-C2-00-00-00  Registered           1,3
 
 

Example: list database dynamic

            MAC Address    MC* Entry Type      AGE  Port(s)
            00-00-00-00-AA-AA  Dynamic         295  4 (Eth/2)
            00-00-93-10-E4-F9  Dynamic         300  1 (Eth/1)
            00-00-93-90-04-A6  Dynamic         300  1 (Eth/1)
            00-00-A7-10-68-28  Dynamic         270  1 (Eth/1)
            08-00-17-00-35-F9  Dynamic/ETH-II  300  1 (Eth/1)
            08-00-17-00-4D-DA  Dynamic         300  1 (Eth/1)        
Note:The following fields are displayed for all of the list database command options.

MAC Address
Specifies the address entry in 12-digit hex format (canonical bit order).

MC*
An asterisk following an address entry indicates that the entry has been flagged as a multicast address.

Entry Type
Specifies one of the following types:

Reserved
Entries reserved by the IEEE 802.1d standard.

Registered
Entries consist of unicast addresses belonging to interfaces participating in the bridge or multicast addresses enabled by protocol forwarders

Permanent
Entries entered by the user in the configuration process which survive power on/offs or system resets

Static
Entries entered by the user in the monitoring process which do not survive power on/offs or system resets and are ageless.

Dynamic
Entries "learned" by the bridge "dynamically" which do not survive power on/offs or system resets and which have an "age" associated with the entry

If IPX Conversion is enabled and the entry was "learned" during the process of forwarding a Novell IPX frame, the Ethernet/802.3 frame type (encapsulated) is also displayed as:

  • ETH-II - Ethernet-V2.0 (IPX frame type ETHERNET_II)

  • 802.3 - 802.3/Novell Proprietary (IPX frame type ETHERNET_8023)

  • 802.2 - 802.3/LLC (IPX frame type ETHERNET_8022)

  • SNAP - 802.3/SNAP (IPX frame type ETHERNET_SNAP)

Free
This type is not used and should not be normally be seen except in occasional "race" conditions between the monitoring and the bridge.

Unknown
Unknown entry type. May indicate a software bug. Report the hex entry type to Customer Service.

Age
Refers to the age (in seconds) of each dynamic entry. Age is decremented at each resolution interval.

Port(s)
Specifies the outgoing port number(s) for that entry. Device type is also listed for single port entries.

dmac
Displays information about configured options for the duplicate MAC address feature.

Example: list dmac

ASRT>list dmac
           Duplicate MAC address feature is    ENABLED
           Load balance feature is    ENABLED
           Age value for Duplicate MAC address :00000096
           Duplicate MAC ADDRESSES CONFIGURED
           ==================================
           10-00-5A-66-66-00
           10-00-5A-66-66-01
           10-00-5A-66-66-02
           10-00-5A-66-66-03
           10-00-5A-66-66-04
           10-00-5A-66-66-05
 

filtering datagroup-option
Displays general information about the bridge's protocol filtering databases. There are a number of general datagroups which may be displayed under the list filtering command. These include the following:

The following examples break down each of the list filtering display options.

Example: list filtering all

             Ethernet type 0800 is routed on ports 1
             IEEE 802.2 destination SAP 42 is routed on ports 1
             IEEE 802 SNAP PID 00-00-00-08-00 is routed on ports 2-3

Descriptors used in explaining how packets are communicated include the following:

All of the descriptors just explained also apply to ARP packets with this Ethertype.

Example: list filtering ethertype

             Ethernet type (in hexadecimal), 0 for all [0]? 0800
             Ethernet type 0800 is routed on ports 1

Example: list filtering SAP

             SAP (in hexadecimal), 100 for all [100]? 42
             IEEE 802.2 destination SAP 42 is routed on ports 1

Example: list filtering SNAP

             SNAP Protocol ID, return for all [00-00-00-00-00]?
             IEEE 802 SNAP PID 00-00-00-08-00 is routed on ports 2-3

multiaccess-database port#
Displays the contents of the multiaccess database. This database maps a source routing segment number to a Frame Relay circuit number.

all-ports
Specifies that all database entries should be displayed.

Example: list multiaccess-database

Aging Time (in seconds): 300
 
4 entries used out of 512
 
Segment  Age    Port  Interface   Circuit
204      100    2     FR/0        16
267      200    3     FR/1        16
375      120    2     FR/0        18
400      220    3     FR/1        18

port port#
Displays database entries for a specific bridge port.

Example: list multiaccess-database

Aging Time (in seconds): 300
 
4 entries used out of 512
 
Segment  Age    Port  Interface   Circuit
204      100    2     FR/0        16
375      120    2     FR/0        18
 

In the displays:

Segment
Is the destination source routing segment number.

Age
Is the entry time-to-live in seconds.

Port
Is the port number of the multiaccess bridge port that built this entry.

Interface
Is the name of the network interface that built this entry.

Circuit
Is the Frame Relay circuit number that built this entry.

port port#
Displays port information.

Example: list port

Port Id (dec)    : 128: 3, (hex): 80-03
Port State       : Forwarding
STP Participation: Enabled
Port Supports    : Transparent Bridging Only
Assoc Interface #/name : 5/Eth/1
 

Example: list port 1

Port Id (dec)    : 128: 4, (hex): 80-04
Port State       : Disabled
STP Participation: Enabled
Port Supports    : Transparent Bridging Only
Assoc Interface #/name : 1/FR/0  PVC Circuit name:   
  PVC Circuit number: 16
   

Example: list port 2

Port Id (dec)    : 128: 5, (hex): 80-05
Port State       : Disabled
STP Participation: Enabled
Port Supports    : Source Route Bridging Only
SRB: Segment Number: 0x004       MTU:  1979     STE Forwarding: Auto
Assoc Interface #/name : 10/PPP/1

Port
Specifies a user defined number assigned to an interface by the add port command.

Interface
Identifies devices connected to a network segment through the bridge.

State
Indicates the current state of the port. This is displayed as UP or DOWN.

MAC address
Displays the MAC address associated with that port in canonical bit order.

Modes
Displays the bridging mode for that port. T indicates transparent bridging. SR indicates source routing. A indicates adaptive bridging.

MSDU
Specifies the maximum frame (data unit) size (including the MAC header but not the FCS field) the bridge can transmit and receive on this interface.

Segment
Displays the source routing bridge segment number assigned to that port (if any).

source-routing datagroup-option
Displays source-routing bridge configuration information. There are a number of general datagroup options which may be displayed under the list source-routing command. These include the following:

The following examples illustrate each of the list source-routing display options.

Example: list source-routing configuration

            Bridge number:               1
            Bridge state:                Enabled
            Maximum STE hop count        14
            Maximum ARE hop count        14
            Virtual segment:             003
            Port  Segment  Interface   State     MTU    STE Forwarding  LNM
            2    001      TKR/1       Enabled   4399   Yes              ENA
            3    002      TKR/2       Enabled   4399   Yes

Bridge number
The bridge number (in hexadecimal) assigned to this bridge.

Bridge State
Indicates whether bridging is enabled or disabled.

Maximum STE hop count
The maximum hop count for spanning tree explorer frames transmitting from the bridge for a given interface associated with source routing bridging.

Maximum ARE hop count
The maximum hop count for all route explorer frames transmitting from the bridge for a given interface associated with source routing bridging.

Virtual segment
The virtual segment number assigned for 1:N bridging.

Port
The numbers of ports associated with source routing bridging.

Segment
The assigned segment numbers for ports associated with source routing bridging.

Interface
The associated interface names. VPI/VCI is shown for ATM. DLCI is shown for FR.

State
The current port state (Enabled or Disabled).

MTU
The MTU size set for that port.

STE Forwarding
Indicates whether Spanning Tree Explorers received on this port are forwarded (Yes) and whether STEs from other ports go out this port.

LNM
Indicates whether LAN Network Manager (LNM) agents are enabled (ENA) or disabled (DIS) on that specific port.

The counters option has further subgroups of information which may be displayed using the list source-routing command. These include the following:

The following examples illustrate each of the list source-routing display options.

Example: list source-routing counters all-ports

            ASRT>list source counters all-ports
            Counters for port 2, segment 001, interface TKR/1
            SRF frames received:          0    sent:          0
            STE frames received:          0    sent:          0
            ARE frames received:        648    sent:          0
            SR frames sent as TB:                             0
            TB frames sent as SR:                          2057
            Dropped, input queue overflow:                    0
            Dropped, source address filtering:                0
            Dropped, dest address filtering:                  0
            Dropped, invalid RIF length:                      0
            Dropped, duplicate segment:                    2594
            Dropped, segment mismatch:                        0
            Dropped, Duplicate LAN ID or tree error:          0
            Dropped, STE hop count exceeded:                  0
            Dropped, ARE hop count exceeded:                  0
            Dropped, no buffer available to copy:             0
            Dropped, MTU exceeded:                            0
 
 
            Counters for port 3, segment 002, interface TKR/2:
            SRF frames received:          0    sent:          0
            STE frames received:          0    sent:          0
            ARE frames received:        825    sent:          0
            SR frames sent as TB:                             0
            TB frames sent as SR:                          2041
            Dropped, input queue overflow:                    0
            Dropped, source address filtering:                0
            Dropped, dest address filtering:                  0
            Dropped, invalid RIF length:                      0
            Dropped, duplicate segment:                    3300
            Dropped, segment mismatch:                        0
            Dropped, Duplicate LAN ID or tree error:          0
            Dropped, STE hop count exceeded:                  0
            Dropped, ARE hop count exceeded:                  0
            Dropped, no buffer available to copy:             0
            Dropped, MTU exceeded:                            0

Port
Lists the numbers of ports associated with source routing bridging

Segment
Lists the source-routing segment numbers in hex.

Interface
Lists the name of the network interface.

SRF Frames Received/Sent
Lists the number of Specifically Routed Frames received and sent on this bridge.

STE Frames Received/Sent
Lists the number of Spanning Tree Explorer Frames received and sent on this bridge.

ARE Frames Received/Sent
Lists the number of All Routes Explorer Frames received and sent on this bridge.

SR Frames Sent as TB
Lists the number of source routing frames received on this interface that were sent as transparent bridge frames.

TB Frames Sent as SR
Lists the number of transparent bridge frames received on this interface that were sent as source routing frames.

Dropped, input queue overflow
Lists the number of frames arriving on this interface that were not bridged for flow control reasons. The input queue to the forwarder overflowed.

Dropped, source address filtering
Lists the number of frames arriving on this interface that were not bridged because this source address matched a source address filter in the filtering database.

Dropped, destination address filtering
Lists the number of frames arriving on this interface that were not bridged because this destination address matched a destination address filter in the filtering database.

Dropped, protocol filtering
Lists the number of frames arriving on this interface that were not bridged because their protocol identifier was one that is being administratively filtered.

Dropped, invalid RIF length
Lists the number of frames arriving on this interface that were dropped because the RIF length as less than 2 or over 30.

Dropped, duplicate segment
Lists the number of frames arriving on this interface that were dropped because of a duplicate segment in the RIF. This is normal for ARE frames.

Dropped, segment mismatch
Lists the number of frames arriving on this interface that were dropped because the outgoing segment number does not match any in this bridge.

Dropped, Duplicate LAN ID or tree error:
The number of duplicate LAN IDs or Tree errors. This helps in the detection of problems in networks containing older IBM Source Routing Bridges.

Dropped, STE hop count exceeded:
The number of explorer frames that have been discarded by this port because the Routing Information Field has exceeded the maximum route descriptor length.

Dropped, ARE hop count exceeded:
The number of explorer frames that have been discarded by this port because the Routing Information Field has exceeded the maximum route descriptor length.

Dropped, no buffer available to copy:
Number of times a frame was not forwarded on an interface because there were no buffer resources available to copy the frame. (Frame to multicast destinations and to unknown destinations need to be copied for transmission on all active ports.)

Dropped, MTU exceeded:
The number of frames that were discarded by this port due to an excessive size.

Example: list source-routing counters port 3

Counters for port 3, segment 002, interface TKR/1:
SRF frames received:          0    sent:           0
STE frames received:          0    sent:           0
ARE frames received:       1140    sent:           0
SR frames sent as TB:                              0
TB frames sent as SR:                           2931
Dropped, input queue overflow:                     0
Dropped, source address filtering:                 0
Dropped, dest address filtering:                   0
 
Dropped, invalid RIF length:                       0
Dropped, duplicate segment:                     4560
Dropped, segment mismatch:                         0
Dropped, Duplicate LAN ID or tree error:           0
Dropped, STE hop count exceeded:                   0
Dropped, ARE hop count exceeded:                   0
Dropped, no buffer available to copy:              0
Dropped, MTU exceeded:                             0
Dropped, dest address filtering:                   0
Dropped, protocol filtering:                       0

Example: list source-routing counters segment 2

Counters for port 3, segment 002, interface TKR/2:
SRF frames received:          0    sent:          0
STE frames received:          0    sent:          0
ARE frames received:       1249    sent:          0
SR frames sent as TB:                             0
TB frames sent as SR:                          3200
Dropped, input queue overflow:                    0
Dropped, source address filtering:                0
Dropped, dest address filtering:                  0
Dropped, protocol filtering:                      0
Dropped, invalid RI length:                       0
Dropped, duplicate segment:                    4996
Dropped, segment mismatch:                        0
Dropped, Duplicate LAN ID or tree error:          0
Dropped, STE hop count exceeded:                  0
Dropped, ARE hop count exceeded:                  0
Dropped, no buffer available to copy:             0
Dropped, MTU exceeded:                            0

spanning-tree protocol datagroup-option

tunnel datagroup-option
Displays tunnel configuration information. There are general datagroup options which may be displayed under the list tunnel command. These include:

NetBIOS

Use the netbios command to access the NetBIOS> prompt. NetBIOS monitoring commands may be entered at the NetBIOS> prompt.

See "NetBIOS Commands" for the NetBIOS monitoring commands.

Syntax:

netbios

Accessing the BAN Monitoring Prompt

Use the ban command from the ASRT> or DLSw> monitoring prompt to access BAN commands.

To access the BAN monitoring prompt, enter the ban command from the ASRT monitoring prompt of the DLSw monitoring prompt. For example:

  ASRT> ban
  BAN>
 
     or
 
  DLSw> ban
  BAN>

Once you access the BAN monitoring prompt, you can begin entering specific monitoring commands. To return to the monitoring prompt you came from, enter the exit command.


BAN Monitoring Commands

This section describes the BAN monitoring commands. Enter the commands at the BAN> prompt.

Table 9. BAN Monitoring Commands Summary
Command Function
? (Help) Displays all the commands available for this command level or lists the options for specific commands (if available). See "Getting Help".
 List   Displays all information concerning BAN ports. 
Exit Returns you to the previous command level. See "Exiting a Lower Level Environment".

List

Use the list command to list information about all BAN ports. The information that is displayed includes the BAN port number, the MAC address for the BAN DLCI, whether the frames handled by the port are bridged or the LLC is terminated by DLSw, and the status of the port.

The status of the port will have one of three values:

Syntax:

list

Example: list

  bridge  BAN                Boundary             bridged or
  port    DLCI MAC Address   Node Identifier      DLSw terminated  Status
  2       40:00:12:34:56:78  4F:FF:00:00:00:00    bridged          Up


[ Top of Page | Previous Page | Next Page | Table of Contents | Index ]