Layer 2 Tunnel. xconnect performance test

Size: px
Start display at page:

Download "Layer 2 Tunnel. xconnect performance test"

Transcription

1 Layer 2 Tunnel xconnect performance test 1

2 About test The main purpose of this examination was to find out the router performance in Layer 2 tunnel mode during transmission of packets with different length. Some background information is present in document also for better understanding. During the test were used: Cisco 892/K9, C890 Software (C890-UNIVERSALK9-M), Version 15.1(2)T2, RELEASE SOFTWARE (fc1) JDSU SmartClass Ethernet Testers. Measured L1 Rate [Mbps] results in tables are rounded. However, it is sufficient for the review. A more accurate value you can get out from Frame Measured Rate. For example: for 64-Byte frames L1 Rate is 14,9 Mbps and frame rate is frames per seconds, In this case 14,9Mbps is rounded. A more accurate value is [frames/s] x 84 [bytes on wire] x 8 [bits in byte] = Mbps. Background Each layer have own unit of measure. PDU Protocol Data Unit Layer 1 Physical Layer - Bit Layer 2 Data Link Layer - Frame Layer 3 Network Layer - Packet Ethernet frame Ethernet II / DIX Figure 1 shows fields and lengths of Ethernet II/DIX frame. Preamble Destination MAC Source MAC 8 Bytes 6 Bytes 6 Bytes Ethertype 2 Bytes Payload Bytes CRC-32 4 Bytes Interframe gap 12 Byte times This is Layer 1 part. not included in the Ethernet frame length Included in the Ethernet frame length This is Layer 1 part. not included in the Ethernet frame length Figure 1. Untagged Ethernet frame 2

3 Maximum throughput The inter frame gap is inserted between frames during transmitting (Figure 2) #4 #3 #2 #1 Frames Interframe gap 12 Byte times Figure 2 Ethernet interframe gap Preamble 8 Bytes + Destination MAC 6 Bytes + Source MAC 6 Bytes + Ethertype 2Bytes + Payload 1500 bytes + FCS 4 Bytes + Inter frame Gap 12 Bytes = 1538 Bytes. In this way 1538 bytes are needed to transmit 1518 bytes untagged frame. Layer 3 maximum throughput can t reach 100% wire speed and depends from packet length Bytes are needed for transmitting 1500 bytes of L3 data -> 1500/1538*100% = untagged frame. 84 Bytes are needed for transmitting 46 bytes of L3 data -> 64/84*100% = untagged frame. L2TP encapsulation L2TP overhead is 38 bytes (Figure 3). Figure 3 L2TP Encapsulation 3

4 Performance test L2 Tunnel topology Topology: L2 Tunnel with redundant paths (Figure 4). Routing protocol: BGP protocol is used, but routing protocol selection is not important in this test. Test type: Layer 2 RFC2544. Two variants were tested: 1 st variant: Tunnel via Gi0 port 2 nd variant: Tunnel via Fa7 port (interface SVI VLAN 100) Figure 4 Schematic diagram Cisco 892 router has 2 routed ports and 8-port LAN switch. SVI is configured for creation of 3rd routed port. Connections Fa7-Fa7 and Gi0-Gi0 are tunnels and must have Layer 3 MTU 1538 bytes ( bytes L2TP overhead). SVI MTU by default is 1514 bytes. It included L3 packet 1500 bytes + L2 MAC header 14 bytes and without CRC. Because SVI involved in tunneling, then MTU must be 1552 bytes ( ). NB! Bug with MTU was found during SVI testing. It described below. Initial router configurations: Router R1 interface FastEthernet8 no ip address xconnect encapsulation l2tpv3 manual pw-class L2_TUNNEL l2tp id <- define xconnect <- define tunnel session ID interface Loopback0 ip address interface GigabitEthernet0 mtu 1538 ip address interface FastEthernet7 switchport access vlan 100 mtu 1538 interface Vlan100 mtu 1552 ip address pseudowire-class L2_TUNNEL encapsulation l2tpv3 protocol none ip local interface Loopback0 <- tunnel MTU <- tunnel MTU <- tunnel MTU <- define pseudo wire class <- define encapsulation <- manual mode <- use Loopback 0 interface 4

5 router bgp 10 bgp router-id bgp log-neighbor-changes redistribute connected neighbor remote-as 20 neighbor remote-as 20 neighbor weight 10 no auto-summary <- BGP configuration <- path via Gi0 is preferred (primary) Router R2 interface FastEthernet8 no ip address xconnect encapsulation l2tpv3 manual pw-class L2_TUNNEL l2tp id <- define xconnect <- define tunnel session ID interface Loopback0 ip address interface GigabitEthernet0 mtu 1538 ip address interface FastEthernet7 switchport access vlan 100 mtu 1538 interface Vlan100 mtu 1552 ip address pseudowire-class L2_TUNNEL encapsulation l2tpv3 protocol none ip local interface Loopback0 router bgp 20 bgp router-id bgp log-neighbor-changes redistribute connected neighbor remote-as 10 neighbor remote-as 10 neighbor weight 10 no auto-summary <- tunnel MTU <- tunnel MTU <- tunnel MTU <- define pseudo wire class <- define encapsulation <- manual mode <- use Loopback 0 interface <- BGP configuration <- path via Gi0 is preferred (primary) The #sh processes cpu sorted 1min and #sh processes cpu history were used for CPU statistics gathering. Please see the example below: R1#sh processes cpu sorted 1min i CPU utilization CPU utilization for five seconds: 57%/55%; one minute: 38%; five minutes: 17% R1#sh proc cpu hist R1 07:02:20 AM Wednesday Jan UTC ******************************************** 50 ******************************************** 40 ******************************************** 30 ******************************************** ****** 20 ************************************************* ****** 10 ************************************************* ****** CPU% per second (last 60 seconds) The CPU utilization for five seconds: 57%/55%; should be read as "Total CPU usage"/"cpu Usage Caused by traffic". 5

6 Test results Original L2 Frame Length [Bytes] L2 Tunnel Frame Length [Bytes] Measured L1 Rate [Mbps] Test results. Tunnel via Gi0 port CPU total usage [%] CPU usage caused by traffic [%] Measured Rate frame/sec random avg Table 1 Throughput of L2 Tunnel via Gi0 and CPU utilization Original L2 Frame Length [Bytes] L2 Tunnel Frame Length [Bytes] Measured L1 Rate [Mbps] Test results. Tunnel via SVI port CPU total usage [%] CPU usage caused by traffic [%] Measured Rate frame/sec Table 2 Throughput of L2 Tunnel via Fa7 and CPU utilization You can see that performance fell fast for 1518-byte frames. It was strange. I began to look for the cause and saw some interesting information. R2(config)#do sh buffer leak i Fa8 Header Header DataArea Pool Size Link Enc Flags Input Output User 85B EC01544 DMA Fa8 None L2X Data 85B45BB4 1EC0A944 DMA Fa8 None L2X Data 85B4892C 1EC21B44 DMA Fa8 None L2X Data 85B496D0 1EC28A44 DMA Fa8 None L2X Data 85B4B6A4 1EC38D44 DMA Fa8 None L2X Data 85B4DB04 1EC4B544 DMA Fa8 None L2X Data 85B4F1C0 1EC56E44 DMA Fa8 None L2X Data... L2 tunnel data does not fit to the MTU size of tunnel. 6

7 I began to capture traffic with Wireshark. For start, frames are captured for the path through the Gi0 interfaces. 1. Source frame (Figure 5). Length 1518 bytes. Figure 5. Source frame 1518 bytes Frame size 1518 bytes. Wireshark shows 1514 bytes without CRC. Payload pattern is 0xAA. Each frame contains 4 bytes (red selection) in the end of DATA. 2. Frame from R1 to R2 through interface Gi0 (Figure 6). MTU 1552 bytes. Figure 6. L2TP frame. Path via Gi0 7

8 MTU is correct. New MAC header 14bytes + New IP header 20 bytes + L2TP header 4 bytes + Original frame without CRC 1514 bytes = 1552 bytes (without CRC). Each frame contains 4 bytes (red selection) in the end of DATA. 3. Frames from R2 to tester 2, from Tester 2 to R2, from R2 to R1 and from R1 to Tester 1. Frames are correct and have right MTU. In general, changing the frame size is shown in Figure 7. Figure 7. Frame length change during transmission thru tunnel (via Gi0) Next step, frames are captured for the path through the Fa7 interfaces. 4. Source frames with length 1518 bytes Frames are same like in Figure Frame from R1 to R2 through interface Fa7. MTU 1552 bytes. Router R1 encapsulates frames into L2TP packets and sends to the router R2 via SVI and Fa7 ports. This step is correct. Frames have correctly MTU (Figure 8). 8

9 Figure 8. L2TP frame. Path through Fa7 NB! But further steps are an anomaly. In general, changing the frame size is shown in Figure 9. Figure 9. Frame length change during transmission through tunnel (via Fa7) 6. Frames from R2 to Tester 2 Router R2 adds 4 bytes to end of original frame DATA for frames which de-encapsulates from Tunnel to output port. Please see Figure 10. 9

10 NB! This anomaly starts only from frame length 1493 bytes with CRC (1489 without CRC). Frames with length up to 1492 bytes are forwarded correctly. Figure 10. Frame from R2 to Tester 2. 4 Bytes are added. Added DATA is shown in yellow frame in Figure 10. These 4 bytes are outside of the Layer 3 packet length. Please note, my NIC card sends frames without CRC to Windows and Wireshark also. Wireshark shows a value bytes on wire without 4 bytes of CRC. Wireshark decodes frame and sees that length of Layer 3 payload is 1500 bytes. But additional bytes are present after End of packet. Wireshark thinks that they are CRC and starts check it. Check fails, because these bytes are not Layer 2 CRC. Warning message is shown [Ethernet Frame Check Sequence Incorrect]. 7. Frames from R2 to R1 Next step. Tester 2 receives frames with inserted 4 bytes from R2, and sends them back toward Tester1. Because incoming port Fa8 is tunnel port, Router 2 does not check any Layer 3 payload. Router encapsulates all incoming bytes into L2TP packet and forward to Router R1 via tunnel. This procedure does not add additional bytes (Figure 11). 10

11 Figure 11. L2TP frame. Direction from R2 to R1. Tunnel through Fa7. 8. Frames from R1 to Tester 1 Final step. Router R1 also adds 4 bytes to end of original frame DATA for frames which de-encapsulates from Tunnel to output port. Original frame from tunnel has 4 additional bytes and router R1 adds next 4 bytes. Frames with length 1522 bytes (without CRC) are returned to Tester 1. Please see Figure

12 Figure 12. Frame with additional 8 bytes. Tester receives long frames but ignores any data after End of Packet. This is same situation as padding is ignored for short packets. In this case tester does not show error or lost packets. Only can be seen in the tester that the received frames are recognized as >1518/1526, but must be as /1526. MTU tuning MTU are increased for Fa7 and VLAN 100 interfaces bytes for Fa7 and 1556 for VLAN 100. Throughput test was repeated after MTU increasing. Now performance is much better (Table 3). However anomaly with additional bytes is remained. Router still adds 4 bytes during de-encapsulation from Tunnel to output port for frames with length bytes. 12

13 Throughput [Mbps] CPU Utilization [%] Original L2 Frame Length [Bytes] L2 Tunnel Frame Length [Bytes] Measured L1 Rate [Mbps] Test results. Tunnel via SVI port CPU total usage [%] CPU usage caused by traffic [%] Measured Rate frame/sec random avg Table 3. L2 Tunnel throughput and CPU utilization Summary The Graph 1 is summary graph for RFC2544 tests. This graph shows a maximum throughput. The Graph 2 shows a router performance for random frames, this gives more close result to a real throughput /97% 92/91% 99/97% 99/97% 96,5 Mbps 97,1 Mbps 97,6 Mbps 96,5 Mbps 97,1Mbps 97,3 Mbps 99/96% 99/96% 99/96% 99/96% 89,2 Mbps 98/95% 93/92% 84/83% 72/71% 49,9 Mbps 59,5 Mbps 57/55% 52/50% 26,3 Mbps 30,0 Mbps 14,9 Mbps 17,0 Mbps 10,0 Mbps Packet Length [Bytes] L1 Throughput. Tunnel via Fa7 CPU untilization. Tunnel via Fa7 L1 Throughput. Tunnel via Gi0 CPU total usadge. Tunnel via Gi0 Graph 1 Throughput and CPU utilization. 13

14 L1 Rate [Mbps] Mbps Mbps CPU utilization 60% CPU utilization 64% Tunnel via Gi0 Tunnel via Fa7 Graph 2. Throughput and CPU utilization for random frames Juri Jestin

Cisco 1921 router performance test

Cisco 1921 router performance test Cisco 1921 router performance test Juri Jestin 16.12.214 1 About test Test was carried out for clarify the performance characteristics of the router with different configurations during transmission of

More information

L2 Bridging Across an L3 Network Configuration Example

L2 Bridging Across an L3 Network Configuration Example L2 Bridging Across an L3 Network Configuration Example Document ID: 116266 Contributed by Atri Basu, Jay Young Taylor, and Mani Ganesan, Cisco TAC Engineers. Jul 09, 2013 Contents Introduction Prerequisites

More information

Configuring Virtual Private LAN Services

Configuring Virtual Private LAN Services Virtual Private LAN Services (VPLS) enables enterprises to link together their Ethernet-based LANs from multiple sites via the infrastructure provided by their service provider. This module explains VPLS

More information

CCENT Study Guide. Chapter 11 VLANs and Inter-VLAN Routing

CCENT Study Guide. Chapter 11 VLANs and Inter-VLAN Routing CCENT Study Guide Chapter 11 VLANs and Inter-VLAN Routing Chapter 11 Objectives The CCENT Topics Covered in this chapter include: 2.0 LAN Switching Technologies 2.4 Configure, verify, and troubleshoot

More information

Configure Multipoint Layer 2 Services

Configure Multipoint Layer 2 Services This module provides the conceptual and configuration information for Multipoint Layer 2 Bridging Services, also called Virtual Private LAN Services (VPLS). Note VPLS supports Layer 2 VPN technology and

More information

Implementing SES Network Duplication A Best Practices Guide.

Implementing SES Network Duplication A Best Practices Guide. Implementing SES Network Duplication A Best Practices Guide. SIP Enablement Services 5.1 Avaya ABSTRACT This application note is a tutorial on Avaya SIP Enablement Services Network Duplication from an

More information

Deploying MPLS L2VPN

Deploying MPLS L2VPN Deploying MPLS L2VPN Nurul Islam Roman (nurul@apnic.net) 1 Abstract This session covers the fundamental and advanced topics associated with the deployment of Layer 2 VPNs over an MPLS network. The material

More information

CCNA 1 Chapter 5 v5.0 Exam Answers 2013

CCNA 1 Chapter 5 v5.0 Exam Answers 2013 CCNA 1 Chapter 5 v5.0 Exam Answers 2013 1 2 A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in its ARP cache. How will the device obtain a destination

More information

2. What is a characteristic of a contention-based access method?

2. What is a characteristic of a contention-based access method? CCNA 1 Chapter 5 v5.0 Exam Answers 2015 (100%) 1. Which statement is true about MAC addresses? MAC addresses are implemented by software. A NIC only needs a MAC address if connected to a WAN. The first

More information

Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling

Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling CHAPTER 14 Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling With Release 12.1(13)E and later, the Catalyst 6500 series switches support IEEE 802.1Q tunneling and Layer 2 protocol tunneling.

More information

Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling

Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling CHAPTER 8 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Virtual private networks (VPNs) provide enterprise-scale connectivity on a shared infrastructure, often Ethernet-based, with the same security,

More information

Lab Using Wireshark to Examine Ethernet Frames

Lab Using Wireshark to Examine Ethernet Frames Topology Objectives Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Background / Scenario When upper layer protocols communicate with

More information

Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling

Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling 9 CHAPTER Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling Virtual private networks (VPNs) provide enterprise-scale connectivity on a shared infrastructure, often Ethernet-based, with the

More information

Lab Using Wireshark to Examine Ethernet Frames

Lab Using Wireshark to Examine Ethernet Frames Topology Objectives Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Background / Scenario When upper layer protocols communicate with

More information

Module 11a MPLS VPWS Configuration Lab (LDP)

Module 11a MPLS VPWS Configuration Lab (LDP) APNIC MPLS Workshop Lab Module 11a MPLS VPWS Configuration Lab (LDP) Objective: All the routers are pre-configured with basic interface, OSPF, BGP, MPLS Label Distribution Protocol (LDP) configuration

More information

Chapter 5: Inter-VLAN Routing. Routing & Switching

Chapter 5: Inter-VLAN Routing. Routing & Switching Chapter 5: Inter-VLAN Routing Routing & Switching What is Inter-VLAN routing? Layer 2 switches cannot forward traffic between VLANs without the assistance of a router. Inter-VLAN routing is a process for

More information

POS on ONS Ethernet Cards

POS on ONS Ethernet Cards 20 CHAPTER This chapter describes packet-over-sonet/sdh (POS) and its implementation on ONS Ethernet cards. This chapter contains the following major sections: POS Overview, page 20-1 POS Interoperability,

More information

Configuring Pseudowire

Configuring Pseudowire This chapter provides information about configuring pseudowire features on the Cisco ASR 920 Series Router. Pseudowire Overview, on page 1 CEM Configuration, on page 2 CEM Configuration Guidelines and

More information

IEEE 802.1Q Tunneling (QnQ) and L2PT on L2 Ports

IEEE 802.1Q Tunneling (QnQ) and L2PT on L2 Ports Revised: November 11, 2011, OL-20468-01 First Published: November 11, 2011 Last Updated: November 11, 2011 This feature provides Layer 2 Tunneling support for QnQ and Layer 2 Protocol Tunneling (L2PT)

More information

Implementing MPLS VPNs over IP Tunnels

Implementing MPLS VPNs over IP Tunnels The MPLS VPNs over IP Tunnels feature lets you deploy Layer 3 Virtual Private Network (L3VPN) services, over an IP core network, using L2TPv3 multipoint tunneling instead of MPLS. This allows L2TPv3 tunnels

More information

Chapter 5 Reading Organizer After completion of this chapter, you should be able to:

Chapter 5 Reading Organizer After completion of this chapter, you should be able to: Chapter 5 Reading Organizer After completion of this chapter, you should be able to: Describe the operation of the Ethernet sublayers. Identify the major fields of the Ethernet frame. Describe the purpose

More information

ECE4110 Internetwork Programming. Introduction and Overview

ECE4110 Internetwork Programming. Introduction and Overview ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?

More information

Configuring Interfaces

Configuring Interfaces CHAPTER 9 This chapter defines the types of interfaces on the Cisco ME 3400 Ethernet Access switch and describes how to configure them. The chapter consists of these sections: Understanding Interface Types,

More information

Configuring IEEE 802.1Q Tunneling

Configuring IEEE 802.1Q Tunneling CHAPTER 26 This chapter describes how to configure IEEE 802.1Q tunneling in Cisco IOS Release 12.2SX. For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS

More information

CCNA Cisco Certified Network Associate CCNA (v3.0)

CCNA Cisco Certified Network Associate CCNA (v3.0) 200-125 - CCNA Cisco Certified Network Associate CCNA (v3.0) 1.What is one benefit of PVST+? A. PVST+ supports Layer 3 load balancing without loops. B. PVST+ reduces the CPU cycles for all the switches

More information

Introduction to Routers and LAN Switches

Introduction to Routers and LAN Switches Introduction to Routers and LAN Switches Session 3048_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 3 Prerequisites OSI Model Networking Fundamentals 3048_05_2001_c1 2001, Cisco Systems, Inc.

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 9 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094). It includes information about VLAN membership modes, VLAN configuration

More information

L2VPN Protocol-Based CLIs

L2VPN Protocol-Based CLIs The feature provides a set of processes and an improved infrastructure for developing and delivering Cisco IOS software on various Cisco platforms. This feature introduces new commands and modifies or

More information

Configuring Virtual Private LAN Service (VPLS) and VPLS BGP-Based Autodiscovery

Configuring Virtual Private LAN Service (VPLS) and VPLS BGP-Based Autodiscovery Configuring Virtual Private LAN Service (VPLS) and VPLS BGP-Based Autodiscovery Finding Feature Information, page 1 Configuring VPLS, page 1 Configuring VPLS BGP-based Autodiscovery, page 17 Finding Feature

More information

Computer Networks Principles LAN - Ethernet

Computer Networks Principles LAN - Ethernet Computer Networks Principles LAN - Ethernet Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr 1 Interconnection structure - layer 3 interconnection layer 3 router subnetwork 1 interconnection layer 2

More information

Sections Describing Standard Software Features

Sections Describing Standard Software Features 30 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic-qos (auto-qos) commands or by using standard QoS commands. With QoS, you can give preferential treatment to

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER 7 CHAPTER This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Cisco MWR 2941 router. It includes information about VLAN

More information

Imi :... Data:... Nazwisko:... Stron:...

Imi :... Data:... Nazwisko:... Stron:... Imi :.................................................... Data:....................... Nazwisko:............................................... Stron:...................... 1. Which of the following protocols

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Cisco ME 3400 Ethernet Access switch. It includes information

More information

AToM Graceful Restart

AToM Graceful Restart AToM Graceful Restart Last Updated: November 29, 2011 The AToM Graceful Restart feature assists neighboring routers that have nonstop forwarding (NSF), stateful switchover (SSO) and graceful restart (GR)

More information

Configuring PPP over Ethernet with NAT

Configuring PPP over Ethernet with NAT CHAPTER 3 The Cisco Secure Router 520 Ethernet-to-Ethernet routers support Point-to-Point Protocol over Ethernet (PPPoE) clients and network address translation (NAT). Multiple PCs can be connected to

More information

Configure L2VPN Autodiscovery and Signaling

Configure L2VPN Autodiscovery and Signaling This chapter describes the L2VPN Autodiscovery and Signaling feature which enables the discovery of remote Provider Edge (PE) routers and the associated signaling in order to provision the pseudowires.

More information

Configuring Link Aggregation on the ML-MR-10 card

Configuring Link Aggregation on the ML-MR-10 card CHAPTER 34 Configuring Link Aggregation on the ML-MR-10 card This chapter applies to the ML-MR-10 card and describes how to configure link aggregation for the ML-Series cards, both EtherChannel and packet-over-sonet/sdh

More information

Configuring PPP over Ethernet with NAT

Configuring PPP over Ethernet with NAT This chapter provides an overview of Point-to-Point Protocol over Ethernet (PPPoE) clients and network address translation (NAT) that can be configured on the Cisco 819, Cisco 860, Cisco 880, and Cisco

More information

Enhanced RFC 2544 Test

Enhanced RFC 2544 Test 1 Enhanced RFC 2544 Report - Port 2: 10/100/1000 Eth Layer 2 Traffic Term Generated by JDSU 5800 MSAM Enhanced RFC 2544 Test Overall Test Result: Pass Mode Tests to Run Customer Name Technician ID Test

More information

Lab - Using Wireshark to Examine a UDP DNS Capture

Lab - Using Wireshark to Examine a UDP DNS Capture Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you

More information

Lab - Using Wireshark to Examine a UDP DNS Capture

Lab - Using Wireshark to Examine a UDP DNS Capture Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you

More information

Configuring MPLS and EoMPLS

Configuring MPLS and EoMPLS 37 CHAPTER This chapter describes how to configure multiprotocol label switching (MPLS) and Ethernet over MPLS (EoMPLS) on the Catalyst 3750 Metro switch. MPLS is a packet-switching technology that integrates

More information

L2VPN Interworking. Finding Feature Information

L2VPN Interworking. Finding Feature Information Interworking is a transforming function that is required to interconnect two heterogeneous attachment circuits (ACs). Several types of interworking functions exist. The function that is used would depend

More information

Lab Configuring 802.1Q Trunk-Based Inter-VLAN Routing (Instructor Version Optional Lab)

Lab Configuring 802.1Q Trunk-Based Inter-VLAN Routing (Instructor Version Optional Lab) (Instructor Version Optional Lab) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional activities are designed to enhance understanding and/or

More information

PASS4TEST IT 인증시험덤프전문사이트

PASS4TEST IT 인증시험덤프전문사이트 PASS4TEST IT 인증시험덤프전문사이트 http://www.pass4test.net 일년동안무료업데이트 Exam : 640-802 Title : Cisco Certified Network Associate(CCNA) Vendors : Cisco Version : DEMO 1 / 10 Get Latest & Valid 640-802 Exam's Question

More information

Frame Relay over L2TPv3

Frame Relay over L2TPv3 The (FRoL2TPv3) feature enables Frame Relay switching over Layer 2 Tunnel Protocol Version 3 (L2TPv3). The feature works with like interfaces and disparate interfaces (L2VPN interworking). Finding Feature

More information

Configuring Interfaces

Configuring Interfaces CHAPTER 9 This chapter defines the types of interfaces on the Cisco ME 3400 Ethernet Access switch and describes how to configure them. Understanding Interface Types, page 9-1 Using Interface Configuration

More information

VLAN Configuration. Understanding VLANs CHAPTER

VLAN Configuration. Understanding VLANs CHAPTER CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the CGR 2010 ESM. It includes information about VLAN membership

More information

Behavior of Cisco Discovery Protocol between Routers and Switches

Behavior of Cisco Discovery Protocol between Routers and Switches Behavior of Cisco Discovery Protocol between Routers and Switches Document ID: 118736 Contributed by Meghana Tandon, Sumanth Srinath, and Vishnu Asok, Cisco TAC Engineers. May 06, 2015 Contents Introduction

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 12 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the switch. It includes information about VLAN membership

More information

GRE Tunnel with VRF Configuration Example

GRE Tunnel with VRF Configuration Example GRE Tunnel with VRF Configuration Example Document ID: 46252 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations Verify Troubleshoot Caveats

More information

Configure Link Layer Discovery Protocol

Configure Link Layer Discovery Protocol This chapter describes the procedures to configure Link Layer Discovery Protocol on Cisco NCS 4000 Series routers. Link Layer Discovery Protocol (LLDP) - Overview, on page 1 LLDP Frame Format, on page

More information

Sybex CCENT Chapter 11: VLANs and Inter-VLAN Routing. Instructor & Todd Lammle

Sybex CCENT Chapter 11: VLANs and Inter-VLAN Routing. Instructor & Todd Lammle Sybex CCENT 100-101 Chapter 11: VLANs and Inter-VLAN Routing Instructor & Todd Lammle Chapter 11 Objectives The CCENT Topics Covered in this chapter include: LAN Switching Technologies Describe how VLANs

More information

Configuring VPLS. VPLS overview. Operation of VPLS. Basic VPLS concepts

Configuring VPLS. VPLS overview. Operation of VPLS. Basic VPLS concepts Contents Configuring VPLS 1 VPLS overview 1 Operation of VPLS 1 VPLS packet encapsulation 4 H-VPLS implementation 5 Hub-spoke VPLS implementation 7 Multi-hop PW 8 VPLS configuration task list 9 Enabling

More information

Configuring MPLS Transport Profile

Configuring MPLS Transport Profile CHAPTER 44 The Multiprotocol Label Switching (MPLS) Transport Profile (TP) enables you to create tunnels that provide the transport network service layer over which IP and MPLS traffic traverse. MPLS-TP

More information

Implementing Inter-VLAN Routing. 2003, Cisco Systems, Inc. All rights reserved. 2-1

Implementing Inter-VLAN Routing. 2003, Cisco Systems, Inc. All rights reserved. 2-1 Implementing Inter-VLAN Routing 2003, Cisco Systems, Inc. All rights reserved. 2-1 Internetwork Communications C:>ping 172.16.30.100 Can two hosts on different subnets communicate without a router? No

More information

Configuring EtherChannels and Link-State Tracking

Configuring EtherChannels and Link-State Tracking 30 CHAPTER Configuring EtherChannels and Link-State Tracking This chapter describes how to configure EtherChannels on Layer 2 ports on the Catalyst 2960 switch. EtherChannel provides fault-tolerant high-speed

More information

Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS

Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS Mail seban649@student.liu.se Protocol Hi Hi Got the time? 2:00 time TCP connection request TCP connection response Whats

More information

Table of Contents Chapter 1 Tunneling Configuration

Table of Contents Chapter 1 Tunneling Configuration Table of Contents Table of Contents... 1-1 1.1 Introduction to Tunneling... 1-1 1.1.1 IPv6 over IPv4 Tunnel... 1-2 1.1.2 IPv4 over IPv4 Tunnel... 1-7 1.2 Tunneling Configuration Task List... 1-8 1.3 Configuring

More information

VLANs. Traditional Campus Networks. Performance Issues. Broadcast Issues. Bridges terminate collision domains

VLANs. Traditional Campus Networks. Performance Issues. Broadcast Issues. Bridges terminate collision domains Traditional Campus Networks Broadcast Domain VLANs Collision Domain 1 Collision Domain 2 Bridges terminate collision domains 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc.

More information

Configuring Interface Characteristics

Configuring Interface Characteristics CHAPTER 11 This chapter defines the types of interfaces on the Catalyst 3750 switch and describes how to configure them. Unless otherwise noted, the term switch refers to a standalone switch and a switch

More information

MPLS VPN--Inter-AS Option AB

MPLS VPN--Inter-AS Option AB The feature combines the best functionality of an Inter-AS Option (10) A and Inter-AS Option (10) B network to allow a Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) service provider

More information

Implementing IP in IP Tunnel

Implementing IP in IP Tunnel This chapter module provides conceptual and configuration information for IP in IP tunnels on Cisco ASR 9000 Series Router. Note For a complete description of the IP in IP tunnel commands listed in this

More information

POS on ONS Ethernet Cards

POS on ONS Ethernet Cards CHAPTER 23 This chapter describes packet-over-sonet/sdh (POS) and its implementation on ONS Ethernet cards. This chapter contains the following major sections: POS Overview, page 23-1 POS Interoperability,

More information

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF MODULE 07 - MPLS BASED LAYER 2 SERVICES 1 by Xantaro MPLS BASED LAYER 2 VPNS USING MPLS FOR POINT-TO-POINT LAYER 2 SERVICES 2 by Xantaro Why are Layer-2

More information

VLANs. 2003, Cisco Systems, Inc. All rights reserved. 2-1

VLANs. 2003, Cisco Systems, Inc. All rights reserved. 2-1 VLANs 2003, Cisco Systems, Inc. All rights reserved. 2-1 Traditional Campus Networks Broadcast Domain Collision Domain 1 Collision Domain 2 Bridges terminate collision domains 2003, Cisco Systems, Inc.

More information

VLANs. 2003, Cisco Systems, Inc. All rights reserved. 2-1

VLANs. 2003, Cisco Systems, Inc. All rights reserved. 2-1 VLANs 2003, Cisco Systems, Inc. All rights reserved. 2-1 Traditional Campus Networks Broadcast Domain Collision Domain 1 Collision Domain 2 Bridges terminate collision domains 2003, Cisco Systems, Inc.

More information

Lab 7.5.3: Troubleshooting the Wireless WRT300N

Lab 7.5.3: Troubleshooting the Wireless WRT300N Lab 7.5.3: Troubleshooting the Wireless WRT300N Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Fa0/1.5 5.5.5.10 255.255.255.0 N/A Fa0/1.10 192.168.10.1 255.255.255.0

More information

Chapter 3. Virtual Local Area Networks (VLANs) Part II

Chapter 3. Virtual Local Area Networks (VLANs) Part II Chapter 3 Virtual Local Area Networks (VLANs) Part II CCNA3-1 Chapter 3-2 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor,

More information

Sections Describing Standard Software Features

Sections Describing Standard Software Features 27 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic-qos (auto-qos) commands or by using standard QoS commands. With QoS, you can give preferential treatment to

More information

IP SLA Service Performance Testing

IP SLA Service Performance Testing This module describes how to configure the ITU-T Y.1564 Ethernet service performance test methodology that measures the ability of a network device to enable movement of traffic at the configured data

More information

Cisco Exam Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Version: 6.0 [ Total Questions: 79 ]

Cisco Exam Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Version: 6.0 [ Total Questions: 79 ] s@lm@n Cisco Exam 300-135 Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Version: 6.0 [ Total Questions: 79 ] Topic break down Topic No. of Questions Topic 1: Mix Questions 26 Topic 2: Troubleshooting

More information

TS Open Day Data Center Fibre Channel over IP

TS Open Day Data Center Fibre Channel over IP TS Open Day Data Center Fibre Channel over IP Presented by: Rong Cheng- TAC LAN & DCN China Jan 30 th, 2015 2013 Cisco and/or its affiliates. All rights reserved. 1 FCIP Introduction FCIP Configuration

More information

Lab Configuring Basic Switch Settings (Solution)

Lab Configuring Basic Switch Settings (Solution) (Solution) Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway S1 VLAN 99 192.168.1.2 255.255.255.0 192.168.1.1 PC-A NIC 192.168.1.10 255.255.255.0 192.168.1.1

More information

LARGE SCALE DYNAMIC MULTIPOINT VPN

LARGE SCALE DYNAMIC MULTIPOINT VPN LARGE SCALE DYNAMIC MULTIPOINT VPN NOVEMBER 2004 1 INTRODUCTION Presentation_ID 2004, Cisco Systems, Inc. All rights reserved. 2 Dynamic Multipoint VPN Facts Dynamic Multipoint VPN (DMVPN) can work with

More information

IEEE 802.1Q-in-Q VLAN Tag Termination

IEEE 802.1Q-in-Q VLAN Tag Termination IEEE 802.1Q-in-Q VLAN Tag Termination Encapsulating IEEE 802.1Q VLAN tags within 802.1Q enables service providers to use a single VLAN to support customers who have multiple VLANs. The IEEE 802.1Q-in-Q

More information

Chapter 6: Network Layer

Chapter 6: Network Layer Chapter 6: Network Layer Introduction to Networks Intro to Networks v5 Network Layer Intro to Networks v5 2 The Network Layer End to End Transport processes Addressing end devices Encapsulation of Packets

More information

Chapter 2. Switch Concepts and Configuration. Part I

Chapter 2. Switch Concepts and Configuration. Part I Chapter 2 Switch Concepts and Configuration Part I CCNA3-1 Chapter 2-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor,

More information

Configuring EtherChannels and Layer 2 Trunk Failover

Configuring EtherChannels and Layer 2 Trunk Failover 28 CHAPTER Configuring EtherChannels and Layer 2 Trunk Failover This chapter describes how to configure EtherChannels on Layer 2 ports on the switch. EtherChannel provides fault-tolerant high-speed links

More information

Implementing Inter-VLAN Routing

Implementing Inter-VLAN Routing Internetwork Communications C:>ping 72.6.30.00 Implementing Inter-VLN Routing Can two hosts on different subnets communicate without a router? No What would happen if a host tried to ping another host?

More information

IEEE 802.1ah on Provider Backbone Bridges

IEEE 802.1ah on Provider Backbone Bridges IEEE 802.1ah on Provider Backbone Bridges First Published: November 25, 2009 Last Updated: February 8, 2011 The IEEE 802.1ah on Provider Backbone Bridges feature enables MAC-in-MAC tunneling on Ethernet

More information

Implementing Virtual Private LAN Services

Implementing Virtual Private LAN Services Implementing Virtual Private LAN Services This module provides the conceptual and configuration infmation f Virtual Private LAN Services (VPLS) on Cisco IOS XR software. VPLS suppts Layer 2 VPN technology

More information

Implementing VXLAN. Prerequisites for implementing VXLANs. Information about Implementing VXLAN

Implementing VXLAN. Prerequisites for implementing VXLANs. Information about Implementing VXLAN This module provides conceptual information for VXLAN in general and configuration information for layer 2 VXLAN on Cisco ASR 9000 Series Router. For configuration information of layer 3 VXLAN, see Implementing

More information

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017 CS 43: Computer Networks Switches and LANs Kevin Webb Swarthmore College December 5, 2017 Ethernet Metcalfe s Ethernet sketch Dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology

More information

Deploy VPLS. APNIC Technical Workshop October 23 to 25, Selangor, Malaysia Hosted by:

Deploy VPLS. APNIC Technical Workshop October 23 to 25, Selangor, Malaysia Hosted by: Deploy VPLS APNIC Technical Workshop October 23 to 25, 2017. Selangor, Malaysia Hosted by: Issue Date: [201609] Revision: [01] Acknowledgement Cisco Systems 2 VPLS Overview 3 Virtual Private LAN Service

More information

Configure Virtual LANs in Layer 2 VPNs

Configure Virtual LANs in Layer 2 VPNs The Layer 2 Virtual Private Network (L2VPN) feature enables Service Providers (SPs) to provide L2 services to geographically disparate customer sites. A virtual local area network (VLAN) is a group of

More information

Configuring Interface Characteristics

Configuring Interface Characteristics CHAPTER 10 This chapter defines the types of interfaces on the switch and describes how to configure them. Unless otherwise noted, the term switch refers to a standalone switch and to a switch stack. The

More information

CCNA Semester 3 labs. Labs for chapters 2 10

CCNA Semester 3 labs. Labs for chapters 2 10 CCNA Semester 3 labs Labs for chapters 2 10 2.1.4.5 Lab - Configure Extended VLANs, VTP, and DTP 2.2.2.5 Lab - Troubleshooting Inter-VLAN Routing 3.1.2.12 Lab - Building a Switched Network with Redundant

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 14 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Catalyst 3750 switch. It includes information about VLAN

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on your Catalyst 3550 switch. It includes information about VLAN

More information

Lab - Troubleshooting VLAN Configurations (Instructor Version Optional Lab)

Lab - Troubleshooting VLAN Configurations (Instructor Version Optional Lab) (Instructor Version Optional Lab) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional activities are designed to enhance understanding and/or

More information

Antonio Cianfrani. Virtual LAN (VLAN)

Antonio Cianfrani. Virtual LAN (VLAN) Antonio Cianfrani Virtual LAN (VLAN) Ethernet Ethernet standard (IEEE 802.3) for Local Area Network (LAN). CSMA/CD (Carrier Sense Multiple Access/Collision Detection) Carrier Sense: all devices have to

More information

TRILL Transparent Transport over MPLS

TRILL Transparent Transport over MPLS TRILL Transparent Transport over MPLS draft-muks-trill-transport-over-mpls- 00 Mohammad Umair, Kingston Smiler, Donald Eastlake, Lucy Yong Overview This draft covers two problems as follows. Providing

More information

Route between VLANs using a 3560 switch with an internal route processor using Cisco Express Forwarding (CEF).

Route between VLANs using a 3560 switch with an internal route processor using Cisco Express Forwarding (CEF). Lab 3- Part I Inter-VLAN routing with a Multilayer Switch Configuration and Management of Networks - 2014 Topology Objective Route between VLANs using a 3560 switch with an internal route processor using

More information

H-VPLS N-PE Redundancy for MPLS Access

H-VPLS N-PE Redundancy for MPLS Access The feature enables two network provider edge (N-PE) devices to provide failover services to a user provider edge (U-PE) device in a hierarchical virtual private LAN service (H-VPLS). Having redundant

More information

Data Center Configuration. 1. Configuring VXLAN

Data Center Configuration. 1. Configuring VXLAN Data Center Configuration 1. 1 1.1 Overview Virtual Extensible Local Area Network (VXLAN) is a virtual Ethernet based on the physical IP (overlay) network. It is a technology that encapsulates layer 2

More information

Configuring Web Cache Services By Using WCCP

Configuring Web Cache Services By Using WCCP CHAPTER 44 Configuring Web Cache Services By Using WCCP This chapter describes how to configure your Catalyst 3560 switch to redirect traffic to wide-area application engines (such as the Cisco Cache Engine

More information

Configuring EtherChannels and Layer 2 Trunk Failover

Configuring EtherChannels and Layer 2 Trunk Failover 35 CHAPTER Configuring EtherChannels and Layer 2 Trunk Failover This chapter describes how to configure EtherChannels on Layer 2 and Layer 3 ports on the switch. EtherChannel provides fault-tolerant high-speed

More information

ATM in TCP/IP environment: Adaptations and Effectiveness

ATM in TCP/IP environment: Adaptations and Effectiveness Bremen Institute of Industrial Technology and Applied Work Science ATM in TCP/IP environment: Adaptations and Effectiveness Dipl.-Ing. Kai-Oliver Detken, BIBA ATM Traffic Symposium, Mykonos, Greece, September

More information