Troubleshooting sieci opartej na. Mariusz Kazmierski, CCIE #25082 (R&S, SP) TAC EMEAR Technical Leader Switching

Size: px
Start display at page:

Download "Troubleshooting sieci opartej na. Mariusz Kazmierski, CCIE #25082 (R&S, SP) TAC EMEAR Technical Leader Switching"

Transcription

1 Troubleshooting sieci opartej na architekturze SDA Mariusz Kazmierski, CCIE #25082 (R&S, SP) TAC EMEAR Technical Leader Switching

2 What s on the Network? Overlay Network Control Plane based on LISP Policy Plane based on TrustSec Data Plane based on VXLAN Underlay Network Assumption: Underlay is working 2

3 SD-Access topology Fabric Border Nodes C Control Plane Node Control-Plane(CP) Nodes Map System that manages the Endpoint to Gateway (Edge or Border) relationship. B B Border Nodes The L3 Gateway device (Core), that connects External L3 network(s) to Fabric. Intermediate Nodes Fabric Edge(FE) Nodes The L3 Gateway device (Access or Distribution), that connects Endpoints to Fabric. Intermediate Nodes Basic L3 (IP) Forwarders in the Underlay. Fabric Edge Nodes 3

4 Our Playground Control-Plane(C) Nodes: Map System that manages the Endpoint to Gateway (Edge or Border) relationship. Border Nodes (B) The L3 Gateway device (Core), that connects External L3 network(s) to Fabric. Fabric Edge(E) Nodes The L3 Gateway device (Access or Distribution), that connects Endpoints to Fabric. 4

5 Our Playground Underlay Network Routing ID (RLOC) IP address of the LISP router facing ISP Overlay Network Endpoint Identifier(EID) IP address of a host VN (VRF) - Campus Instance Id

6 Terminology Egress Tunnel Router (ETR): An ETR is a device that is the tunnel endpoint; it accepts an IP packet where the destination address in the "outer" IP header is one of its own RLOCs. Ingress Tunnel Router (ITR): An ITR is a device that is the tunnel start point; it receives IP packets from site endsystems on one side and sends LISP-encapsulated IP packets, across the Internet to an ETR, on the other side. xtr: A xtr refers to a device which functions both as an ITR and an ETR (which is typical), when the direction of data flow is not part of the context description Proxy xtr (PxTR): A PxTR is used for inter-networking between LISP and Non-LISP sites. Scalable Group (SG): Cisco TrustSec uses the device and user credentials acquired during authentication for classifying the packets by scalable groups (SGs) as they enter the network Scalable Group Tag (SGT): Scalable group tag is the tag that is added in the packet to classify the security group. 6

7 What is new in the control plane? Control Plane based on LISP Multiple Routing Tables BEFORE Single Host tracking database - Map Server AFTER C 7

8 8

9 Here is how you begin Host authentication DHCP packet flow Host resolution Host registration East West Traffic... 9

10 Here is how you begin Host authentication DHCP packet flow Host Resolution Host Registration East West Traffic... 10

11 Host authentication configuration (1/2) aaa new-model aaa group server radius dnac-group server name dnac-radius_ ip radius source-interface Loopback0 aaa authentication login default group dnac-group local aaa authentication enable default enable aaa authentication dot1x default group dnac-group aaa authorization exec default group dnac-group local aaa authorization network default group dnac-group aaa authorization network dnac-cts-list group dnac-group aaa accounting dot1x default start-stop group dnac-group aaa server radius dynamic-author client server-key C!sco123

12 Host authentication configuration (2/2) interface GigabitEthernet2/0/13 switchport mode access switchport voice vlan 4000 device-tracking attach-policy IPDT_MAX_10 authentication control-direction in authentication event server dead action authorize vlan 3999 authentication event server dead action authorize voice authentication host-mode multi-auth authentication order dot1x mab authentication priority dot1x mab authentication port-control auto authentication periodic authentication timer reauthenticate server authentication timer inactivity server dynamic mab dot1x pae authenticator dot1x timeout tx-period 10 spanning-tree portfast end

13 Host authentication ISE perspective - users & groups 13

14 Host authentication ISE perspective - authorization profiles

15 Host authentication ISE perspective security groups

16 Host authentication ISE perspective policy

17 Topology refresh TAC user connects to the network 17

18 Host authentication Authentication on edge node (1/3) SDA-D STACK#show authentication sessions interface gi2/0/13 Interface MAC Address Method Domain Status Fg Session ID Gi2/0/ d dot1x DATA Auth AC13660E DD07D9721 SDA-D STACK#show authentication sessions interface gi2/0/13 details Interface: GigabitEthernet2/0/13 IIF-ID: 0x1BD564A7 MAC Address: d IPv6 Address: fe80::4913:cf31:eba3:e337 IPv4 Address: User-Name: tim Status: Authorized Domain: DATA Oper host mode: multi-auth Oper control dir: in Session timeout: N/A Common Session ID: AC13660E DD07D9721 Acct Session ID: 0x Handle: 0xd Current Policy: POLICY_Gi2/0/13

19 Host authentication Authentication on edge node (3/3) SDA-D STACK#show authentication sessions interface gi2/0/13 details (...) Local Policies: Idle timeout: sec Server Policies: Vlan Group: Vlan: 1022 Security Policy: None Security Status: Link Unsecured SGT Value: 14 Method status list: Method dot1x State Authc Success

20 Host authentication Authentication on edge node (2/3) SDA-D STACK#show interface gi2/0/13 switchport Name: Gi2/0/13 Switchport: Enabled Administrative Mode: static access Operational Mode: static access Administrative Trunking Encapsulation: dot1q Operational Trunking Encapsulation: native Negotiation of Trunking: Off Access Mode VLAN: 1022 (192_168_10_0-Campus) Trunking Native Mode VLAN: 1 (default) Administrative Native VLAN tagging: enabled Voice VLAN: 4000 (VOICE_VLAN) SDA-D STACK#show cts role-based sgt-map vrf Campus host Active IPv4-SGT Bindings Information IP Address SGT Source ============================================ LOCAL

21 Here is how you begin Host authentication DHCP packet flow Host registration Host Resolution East West Traffic... 21

22 DHCP packet flow Configuration - edge node interface Vlan1022 description Configured from apic-em mac-address c9f.f45d vrf forwarding Campus ip address ip helper-address no ip redirects ip local-proxy-arp ip route-cache same-interface no lisp mobility liveness test lisp mobility 192_168_10_0-Campus

23 DHCP packet flow Configuration - border node interface Loopback1022 description Loopback Border vrf forwarding Campus ip address ! router bgp address-family ipv4 vrf Campus aggregate-address summary-only redistribute connected! router lisp eid-table vrf Campus instance-id 4098 ipv4 route-export site-registrations ipv4 distance site-registrations 250 ipv4 map-cache site-registration

24 DHCP packet flow in Campus Fabric 1 FE 2 BDR B 1 2 The DHCP client generates a DHCP request and broadcasts it on the network FE adds remote ID in option 82. The packet is sent with src IP of the SVI. 3 DHCP Server replies with offer Border uses the remote ID in option 82 to forward the packet. 5 FE installs the DHCP binding and forwards the reply to client 24

25 DHCP option 82 Agent Circuit ID Option 82 is added: Option 82 Suboption: (1) Agent Circuit ID Length: 6 Agent Circuit ID: fe020d Option 82 format: #show ip dhcp snooping Insertion of option 82 is enabled circuit-id default format: vlan-mod-port Decode: fe020d = fe 02 0D 00 = format (vlan-mod-port) 04 = option length 0x03fe = VLAN = module 2 0D = port 13

26 DHCP option 82 Agent Remote ID Option 82 is added: Option 82 Suboption: (2) Agent Remote ID Length: 10 Agent Remote ID: ac Decode: ac100bfd = ac100bfd 03 = used for LISP (01 = MAC; 02 string) 08 = sub-option length = LISP instance 0x1002 = = 01 IPv4; 02 IPv6 ac = RLOC of xtr (Edge device) -> ac = interface Loopback0 description Fabric Node Router ID ip address

27 DHCP packet flow Bindings SDA-D STACK#show ip dhcp snooping binding MacAddress IpAddress Lease(sec) Type VLAN Interface :50:56:93:10:0D dhcp-snooping 1022 GigabitEthernet2/0/13 Total number of bindings: 1 SDA-D STACK#show ip arp vrf Campus Protocol Address Age (min) Hardware Addr Type Interface Internet d ARPA Vlan1022 SDA-D STACK#show device-tracking database interface gi2/0/13 portdb has 2 entries for interface Gi2/0/13, 2 dynamic Codes: L - Local, S - Static, ND - Neighbor Discovery, ARP - Address Resolution Protocol, DH4 - IPv4 DHCP, DH6 - IPv6 DHCP PKT - Other Packet, API - API created Preflevel flags (prlvl): 0001:MAC and LLA match 0002:Orig trunk 0004:Orig access 0008:Orig trusted trunk 0010:Orig trusted access 0020:DHCP assigned 0040:Cga authenticated 0080:Cert authenticated 0100:Statically assigned Network Layer Address Link Layer Address Interface vlan prlvl age state Time left ND FE80::4913:CF31:EBA3:E d Gi2/0/ mn REACHABLE 91 s DH d Gi2/0/ s REACHABLE 200 s(43296 s) 27

28 Here is how you begin Host authentication DHCP packet flow Host resolution Host registration East West Traffic... 28

29 Topology refresh at this stage all enddevices get IP address / VLAN / SGT assignment. 29

30 Host registration Edge node configuration and local database router lisp instance-id 4098 remote-rloc-probe on-route-change dynamic-eid 192_168_10_0-Campus database-mapping /24 locator-set rloc_d080ca6d bb9-a86c-1eaa14867c33 exit-dynamic-eid SDA-D STACK#show lisp eid-table Campus ipv4 database /32 LISP ETR IPv4 Mapping Database for EID-table vrf Campus (IID 4098), LSBs: 0x1 Entries total 4, no-route 0, inactive /32, dynamic-eid 192_168_10_0-Campus, inherited from default locator-set rloc_d080ca6d bb9-a86c-1eaa14867c33 Locator Pri/Wgt Source State /10 cfg-intf site-self, reachable 30

31 Host registration Registration process 31

32 Host registration Control node configuration and site data router lisp site site_uci description map-server configured from apic-em authentication-key uci eid-prefix instance-id /24 accept-more-specifics SDA-D #show lisp eid-table Campus site LISP Site Registration Information * = Some locators are down or unreachable # = Some registrations are sourced by reliable transport Site Name Last Up Who Last Inst EID Prefix Register Registered ID site_uci never no /24 00:16:00 yes# /32 32

33 Here is how you begin Host authentication DHCP packet flow Host resolution Host registration East West Traffic... 33

34 Topology refresh TAC: users : /24 servers : /24 BU: at this stage all end-devices have IP address / VLAN / SGT assignment and are registered to control node. users : /24 servers : /24 34

35 Host resolution Control node - database control node is aware of all hosts in the fabric SDA-D #show lisp eid-table Campus site LISP Site Registration Information * = Some locators are down or unreachable # = Some registrations are sourced by reliable transport Site Name Last Up Who Last Inst EID Prefix Register Registered ID site_uci never no /24 03:35:40 yes# /32 never no /24 1d20h yes# /32 never no /24 1d20h yes# /32 35

36 Host resolution Edge node - database edge node need to query control node to learn new prefixes SDA-D STACK#show lisp eid-table Campus ipv4 map-cache LISP IPv4 Mapping Cache for EID-table vrf Campus (IID 4098), 10 entries /0, uptime: 2d20h, expires: never, via static-send-map-request Negative cache entry, action: send-map-request 36

37 Host resolution Communication 37

38 Host resolution Edge node - map-cache SDA-D STACK#show lisp eid-table Campus ipv4 map-cache /32 LISP IPv4 Mapping Cache for EID-table vrf Campus (IID 4098), 10 entries /32, uptime: 13:44:58, expires: 10:15:01, via map-reply, complete Sources: map-reply State: complete, last modified: 13:44:58, map-source: Idle, Packets out: 0(0 bytes) Encapsulating dynamic-eid traffic Locator Uptime State Pri/Wgt Encap-IID :44:58 up 10/10 - Last up-down state change: 13:44:58, state change count: 1 Last route reachability change: 13:44:58, state change count: 1 Last priority / weight change: never/never RLOC-probing loc-status algorithm: Last RLOC-probe sent: 13:44:58 (rtt 4ms) 38

39 Here is how you begin Host authentication DHCP packet flow Host resolution Host registration East-West Traffic... 39

40 Topology refresh at this stage all end-devices get IP address / VLAN / SGT assignment and are registered to control node and aware of end-point location TAC: users : /24 servers : /24 BU: users : /24 servers : /24 packet capture packet capture packet capture 40

41 East-west Traffic Security / SGTs scenario: TAC user ßàTAC Server

42 Topology refresh scenario: TAC user ßàTAC Server 42

43 East-west Traffic Packet capture (ingress to fabric) scenario: TAC user ßàTAC Server SDA-D STACK#show monitor capture capin buffer Starting the packet display... Press Ctrl + Shift + 6 to exit > ICMP 74 Echo (ping) request id=0x0001, seq=41/10496, ttl= > ICMP 74 Echo (ping) request id=0x0001, seq=42/10752, ttl= > ICMP 74 Echo (ping) request id=0x0001, seq=43/11008, ttl= > ICMP 74 Echo (ping) request id=0x0001, seq=44/11264, ttl=128 SDA-D STACK#show monitor capture capin buffer dump Starting the packet display... Press Ctrl + Shift + 6 to exit c 9f f4 5d d ].PV...E c 12 eb c0 a8 0a 65 c0 a8.<...e b 0c d M2...)abcdef a 6b 6c 6d 6e 6f ghijklmnopqrstuv wabcdefghi 43

44 East-west Traffic Packet capture (ingress to fabric) scenario: TAC user ßàTAC Server 44

45 East-west Traffic Packet capture (ingress to fabric point-of-exit) scenario: TAC user ßàTAC Server SDA-D #sh monitor capture capin buffer display-filter icmp Starting the packet display... Press Ctrl + Shift + 6 to exit > ICMP 124 Echo (ping) request id=0x0001, seq=45/11520, ttl= > ICMP 124 Echo (ping) request id=0x0001, seq=46/11776, ttl= > ICMP 124 Echo (ping) request id=0x0001, seq=47/12032, ttl= > ICMP 124 Echo (ping) request id=0x0001, seq=48/12288, ttl=127 SDA-D #show monitor capture capin buffer display-filter icmp dump Starting the packet display... Press Ctrl + Shift + 6 to exit ff 8c 6f e4 64 f6 9d 71 b P...o.d..q.@..E e 0e f e 11 cb 60 ac ac 13.n..@.~..`..f ff b5 00 5a e d...z ba 25 cd f4 ad c 9f % c 12 f f c0 a8 0a 65 E..<...e 0050 c0 a8 0b 0c d 2e d M...-abcd a 6b 6c 6d 6e 6f efghijklmnopqrst uvwabcdefghi 45

46 East-west Traffic Packet capture (ingress to fabric point-of-exit) scenario: TAC user ßàTAC Server

47 East-west Traffic Security / SGTs scenario: TAC user ßàTAC Server SDA-D #show cts role-based permissions IPv4 Role-based permissions default: Permit IP-00 IPv4 Role-based permissions from group 14:SDA_TAC_Users to group 16:SDA_TAC_Servers: Permit IP-00 RBACL Monitor All for Dynamic Policies : FALSE RBACL Monitor All for Configured Policies : FALS SDA-D #show cts role-based counters from 14 to 16 Role-based IPv4 counters From To SW-Denied HW-Denied SW-Permit HW-Permit SW-Monitor HW-Monitor

48 Topology refresh scenario: TAC user ßà BU Server 48

49 East-West Traffic Packet capture (ingress to fabric) scenario: TAC user ßàBU Server SDA-D STACK#show monitor capture capin buf display-filter icmp Starting the packet display... Press Ctrl + Shift + 6 to exit > ICMP 74 Echo (ping) request id=0x0001, seq=61/15616, ttl= > ICMP 74 Echo (ping) request id=0x0001, seq=62/15872, ttl= > ICMP 74 Echo (ping) request id=0x0001, seq=63/16128, ttl= > ICMP 74 Echo (ping) request id=0x0001, seq=64/16384, ttl=128 SDA-D STACK#sh monitor capture capin buffer display-filter icmp dump Starting the packet display... Press Ctrl + Shift + 6 to exit c 9f f4 5d d ].PV...E c d c0 a8 0a 65 c0 a8.<.a...e d d 1e d M...=abcdef a 6b 6c 6d 6e 6f ghijklmnopqrstuv wabcdefghi 49

50 East-West Traffic Packet capture (ingress to fabric) scenario: TAC user ßàBU Server

51 East-west Traffic Packet capture (ingress to fabric point-of-exit) scenario: TAC user ßàTAC Server SDA-D #show monitor capture capin buffer display-filter icmp Starting the packet display... Press Ctrl + Shift + 6 to exit > ICMP 124 Echo (ping) request id=0x0001, seq=61/15616, ttl= > ICMP 124 Echo (ping) request id=0x0001, seq=62/15872, ttl= > ICMP 124 Echo (ping) request id=0x0001, seq=63/16128, ttl= > ICMP 124 Echo (ping) request id=0x0001, seq=64/16384, ttl=127 SDA-D #show monitor capture capin buffer display-filter icmp dump Starting the packet display... Press Ctrl + Shift + 6 to exit c 5d e f6 9d 71 b ].Tdd..q.@..E e 0f 3f e 11 cb 12 ac ac 13.n.?@.~...f ff b5 00 5a e d...z ba 25 cd f4 ad c 9f % c f d c0 a8 0a 65 E..<.a...e 0050 c0 a8 15 0d d 1e d M...=abcd a 6b 6c 6d 6e 6f efghijklmnopqrst uvwabcdefghi 51

52 East-west Traffic Packet capture (ingress to fabric point-of-exit) scenario: TAC user ßàTAC Server

53 East-west Traffic Security / SGTs scenario: TAC user ßàTAC Server SDA-D #show cts role-based permissions IPv4 Role-based permissions default: Permit IP-00 IPv4 Role-based permissions from group 14:SDA_TAC_Users to group 18:SDA_BU_Servers: Deny IP-00 RBACL Monitor All for Dynamic Policies : FALSE RBACL Monitor All for Configured Policies : FALSE SDA-D #sh cts role-based counters from 14 to 18 Role-based IPv4 counters From To SW-Denied HW-Denied SW-Permit HW-Permit SW-Monitor HW-Monitor

54 Here is how you begin Host authentication DHCP packet flow Host registration Host Resolution East-West Traffic ALL GOOD J 54

55 Here is how you begin

56 Dziękuję za uwagę!

DNA SA Border Node Support

DNA SA Border Node Support Digital Network Architecture (DNA) Security Access (SA) is an Enterprise architecture that brings together multiple building blocks needed for a programmable, secure, and highly automated fabric. Secure

More information

Contents. Introduction

Contents. Introduction Contents Introduction Prerequisites Requirements Components Used Configure Network Diagram ISE - Configuration Steps 1. SGT for Finance and Marketing 2. Security group ACL for traffic Marketing ->Finance

More information

LISP Generalized SMR

LISP Generalized SMR The feature enables LISP xtr (ITR and ETR) to update map cache when there is a change in database mapping. Note There is no configuration commands for this feature. This feature is turned on automatically.

More information

GETVPN+LISP Lab Guide

GETVPN+LISP Lab Guide GETVPN+LISP Lab Guide Developers and Lab Proctors This lab was created by: Gregg Schudel, TME LISP Development Team Version 1.0: Created by Gregg Schudel Lab proctor: Gregg Schudel (gschudel@cisco.com)

More information

Contents. Introduction. Prerequisites. Configure. Requirements. Components Used. Network Diagram

Contents. Introduction. Prerequisites. Configure. Requirements. Components Used. Network Diagram Contents Introduction Prerequisites Requirements Components Used Configure Network Diagram Traffic Flow Configurations Switch 3850-1 Switch 3850-2 ISE Verify References Related Cisco Support Community

More information

Campus Fabric Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 3650 Switches)

Campus Fabric Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 3650 Switches) Campus Fabric Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 3650 Switches) First Published: 2017-07-31 Last Modified: 2017-11-03 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive

More information

Evolving your Campus Network with. Campus Fabric. Shawn Wargo. Technical Marketing Engineer BRKCRS-3800

Evolving your Campus Network with. Campus Fabric. Shawn Wargo. Technical Marketing Engineer BRKCRS-3800 Evolving your Campus Network with Campus Fabric Shawn Wargo Technical Marketing Engineer BRKCRS-3800 Campus Fabric Abstract Is your Campus network facing some, or all, of these challenges? Host Mobility

More information

Campus Fabric Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9300 Switches)

Campus Fabric Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9300 Switches) Campus Fabric Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9300 Switches) First Published: 2017-07-31 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706

More information

Deploying LISP Host Mobility with an Extended Subnet

Deploying LISP Host Mobility with an Extended Subnet CHAPTER 4 Deploying LISP Host Mobility with an Extended Subnet Figure 4-1 shows the Enterprise datacenter deployment topology where the 10.17.1.0/24 subnet in VLAN 1301 is extended between the West and

More information

LISP Parallel Model Virtualization

LISP Parallel Model Virtualization Finding Feature Information, page 1 Information About, page 1 How to Configure, page 6 Configuration Examples for, page 24 Additional References, page 25 Feature Information for, page 26 Finding Feature

More information

Auto Identity. Auto Identity. Finding Feature Information. Information About Auto Identity. Auto Identity Overview. Auto Identity, page 1

Auto Identity. Auto Identity. Finding Feature Information. Information About Auto Identity. Auto Identity Overview. Auto Identity, page 1 , page 1 The feature provides a set of built-in policies at global configuration and interface configuration modes. This feature is available only in Class-Based Policy Language (CPL) control policy-equivalent

More information

Cisco Campus Fabric Introduction. Vedran Hafner Systems engineer Cisco

Cisco Campus Fabric Introduction. Vedran Hafner Systems engineer Cisco Cisco Campus Fabric Introduction Vedran Hafner Systems engineer Cisco Campus Fabric Abstract Is your Campus network facing some, or all, of these challenges? Host Mobility (w/o stretching VLANs) Network

More information

SD-Access Wireless: why would you care?

SD-Access Wireless: why would you care? SD-Access Wireless: why would you care? CUWN Architecture - Centralized Overview Policy Definition Enforcement Point for Wi-Fi clients Client keeps same IP address while roaming WLC Single point of Ingress

More information

Campus Fabric. How To Integrate With Your Existing Networks. Kedar Karmarkar - Technical Leader BRKCRS-2801

Campus Fabric. How To Integrate With Your Existing Networks. Kedar Karmarkar - Technical Leader BRKCRS-2801 Campus Fabric How To Integrate With Your Existing Networks Kedar Karmarkar - Technical Leader Campus Fabric Abstract Is your Campus network facing some, or all, of these challenges? Host Mobility (w/o

More information

LISP Multicast. Finding Feature Information. Prerequisites for LISP Multicast

LISP Multicast. Finding Feature Information. Prerequisites for LISP Multicast The feature introduces support for carrying multicast traffic over a Locator ID Separation Protocol (LISP) overlay. This support currently allows for unicast transport of multicast traffic with head-end

More information

LISP A Next-Generation Networking Architecture

LISP A Next-Generation Networking Architecture LISP A Next-Generation Networking Architecture LISP Disjointed RLOC Space Technical Details Version 0.8 30 October 2013 LISP Disjointed RLOC Space Details Agenda LISP Disjointed RLOC Space Technical Details

More information

LISP Router IPv6 Configuration Commands

LISP Router IPv6 Configuration Commands ipv6 alt-vrf, page 2 ipv6 etr, page 4 ipv6 etr accept-map-request-mapping, page 6 ipv6 etr map-cache-ttl, page 8 ipv6 etr map-server, page 10 ipv6 itr, page 13 ipv6 itr map-resolver, page 15 ipv6 map-cache-limit,

More information

Cisco IOS LISP Application Note Series: Lab Testing Guide

Cisco IOS LISP Application Note Series: Lab Testing Guide Cisco IOS LISP Application Note Series: Lab Testing Guide Version 3.0 (28 April 2011) Background The LISP Application Note Series provides targeted information that focuses on the integration configuration

More information

TTL Propagate Disable and Site-ID Qualification

TTL Propagate Disable and Site-ID Qualification The TTL Propagate Disable feature supports disabling of the TTL (Time-To-Live) propagation for implementing the traceroute tool in a LISP network when RLOC and EID belong to different address-family. The

More information

Locator ID Separation Protocol (LISP) Overview

Locator ID Separation Protocol (LISP) Overview Locator ID Separation Protocol (LISP) is a network architecture and protocol that implements the use of two namespaces instead of a single IP address: Endpoint identifiers (EIDs) assigned to end hosts.

More information

IP Routing: LISP Configuration Guide, Cisco IOS Release 15M&T

IP Routing: LISP Configuration Guide, Cisco IOS Release 15M&T First Published: 2012-07-27 Last Modified: 2013-03-29 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)

More information

INTRODUCTION 2 DOCUMENT USE PREREQUISITES 2

INTRODUCTION 2 DOCUMENT USE PREREQUISITES 2 Table of Contents INTRODUCTION 2 DOCUMENT USE PREREQUISITES 2 LISP MOBILITY MODES OF OPERATION/CONSUMPTION SCENARIOS 3 LISP SINGLE HOP SCENARIO 3 LISP MULTI- HOP SCENARIO 3 LISP IGP ASSIT MODE 4 LISP INTEGRATION

More information

Configuring IPv6 First-Hop Security

Configuring IPv6 First-Hop Security This chapter describes the IPv6 First-Hop Security features. This chapter includes the following sections: Finding Feature Information, on page 1 Introduction to First-Hop Security, on page 1 RA Guard,

More information

Cisco Nexus 7000 Series NX-OS LISP Command Reference

Cisco Nexus 7000 Series NX-OS LISP Command Reference First Published: 2016-11-24 Last Modified: -- Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax:

More information

Catalyst 4500 Series IOS Commands

Catalyst 4500 Series IOS Commands CHAPTER Catalyst 4500 Series IOS Commands New Commands call-home (global configuration) call-home request call-home send call-home send alert-group call-home test clear energywise neighbors clear errdisable

More information

Switch and Wireless LAN Controller Configuration Required to Support Cisco ISE Functions

Switch and Wireless LAN Controller Configuration Required to Support Cisco ISE Functions Switch and Wireless LAN Controller Configuration Required to Support Cisco ISE Functions To ensure Cisco ISE is able to interoperate with network switches and functions from Cisco ISE are successful across

More information

IPv6 Snooping. Finding Feature Information. Restrictions for IPv6 Snooping

IPv6 Snooping. Finding Feature Information. Restrictions for IPv6 Snooping The feature bundles several Layer 2 IPv6 first-hop security features, including IPv6 neighbor discovery inspection, IPv6 device tracking, IPv6 address glean, and IPv6 binding table recovery, to provide

More information

P ART 3. Configuring the Infrastructure

P ART 3. Configuring the Infrastructure P ART 3 Configuring the Infrastructure CHAPTER 8 Summary of Configuring the Infrastructure Revised: August 7, 2013 This part of the CVD section discusses the different infrastructure components that are

More information

Software-Defined Access Wireless

Software-Defined Access Wireless Introduction to, page 1 Configuring SD-Access Wireless (CLI), page 7 Introduction to The Enterprise Fabric provides end-to-end enterprise-wide segmentation, flexible subnet addressing, and controller-based

More information

Contents. EVPN overview 1

Contents. EVPN overview 1 Contents EVPN overview 1 EVPN network model 1 MP-BGP extension for EVPN 2 Configuration automation 3 Assignment of traffic to VXLANs 3 Traffic from the local site to a remote site 3 Traffic from a remote

More information

Cisco IOS LISP Application Note Series: Access Control Lists

Cisco IOS LISP Application Note Series: Access Control Lists Cisco IOS LISP Application Note Series: Access Control Lists Version 1.1 (28 April 2011) Background The LISP Application Note Series provides targeted information that focuses on the integration and configuration

More information

Figure 1 - Controller-Initiated Web Login Flow

Figure 1 - Controller-Initiated Web Login Flow Figure 1 - Controller-Initiated Web Login Flow Figure 2 Controller-Initiated Web Login with MAC Cache Figure 3 Server-Initiated Web Login Figure 4 Server Initated Web Login with MAC Cache Figure 5 Server-Initiated

More information

TrustSec Configuration Guides. TrustSec Capabilities on Wireless 8.4 Software-Defined Segmentation through SGACL Enforcement on Wireless Access Points

TrustSec Configuration Guides. TrustSec Capabilities on Wireless 8.4 Software-Defined Segmentation through SGACL Enforcement on Wireless Access Points TrustSec Configuration Guides TrustSec Capabilities on Wireless 8.4 Software-Defined Segmentation through SGACL Enforcement on Wireless Access Points Table of Contents TrustSec Capabilities on Wireless

More information

DNA Campus Fabric. How to Migrate The Existing Network. Kedar Karmarkar - Technical Leader BRKCRS-2801

DNA Campus Fabric. How to Migrate The Existing Network. Kedar Karmarkar - Technical Leader BRKCRS-2801 DNA Campus Fabric How to Migrate The Existing Network Kedar Karmarkar - Technical Leader Campus Fabric Abstract Is your Campus network facing some, or all, of these challenges? Host Mobility (w/o stretching

More information

Software-Defined Access Wireless

Software-Defined Access Wireless Introduction to, page 1 Configuring SD-Access Wireless (CLI), page 7 Enabling SD-Access Wireless (GUI), page 8 Configuring SD-Access Wireless VNID (GUI), page 9 Configuring SD-Access Wireless WLAN (GUI),

More information

Configure IBNS 2.0 for Single-Host and Multi- Domain Scenarios

Configure IBNS 2.0 for Single-Host and Multi- Domain Scenarios Configure IBNS 2.0 for Single-Host and Multi- Domain Scenarios Contents Introduction Prerequisites Requirements Components Used Configure Configuration Theory Scenario for Single-Host Scenario for Multi-Domain

More information

Mobility and Virtualization in the Data Center with LISP and OTV

Mobility and Virtualization in the Data Center with LISP and OTV Cisco Expo 2012 Mobility and Virtualization in the Data Center with LISP and OTV Tech DC2 Martin Diviš Cisco, CSE, mdivis@cisco.com Cisco Expo 2012 Cisco and/or its affiliates. All rights reserved. 1 Twitter

More information

Easy Virtual Network Configuration Example

Easy Virtual Network Configuration Example Easy Virtual Network Configuration Example Document ID: 117974 Contributed by Fabrice Ducomble, Cisco TAC Engineer. Aug 04, 2014 Contents Introduction Prerequisites Requirements Components Used Background

More information

Cisco SD-Access Policy Driven Manageability

Cisco SD-Access Policy Driven Manageability BRKCRS-3811 Cisco SD-Access Policy Driven Manageability Victor Moreno, Distinguished Engineer Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session

More information

FiberstoreOS IPv6 Security Configuration Guide

FiberstoreOS IPv6 Security Configuration Guide FiberstoreOS IPv6 Security Configuration Guide Contents 1 Configuring IPv6 over IPv4 Tunnel...4 1.1 Overview... 4 1.1.2 Manual Tunnel... 5 1.1.3 6to4 Tunnel... 6 1.1.4 ISATAP Tunnel...7 1.2 Configure Manual

More information

Intelligent WAN Multiple VRFs Deployment Guide

Intelligent WAN Multiple VRFs Deployment Guide Cisco Validated design Intelligent WAN Multiple VRFs Deployment Guide September 2017 Table of Contents Table of Contents Deploying the Cisco Intelligent WAN... 1 Deploying the Cisco IWAN Multiple VRFs...

More information

Software-Defined Access Wireless

Software-Defined Access Wireless Introduction to, page 1 Configuring SD-Access Wireless (CLI), page 7 Enabling SD-Access Wireless (GUI), page 8 Configuring SD-Access Wireless VNID (GUI), page 9 Configuring SD-Access Wireless WLAN (GUI),

More information

Configuring Network Admission Control

Configuring Network Admission Control 45 CHAPTER This chapter describes how to configure Network Admission Control (NAC) on Catalyst 6500 series switches. With a PFC3, Release 12.2(18)SXF2 and later releases support NAC. Note For complete

More information

FiberstoreOS. Security Configuration Guide

FiberstoreOS. Security Configuration Guide FiberstoreOS Security Configuration Guide Contents 1 Configuring Port Security...1 1.1 Overview...1 1.2 Topology... 2 1.3 Configurations...2 1.4 Validation... 3 2 Configuring Vlan Security... 4 2.1 Overview...4

More information

Configuring Web-Based Authentication

Configuring Web-Based Authentication CHAPTER 61 This chapter describes how to configure web-based authentication. Cisco IOS Release 12.2(33)SXH and later releases support web-based authentication. Note For complete syntax and usage information

More information

FiberstoreOS IPv6 Service Configuration Guide

FiberstoreOS IPv6 Service Configuration Guide FiberstoreOS IPv6 Service Configuration Guide Contents 1 Configuring IPv6 over IPv4 Tunnel...5 1.1 Overview...5 1.1.2 Manual Tunnel...6 1.1.3 6to4 Tunnel...6 1.1.4 ISATAP Tunnel...7 1.2 Configure Manual

More information

Configuring Web-Based Authentication

Configuring Web-Based Authentication CHAPTER 42 This chapter describes how to configure web-based authentication. It consists of these sections: About Web-Based Authentication, page 42-1, page 42-5 Displaying Web-Based Authentication Status,

More information

Več kot SDN - SDA arhitektura v uporabniških omrežjih

Več kot SDN - SDA arhitektura v uporabniških omrežjih Več kot SDN - SDA arhitektura v uporabniških omrežjih Aleksander Kocelj SE Cisco Agenda - Introduction to Software Defined Access - Brief description on SDA - Cisco SDA Assurance - DEMO 2 New Requirements

More information

FSOS Security Configuration Guide

FSOS Security Configuration Guide FSOS Security Configuration Guide Contents 1 Configuring Port Security...8 1.1 Overview...8 1.2 Topology... 9 1.3 Configurations...9 1.4 Validation... 10 2 Configuring Vlan Security... 11 2.1 Overview...

More information

TrustSec Configuration Guide. TrustSec with Meraki MS320 Switch Configuration Guide

TrustSec Configuration Guide. TrustSec with Meraki MS320 Switch Configuration Guide TrustSec Configuration Guide TrustSec with Meraki MS320 Switch Configuration Guide Table of Contents TrustSec with Meraki MS320 Switch... 3 Introduction... 3 Summary of Operation... 3 Configuration...

More information

Configuring IEEE 802.1x Port-Based Authentication

Configuring IEEE 802.1x Port-Based Authentication CHAPTER 10 Configuring IEEE 802.1x Port-Based Authentication IEEE 802.1x port-based authentication prevents unauthorized devices (clients) from gaining access to the network. Unless otherwise noted, the

More information

Configuring VXLAN EVPN Multi-Site

Configuring VXLAN EVPN Multi-Site This chapter contains the following sections: About VXLAN EVPN Multi-Site, on page 1 Licensing Requirements for VXLAN EVPN Multi-Site, on page 2 Guidelines and Limitations for VXLAN EVPN Multi-Site, on

More information

Catalyst 4500 Series IOS Commands

Catalyst 4500 Series IOS Commands CHAPTER Catalyst 4500 Series IOS Commands New Commands dot1x guest-vlan supplicant ip dhcp snooping information option allow-untrusted port-security mac-address port-security mac-address sticky port-security

More information

Mobile IP Support for RFC 3519 NAT Traversal

Mobile IP Support for RFC 3519 NAT Traversal The Mobile IP: Support for RFC 3519 NAT Traversal feature introduces an alternative method for tunneling Mobile IP data traffic. New extensions in the Mobile IP registration request and reply messages

More information

Configuring Network Admission Control

Configuring Network Admission Control CHAPTER 59 This chapter describes how to configure Network Admission Control (NAC) in Cisco IOS Release 12.2SX. Note For complete syntax and usage information for the commands used in this chapter, see

More information

Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT

Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT The Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT feature supports the forwarding of packets from a standby

More information

Configure TrustSec Multiple Matrices on ISE 2.2

Configure TrustSec Multiple Matrices on ISE 2.2 Configure TrustSec Multiple Matrices on ISE 2.2 Contents Introduction Prerequisites Requirements Components Used Background Information Multiple Matrices DefCon Matrices Configure Network Diagram Configurations

More information

IEEE 802.1X Multiple Authentication

IEEE 802.1X Multiple Authentication The feature provides a means of authenticating multiple hosts on a single port. With both 802.1X and non-802.1x devices, multiple hosts can be authenticated using different methods. Each host is individually

More information

Contents. Introduction. Prerequisites. Requirements. Components Used

Contents. Introduction. Prerequisites. Requirements. Components Used Contents Introduction Prerequisites Requirements Components Used Background Information Terminology What is VXLAN? Why VXLAN? Configure Network Diagram Configurations 3172-A 9396-A 9396-B Verify Example

More information

Configuring Private VLANs

Configuring Private VLANs Finding Feature Information, on page 1 Prerequisites for Private VLANs, on page 1 Restrictions for Private VLANs, on page 1 Information About Private VLANs, on page 2 How to Configure Private VLANs, on

More information

Remote Access MPLS-VPNs

Remote Access MPLS-VPNs First Published: August 12, 2002 Last Updated: May 4, 2009 The feature allows the service provider to offer a scalable end-to-end Virtual Private Network (VPN) service to remote users. This feature integrates

More information

Configuring MAC Authentication Bypass

Configuring MAC Authentication Bypass Configuring MAC Authentication Bypass Last Updated: January 18, 2012 The MAC Authentication Bypass feature is a MAC-address-based authentication mechanism that allows clients in a network to integrate

More information

Configuring FlexVPN Spoke to Spoke

Configuring FlexVPN Spoke to Spoke Last Published Date: March 28, 2014 The FlexVPN Spoke to Spoke feature enables a FlexVPN client to establish a direct crypto tunnel with another FlexVPN client leveraging virtual tunnel interfaces (VTI),

More information

Configure to Secure a Flexconnect AP Switchport with Dot1x

Configure to Secure a Flexconnect AP Switchport with Dot1x Configure to Secure a Flexconnect AP Switchport with Dot1x Contents Introduction Prerequisites Requirements Components Used Configure Network Diagram Verify Troubleshoot Introduction This document describes

More information

CWA URL Redirect support on C891FW

CWA URL Redirect support on C891FW Introduction, page 1 Prerequisites for, page 2 Configuring, page 3 HTTP Proxy Configuration, page 8 Configuration Examples for, page 8 Important Notes, page 14 Additional References for, page 14 Feature

More information

IPv6 Snooping. Finding Feature Information. Restrictions for IPv6 Snooping

IPv6 Snooping. Finding Feature Information. Restrictions for IPv6 Snooping The feature bundles several Layer 2 IPv6 first-hop security features, including IPv6 neighbor discovery inspection, IPv6 device tracking, IPv6 address glean, and IPv6 binding table recovery, to provide

More information

Security Commands. Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3850 Switches) OL

Security Commands. Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3850 Switches) OL Security Commands aaa accounting dot1x, page 4 aaa accounting identity, page 6 aaa authentication dot1x, page 8 aaa authorization, page 9 aaa new-model, page 14 access-session mac-move deny, page 16 action,

More information

Network as an Enforcer (NaaE) Cisco Services. Network as an Enforcer Cisco and/or its affiliates. All rights reserved.

Network as an Enforcer (NaaE) Cisco Services. Network as an Enforcer Cisco and/or its affiliates. All rights reserved. Network as an Enforcer (NaaE) Cisco Services INTRODUCTION... 6 Overview of Network as an Enforcer... 6 Key Benefits... 6 Audience... 6 Scope... 6... 8 Guidelines and Limitations... 8 Configuring SGACL

More information

Configuring Private VLANs

Configuring Private VLANs CHAPTER 15 This chapter describes how to configure private VLANs on the Cisco 7600 series routers. Note For complete syntax and usage information for the commands used in this chapter, refer to the Cisco

More information

Configuring Web-Based Authentication

Configuring Web-Based Authentication This chapter describes how to configure web-based authentication on the switch. It contains these sections: Finding Feature Information, page 1 Web-Based Authentication Overview, page 1 How to Configure

More information

Configuring Virtual Private LAN Service (VPLS) and VPLS BGP-Based Autodiscovery

Configuring Virtual Private LAN Service (VPLS) and VPLS BGP-Based Autodiscovery Configuring Virtual Private LAN Service (VPLS) and VPLS BGP-Based Autodiscovery Finding Feature Information, page 1 Configuring VPLS, page 1 Configuring VPLS BGP-based Autodiscovery, page 17 Finding Feature

More information

Configuring IEEE 802.1X Port-Based Authentication

Configuring IEEE 802.1X Port-Based Authentication CHAPTER 44 This chapter describes how to configure IEEE 802.1X port-based authentication to prevent unauthorized devices (clients) from gaining access to the network. Note For complete syntax and usage

More information

Data Center Configuration. 1. Configuring VXLAN

Data Center Configuration. 1. Configuring VXLAN Data Center Configuration 1. 1 1.1 Overview Virtual Extensible Local Area Network (VXLAN) is a virtual Ethernet based on the physical IP (overlay) network. It is a technology that encapsulates layer 2

More information

Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards

Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards This document provides configuration tasks for the 4-port Cisco HWIC-4ESW and the 9-port Cisco HWIC-D-9ESW EtherSwitch high-speed WAN interface

More information

IPv6 Client IP Address Learning

IPv6 Client IP Address Learning Prerequisites for IPv6 Client Address Learning, on page 1 Information About IPv6 Client Address Learning, on page 1 Configuring IPv6 Unicast, on page 6 Configuring RA Guard Policy, on page 7 Applying RA

More information

Configuring Web-Based Authentication

Configuring Web-Based Authentication This chapter describes how to configure web-based authentication on the switch. It contains these sections: Finding Feature Information, page 1 Web-Based Authentication Overview, page 1 How to Configure

More information

Contents. Configuring EVI 1

Contents. Configuring EVI 1 Contents Configuring EVI 1 Overview 1 Layer 2 connectivity extension issues 1 Network topologies 2 Terminology 3 Working mechanism 4 Placement of Layer 3 gateways 6 ARP flood suppression 7 Selective flood

More information

CCIE R&S LAB CFG H2/A5 (Jacob s & Jameson s)

CCIE R&S LAB CFG H2/A5 (Jacob s & Jameson s) Contents Section 1 Layer 2 Technologies... 2 1.1 Jameson s Datacenter: Access port... 2 1.2 Jameson s Datacenter: Trunk ports... 4 1.3 Jameson s Datacenter: Link bundling... 5 1.4 Jameson s Branch Offices...

More information

Cisco IOS Commands for the Catalyst 4500 Series Switches

Cisco IOS Commands for the Catalyst 4500 Series Switches 2 CHAPTER Cisco IOS Commands for the Catalyst 4500 Series Switches This chapter contains an alphabetical listing of Cisco IOS commands for the Catalyst 4500 series switches. For information about Cisco

More information

IP Router Command Reference

IP Router Command Reference IP Router Configuration IP Router Command Reference Command Hierarchies Configuration Commands Router Commands on page 94 Router L2TP Commands on page 96 Router Interface Commands on page 99 Router Interface

More information

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Actual4Test.   Actual4test - actual test exam dumps-pass for IT exams Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 200-125 Title : CCNA Cisco Certified Network Associate CCNA (v3.0) Vendor : Cisco Version : DEMO Get

More information

Advanced IPv6 Training Course. Lab Manual. v1.3 Page 1

Advanced IPv6 Training Course. Lab Manual. v1.3 Page 1 Advanced IPv6 Training Course Lab Manual v1.3 Page 1 Network Diagram AS66 AS99 10.X.0.1/30 2001:ffXX:0:01::a/127 E0/0 R 1 E1/0 172.X.255.1 2001:ffXX::1/128 172.16.0.X/24 2001:ff69::X/64 E0/1 10.X.0.5/30

More information

Configuring Private VLANs

Configuring Private VLANs 36 CHAPTER This chapter describes private VLANs (PVLANs) on Catalyst 4500 series switches. It also provides restrictions, procedures, and configuration examples. This chapter includes the following major

More information

CCNP TSHOOT. Quick Reference Sheet Exam

CCNP TSHOOT. Quick Reference Sheet Exam CCNP TSHOOT Quick Reference Sheet Exam 300-135 Chapter 1. Network Principles Troubleshooting Steps Problem Identification Collection of Information Examination and Action Plan Verification Basic Troubleshooting

More information

Location ID Separation Protocol. Gregory Johnson -

Location ID Separation Protocol. Gregory Johnson - Location ID Separation Protocol Gregory Johnson - grjohnso@cisco.com LISP - Agenda LISP Overview LISP Operations LISP Use Cases LISP Status (Standards and in the Community) Summary 2 LISP Overview 2010

More information

Implementing VXLAN. Prerequisites for implementing VXLANs. Information about Implementing VXLAN

Implementing VXLAN. Prerequisites for implementing VXLANs. Information about Implementing VXLAN This module provides conceptual information for VXLAN in general and configuration information for layer 2 VXLAN on Cisco ASR 9000 Series Router. For configuration information of layer 3 VXLAN, see Implementing

More information

Configuring VRF-lite CHAPTER

Configuring VRF-lite CHAPTER CHAPTER 36 Virtual Private Networks (VPNs) provide a secure way for customers to share bandwidth over an ISP backbone network. A VPN is a collection of sites sharing a common routing table. A customer

More information

I Commands. iping, page 2 iping6, page 4 itraceroute, page 5 itraceroute6 vrf, page 6. itraceroute vrf encap vxlan, page 12

I Commands. iping, page 2 iping6, page 4 itraceroute, page 5 itraceroute6 vrf, page 6. itraceroute vrf encap vxlan, page 12 iping, page 2 iping6, page 4 itraceroute, page 5 itraceroute6 vrf, page 6 itraceroute6 vrf encap vlan, page 7 itraceroute6 vrf encap vxlan dst-mac, page 8 itraceroute vrf, page 9 itraceroute vrf encap

More information

Catalyst 3850 Series Switch Session Aware Networking with a Service Template on the ISE Configuration Example

Catalyst 3850 Series Switch Session Aware Networking with a Service Template on the ISE Configuration Example Catalyst 3850 Series Switch Session Aware Networking with a Service Template on the ISE Configuration Example Document ID: 116838 Contributed by Michal Garcarz, Cisco TAC Engineer. Nov 26, 2013 Contents

More information

DHCP Server RADIUS Proxy

DHCP Server RADIUS Proxy The Dynamic Host Configuration Protocol (DHCP) Server RADIUS Proxy is a RADIUS-based address assignment mechanism in which a DHCP server authorizes remote clients and allocates addresses based on replies

More information

Identity-Based Networking Services Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)

Identity-Based Networking Services Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) Identity-Based Networking Services Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) First Published: January 29, 2013 Last Modified: January 29, 2013 Americas Headquarters Cisco Systems,

More information

22 Cisco IOS Commands for the Catalyst 4500 Series Switches interface

22 Cisco IOS Commands for the Catalyst 4500 Series Switches interface Chapter 2 22 interface interface To select an interface to configure and to enter interface configuration mode, use the interface command. interface type number type number Type of interface to be configured;

More information

Cisco IOS Commands for the Catalyst 4500 Series Switches

Cisco IOS Commands for the Catalyst 4500 Series Switches CHAPTER 2 Cisco IOS Commands for the Catalyst 4500 Series Switches This chapter contains an alphabetical listing of Cisco IOS commands for the Catalyst 4500 series switches. For information about Cisco

More information

-1- Command Guide of SGS T2X

-1- Command Guide of SGS T2X -1- Command Guide of SGS-5220-24T2X Contents Command Guide of SGS-5220-24T2X Chapter 1 COMMAND LINE INTERFACE... 18 1.1 Accessing the CLI... 18 1.2 Command Line Modes... 18 1.3 Requirements... 19 Chapter

More information

Cisco IOS Commands for the Catalyst 4500 Series Switches

Cisco IOS Commands for the Catalyst 4500 Series Switches CHAPTER 2 Cisco IOS Commands for the Catalyst 4500 Series Switches This chapter contains an alphabetical listing of Cisco IOS commands for the Catalyst 4500 series switches. For information about Cisco

More information

Configuring IEEE 802.1x Port-Based Authentication

Configuring IEEE 802.1x Port-Based Authentication CHAPTER 8 Configuring IEEE 802.1x Port-Based Authentication This chapter describes how to configure IEEE 802.1x port-based authentication on the switch. IEEE 802.1x authentication prevents unauthorized

More information

Locator/ID Separation Protocol (LISP)

Locator/ID Separation Protocol (LISP) Locator/ID Separation Protocol (LISP) Damien Saucez* INRIA Sophia Antipolis FRNOG 18, December 2 th, 2011 * special thanks to Olivier Bonaventure, Luigi Iannone and Dino Farinacci Disclaimer Not a vendor

More information

Unicast Forwarding. Unicast. Unicast Forwarding Flows Overview. Intra Subnet Forwarding (Bridging) Unicast, on page 1

Unicast Forwarding. Unicast. Unicast Forwarding Flows Overview. Intra Subnet Forwarding (Bridging) Unicast, on page 1 Unicast, on page 1 Unicast Flows Overview Intra and inter subnet forwarding are the possible unicast forwarding flows in the VXLAN BGP EVPN fabric, between leaf/tor switch VTEPs. They are explained in

More information

MPLS VPN over mgre. Finding Feature Information. Last Updated: November 1, 2012

MPLS VPN over mgre. Finding Feature Information. Last Updated: November 1, 2012 MPLS VPN over mgre Last Updated: November 1, 2012 The MPLS VPN over mgre feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity

More information

DHCP Relay in VXLAN BGP EVPN

DHCP Relay in VXLAN BGP EVPN Overview, on page 1 Guidelines and Limitations for DHCP Relay, on page 2 Example, on page 2 Configuring VPC Peers Example, on page 19 vpc VTEP DHCP Relay Configuration Example, on page 21 Overview DHCP

More information