Understanding Extreme command line interface

By | July 10, 2020


https://lh6.googleusercontent.com/m6dZkPRzgKoojaaG-tDldaEpp3RWm0www7R3nWPkFZFSBUGz3zRfY9NwArt487-KMlQOO3-gYcftrIND0wH22m-JYug1FAqxMqFpjAMWVteZBReTnDRxTnAdYo9oKIE7uXMMcbd00qiorLUu

https://lh6.googleusercontent.com/E27Rxhljx2QTKIB6zpbcEZ15zVuxRz67HS-slBhmJqq0I7cF9N0BD71iT4k_-9cCAbn52qYp034XpZqqp3hrK4APd6nscRvewCj-7sSX6mfymFvsOSmmqgYw4Pjz8WcM7umfWIoJ_H6gTIUq

     
https://lh4.googleusercontent.com/_lx_BsCLWM446PpwTTY01eC57DG4yC3p1fiQxd68S4vuJRJJW67Q_OzbxXxVWY7SlItqx00myN8_Qu2YBRDntaLEXAAvP4jD1xtzqm4tDtVn-2mr-nuLuRnXRvGEW7DgS1J73raHqZuXF6BG
                  
https://lh4.googleusercontent.com/a49rRGEFCPiA0BUzHx-JVHix3dtArguJhFXZoZsWnp7dVyh3xUj91wj0-ZIV-QUMdkXx2zW5V6qOm5NJ1qa2jEpi1wmR0zdyxYwEhq-lN3y3YjFe5SymnkarCsXow2H6QIf2gpxrFwALWp1w
                   
https://lh5.googleusercontent.com/9meqd--HsCe1otnGSn6zo0sZDEb5SMKHd8aMXe2l8C2bpgC5s07ICj6UYQks9K-LwiW8Y6GYkVk0XEcimiGSSlVi8W93eZ2l4ppqz_QbtXDG-aHktHmV3nD8tOASAEkMLEZXFzgHatI9Qz11

    Fig 1. Standalone Switch: Summit X430               Fig 2. Extreme Stack : Summit X440 Series                Fig 3. Modular Switch : BD 8800

In this article we will learn basics of the Extreme command line interface.I thought the best way to demonstrate it by working with network topology and try to configure it from the scretch.To make the undestanding even more simpler lets compare the technology with Cisco.It will be fun.Lets begin.

Topology :

https://lh4.googleusercontent.com/LwzwVigM6G6i5mGB4_XAmFvOif3VOSbHPQWj-tAP8UlgyU6_GqfYxkaJ0_nlBeoK6ZFoWqqDw_MdvI78AB0ZPjYSjju9RG-oQV5Pr8y-MssuJOXHxsYbjz94v7zYMYpMdo7rIu5SHvehbnsg

Device Models :  

https://lh6.googleusercontent.com/jxtyAa3TL691NpAqwFlaKLzghJdhVR1WKf6r6DPEERlNhBeWQTFiHnJasCAHSzA0joUdA336kqmMsaJeO3gc8MFvWLONbGp6R99eBRXv3aAiL-ymZdJewwHwLH26LnNooZlAbCZ0rmjtAvnH

Operting System : ExtremeXOS version 15.3.2.11.

Platform used : GNS3 and Virtual Machines running Extrme OS.

VLAN :

We will start with the concept of VLAN.As everyone know vlan is  configured on the switch to create a layer 2 broadcast domain.It just like taking one switch and breaking it into many virtual switches to improve the network performance.

In extreme before we learn about the VLAN we have to learn the concepf of VR- Virtual Router.This capabilty allow a single physical switch to be split into multiple Virtual routers  [ Just like a Virtual Router Forwding in cisco] . Each VR maintains a separate logical forwarding table.When we create two VR in one switch means we are creating two separate logical routing table. Each VR maintains its own separate routing information. packets arriving on one VR are never switched to another.

Rule of thumb : one VLAN can be part of only one VR.

By default extreme switch create 3 VR once its bootup.They are

  1. VR-Mgmt — > used for remotely manage the switch using telnet,ssh and snmp sessions.This VR cannot be deleted.no other port or vlan can be added.No routing protocol can run on this VR
  2. VR-Control–>used for internal communications between all the modules and subsystems.no ports,no vlan can be added into this VR
  3. VR-Default–> By default all the ports in the switch assinged to VR-Default.We can add the new vlan into it.

Lets create VR called HR and add the vlan to it

Step 1: To create own VR in the switch:

https://lh3.googleusercontent.com/EmWHrsU2dHr_Vv4Ks1ness9EP1IclbyTq8YDQEnnit2uaqTG5eoQ3CuzXGf4JFKTXlCbPGDuxLD3cNbT5s5EFUXKCg5L_fZwmozkCA7JgRr-Ur19-4naXEQhGWaovevN-5Uf6BAC0VhseM4l

Step 2: To add vlan into VR

https://lh6.googleusercontent.com/jFGRRbgj3XUCSTKQ7T2Y6xmN_-plqPYlswSXvgMcPdlTk-nnYGBfDVZcPesuV9gP4iB80V1RTr3-fmjX4-Ju96x-1UxVs9UH2CjcFCK6uFcDqG_dMlg0NxKSzUOG9Lmg3DtxtM3LJjIbNQR8

Step 3 : Verification

https://lh5.googleusercontent.com/C0JGlT75KJfolxNHD7Iu5UI2bXTCIXBJNtdWhEeNdndjNZ2-8IHBEZoTAuhRpHJLdBEzv_0U--6YgC-rOvPcQVJF32fI5ZQyj7FLXr7kBPfvsxOMrJIruvbk9fvnOFbWOxGUJ1jyj9Bl9tUw

Now we have two separate routing table one is VR HR which is for vlan HR-USERS and one is VR-DEFAULT which is for other vlans

Two separate routing table in Switch

One for VR-HR

https://lh5.googleusercontent.com/IaWkLs-bQdL1WPDtT6FRWd82D4m64rSrCGPKqMRwLLqCJWSUHNW1gvKcqhvWrp4ZUZy8RL-5zYc1qSCkMIJYoAxiNFFFJDyoQBfTATLdYJx9JmvGzO-bWQfkF-eVOZySW-UfpQOxrxw2R3Yy

One for VR-Default

https://lh3.googleusercontent.com/YABUNwrKSwDCIQJ3owdmGcaNtJfMgNmHaufEUwb7_nvK6xpG51Z_lKxqY-ovyrpAL8Iliu1ODrWwwwDZv1cNLfqkJzjxsrwVCWgvbusZoGlZQbBzAHECNwqw1ewSZjajk9x7TSIkxgYKLk6Q

We cannot ping between each other as they are two logical separate routing table.

https://lh5.googleusercontent.com/T7ufQPZkDcRxEs5Xc8bcC3FQQYb9hZFYKvlTsV03Gliz78GhXewYzkFjYtPfiplCSY-MTiXv73zJINBS3u6UoBwtVhS-Oqd8kctapCZIoCY4izPtLqW5n8hTShAAMglXRt4H6RHs76FrohDl

By default all the ports in extreme switch will be the part of default VLAN 1 (which is same as in cisco switch –VLAN 1).If we want to add any untagged port (access port in cisco) into new VLAN we first need it to remove from the default VLAN and then add it to new VLAN.

When we create VLAN without tag (without assigning VLAN number) it choose the number automatically which will be in decrement order 4094, 4093.

If we want to assign VLAN number we need to tag it.

Let’s create some VLANS as per the topology

Step 1: let’s configure SALES VLAN without tag and Marketing VLAN with tag on both switches.

https://lh4.googleusercontent.com/DHpT3zhXmIVMOEl-BItey6bL_EUvkfwxuKRMqzZjEM_Ha6DBOVWfZdgERl2-0Rla_KorAOPgFBoOAq66vJp1V_6mpOOkozQD7tO3RGfkk-RkgTdqsNlOEELY432C7bgEE3CP9DaP2634zAQ_

https://lh5.googleusercontent.com/SLc-y5guviVY57gWEP-6TMPlksTMrohdngwtZRUeQUwaUF-RWOq4U4mUACIlLtcB1r01nYY665w45JtXtka99Vjvy-cxwUMcb4heLjycNoOyQOA-6ZFFIEA-SS1Yq9axrzNyLVdnM6NXjVlC

Step 2: Verify : show vlan

Error! Filename not specified.

In cisco above we can create vlan using below commands:

# vlan < vlan number>

# name <  SALES >

So for now we created the VLANS on Switch-01.Lets connect two clients from sales department to port 1 and Port 2 of switch-01 and add them in VLAN SALES.

https://lh5.googleusercontent.com/kczfHv5QUOh3AJ2QNmw0GACUwwSgrSjwzco282ZzST8doot983XkuwXpnr8NGFPncR_O0ey0w3sTz8YWdGPUpbS5aRvDF3RsA5syEM-6JuKoj4lM0m7FwP7VTix-0ZwL18yGvVyAppJt-i3I
  

As soon as I try to configure the ports operating system throws me an error as the port 1 is already assinged and untagged in default vlan

https://lh6.googleusercontent.com/7PuHxqWY6sqWh2rIAdYoZatLiGT9Kk1xlh7f3U3QSl4SzeJ19DkEwUYKe-FqENHTdn7FpQ-RKJBODbaq2Z60Gu3Y4voOFFAA5f4GYW2woN626aSmSjc8-LEfHQWQ-WOBb2UERZRTsWGK81mI

Step 1: Lets delete that port from Default vlan and then add them in SALES VLAN.

https://lh4.googleusercontent.com/S9JIc94zlfJHAhU3XppnhmmtLTtMi9iKmeI2OfYOcMDgcPPQ5xE5XyUvNWN4HEZy9r-3X5BHB_4m1za68NDhBXvcqaYmRq39ge2XYbJlKwjdrTNJ3nhZiaxLxBPgUEfE4ItJR3YmoO4LG9oT

Step 2: Assingn them now to Sales vlan as a untagged port [ Access port ]

https://lh5.googleusercontent.com/kpwkQLqb8U20j4_JJUOqyVHpy9oD-SoaiJf4ZzHzm8qeneHQAVn611N8P730LHSwWepiCR3lFT4Y25lzc8AelNw0xchOgeYSVMdVvAoxyoK7ks3XmWx_kAPyzSC69DfDNxL3YLnUeIHZQ6f5

Step 3 : Verify

Lets try to check whether the both users can reach other or not.

https://lh3.googleusercontent.com/7vLyhbXqEhO7RLdY8a8mLDkyoeaiD8HBr47_e_ari4R-iXC6qDQo4ewpDOvzorrewlLg1NMYRqFskdmUlZKYVJXOVqxo6oIKiZOVkT23lPmGYjNFwgKagaM4a6Ah1zA2kaej5PFuv6d8eZ5-

Ping will be successful here as both the Users are in Same VLAN [Sales-VLAN].

In cisco we assign the access ports in vlan using below commands.

#interface range fa0/1-2

#switchport mode access.

#switchport access vlan 4089

What If we have IP phones in my organization and we need to connect them too.

https://lh5.googleusercontent.com/chXiAb5goyLpjicNIyorgG5yhnb8e4Bdth80iWZzBlxPOBE7HXtRa0gQhxsBHGEflazu-toebstOQD_B1yHS7BvNjwGPzBxs_Mi5gH9QGLtl91slOj-Xp3NC9dd0QR-Y7gY_rDTS4RWsgdcl
https://lh3.googleusercontent.com/JBCUvLcrWqQo22zACzlSHxLHXmzNw6aLC0iptEwyrJYQ05MYCfoSvhI0ObT7zDtLt5bJC3SLogqsFAVbYLyLCEUXVHtky5X0zpA3Z0mo4NH_67-jT7eJ-EUDGUH7k2BNp_7_jU5W5EoDlZdL

If there are Voice over IP Phone the one port [ which is Switchport] will be connected to Switch and one port [Which is PC Port ] will connect to Computer.We also need to configure the Switch to make sure IP phone work properly.

Step 1 : We need to make sure the switch model which we are using is capable of delevering POE to the IP Phone.If POE is not supported than we need to use external power supply for IP phone to deliver the power.

https://lh6.googleusercontent.com/anTUhOqX0w9BdT-JXp2VaVcnhUqXvBcxyPqv4gdw0BuhqC6WJ1s9ayftMZUsqQTI8EApIydY5JwtrXqi0QYV9WNkbpTwWHw5UnzhCEquKel-VKdqIdMm2wsdR7PC9y8nssT4_hJqyzPmtkV-

If it is disabled we need to enable it by on specific port where ip phones are connected using below commands

https://lh6.googleusercontent.com/-t8jK73Na-LI_2V233mK3jvEYGfEJEdb3T_jReunKwAGrWXIN8Oev13Pu88Upuhd8GIPT7SzpQB5DEGHMeqW79TPyUKGNt-mh2v1aRm9kiOaNuBIXeoRS61G4TzcFxDeWnaiwbuRSgeSrDlQ

Step 2: We also need to create separate VLAN for voice so that Voice traffic [ will be tagged using 802.1Q ]is completely  is treated differenly from data traffic for security purpose or QOS implementation.

https://lh3.googleusercontent.com/hvqK9fK-TT5FHvSaLJA4-dq_RH5IuaF4aFeSxs3cRIk6ZgE4lMiQRtO0PcC32rAfPcfSwkSCDnzLSTGczCnXETWTotEsD6xqRf-uzKWyGoCQV4BXclKEAVISkmTT34acIr-7X6Q9qDVa4V2d

Step 3: Now configure the port [ Port 2 here ] to be part of voice vlan as tagged port and sales vlan as untagged port.

https://lh4.googleusercontent.com/STozlCyERe6e9mDL9y73bvgN6R-eXSWuJ9GIcdpytJijkUS9gOhgYj_gPq3x9lRR6soBjLr55tQzn22UC6hH9E3dbEy5hzO77lzEFZac0soj73u5Qkre_zUub2ky-eAc8G022Yj_ERvZWKTr

Step 4: We also need enable the LLDP on extreme switch so that it allows the SIP phone [Avaya or Cisco] to determine the virtual LAN (VLAN) used for voice traffic.

https://lh5.googleusercontent.com/W6q4z3nWf3An2ADXyi9Zrj0izOSTgtt7aMBfV9UaHlBimNLOsTpY79IXm6PN2iDwZyowC1D_Fw8kJ7SKZN0UTnsa0Fdg-yd4VtF-pIJ63FbME8T5kEjYI0VO55Te7URwLUWg8syRxwTZPxSo

Step 5: Lets verify now.

https://lh4.googleusercontent.com/IroYAcduHIKaWtrlwpQQXPTZeLejwOOM96Jyjh85b5Ca_tJyTIFeM40Uc6mSMTmMWEJTgkzWDg9Pd7r5EJF6Xp-XCOC36vTxDu54oYzketlcO9kvsFxcZoDwxAkUIlc0njgQSPZfXalPp6wP

https://lh6.googleusercontent.com/3PBLVaGtCOZda-9CMBjg6FC60JbpO6mpCJYpK1eL78EvII-A424zcnOHnjn3HLMPCcdCzCTWFhZQndDfrjQzb5FwfndT6b89IUPQprY0ukY0j0QF5Bn4c8h6JGY4kchXB92BJve7r-k72ghz

https://lh4.googleusercontent.com/nwg5eFMU-s8OgvLtzlSbKYAqenD5SR8rDBwxklrCZ2KFYftG5rqEkpAGJh-zJY-3UUAtDaAiXsYpBxlQgR8hQTFx-ry9Yy8bBoDSgPvRl-LyeIFoHPHuyE2Seb0AQ-X72GmiKavOzNEX_jGv

Please note in cisco we can use CDP to deliver to the Voice VLAN details to Cisco IP phone speaking SCCP langauge.

We configure the cisco switch using below commands for voice

Interface fa0/2

Switchport access vlan 4089

Switchport voice vlan 150

Lets assign the User 2 now in MARKETING VLAN and check the connecivity.

Ping will fail here as both the users are now in different vlans

https://lh5.googleusercontent.com/yFpAED5JgYv05Sjz_JJwTb0j3lC7YgL_CxzXQIMc6QgX2iIcGaPNrKFI0r9yRRTTfhPPYweSjSGvDzeXgtdDKzDtxhyMMEGdRxqcACVmSa9dJQBhfkIi8yLhENihrjGahwfuSr5x2wVFIoW5

https://lh5.googleusercontent.com/1LxbPlyuhsurX-dhNaU-MpDRQyTEN6VZXg_YWXE-l9vcRftFoQ51lxwReAOFI3Oa5Jlw7rEoB8nTm9283M8Bp6V_8zdcWE02nEiNsVAw8Bc002ZJu5-rCa7RLnSP-0FZlStCryqn1Okv4dJl

https://lh3.googleusercontent.com/aiWtjWiazNUFVYzPdD8a9XrI9FMprsDKO5kOsB4fGJeQHHCZ2OERa8Oy_zEwe4_YC7udaGR8URtyaLPhj6czlfZccPYn60pl1MRaCGfEFiWtSUDAlBvNuIidKoW3zXAsFd2LC7iRyeBSQd9f

If the want them to communicate each other we need to use layer 3 device such as router or we need to create SVI within the switch to perform intervlan communication between them.

Now lets connect switch-02 to our topology.Now Connect User 1 to Switch-01 and User 2 to Switch-02 and add them in sales vlan.

Will both users will be able to communicate with each other ?

No. Because When switch 1 send a traffic of  user 1 to switch 2 via port 2 (part of default vlan ) which is untagged (access port ) it wont tag the traffic due to that  Switch 2 receive it on port 2 ( defualt vlan) and send that taffic to those ports which are part of default vlan 1.

Solution : Trunk Link

In Extreme Trunk Link are create by adding the ports to the VLANs as tagged ports.

We need to add port 2 to be the part of both SALES VLAN and MARKETING VLAN to tag the traffic on both of the switces

In cisco we do it by using below commands.

Interface fastethernet 0/2

Switchport mode trunk (In cisco By default all Active vlans will be allowed on trunk link ).

https://lh4.googleusercontent.com/UXhxIKU22S6OXfmjnbEyzEosYDuPwx7HrtcaWrGNiX3kEwHTytrVqCo1iQWziD76eSGNKCTxLXYy6NhLR2a5xmfghdJAOAHApXX8qaNFq2Y5CzlvVIrauioQOFX6w0O4K_v3ee7-gNT0kbj1

Lets cofigure trunk ports

Step 1 : Assingn the ports in VLAN as a tagged ports on both switches

https://lh5.googleusercontent.com/FLlZxBYfbhhzXjB_LaM0_IhP1dNak66bG3r_qeWoeUuYPqCy2YIQRQfRUHupU4cWZ7yuZ8zdDBjtGuwnOsqzbETcnM32pYeE6T4skfQyY268M_NuCaSC2oFdlv0wS11SwRHnutBzeKiWydf0

https://lh6.googleusercontent.com/BqdBz1yC8_SXRqxY38BMb8AblVef9QxJ69tNQ92MXCsud9Trwi3GlSYPTBjIgXGXkFqFENoPMhzf4qcCcNWovjyEeZ_wOxa33NuZuHORavfOwDB0pQB6L4fWrCtV24ka4YrLAW1rehl_REAJ

https://lh6.googleusercontent.com/gUSopxTDTxqBGjiwq59sOVmG89-V81EYi46umJoJbHnaf0i2uHp0bnqwfqYiMCHYfDtwNh8-pTbOoY9hDv0arXEeQwjvQEz4KCEdQwLuP5p4yIFFSI5MkG7OYX3Lrs_-GZhOf7D9BrGR_Yq4

Step 2: Verify

https://lh3.googleusercontent.com/rIrruGmg0o4mFQlBfPyXgE7M2a_gKfyt6lphnj2McTK8NlV65dImMWsjfggw3L8HdIjePwL0IOxsn8FzhTshqd2z36OIqlxRDmBDpmNLlYcXOStL_vQPvcowCAYlYIb0C2N9EWjYcgHL4Hmd

Now if I try to reach between the users.Ping should be success full.

But it failed in GNS3 due to some limitation.Switch -02 was droping the tagged traffic with below error.

Error : 08/23/2015 09:35:31.38 <Erro:EDP.ProcPDUFail> pdu received on port 1:2 could not be processed, invalid length (rcvd length = 72, pdu length = 120

So here whenever switches send traffic over the tag port .It add the new 802.1Q header [ which contain VLAN number and priority field ] to existing ethernet frame  [ so that other switch know which vlan this traffic belongs to ] which increase the size of the frame and this tagged traffic dint allowed  to pass through the tag port which we created in GNS3.It could be the limitation of GNS3[ We cannot test everyhing is GNS3.its not real hardware] .The above commands we used to create trunk link on both extreme switches should work on real equipment without any issue.

For now as workaround I thought like to use a traditonal way to make the  VLAN communication work between the switches.i.e by using separate cable for each vlan [ Sales and Marketing] which will be untagged.Ping was successful now between user 1 and User 2 .

https://lh4.googleusercontent.com/uG6JPMY0J68VUCEdh4XV2y0v7xpkykG6YRs-TtDA2P36nSgnGsqi5zI2bXTOox5_vAiPnbyZA-zriJ8RjK8GYLwxp-v0O2PWUiCkWwQStpOJKRoA91ANOftC1bhUnATDRBL_QLMQNK8X9NQm

https://lh6.googleusercontent.com/9nb04JdJAV8k4DafNlDs6Dn1QCYsnpC3J3VDe112iotCkGvC3ASpmYEh8Rv6dK3q2oOhtUKWjtiRtf__gqFhhnntU626Q_jI8FhSWAXndCM7OJzP-ylvCLiNKVPNP2NRPUYjCZH7DFtygmiS

Lets assingn the user 2 now in marketing vlan with ip address [20.1.1.1/24].now again users lost the connectivity because they are in different vlan.Solution is either to SVI  or Router on a stick technique inorder to provide inter-vlan communication.

Solution : SVI on Extreme Switch

Lets configure it

Step 1: create two SVI and assing them an ip address

https://lh3.googleusercontent.com/yNXW6rM-frIb7lYxuHrcrOt8ZFEXLNtEAl2WuomtBGs7kGgI4CtTb42dL9kPKWSqBEYtWvVyC4EK2HmjzXYugC3hKPG2qWynUVl2ydHpG0tPX7Yt8d0W8dlHhsIgmfS31SvM2MfOaio00KKA

https://lh5.googleusercontent.com/6NuBk3thVQUEvm3VXy2IPfx0PL_UoopDEHbtz_193HpPOe9aX013uQHcT1DRDVCjpxd_q6MoaRMQ6exa6yNyzbhhBZXfT961hJv_AJOSpvkqAuNF5AUZQdX7pTKHPtsGAkDDELZagfW6iyw8

https://lh3.googleusercontent.com/nk-LW8PKwjZzQO2RanZOVYjj0zQCZwIhxLIyHJ7aMcpOPNrtPMHfGACMHWL4ACfRbNA6ecZrx10ajbEWjieL8JkIqO0m7MOxiMM_lBzOizgoz7AXfxTUZtzmp2kP3lSuoGnEYxlODhYbl_F9

https://lh6.googleusercontent.com/pkaOk-nmVcaXKCMNdVCYY9SIKpmQYX3EONy8Wo8yEVpIdoBFMl-7Ls9W7ZNbP2rqmElHtPPsGsqx57mD0xNe6MV9Fn5LrVYY4OtHThAl2k8pJ8Vhn8tL_E5DAmciiNPOTmWORhI6Oi2QMc1d

By just creating SVI on both switches the intervlan communication will not work.We also need enable routing on both vlans by using below commands.

Step 2 : Enable IP routing on those SVI.

https://lh5.googleusercontent.com/GImN4Pj6enHQE3vdaRxDLICTvxt0SPpe0FskEhxkAeFcfygJKz3V2bg_Y1s12whlVmLLoOvdzczwCMvnKuts-9KE9FJdck8hIHH9QnUc9V3QUhyUzdEkiSxS3La5l-Tl0onyWQRBNF1JahJ7

https://lh6.googleusercontent.com/ZuZWkxj6wQA86BzzlvGOGV4KAT-0IB89cyROlMH1lL1rluheFeeZTXa7gE1Qc7DHJ5QgSZuO15xqwmOfihxRwcqODLPMbAdvnYGb8moBsfhoOZB4p2iDk-6yYToMtVunvXyQdDYO_LeWHvnO

In cisco we do it by using below comands

Interface vlan 4089

Ip add 10.1.1.1 255.255.255.0

Ip routing –   [enable routing on all SVI ]

Now with SVI the users are able to reach each other.

https://lh4.googleusercontent.com/2q9vjfPygjArQgXmK2k78VT0tx4bPBqipyyJD-Fm4sesoYopUVnNGVZL3z_bDndLujEOERpy1K-dSTvoXJmlQB3_g4XdgTThnvuHmPRHtB6jSgHOIOYALE33jUKObqffe9r7cndOUxeUo6e_

https://lh4.googleusercontent.com/eIYl77pfibkzTf_nnIdGvt_oRbGHHQC5TEysatQdMwFTNL7kuBqH_JotgCYFZzDM28fiYeCr1XI4VmWben2Lb3v5ThSrgg2m6wiaEcOk1tKAjizJNckQK7pvWzJNYrPdAH1YzhjN9TaBp_-m

Lets add one more switch which is Switch-03 as a access layer switch to our existing Network Topology for LAN growth

https://lh6.googleusercontent.com/0QVgHFhoy4K74OTIBmAR1rOMxr6hvR0oKXbzTSjTFkF-b4AhgAE7-MYg3HR8DmgaBl6UadVgrwFGEJdbDSvao5nGwRkNkX2QXY8R0-hULbHlTjnaiZC5F5TzzE3rbBpNAJI4HwKDHkuHHYE-

As soon I built the above topolgy in GNS3.  I saw the CPU utilization on all switch went to peak 99%

https://lh5.googleusercontent.com/TQ1hbkeeZ0aQCnQ-NUmhOWQyTyqk12CZcNn_Y1oKtq8N0sCNuT4bDtuGonDajA9Xd-Ehn54qj6A84uKlpkMSMjPYu8xpzYXFoPekZ-ryjfyZ-XooIX3QeXR5bd7_gxavfPE48FYxwhswKW00

https://lh5.googleusercontent.com/FF_tu4gJl3XCQ3mXOuptUrorT0pN1dqJtUOgwLL6rxXukPtk0zwmipf0iGfUEGzVruQWmtnWe7gQ7rMbWqwZ1p8RixcJbBHeBG9a2tjHrD8C0ntImldxHjhRf1UK2Q8bDPadfUcWBITR59gK

Any guess why CPU Utilization went high ?

Its Because of Layer 2 LOOP.

As soon as I break the loop by shutting down the port 2 on Switch-3 CPU utilization was under control.

https://lh5.googleusercontent.com/Bl9ls_UusUAWN7KGOGWznH_yR0sF8JYFX0cvJkHez5dddO8kqeU4V0Z_9qnCjUvWxbTfdePF5_ogQJg_ehwd4X8two4vLGCZnglTX-jucJfd6ffQrSE34Fez1gJl0x6US0wm3i3ssQ2GM0aH

https://lh3.googleusercontent.com/HZWzrZDOzvvindi6QS9ubYi82GfvRpWyqFncGS8rD3myHJhT9shkjpZn2qscJs_T9ztFxkUfyqYhY6tE6MkNFyzMLKZSvsyf9Z9u5gRVRk4yhL1a5Xb7WqFTDvNmcY5Wq8eD-2kFJvQ2AqnY

In Extreme we have lovely command (mentioned below) in order to find on which vlan large numbers of packets are processed[ Packet which are looping around ].So now once we know which VLAN it is we can focus on that particular vlan inorder to break the loop.

https://lh6.googleusercontent.com/aoMAD_YOjBA42F9yFLl3oJvLAiXKv4_m-A6gmwBjYghziWU9cdu2w3pzKvBwPTtYNPzGE-8YE9dIoUU5ReTB4P2KBlILuUUKeRYde82X-obn31pmkEOjFFMwH-M8mnJOtKL9qxa6xQ1sc4q7

Please note by default all the loop prevention mechanisam will be disabled on extreme switches.So its very important we enable some kind loop prevention technique before we connect switches togather.

In extreme Loop prevention protocol available are : ELRP,STP,EAPS – We need to enable them globally.

Lets talk about basics about ELRP here [STP – same as cisco so everyone know, EAPS – It require one more separate Article ]

I thought before we discuss about the how ELRP work. lets do some packets capture by connecting the Server which is running wireshark Software to Switch-01. [We usually do packet capture by just right clicking the link between devices in GNS3 but it was not allowed here as these are remote Virtual Machines running extreme OS].So I tried to configure Port mirroring as a solution for this[ Same as Switched Port Analyzer (SPAN) feature in Cisco ].

Solution: Port mirroring [SPAN feature in Cisco]

With Port mirroring all data transaved [ ingress only here]on the port 2 is copied to the monitor ports for packet capture analysis.

https://lh5.googleusercontent.com/kASAvc6JyFBxw43KCHZb0w1onamRs1RNmLNr_23QnTLQ7KembxNVcZgcxyaSEW46hFxFVSJV-c_1PEKQHbRddZxjFlWl1TJt-2arWXAZwmWrAjFjNbq7a--jQe1R-U53woHBuT4yLfC4mQVd

Lets configure port mirroring on Switch 1.

Step 1: Choose Monitoring Port as a Port 3 which is connected to Server

https://lh5.googleusercontent.com/qYl-wdsAra17rXBN1vMCC5Jk-l9-DcdOjPgCjaeBXpZnyZttygzg1rph-CtpcBx_tuFAjHqUBYsJ7r4c6kxqMoW5gLXtKsi8YhtGr5ZHAmJAS4T4K0P_w3WSEXdZ6ZGTZ75ilogIpMf2Fk4R

Step 2: Send all traffic received at  port 1,2 [ Sales vlan ]  to the monitoring port 3:

https://lh6.googleusercontent.com/qynFsLdLkx_FWYmzFPmIBxrkVLOaihF3irgGfUBKMWcnd1uC_CIJN0eca1mOOSLBLo4VnJYQKATRojQyofVBxYYHKdaWSq7JSPJ618MslM7xuDwI2tIusMdzSw1AF89_pBAtLjdMU84_gE0i

Step 3: Verify

https://lh4.googleusercontent.com/6fUNR3e6nIx7hmjfldLylkk2dOW_ae_lxTUyOCFysVgtluSkASkPmGA6zPdXzVcZHxqYqRq2Xy1oHrxYxKBo0MT-WXD2x8n17baUQ4kUChZ9Kf_LUUeY0i9O4r7YMYU5FVJo3Yn5KZ_7hxKp

The above command should able to give you packets on your server on real gear but dint really worked in GNS3 due to limitation [ Port 1 ,2 of are remote port of VM machine ]

So I thought like to use the old way to perform packet capture which is adding hub between the all 3 links and connecting the server to it.

As we know Hub by default broadcast all of the packet which it receive on one port to all other port.

We have captured our first packet which sent by Switch-01 via Port 2 to switch-02 which is a EDP Packet

About Extreme Discovery Protocol ( same as CDP in Cisco ) : is used to gather information about neighbor Extreme Networks switches which include MAC address (switch ID),VLAN,Ports (local and remote ports),Version of OS.

Here is the Packet Capture of EDP Packet Sent by switch-01 to Switch-02

https://lh5.googleusercontent.com/UEGarwj6IdsFd69kGzgumc5cUZph3WDCR4v3lZA82Z7VM48BxCGr4tCJB72fo4SEZ36SWlrDH5y2UAvFw_ilgt5XGsrD_AZoGMRwKZ9Lrg7IyODT-5HWk3JDGUCr9UlTAQjHUtdLLIM-TtJG

https://lh5.googleusercontent.com/1EUn6SCCYVn4j_kQdvmne5jm0-zGnkyo-4NoLvSE_7QoslgrLsyWkZyteEoyMVUZF2fbc0qPLubaU6gRVHWDScmHw1tatr6p1JosTVFkrUJlio6p1cHV1PmjOcgse1izS9lK5Clma3pcZxuE

https://lh4.googleusercontent.com/0XQTDF04QG8AkTwOMxcK6M-hSlRz83kvnOdex5PeSJSczRJVIdT2nkFweDDJmc1-FSu1Bx4RdCC5x7COmgc-GXBFXfjLtVCLd_f2VHMnFUe5Xoog8F3DYar17Wren2mE828gHaMfLBNd8hcc

We can enable the EDP using below command if it is disabled.

https://lh4.googleusercontent.com/qxdT2Pbu7X9vuPWJ5MzG-rvSQ5RDHMl3jOdBzfSVREAsydiL22eppuJv45YKs1KHlcJlefYhYe6lWjXc-iV6TlVEKRUI_Z0OL1g8HprvvHYFJK06PsC7s9a5ESCORObrP9H797WUG3sau77H

Topology to perform Packet Capture on all 3 links

https://lh5.googleusercontent.com/UyHTHI3P6Z4pV7GyJeSCqE42UVuM8v58XNAF_aFWM784aj9LA2FC-cdepheVz3INI8nACNm7DWbHhVuMgJOo2hOR2TyGrK3tl95Kgj-8Cc0UfHrnVns5gUFq3UKJmfP-eed0r3mD_U9P4TlU

With the above topolgy I was able to capture all of the packets.

Lets talk about ELRP now.

ELRP concept :

ELRP is very simple protocol [ not complex as STP ] which used to detect network loops in a Layer 2 network.

What we are disussing here is standalone ELRP [ will work independatly on one switch it will not span across all the switch ]

how it work :

  1. A switch running ELRP sends multicast frame with a special MAC destination address [09:00:27:f4:db:ce]  out each configured ports belonging to a VLAN [ ELRP should be enabled on that VLAN].

Lets visualise it from Switch – 03 Prespective.It sent a Frame out of Port 1 [Not from Port 2 because it is currently administratively down]

Packet capture of ELRP Packet encapsulated in EDP

https://lh5.googleusercontent.com/K506zK4itr7f_dvmsaK87656-oC7GaGrBnvE7dgqA_w_cGO7pGF4-ZCzUo5muE9pRB1l2ARKRkNeRo1-uXEZZDhkEai292_t4P0cBIJUQ09_B9PUgf_SZv-3gxfO6dp08NpPf_7BoJWIjpsJ

  1. All of the other switches [ Switch 2 and 3 ] in the network treat this packet as a normal multicast frame and flood it to all of the ports belonging to the VLAN [Sales vlan ].

https://lh5.googleusercontent.com/s_fd8ReQlmR0z9Ygbkk5WNtP_TVvOQFFJQGFW8tRDSE8neLmtoZw0Z6lxbV6f_kO4hpUObmIQhIAp1tQbUd0qmcLslQQYRn0aFU4r5rp0M_gaZ-FgHsoItnvbI3pTo4As2xVI8XcxylIuCri

  1. Lets say If the frame transmitted by a switch 3 via Port 1 and the if the same frame if it is receiving it on Port 2 , that will indicate there is a loop in the network.

We will get below log messages in switches when loop detected by ELRP.

# show logs:

https://lh5.googleusercontent.com/BVyk5Ktsx7ThqmgejPKxNzs3VVDVZH1tHerBjaX5CEjAH_e8hYOb9KcETJvEhbzcvT_q36gsrwcffIbm8snd89h4rDYWysicUlEc03WVZuPQFTV4aSEdiXyn3mxugdPGb_8sOoRE_Tr8jdZ2

  1. Once a loop is detected through ELRP on port we configure the ELRP to disable that port permananlty or can block the certain ports for certain amount of time to break the loop or it can also configure just notify about the issues via logs,SNMP Trap.

  Now we know about the concepts.Lets see how to configure ELRP.

Step 1: Enable ELRP globally on all switches.

          
https://lh4.googleusercontent.com/Es35iYUXnHIyd3GlquSJ7-9_pkk2K6PlqDua0eP2sMX1KOYS1ffroq12kBNPedDXrmDm2vffEr9ik0kHVuHam2gB8vx-RPVJaNBxS42hJ5YaPyTSGvvuHreeUR8dGYzzH4hyB46GrvoGp_Kl

Step 2: Specify VLAN on which ELRP should run and Specify the port that needs to be disabled if the loop detected and speficy the amount of time [ once the time is expire elrp again enable that port and block it again if there is loop again]. 

           
https://lh5.googleusercontent.com/MCe78HXqkq3rXpnohdTiU2BA1abwE9YPDIm_JRcTcwYR2l72bTbXhSruYcAqvIfzZhZje356pEPoBcj0LoKo9Vj0TDzygVY6xh4fEOsul58n6SeMtVjYZXnPLg53FJRzRF9dF4t26oVTFl70

Step 3: We can exclude some of the port from blocking specialy Uplink port[I am excluding port 1 here on switch3 which is connected to Switch-1] by using below commands. We should always exclude uplink port is from being disabled because those are  port connect our Access layer swithch [ Switch-03 ] to Distribution layer switches [ Switch-01 and Switch -02 ]

https://lh5.googleusercontent.com/clBh-tms0svRq_fMNeNk7QsebX5vBKZNp6MsqrxyF9U59dSZVH0urZlrtFL32I6UBpQ1SWLHEsxpkq4cqaghY3TS3KPPS_uHj2nxfvlnevuYymwRoDI3EM7JgVsG4fvUaLrOmtnkUv6YdyFV

But here im just excluding port 1 not port 2 because we are visualising the elrp from switch-03 prespctive.

Step 4 :  Lets Verify now

https://lh5.googleusercontent.com/1RiYAEZWASPYZ8qtWtVr1UxzFD97pybQ4vpvq4hiMVLNtndNa1wk19WS9naWv8fRuXNg7cRxyqTdlnUgIsKoEqZgyGkxT-HLfeF5FqX_ex3kXtxcfkzfB-YvANfYh6Wvthq5-yR9w9yL3He3

https://lh3.googleusercontent.com/H3aO6V1diNbMHvpZc9d-gZF-l4wvKkCSZFTKQM353_qsk-0uFGH9dYZD7-z1Wsarj4hZjxIGYtIkX9J-GKckWvY9mApdEqbQist3Mc6cQwb5EIPRhvvubaJTg6WUM_hyPeB7ZonR_Ygsajd3

Lets enable port 2 on Switch-3 and see the ELRP in action.

https://lh5.googleusercontent.com/wqpWQPbcI08_2xfAWX7iuQPjiQ_BNUIdK38Ek_SRfBOw0Kx1sXAWvN8zoPrR4n3cptaGaTMeOzudmyfes0o5ol55AyZqNI3i89ncrE0uH3yxdh6NNO0Lkhf-61BGqS2as-6zfTjLM1AQGxPW

https://lh5.googleusercontent.com/ZdA2GC25V0125a-dm56iK24Ed2VxzHACsoqWzHRnocUttbnZshlyCt4byKD5uCPeUZC7tv0J3QuyGYRgyTuh8mYKO6ByYnu9aJJuenj_rYYMJsv0MXGIuWXDKDJNLAFpXkOJICA9ajGifgjX

Port 2 is disabled by ELRP on switch-3 to prevent the loop for 2 Minute [ 600 seconds].

Now again I have excluded port 2 from being blocked for uplink connecivity with Switch-02

https://lh5.googleusercontent.com/5cJTPpuEs08a8iCGkVJEdpWsvtIvuA5sS_5XBZLxm7MsM6jASrHwr6rSVN1s46-QA2hTFlqaK1WAk0uJ--9jVADtKHKCoucSCOU4KItBM6ULXRVPJAwA20ngwsqywDlfSumR5BPHuBQfIxTL

But I have enableed ELRP on Switch-02 to disable the port 2 [ Link between Switch 1 & 2 ] permanently and  have excluded port 1 [ connected to Switch-03 ] from being blocked.

https://lh3.googleusercontent.com/5Mo5qs_i9RBe2EUnFPsF4gd1tCWaubXGGiybX2R7cV85lMZv81kpefV70kneyscPh0kI5tFbQlPLbPCVdA0y8oXGJXJSSq392vpQf7Xh-rFo-KyWQFJ3QrWkCX-7D6B1EzfFZTTw0u8zqbGS

https://lh5.googleusercontent.com/AYGiXcjoGxTDPqzH4Pc6akGo3HkDKInLOH4LJlAqs2Qbw7R2_ZKoAzQgPLrHAz85qKZpmqjWKUe8pXHn24imCVhAZmuecOmAYbaoQj__W6qyRusyi9uaxGlMl0bLT5OFz8cNChMi4uFNxbQr

https://lh6.googleusercontent.com/SPnFIjEIQShth4gGUi6Jm_bhE2WmWVaM4M7TKhyjD7M6sB7RET_WieqqNDBvxUrZ7L1bma5Lb0-Y-kJaeWSYxtYlMLGFRJDmHmeiziQHzeEjvWnlV5F8jHsriExRI0ca_XiwqXG18wTcnnbf

So now we have loop prevention technique is enabled on our topolgy.so for now no issues.

Now lets look at our our topology now from the sales user-1 prespective it can use  either switch 1 or switch 2 to reach outside network.If it is using Switch 1 as a gateway and if it goes down we need to reconfigure the sales user-1 to use switch2 as the its new default gateway.This require manual intervnetion.

Solution : VRRP [ Industy standard ]

When we enable VRRP on both of the switches  and them in router id [ group ]with Virtual IP Address than one of the switch will be elected as a Master switch and respond ARP request sent by clients to VIP with Virtual Mac address[00:00:5e:00:01:0a].

Please note : We also need to configure the sales user with Virtual IP as a default gateway.

Currently it is using Switch-1 as DGW.

https://lh6.googleusercontent.com/_fGlzX88_w-0lo_cuj4fLhFzl5_2fFTQzGBjaUojylouOVUcqynUrhL2mmLQhzmfHUn-PlBNK4drD88VZC6pt2dO4X7yMYjaS2wZsdIjGPuxG8vLoDHSV03Esvkk_wOI7OImlqFH6pvjSx7n

Lets configure VRRP on sales vlan on both of the switches in our network topolgy to provide the gateway redundancy.

Step 1: Create VRRP Virtual Router ID for Sales VLAN [ group number in Cisco]

https://lh3.googleusercontent.com/6SOoAIBrBm1tjwbswNJBVB-JL3tK7FlJeaLYr_kzolCncRSR4tXB5VinvP8fbIgoYKs5Ed8WP5fFhNao39wfw6tTwGWvRZmBiHojdm52wXNsAl7XkbXk79J66jta6xY9fHuR7-Q-d8rAp8NK

Step 2: Enable VRRP on sales VLAN

https://lh3.googleusercontent.com/6Yw2-5kDrk5GxiWVkTg_xRHqnCElMqpI-GXosCie5UervSmQlsghrEtItvkpVoF49GgOUCzv9i0PaHuGIHE2uZjgmBQAY9ucPUHsgV__uwNen3E5m1d5_WXoROC8cKLlahEOKAWsSaXWoYv-

Step 3:Configure Virtual IP Address for Sales VLAN [ This will be clients new default GW IP address ]

https://lh5.googleusercontent.com/yhuqHQTtCs4eZ4aPGWjEra1TC5l37-tzvA6Go6YCmsOnxXCCaqAVB7bQ8Ojzts-KjLde7c5wBmhbGj4NREbkMQ0c3DZbzDKAxm40HdbmJKsOXrO85nLH4B5Tq4ZbInh449lTOoD31O6VT8Rq

We are done !!! We can also configure more features such as Preemption/Authentication/Tracking

https://lh4.googleusercontent.com/ejP3h9lGDxm2mLslfqrSYaw7VVr5yB3yN_UV16rrzU8MeDHk2EFbb5_iN_bO-2jrvsY2VXr9ZOrGtONINlD6AQ5aTXiWuj81ZB2Wq04cNPx31ovyrMgu31wcKaZ2uXmy4tRXzzTvxyAreb0-

Step 4 : Lets Verify which switch elected as a Master / Backup.

    Election Process is based on 1.Device with Higher Priority[ Default Priority is 100].

                                                       2. If devices have same priority, the highest IP address on SVI will be used a tiebreaker.

Switch-02 elected has a MASTER.Lets see why

https://lh5.googleusercontent.com/8KXCOuEpAi7SHUC1lRSYnkQ4e0pzqDvm6hFFob83xj3FwEmj6asYHjzFZfxhhLtn_NvPshew6NEpixaZ2798kYU7EMwuQ85KD5i-rLQINwI8lki3ygD6Y-rD0UhFtzNOq7I_UlRyp_BX3k-J

https://lh3.googleusercontent.com/UeAVHrJ4BFeeh0S_L2tpTuk4eR4WFMDz5VUResBnpFaCY0Xui6TUuq-ksGR9Uis90DVNbwGX0AugYpSmvSIIEzyc_Z3VgdfIPbR81QzbWKYE5SeApbTtAQnQxlxqxO7ILrMDNz1AfYLi_w_3

As both of the switches have same priority so highest ip address on SVI used here as a tiebreaker.

Switch 1 has a IP :10.1.1.50 and Switch 2 has a IP : 10.1.1.100 . so the switch-02 wins here

* Extreme-Switch-02.14 # sho vlan “SALES” ipv4

* Extreme-Switch-01.20 # sho vlan “SALES” ipv4

VLAN Interface with name SALES created by user

VLAN Interface with name SALES created by user

   Admin State:         Enabled     Tagging:   802.1Q Tag 4089

   Admin State:         Enabled     Tagging:   802.1Q Tag 4089

   Description:         None

   Description:         None

   Virtual router:      VR-Default

   Virtual router:      VR-Default

   IPv4 Forwarding:     Enabled

   IPv4 Forwarding:     Enabled

   IPv4 MC Forwarding:  Enabled

   IPv4 MC Forwarding:  Enabled

   Primary IP:          10.1.1.100/24

   Primary IP:          10.1.1.50/24

Lets make our Favourate switch-01 ( why switch -01 is favourate : good question : its because switch-01 is the first switch we installed in our GNS3 Topology ] as a Master Switch by increasing its Priority.

Please note we also need to ensure premption feature enabled otherwise switch-01 wont take over the current master [ Switch-02]

https://lh4.googleusercontent.com/bUYN_DIfl1xGhR00gChFXtWna-QzKGOJPpkRXBWmMR6Li37P7KAVnQEGUGdmNq0x1LvGnWmhcDrygb130ikaKQAlKmKqE10UG1gNnPnxfnV11l0lSVIAxGAkWjYGRgf5_oy677V4GFcKOUM6

Now lets verify.

Our Favourate Switch-01 win the election process because it now as higher priority compare to switch -02.

https://lh5.googleusercontent.com/v4eMrbduzieeKoW6-frJcCdKxbcsjRJEUinWHbNJUsKJp-Vw1RQFLviYXJxjhK04m917B3HElPB4RG0L2OoPh8xgrgljk3KuVBiZ7MAybgqknrHRUCk9VL6rAfVJjImb2xXf1-zUggCt6hIi

https://lh4.googleusercontent.com/M9XilHauyDns-OkSlACFK0dsN1T1wfqWr76UaY6AuVPKeuPT-eyMwCL3EQr43ze8zOdrfabPcztF1e3pmkPHlsUuMVrCOtZWKzIzljnHfGVxdL-dRSwPIyZnhOYlRWAS6FnVLOY2x2xR5fjM

Now lets assign the Virtual IP Address to Sales Users and try to reach the the VIP

https://lh6.googleusercontent.com/OI3vyp1vUAYduZARI_YQuOa6HrTWuo0VNM7xb3RYoPpLPrKjPjHejJXpZYeXlN264Qg2eHE0JuZjZtsQmR6ewl4sckG_qR091FSJhXKFCoU_0T5EirOWXGCyVvwnJdjZYNmeos82604zne92

We are able to reach the VIP.

https://lh6.googleusercontent.com/ASx-Dev-owGz1YZTMjgkegvWzIt2CR3hSbcvgLI48STu6YHMRe_CaBT8G6HZb-LYFyFnYgGjYQGx8A0zaL5T8Ya0NYK9hnh04SFGbPsaq772qKOLNVZidVgsHuBvHEtrOloaqjXda3v5ZiS5

Now if in case for some reason Switch-01 is isolated from network  than Switch-02 will respond to that VIP

https://lh4.googleusercontent.com/74lwiaCw5Ep6tNvgee1k62rbF2gB8Usevz2bSBIS1F_ZLmLPRusxobogVnPgVKe-qQEkjl7oa6iKe68WTcvSHPJHklbVyR4jXKfL_F3H1yOrfqW_KEsC2xi-nr1EJpjXGGJn-heTkPJ69GlI

https://lh6.googleusercontent.com/4vacBo9r1Z1zCnGMaxKQGPxJp4ZI4RhAMIgx7J3PSt2_qQQw0u6uGeEw-us9JdlveilsItt42iZ3LgUCWFCBL88BP1n6xCkTK0X9jLiI0BHQOZnPYsqgn-vjMJaXwpJSlU3lAxQxdbLsqDmn

https://lh5.googleusercontent.com/VfyvEpkS5_ClW3EQ4LT-fkhrssWlFJVWQXWTRi2sBQCtsVK79pGUNeMBqP4MxcnOOxQ0pur7s1Gy4EMo62wQ9BMTkj8dMSfQzni-gQP_DbkM-btO5DCatD4y-1YoOkwBTmuiFoJCVKq6RC-_

Lets see how switch-02 and Switch-01 will keep track of each other.They do it by sending VRRP packet to each other to well known Multicast address  224.0.0.18 ( this Multicast address will be converted to Layer 2 address for framing] for every 1 second and If they dint recevice the VRRP packet for about 3 Second + Skew time which is in millisecond than they declare other switch is down and will automatically take over the responsbality of Master Switch.

Packet Capture of Switch-02 which is sending VRRP advertisment packet to MC Address 224.0.0.18

https://lh5.googleusercontent.com/hBhcApltShmuCOJqAI8pbAtFypX1RKpm0g6m47pfaZhIiBUWhsGVBtWN6jrRycDjMiqujGbNLNsn99XPcTi2vDNTHeBjy25PBdvSj1ZluAdw7aD_iI-78iiL0QqePE8_pVcox4Q5Ph862y87

VRRP Packet Sent by Switch-02

https://lh6.googleusercontent.com/jUOJoNsFVSySK48dbLx18Y_yjl1dBE4zyR0ZPbZ29CVhHusjRmmdrNXkvhwEN4D6Jr4XNNukPNdlp9UuUH-kzo_t_xhqg34QCNNKgkyZTGmRuao1lqPLrHiHigv8Eh3S7vT5jf9K3x7JHp9s

VRRP Packet Sent by Switch-01

https://lh5.googleusercontent.com/qnnkBwvbWztYZmMIUK8uqjMF0FxBbKT3cV3myt8dQZF13MPArZZCAssG12a5mSvK7WBuPPGRusxxBf6bufuiDxcrXS-j-AuJR3XzLwBrwPMYDTzjsPCDIRw3u-adJto8dhp9Oe8i_coVvKRJ

Please note with VRRP you can also do loadbalancing but It will not be automatic we need to do it manually by creating virtual router id and map that to vlan.

In cisco we configure VRRP using below commands

feature vrrp

Interface vlan 4089

Vrrp <group number >

Address < Virtual IP address >

So now we have gateway redundancy. Lets add one more link between switch 1 and Switch 2 to our existing topogy for Link Redundancy.Now as soon as I connect one more link by default one of the Link will be disabled by ELRP due to this we can use only one link and that link will be Highly utilized.

Error! Filename not specified.

So as a solution how we can we make sure both Link being utilized and make sure ELRP doesn’t block one of the link.We can fool  [ technically make it to think there is one link ] the ELRP or STP by using load sharing which also known as Link aggregation [LAG].

Solution : Load Sharing ( Etherchannel in Cisco ] :

It  bundle two or more link togather and create Logical link with sum of all bandwidth [10mbps + 10mbs = 20 mbps] and this will also increase availablity.

Lets configure loadsharing in our existing topology.

                              Ther are two way : 1. Static Way

                                                                 2. Dynamic WAY [ Using LACP ]

We will use second option because it is most recommended as it use LACP Protocol which can dynamically bring up the LAG only if configuration match on both side of the Link.

Befor we begin.Lets check the current configuration.

New link is part of Marketing VLAN.lets add that to Sales vlan

https://lh4.googleusercontent.com/khNERK77jxVM_n5Pwszf6NjDkKG-Kz7zNUHDR9OLPWuFVbBuQqHAaXXYUqfW-1HxHD78p1VnZNkKPK67e-vw1l02NJcBkHIe3uARdSox_QiCXYojnpNIiGswertRXv6fD7zUQ2TQXlHmppyM

As soon as I did that.The port 2 disabled by ELRP [ Please note I dint bring up the switch-03 up due that port 2 was up as there is currenly only one link running between Switch-02 and Switch-01] as it detected loop.

Error! Filename not specified.

Now lets configure Load sharing to resolve this issue.

https://lh6.googleusercontent.com/siQ_0haBvHSEpOaZjQvU-0r1YEZCIW2Ew3KiQIen4892nyB8fD_TZGenT9iDuiZdxj02_qy1mvKaFQqhzC8LIwhpmSLRtco8eU7grN0yCbLzccN4oaviMCQ6OMQt1BMQ_iNSyFDA-HLS5gF9

It throws me an error because port 2 was part of sales vlan using VRRP.

Lets disable VRRP and shutdown all port.Configure LAG and then bring back everything

Step 1: Choose Master Port and add other Ports to group and choose LACP.

[Master port is the reference port used in configuration commands and serves as the LAG group ID. It can be thought of as the logical port representing the entire port group. ]

https://lh6.googleusercontent.com/wXIlphJRjYBuWfDZ0WGBqYwvZHRh_NyCxhCq8Noi1II-QLkROMC3tM4Di87J9G2eNYTdhzQcvyJx81GCq49oTbxX6GUCGS6zei_QuOIVO2KZeJr7jd76IWStpDxdfNKFHXMCYnnUipMVTy65

https://lh5.googleusercontent.com/Ouarf9V0otqxlfvlXxahMCWw3jCdjvQ6l1ULwJYqkZXBuwgqumRAGPllLewo9H9vlmsv7GLZADHMpDE_Z-ExsFqN5-BBUxEkhHLT8d_B3J94JAyxEv7qn6okgVKji23EovE7bb528O5MRZdS

Step 2: Enable Port 2, 3

https://lh5.googleusercontent.com/8b-j0VIgSkcCDS9xQ1rIXiQGBHevkeRYyP5Ul36G-QgR1dqHtXfA8_zHgZ0lc1O-9ZOIlP-jb1tR4m1Mmdy6Sq6Ki-qHcjcvo-dBf6WNCp0IlidJUw7hWuyy8VeAQwFd92TIirTLhKRold4A

Step 3 : Verify.

https://lh3.googleusercontent.com/dln4FOMA3qfU-UfL_xYkxgKFFC_FybeTAlXgnXyznoPJBxVg2NBXbjnAEBgNW3onIOY7jR9ZFHguIHaCZr0vD3N0lW5Za9UWkzFNP2d95zuc0KEUPlIMN6LSGib197KALZJdcX3quUOoa6C4

Now we are doing Load sharing.

Lets enable VRRP now

https://lh3.googleusercontent.com/oI770uFx8vX-yXtmO9cdc9MUOY78eYIN-jL6CanJo9AiZlO9mCKuzbx1U4FMF4S-4oWwG5qsabDIf9WsClma70YvCnobqvEBqzrl1P_rCvsh6Bj-j7CGpAuiK4DZPHBDN8bNcvC46wJo1D6n

https://lh6.googleusercontent.com/e2GcmDOv-MSmgd6nL0naMi0dj-LQl0TqCyrYM57x3KraR17y3oYHVgpS3SY5OsxNw6Yw_52ZPkH3nvfU5BGHThROkqTZUybVtFPdKIASIJIg3bqPe_3PS3yTc8hjAFShphRypntXwRFSlLU9

Now all ports are UP without being blocked by ELRP.

https://lh6.googleusercontent.com/Xn6JQL3_szAe2EfCQCHYa2LNzMMJKjowivwLyk2TBjWIu1UkheRjkbauQSZ2ydcUlkdf8HCrKLoy0LBV7Afjh0L3g7MG3clAMx5W4vo0PLMJRR8JeVQ5y2SfdIBVuoh-Di-2PpNk2hR7EIwv

https://lh6.googleusercontent.com/pX_oglGUj2OZzE0_sdrfdbq6GhiRJtCiRm2BvXPQ8Ge6llWvi8ONNZLoRIFvqCxjN_NKVcNDE2zhwitza7mkGx4wG_kpXo3ggeNE2HwuSP-UcBXdSTjv_gFSBTXpgTbptfnn9F9KbEwKjKL4

https://lh4.googleusercontent.com/lJRsKdrCWAVwFKC587q_04BJuTOJidYqLTAh7KPlAb5qsQ-b0t3W3qx5rHKvmJ2UWqStJ1I3_Kotub6NqdKYBN4GXdk198d4xyY7n8whijoyUwzPM2u518H5DOWOWIOtCiQ_5BMFMIYmx1WQ

Please note that behind the scene we will not able to use all the Link Bandwidth using LAG

Loadsharing happens here which willl be based on

• Address based—The egress link is chosen based on packet contents.

• Port-based—The egress link is chosen based on the key assigned to the ingress port.

In cisco we cconfigure etherhannel using below commands

Interface range ethernet2/0 – 3

channel-group < channel-group-number > mode  {active | passive}}

Lets add  two routers to our exiting network topology so that we connect with ISP and connect our site at Banglore to the HEAD office located at San Francisco,US.

Now Questino is which routing protocol to use to exchange routing information between Extreme Switches and Cisco router.

Let use everyone favourate Routing protocol : OSPF

Solution : OSPF ( Industry standard ) :

Topology with two routers.

https://lh5.googleusercontent.com/-RrFEA6lM6dU6o_ofjvZzW0B4l0qe2EIf7U0L8zUbcWEZQB89Eln3T2b5kRTEBMPRnHZufCXPxwxgP06jpPBuHRSoOp2x9D_h60zyhQRKkHz553tL9rg5guz1rebyWcJmtnQalK4skdOMDFm

I have configured ospf on both router.

https://lh4.googleusercontent.com/EHYHvVGMsGoHFcKDDGJieIq250HhMEzWEbR_QygqMvamEwHz3WMxRzQoTpYs1lD4KBR3HXrnjg5pDuWvR6rrwMIifWxN4YeJtNwMYz7A5uDPsslQtOcsTs7-jaaEOdhlzOXIZYqki3SYeqIV

https://lh5.googleusercontent.com/wbrNYJxX6yoH67zLxjijJ5Moy92DO-urctL1WpAUvxTiQIdB3CgJSim0a1M-hg9w556UxqrAIwudfC3sWMhTQnWfzJGph7Y6aHW_ryIfakehxQkBKOczf7ksDw4CGgn1bOqvI8WLervx-weU

Lets prepare the Extreme Swtiches for OSPF.

Please note we need to create Separate SVI for OSPF on both switches inorder to communicate with Router-01-CE and Router-02-CE and untagg those ports to that VLAN.

Lets create SVI on switch-01 and Switch-02 and assign them the IP address

Step 1 : SVI for communication with Routers

https://lh5.googleusercontent.com/rNhFqcpBZhsmrIW9ZRwqMm1kxznvWC_GIbGCIiJum7IMrluL07MK1tHX8qK8ZhJro_2MMhrfBVaL1FVS-5RPdGHcA1ErismjlUM5sUwzMCCHiPqTkwgE3CC84wHckKPjndWAGUKSFFisOHLN

https://lh4.googleusercontent.com/bywzRkRlICQLq73DR1EyXs0jcNe91c6Ud8jW_RgQntcHkT6sH2lOgH2D9mJBdZ6R8KgZm3l_1eXZKoS1uzLbr__cPAnwxqWb1myoC60wHm8y6DOuyd-DWIZZAvOvHoBU986qH0jKdEjgTlHs

Step 2: Assingng the IP address [ Please enable IP forwarding on that SVI ]

https://lh5.googleusercontent.com/8q52nhtClO50tPZzrOQg_sjj1ezeHGtKM3InFIZVSm-rZnjYKggvXWQNEPOGDfQxHM3M3Q8F4QYvwC-5COykg7Av8vRriGoo-8PSWdHgAK_sQxwH78eo6yn-XtSj0HtinJI_qHy5guzc3frs

Step 3: Lets verify.

https://lh3.googleusercontent.com/V9_mFneVWB_8YMaCZczJObXgqK2yo_e060ZMylNPMZiG2YMtX3GWo8c7egY-iyD9R8HdVLLx1Zm-Hmr0c7YToM2K25JNBt5dynFokSR7t7k8OyxcSPiMXsqfgNDiZ_iqeoeCQhILHWzeidHh

Now we  have SVI lets configure OSPF now

Step 1: Enable OSPF Process on switches

https://lh5.googleusercontent.com/bjyS5ayAMsr9oeq922yQAkI0VS0SoCJgDkx402po4Zu73y_hX3ag5T3xwdCw-fZWoW820YoYoSYWReU-mUhJZC2SmRVFVKIh8jD_X_B02z39G8MsbYXsX7b__dzEepT5O0sAf1f0yTSdqvNj

Step 2: Enable IP forwarding on those SVI.

https://lh3.googleusercontent.com/Jl9p7izBAYpLo81FnnMgmX8KEuT3kML6tN3DQsWU8Cxv3V5W1sMgypK7yuACiRCyvKsDvMovVBPKEqFiJJ3IyTq4jpfHkhqeVRz9p9LnNyod2Z1L31YjMowCzCizHxQ2GyZwKMae2aKjIpUG

Step 3: Now Configure OSPF Process on specfic SVI and them in AREA 0[Sales SVI and on SVI which we created routers here].

https://lh5.googleusercontent.com/vRfYmTcsmuwqGoOVRnH1VnCumepDmuFervpI1uAsIksgFQ4Q1Kf03egCawDLKvyxzVR6lSk9hKBAGgeF6udspFh5yAVeJ0dreXrgwH6_5KGPj9O5pWUz8P-McEJ30qyamtmX08qDVv0SCZ4k

Step 4 :Verify

https://lh6.googleusercontent.com/mjwtCNBD45DsfZTOChKSoo2krJSaIgCDkUEH2Br2rZV3GQHPImlEYyqM1UX-zO5BRxMljzTimbBTsLSiy73gamBWfeT31JalcutDeMTTmQO2LHJ8HIhvATG-w4Z8xDZ4hfrE7qbjeIWsbAX2

  We are good here we have OSPF neighbourship up and running between routers and Switches.

https://lh6.googleusercontent.com/3ThgCtbv3fatABaS7x7Hnis6cXQCNcsF3hsvCEcdwPCEVb5dQ5H4zhLyccsGZ3Jo5jFPd0zd143FKkF9aiXLcNrQdE0hTbKfJYNlrUYV29qNhOpDCNaz-cwUv7Oj0LGb5FxRiCNAxLG9WepV

https://lh6.googleusercontent.com/fpl2N1A4IZJaeKUzvXdJe6C7ZyvYPR_DuAxs8bN8gkXBdTfAD-CNVUrs4cI9f_Q9msKCckgVo6m-Lut8qim5VJgBWEA3PWIlZNyp0zqt6ZnEQ1v0i1JVccWXL41oa718lgkvyI5kIrtTOzw4

We may need to restart ospf process sometime if we make some configuration changes. [ such as adding new router-id ] which we can do using below commads

https://lh4.googleusercontent.com/YBeJ1JldRE36-GaJ1NXqIr9ikUnA26mKa5eCiNdTWUMTL1nrz7BkqQLuySBFSnhk71KX6Ai9Sr0JKHtlPw8SRatTLzOasWtw5QgJkDo7OXmjD6oxbFx38NrFaKnXhKm2TmM9MUObcoHnkDB_

Let me configure  now both routers to communicate with each other using internal BGP and with ISP using External BGP.

As we know BGP is policy based routing protocol which we can use to connect and share the information with ISP .We can also maniuplate the path selection based on the BGP path attribute to control the traffic flow.

Before we can configure the ibgp we need to verify first whether we can reach other peer using IGP

https://lh5.googleusercontent.com/JSncuj4U2YFHz44okQ3nTmLO4ScLLYfrT1sUQSeQTAIN1NKaWuuig3iIPh-4GwEDQGDH_m4W_mvk1hcLjkXm_7MkyZFGORdkXsu-lWkaUqc-vnKExrh3ccyYDhyN3E7MGJbKGLPrD4STK4OV

https://lh6.googleusercontent.com/ULLOSBmQcjAif5haOHu4VW48Ho9KUjjZIdm1THQftk3XkZjI1Rn6pvEhd1vRRdjhtGsYcXWOzsowmPzUkMcoMM-MQojfAPTzUUhcznmdW3C-pbOQXjfZ8KeaC8yBe3wKbN_1RtGOhhHQzSjY

We are able to reach R2  from R1 using ospf.

I have now configured ibgp on both routers .We can see BGP is up and running

https://lh5.googleusercontent.com/YoiNWfGjKkyVYTIePJ7vJtCfkY8vRDG_bCBMWwkosfpJ6KwliaXRDtiJiP_maZ-N7OtcEgXDu59I8zjinEYThK0NFsWxLDt0OlpA4JIW2sQCTPF6FKKlk8FgPRtLF_WI8hKTR6DzoXd_2cMo

https://lh3.googleusercontent.com/sBARviohwP5m455vcK9c0wQN1zck-BTYOQ8SJypqicXdNie1Yu7DR_S_psF6ut6eMUXFLwhcQkg7c7VaBnIxg1eoYbYbAQvXRH8uz41BzKbJJajf1OWvdW0XDT1dVp359dja1HeL2y0D1Qaf

Below is our Final Topology.

https://lh6.googleusercontent.com/JD7znG25ty_jEauEm-nP5CYCeD_-_6dlbYgobcKE-zGmpXGcFDyIf11ts5GQn9YVS712e0nUuGFxrdx0p0EguSWKDGfeQu99CeA_LlnMPzVQ5RhF8XuZ41ebIFqfp3LaK5VpcGaw4lcgi7Y5

I have also configured Ebgp between our edge router and ISP.                  

We are conneted to ISP using ebgp and we are also receving the routes from our ISP to reach the WEB server [ Internet ] and DHCP server [ Head office ].

https://lh4.googleusercontent.com/KhQuLiTLnSeITtTT3bCi7aPvNG8YUwnMy3UcPMNqqRyLugSukjryy6Rlh4ZfGsvo7MYyvQVj9_zqUcY_gyegxArmpen3TZE3AJef-f8DViVMle0h-1_VFIbl7aFaxvO2XRMOEQBbjTmByJlg

Now from routing prespctive two things left.

  1. We need to advertise our internal network to ISP by specifing Network stament in BGP on both CE routers.

https://lh6.googleusercontent.com/xC8djd4Ei8DTWwokr9du_cQhRPGSs7T20e11tp919p-BFNlgOC_NC_5ujJD6-ClRIsOXpMaWc6GN5IpvTvrhUEO8XpRnzLtI5EF4dkPZsc3_LEF7nr3hIbixwIA667OCLuIKhSYZA5JQTCTa

  1. We need to redistribute the routes learned from ISP via BGP to OSPF so that our Extreme Switch running ospf know how to  route reach the webserver and DHCP server from layer 3 prespctive.

I have redistributed BGP [ External routes ] in OSPF has a type E-1 [E 1- Take consideration of the external metric [ which is 10 here ] +  as well include cost to reach the ASBR ]. I did that beacuase

I want see one best route in routing table [ nearest cost to reach to ASBR]

Please note E2 routes – Consider only one cost based on external metic.

Please note When router 1 and 2 redistribute external routes in ospf they are now know as ASBR in Area 0.

https://lh3.googleusercontent.com/Cf4J7N4WSb8nagoBs3l6ybqWKSrX_N397gcq8ZZpRNF5xZlkGhT23hA6aTHyUJET9CkmDKmuq43zcyknsGgPRowTyePt3epnCLRhlPRSX51gGgbPIiFTCCH1XEg1lK2lkG3CXe6TljDp7CfS

Lets see what we have in routing table of both of the switces.

We see routes for Webserver and DHCP server are in OSPF database and one best route added is elected and added in routing table.

https://lh6.googleusercontent.com/2WTCCkiBMvmF7wfIl1Jd13h3Vm9y9vm5nvVKVkIkbLGvfR0WvmQlVQCBs2njS7j6HRs_PbUiXRxmzctqphqklIcvrQyElOpum3Sgca422mQJ2c2MBnAky-WoeefpSV4h6Osbcixky8c3y3RO

https://lh3.googleusercontent.com/UU_ou0xJIB55e3ewJ3jdIkEX12ku8T9Xu7PwTf1SeJsfFaeUcESEdXAhwmk4y-Osjpz28taqswzFqRgnBq2pUkis2F9K-o_tjg6VVs_2uxdxOb_K03wfeH5sPCKXpw0d_OmCkqXZuMmp_iCK

https://lh3.googleusercontent.com/Dr9cJx4CYVE_hvumpqjJEX-6ZI22niBAHum6EELGnWiOzOHwsymDVI8vFYYTHlgRd7yjRsZ_Vcrgl4S0p8iw8KNo1JrIhCCxBTdWlUqQ4OQ4-MM3OgRoPeu8aL8YpDze-3DNGYA6fctmF-S9

Lets verify the connectivity with Webserver [100.1.1.100 ]and DHCP server [ 200.1.1.200].

We can reach them from Switch-01 and Switch-02  but not from Switch-03.

https://lh4.googleusercontent.com/mDMM_wBzI2H1i46PuQhbT6peSGjj7aO1XuVIJ7XWvCMU_B1s-Mcc9SCq-GUPQIsNUPfaM5QlJpxoIOcv59KH5wF201zczIQPTi9x4YHurfjw1VBryVLaLYvoEcqzwFK0L2IVwdotun-HoKPO

https://lh6.googleusercontent.com/Y4gVCSpyXuc9bFmujgHsLU-VnI8rRSrljmvsJHQCnO4DqifzBaqx4-HscUKb_mH3LyNMUYE91YXahk3h7sp5qT5Ax2DGN98P_rDd_GjfcGkeFUE06oyeAQ9mrGY6ZNPihV6BpsQT4LWArZVJ

https://lh3.googleusercontent.com/RcYKR0xDXotY03NtNeOmmP7b9maZ1isCJJf3dxMCBYudu8Glz93rjWcfAHf_Hp9cr3fuSqkPaIlyDp98vqudjyEdjJ7vxFY9tg6GDVv21zY_Iy3u-0HM3Dd4MkbewAdm8pOPl-Kqz5hrlB_g

https://lh3.googleusercontent.com/8FW9LtoP7PiTuqJ65hpOXNOLj2vVz8cQc4lAqfBPyb2-s--yrH1DZo3YCOOChcLKar39-l_Cj-KJHTLOBAtOp0PpZLmfsM8njzMXzrEoV7LQ9WGtSsGqrblF5pSoP_Z_EDBjciAIE-w4p9EH

Because OSPF is not running on Switch-03 so it don’t know where to route the traffic.if we don’t want to run OSPF on Switch-03 [ Access layer Switch ] we can configure static default route pointing to VIP.Lets do that.

https://lh5.googleusercontent.com/zqXT3WFd89800Gl4uNZjW0EIztn63dHo3Ra0o6nUQFF6NIQhWNIGaplvDHcQ8uI4uUvAXqEzRyNnADl6Xw5saSXywd1kvaWkmRm59sDIfQIF75jDATGU9uXxnHikKpquZKdYMwA6MCkmo7hq

As soon we did that we are able to reach those servers.

https://lh4.googleusercontent.com/mdinsFVzorAXxuXoLmOPSTxPPAB9rGoVU4V3p8rCqrw24FEUQrTQ-W9J7QuZqoJuOq-EB-NJRYNLOlCVyIW5PDFgLcDGCnEsbuJyF5VSvLhwOhbKUj0b1va6cY-M0HoIqOuJqSAP6zJvnld3

https://lh5.googleusercontent.com/jVXJ9r2YvsPiV-ykfrAUQ_QvrSP2OFRouKkR7QWex2nBvhLUuoUhuBTdeJWe3Ifh151GSg7Hzr4eMnC9Cm1MXp6Jv1O70r441YEP4mXleOWrpT2joDj73TDUaF3s35s2fPalrzwjejCEgk5F

Lets Perform final Verifcation from User 1 Prespctive.

Yes We hav Success here . They are able to reach the server.

https://lh3.googleusercontent.com/DTgWYiG0o5dMTLhY-x-ouyEYZINFQAnseJwmwYPdNKOl-17gAUPw6zQoQZ6FyWKpRgkSAEqW6W8s4i0vXUJggeKF5HNj0zkxJW_umOE5i0Xq8fqHsddrBQLrP-ljkKh7qjjaaNHkGJDGTwij

Now what if we don’t want to assing IP address statically and we want use DHCP server located at Head office to assingn the ip address to the users located at branch office. DHCP request are broadcast packet and they do not beyond layer3 bounday.

Solution  : Bootprelay  feature [ IP helper-address in Cisco ].

Lets configure it on both of the switches so that they send process DHCP request received from the clients [Sales] to the DHCP server [200.1.1.200] located at HEAD office.

Step 1: Enable bootprelay gloabally

https://lh6.googleusercontent.com/VnbIEKn_qNJAu2OUXx3Jo9CC4T41nFT_y5htrwl5yjbgOfJTUs_WPAOcid_N_921yzWGdryqDLl9h0CSJtZmdloXlRGt93x7VUiDBI36CPwLvddFIMqLJjHYD05ZBiXyeWi4VIB2YfSVjndm

Step 2: Enable bootprelay on VLAN and add the ip address of DHCP Server

https://lh4.googleusercontent.com/dGpjIWr_-PY9UkE3xKsWOG5c2yaKdfu0AS1PN5gpWvDnhCWxNK8WOCqX3MMsGM1r_2LaD4fNdRI_T3z-frcTNK20ei6YHoyiXSde6DMMByknwkIsBu9qvH1tTI5wgSGq5kkrjtivZB1cE4Au

Step 3 : Verify

We can see the IP address 10.1.1.1 assinged to  Sales User-1  from the DHCP pool 10.1.1.0/24 by DHCP server

https://lh6.googleusercontent.com/90NiIlMBONrfwMENYz9p6iXIBwqGbGlrwOZ6zeiNVQJ0L15JaBaU22wKoWP7u--PdjyqORzwEhaZxkuv-Y8T70vgnrXr-LYfvyOA0B5pkDwEop9ThP8i6O9vduS4F5cek1f7heNE306GC0KQ

https://lh4.googleusercontent.com/eeWGN51qbsMfXoEK8USmScGsf1FFLFHg3j-i9a4Artj1L9ThVmW_JLdfgcExyX-Tf1c5OJ-POgh6tRBa7YEQ7nB4oKHjRGeCpcLTN5QCBMpLc9tvi8wEzvSju231qdiBZtH0E5ER3d4y8ZSU

https://lh5.googleusercontent.com/_eySAEvV5qRcAc4-Z0l2yP49aQdB96DewjUAm9_ntDP61kkG9oCjZyZGcMEGoEf-JmKjy1zuEB7borw3_XIfu6jKWrMGXU9bg_-x21_qz7jKCv5dxSy8-C0MscyhgpdESbjVnnkSYnlZYSjH

In Cisco we perfom this by using simple command.

Interface vlan 4089

Ip helper-address <200.1.1.200>

Finaly We are done. Everything is up and running in our network Topolgy

Summary of Useful Monitoring commands :

Extreme Commands

Information

Cisco Commands

Extreme-Switch>

User mode

Cisco-Switch>

Extreme-Switch#

Privilage mode

Cisco-Switch#

Extreme-Switch#with configure key

Global configuration mode

Cisco-Switch(config)#

show switch or show version

UP time / Image information /Model / Serial Number

show version

show fdb

MAC Address table

show mac-address table

show edp port all

Neigbour Device information

sho cdp  neighbors

show vlan

VLAN information

show vlan

show ports no-refresh

Port information

sho interfaces

show port 2

information about one Port

show interface fa0/2

show port information detial

Trunk information

show interface trunk

show vlan < name of vlan >

SVI interface information

show interface vlan <  vlan number >

show ports statistics

Packets are being received and transmitted.

sho interfaces | include load

show port 2  rxerrors or txerror

Error statistics

sho interfaces fastEthernet 0/0 | in error

 show stpd

Spanning tree information

show spanning-tree

show vlan < name > stpd

STP configuration of the ports assigned to a specific VLAN

sho spanning-tree vlan < vlan number >

sho ipconfig

what services are enabled

show ip interface

show iproute

Routing table

show ip route

show ospf

To check OSPF running or not

show ip protocols

show ospf neighbor

To check the status of OSPF Neighorship

show ip ospf neighbor

show ospf lsdb

To check OSPF  database

show ip ospf database

show ospf interfaces detail

detailed information about OSPF interfaces

show ip ospf interface

 show ospf area

Displays information related to OSPF areas

show ip ospf

show ports 2 configuration

Displays configuration information about the Port

sho run interface fastEthernet 0/2

show log

System event logs

show logs

 show cpu-monitoring

Information about CPU utilization

show processes cpu

show configuration

Running configuration

show running-config

Save configuration

To save the configuration

write

show slot

To check Status of Module

show module

show stacking

Information about switch stack

show switch

show power

Power Supply information

show environment

Referance Guide:

  1. ExtremeXOS 16.1 User Official Guide by Extreme
  2. GTAC Knowledge Home : https://gtacknowledge.extremenetworks.com/ (Just like Cisco Learnining Network ]

Conclusion : With monitoring commands shown above I am ending this article here.When you first time implementing Extreme-OS in gns3 you may face many difficulties but please go with the concepts.Thank for being with me. If you have any Quesiton you can post below in the comment field. I hope this help

Leave a Reply

Your email address will not be published. Required fields are marked *