User Tools

Site Tools


informatique:extreme_networks

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
informatique:extreme_networks [2020/01/20 09:01] – [Spanning-tree] pteuinformatique:extreme_networks [2020/03/06 10:06] – [Créer une ACL dynamique] pteu
Line 686: Line 686:
 </code> </code>
  
 +[[https://gtacknowledge.extremenetworks.com/articles/Q_A/How-to-check-ports-for-possible-blocking|Commande de diagnostique bas niveau]] :
 +<code bash>
 +debug vlan show vpifs vl-WIFI 2:29
 +VLAN: Default, port:2:29, vlanId:1, instance: 50002499, tag: 0,
 +        Ingress:0x5, Egress: 0x1, l2 prot priority: 0, cfgSave: TRUE
 +        l2Protos (IDs): 0x0 [PIF: type:SLOTPORT linkState:1 phyLinkState:1]
 +        uRPF[-]:0, isTrillAppointedForwarder:0 isTrillDesignated:0
 +        clientUsage: 0x10
 +
 +Egress and Ingres state bit definitions
 +typedef enum ifIngressState_ {
 +IF_STATE_ENABLE_LEARNING=       0x1,
 +IF_STATE_DISABLE_LEARNING =     0x2,
 + IF_STATE_ALLOW_ALL =            0x4,
 + IF_STATE_ALLOW_AUTH_MAC =       0x8,
 +IF_STATE_SLOWPATH_PROCESSING =  0x10,
 +IF_STATE_IN_BLOCK_ALL =         0x20,
 +IF_STATE_IN_BLOCK_DATA =        0x40,
 +IF_STATE_INVALID =              0xffffffff,
 +} ifIngressState_t;
 +typedef enum ifEgressState_ {
 +IF_STATE_FORWARDING =           0x1,
 +IF_STATE_EG_BLOCK_ALL =         0x2,
 +IF_STATE_BLOCK_FLOODING =       0x4,
 +IF_STATE_EG_BLOCK_DATA =        0x8,
 +IF_STATE_BLOCK_BROAD_CAST =     0x10,
 +} ifEgressState_t;
 +Layer 2 protocols , ids and their priorities(lower values have higher precedence
 +Protocol: SRP , ID: 0x1, Priority: 8001
 +Protocol: netLogin , ID: 0x2, Priority: 10001
 +Protocol: VRRP , ID: 0x4, Priority: 40001
 +Protocol: ESRP , ID: 0x8, Priority: 30001
 +Protocol: ELSM , ID: 0x10, Priority: 7001
 +Protocol: ETHOAM , ID: 0x20, Priority: 6001
 +Protocol: brm , ID: 0x40, Priority: 50001
 +Protocol: stp , ID: 0x80, Priority: 9001
 +Protocol: ERPS , ID: 0x100, Priority: 10050
 +Protocol: EAPS , ID: 0x200, Priority: 20001
 +gMacTree[0]: cnt:0 Addr 2.4.96.00.11.22 src: 0
 +</code>
 ====jumbo frames==== ====jumbo frames====
  
Line 784: Line 824:
 En vrac : En vrac :
 <code bash> <code bash>
 +# Configuration de base
 +configure stpd s0 priority 16384
 +configure stpd s0 mode dot1w
 +configure stpd s0 add vlan Default ports 5:1 dot1d | emistp | pvst-plus
 # (dés)activation du domaine s0 # (dés)activation du domaine s0
 disable stpd s0 disable stpd s0
 enable stpd s0 enable stpd s0
  
-configure stpd s0 priority 16384 +Configurer un port edge
-configure stpd s0 mode dot1w +
-configure stpd s0 add vlan Default ports 5:1 dot1d | emistp | pvst-plus +
- +
-configurer un port edge+
 # attention cela bloque le port si l'on reçoit un BPDU dessus # attention cela bloque le port si l'on reçoit un BPDU dessus
 # les bridges sous Linux peuvent en générer par exemple # les bridges sous Linux peuvent en générer par exemple
Line 798: Line 838:
 </code> </code>
  
-Debug / diagnostique+====Debug / diagnostique==== 
 + 
 +Lister l'état STP des ports du domaine s0
 <code bash> <code bash>
-# lister l'état STP des ports du domaine s0 
 show stpd s0 ports show stpd s0 ports
 [..] [..]
Line 809: Line 850:
 #                       port edge 'normal' en 1:13 #                       port edge 'normal' en 1:13
 #                       port bloqué en listening en 1:14 #                       port bloqué en listening en 1:14
 +</code>
  
-Afficher la raison d'un port bloqué+Afficher la raison du blocage d'un port 
 +<code bash>
 show stpd s0 ports non-forwarding-reason show stpd s0 ports non-forwarding-reason
 Port    State       Reason Port    State       Reason
 ------------------------------------------------------------------------------- -------------------------------------------------------------------------------
 1:14    LISTENING   Placed in listening state because it is in dispute. 1:14    LISTENING   Placed in listening state because it is in dispute.
 +</code>
  
-# +Logguer les événements STP : 
-# logs +<code bash> 
-# +# changements de topo STP : 
-# logguer les changements de topo STP sur les ports edge +configure stpd s0 trap topology-change on
-configure stpd s0 trap topology-change edge-ports on+
  
 # ajouter des msg de log # ajouter des msg de log
Line 834: Line 877:
 </code> </code>
  
-sources :+Sources :
   * https://gtacknowledge.extremenetworks.com/articles/Solution/Spanning-Tree-Topology-Changes-on-X460/?l=en_US&fs=RelatedArticle   * https://gtacknowledge.extremenetworks.com/articles/Solution/Spanning-Tree-Topology-Changes-on-X460/?l=en_US&fs=RelatedArticle
   * http://documentation.extremenetworks.com/exos/EXOS_21_1/STP/c_edge-port-behavior.shtml   * http://documentation.extremenetworks.com/exos/EXOS_21_1/STP/c_edge-port-behavior.shtml
Line 892: Line 935:
  
 <code bash> <code bash>
-create access-list dynamic test-acl "protocol icmp;source-address 125.1.40.21/32" "deny"+create access-list dynamic test-acl "protocol icmp;source-address 10.0.20.21/32" "deny"
 </code> </code>
  
informatique/extreme_networks.txt · Last modified: 2023/12/21 15:11 by pteu