cc/td/doc/product/access/acs_mod/3303e
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Configuring Transparent Bridging

Configuring Transparent Bridging

This chapter describes how to configure transparent bridging. For a complete description of the commands mentioned in this chapter, refer to the "Transparent Bridging Commands" chapter in the Bridging and IBM Networking Command Reference. To locate documentation of other commands that appear in this chapter, use the command reference master index or search online.

Transparent and remote bridging software on the Cisco Optical Networking System (ONS) 15304 combines the advantages of a spanning-tree bridge and a full IP router. This combination provides the speed and protocol transparency of an adaptive spanning-tree bridge, along with the functionality, reliability, and security of an IP router. Because the Cisco ONS 15304 does not support Token Ring interfaces, source route bridging and translational bridging are not applicable to the Cisco ONS 15304.

The Cisco ONS 15304's transparent bridging software implementation has the following features:

Transparent Bridging Configuration Task List

Complete one or more of the tasks in the following sections to configure transparent bridging on your router:

See the "Transparent Bridging Configuration Examples" section for configuration examples.

Configure Transparent Bridging

To configure transparent bridging, you must complete the tasks in the following sections:


Note For typical Cisco ONS 15304 applications, there will usually be a separate bridge group for each distinct subscriber Ethernet and serial interface. This is necessary so that traffic from each LAN is kept segregated and to preserve the security of each subscriber's network.

Assign a Bridge Group Number and Define the Spanning-Tree Protocol

The first step in setting up your transparent bridging network is to define a Spanning-Tree Protocol and assign a bridge group number. You can choose either the IEEE 802.1D Spanning-Tree Protocol or the earlier digital protocol upon which this IEEE standard is based.

To assign a bridge group number and define a Spanning-Tree Protocol, complete the following task in global configuration mode:
Task Command

Assign a bridge group number and define a Spanning-Tree Protocol as either IEEE 802.1D standard or digital.

bridge bridge-group protocol {ieee | dec}

The IEEE 802.1D Spanning-Tree Protocol is the preferred way of running the bridge. Use the Digital Spanning-Tree Protocol only for backward compatibility. If you use the digital protocol, you will not be able to use bridge groups. For this reason, the digital Spanning-Tree Protocol mode is not recommended for typical Cisco ONS 15304 applications.

Assign Each Network Interface to a Bridge Group

A bridge group is an internal organization of network interfaces on a router. Bridge groups cannot be used outside the router on which it is defined to identify traffic switched within the bridge group. Bridge groups within the same router function as distinct bridges; that is, bridged traffic and BPDUs cannot be exchanged between different bridge groups on a router. Furthermore, bridge groups cannot be used to multiplex or demultiplex different streams of bridged traffic on a LAN. An interface can be a member of only one bridge group. Use a bridge group for each separately bridged (topologically distinct) network connected to the router. Typically, only one such network exists in a configuration.

The purpose of placing network interfaces into a bridge group is twofold:

After you assign a bridge group number and define a Spanning-Tree Protocol, assign each network interface to a bridge group by completing the following task in interface configuration mode:
Task Command

Assign a network interface to a bridge group.

bridge-group bridge-group

Configure Transparent Bridging over WAN Interfaces

You can configure transparent bridging over a variety of networks, as described in the following sections:

Configure Transparent Bridging over PPP

The Cisco IOS software supports transparent bridging over PPP links and provides some flexibility in controlling access and configuring the interface.

To configure a PPP or Multilink PPP interface for bridging, complete the tasks in the following sections:

Define the Protocols to Bridge

IP packets are routed by default unless they are explicitly bridged; all others are bridged by default unless they are explicitly routed.

To bridge IP packets, complete the following task in global configuration mode:
Task Command

Disable IP routing.

no ip routing


Note For the Cisco ONS 15304, IP routing should always be turned on because IP is used in the management plane. IP can be used on other subscriber interfaces. Follow the instructions below in the rare event that you want to turn off IP routing.

Specify the Bridging Protocol

You must specify the type of spanning-tree bridging protocol to use and also identify a bridge group. To specify the Spanning-Tree Protocol and a bridge group number, complete the following task in global configuration mode:
Task Command

Define the type of Spanning-Tree Protocol and identify a bridge group.

bridge bridge-group protocol {ieee | dec}

The bridge-group number is used when you configure the interface and assign it to a bridge group. Packets are bridged only among members of the same bridge group. Normally, there will be a bridge group with the same identification number associated with an Ethernet interface.

Configure an Interface for Bridging

You can configure transparent bridging using PPP encapsulation on the serial interfaces. To configure transparent bridging over PPP, complete the following tasks, beginning in global configuration mode:
Task Command

Specify the serial interface.

interface serial number

Specify no IP address to the interface.

no ip address

Configure PPP encapsulation.

encapsulation ppp

Assign the interface to a bridge group.

bridge-group bridge-group

Specify the type of Spanning-Tree Protocol.

bridge bridge-group protocol {ieee | dec}

For an example of configuring transparent bridging over multiprotocol PPP, see the section "Transparent Bridging over PPP Example".

Configure Concurrent Routing and Bridging

In the Cisco ONS 15304, Concurrent Routing and Bridging (CRB) will normally be turned on to allow different subscribers' Ethernet interfaces to be configured to operate in both transparent bridging or IP routing modes. If CRB is not turned on, the Cisco ONS 15304 will either bridge or route IP, but not both at the same time. For example, if two different subscribers are using IP traffic, but one has purchased an IP routing service, while the second has purchased a Transparent LAN Service, CRB must be turned on. Otherwise, the IP traffic on the Transparent LAN Service Port will not be forwarded.

You can configure the Cisco IOS software to route a given protocol among one group of interfaces and concurrently bridge that protocol among a separate group of interfaces, all within one router. The given protocol is not switched between the two groups. Rather, routed traffic is confined to the routed interfaces and bridged traffic is confined to the bridged interfaces. A protocol can be either routed or bridged on a given interface, but not both.

The concurrent routing and bridging capability is, by default, disabled. While concurrent routing and bridging is disabled, the Cisco IOS software absorbs and discards bridgeable packets in protocols that are configured for routing on any interface in the router.

When concurrent routing and bridging is first enabled in the presence of existing bridge groups, it will generate a bridge route configuration command for any protocol for which any interface in the bridge group is configured for routing. This is a precaution that applies only when concurrent routing and bridging is not already enabled, bridge groups exist, and the bridge crb command is encountered.

To enable concurrent routing and bridging in the Cisco IOS software, complete the following task in global configuration mode:
Task Command

Enable concurrent routing and bridging.

bridge crb

Information about which protocols are routed and which are bridged is stored in a table, which can be displayed with the show interfaces crb privileged EXEC command.

When concurrent routing and bridging has been enabled, you must configure an explicit bridge route command for any protocol that is to be routed on the interfaces in a bridge group in addition to any required protocol-specific interface configuration.

To configure specific protocols to be routed in a bridge group, complete the following task in interface configuration mode:
Task Command

Specify a protocol to be routed on a bridge group.

bridge bridge-group route protocol

Configure Transparent Bridging Options

You can configure one or more transparent bridging options. To configure transparent bridging options, complete one or more of the tasks in the following sections:

Disable IP Routing

If you want to bridge IP, you must disable IP routing because IP routing is enabled by default on the Cisco IOS software. You can enable IP routing when you decide to route IP packets. To disable or enable IP routing, complete one of the following tasks in global configuration mode:
Task Command

Disable IP routing.

no ip routing

Enable IP routing.

ip routing

All interfaces in the bridge group that are bridging IP should have the same IP address. However, if you have more than one bridge group, each bridge group should have its own IP address.

Establish Multiple Spanning-Tree Domains

The Cisco IEEE 802.1D bridging software supports spanning-tree domains of bridge groups. Domains are a feature specific to Cisco. This feature is only available if you have specified IEEE as the Spanning-Tree Protocol. A domain establishes an external identification of the BPDUs sent from a bridge group. The purpose of this identification is as follows:


Note Domains do not constrain the propagation of bridged traffic. A bridge connects nonrouted traffic received on its interfaces regardless of domain.

You can place any number of routers or bridges within the domain. The devices in the domain, and only those devices, then share spanning-tree information.

When multiple routers share the same cable and you want to use only certain discrete subsets of those routers to share spanning-tree information with each other, establish spanning-tree domains. This function is most useful when running other applications, such as IP User Datagram Protocol (UDP) flooding, that use the IEEE spanning tree. You also can use this feature to reduce the number of global reconfigurations in large bridged networks.

To establish multiple spanning-tree domains, complete the following task in global configuration mode:
Task Command

Establish a multiple spanning-tree domain.

bridge bridge-group domain domain-number 

For an example of how to configure domains, see the section "Ethernet Bridging Example".

Prevent the Forwarding of Dynamically Determined Stations

Normally, the system forwards any frames for stations that it has learned about dynamically. By disabling this activity, the bridge will only forward frames whose address have been statically configured into the forwarding cache. To prevent or allow forwarding of dynamically determined stations, complete one of the following tasks in global configuration mode:
Task Command

Filter out all frames except those whose addresses have been statically configured into the forwarding cache.

no bridge bridge-group acquire

Remove the ability to filter out all frames except those whose addresses have been statically configured into the forwarding cache.

bridge bridge-group acquire

Configure Bridge Table Aging Time

A bridge forwards, floods, or drops packets based on the bridge table. The bridge table maintains both static entries and dynamic entries. Static entries are entered by the network manager or by the bridge itself. Dynamic entries are entered by the bridge learning process. A dynamic entry is automatically removed after a specified length of time, known as aging time, from the time the entry was created or last updated.

If hosts on a bridged network are likely to move, decrease the aging-time to enable the bridge to adapt to the change quickly. If hosts do not transmit continuously, increase the aging time to record the dynamic entries for a longer time and thus reduce the possibility of flooding when the hosts transmit again.

To set the aging time, complete the following task in global configuration mode:
Task Command

Set the bridge table aging time.

bridge-group bridge-group aging-time seconds

Filter Transparently Bridged Packets

A bridge examines frames and transmits them through the internetwork according to the destination address; a bridge will not forward a frame back to its originating network segment. The bridge software allows you to configure specific administrative filters that filter frames based upon information other than paths to their destinations. You can complete administrative filtering by completing one of the tasks in the next section.


Note When setting up administrative filtering, remember that there is virtually no performance penalty in filtering by MAC address or vendor code, but there might be a significant performance penalty when filtering by protocol type.

When configuring transparent bridging access control, keep the following points in mind:

For more information on access lists, refer to the "Configuring Traffic Filters" chapter of the Security Configuration Guide.

Set Filters at the MAC Layer

You can filter transmission of frames at the MAC layer by completing tasks in one of the following sections:

When filtering by a MAC-level address, you can use two kinds of access lists: standard access lists that specify a simple address, and extended access lists that specify two addresses. You can also further restrict access by creating filters for these lists. After you have completed one of the preceding tasks, complete the task in the following section:


Note MAC addresses on Ethernets are "bit swapped" when compared with MAC addresses on Token Ring and FDDI. For example, address 0110.2222.3333 on Ethernet is 8008.4444.CCCC on Token Ring and FDDI. Access lists always use the canonical Ethernet representation. When using different media and building access lists to filter on MAC addresses, keep this point in mind. Note that when a bridged packet traverses a serial link, it has an Ethernet-style address.

Filter by Specific MAC Address

You can filter frames with a particular MAC-level station source or destination address. Any number of addresses can be configured into the system without a performance penalty. To filter by the MAC-level address, complete the following task in global configuration mode:
Task Command

Filter particular MAC-level station addresses.

bridge bridge-group address mac-address {forward | discard}[interface]

When filtering specific MAC destination addresses, allow for multicast or broadcast packets that are required by the bridged network protocols.

Filter by Vendor Code

The bridging software allows you to create access lists to administratively filter MAC addresses. These access lists can filter groups of MAC addresses, including those with particular vendor codes. There is no noticeable performance loss in using these access lists, and the lists can be of indefinite length. You can filter groups of MAC addresses with particular vendor codes by completing the first task and one or both of the other tasks that follow:

To establish a vendor code access list, complete the following task in global configuration mode:
Task Command

Prepare access control information for filtering of frames by canonical (Ethernet-ordered) MAC address.

access-list access-list-number {permit | deny} address mask

The vendor code is the first three bytes of the MAC address (left to right).


Note Remember that, as with any access list using MAC addresses, Ethernets swap their MAC address bit ordering, and Token Rings and FDDI do not. Therefore, an access list that works for one medium might not work for others.

After you have defined an access list to filter by a particular vendor code, you can assign an access list to a particular interface for filtering on the MAC source addresses of packets received on that interface or the MAC destination addresses of packets that would ordinarily be forwarded out that interface. To filter by source or destination addresses, complete one of the following tasks in interface configuration mode:
Task Command

Assign an access list to an interface for filtering by MAC source addresses.

bridge-group bridge-group input-address-list access-list-number

Assign an access list to an interface for filtering by the MAC destination addresses.

bridge-group bridge-group output-address-list access-list-number

Filter by Protocol Type

You can filter by protocol type by using the access-list mechanism and specifying a protocol type code. To filter by protocol type, complete the first task and one or more of the other tasks that follow:


Note Cisco recommends that you do not have both input and output type code filtering on the same interface.

The order in which you enter access-list commands affects the order in which the access conditions are checked. Each condition is tested in succession. A matching condition is then used to execute a permit or deny decision. If no conditions match, a "deny" decision is reached.


Note Protocol type access lists can have an impact on system performance; therefore, keep the lists as short as possible and use wildcard bit masks whenever possible.

Access lists for Ethernet- and IEEE 802.2-encapsulated packets affect only bridging functions. It is not possible to use such access lists to block frames with protocols that are being routed.

You can establish protocol type access lists. Specify either an Ethernet type code for Ethernet-encapsulated packets or a DSAP/SSAP pair for 802.3 or 802.5-encapsulated packets. Ethernet type codes are listed in the "Ethernet Type Codes" appendix of the Bridging and IBM Networking Command Reference.

To establish protocol type access lists, complete the following task in global configuration mode:
Task Command

Prepare access control information for filtering frames by protocol type.

access-list access-list-number {permit | deny} type-code wild-mask

You can filter Ethernet- and SNAP-encapsulated packets on input. For SNAP-encapsulated frames, the access list you create is applied against the two-byte TYPE field given after the DSAP/SSAP/OUI fields in the frame. The access list is applied to all Ethernet and SNAP frames received on that interface prior to the bridge learning process. SNAP frames also must pass any applicable IEEE 802.2 DSAP/SSAP access lists.

You can also filter Ethernet- and SNAP-encapsulated packets on output. The access list you create is applied just before sending out a frame to an interface.

To filter these packets on input or output, complete either or both of the following tasks in interface configuration mode:
Task Command

Add a filter for Ethernet- and SNAP-encapsulated packets on input.

bridge-group bridge-group input-type-list access-list-number

Add a filter for Ethernet- and SNAP-encapsulated packets on output.

bridge-group bridge-group output-type-list access-list-number

You can filter IEEE 802-encapsulated packets on input. The access list you create is applied to all IEEE 802 frames received on that interface prior to the bridge-learning process. SNAP frames also must pass any applicable Ethernet type-code access list.

You can also filter IEEE 802-encapsulated packets on output. SNAP frames also must pass any applicable Ethernet type-code access list. The access list you create is applied just before sending out a frame to an interface.

To filter these packets on input or output, complete one or both of the following tasks in interface configuration mode:
Task Command

Add a filter for IEEE 802-encapsulated packets on input.

bridge-group bridge-group input-lsap-list access-list-number

Add a filter for IEEE 802-encapsulated packets on output.

bridge-group bridge-group output-lsap-list access-list-number

Access lists for Ethernet- and IEEE 802-encapsulated packets affect only bridging functions. You cannot use such access lists to block frames with protocols that are being routed.

Define and Apply Extended Access Lists

If you are filtering by the MAC-level address, whether it is by a specific MAC address, vendor code, or protocol type, you can define and apply extended access lists. Extended access lists allow finer granularity of control. They allow you to specify both source and destination addresses and arbitrary bytes in the packet.

To define an extended access list, complete the following task in global configuration mode:
Task Command

Define an extended access list for finer control of bridged traffic.

access-list access-list-number {permit | deny} source source-mask destination destination-mask offset size operator operand

To apply an extended access list to an interface, complete one or both of the following tasks in interface configuration mode:
Task Command

Apply an extended access list to the packets being received by an interface.

bridge-group bridge-group input-pattern-list access-list-number

Apply an extended access list to the packet being sent by an interface.

bridge-group bridge-group output-pattern-list access-list-number

After an access list is created initially, any subsequent additions (possibly entered from the terminal) are placed at the end of the list. In other words, you cannot selectively add or remove access list command lines from a specific access list.

Caution
Because of their complexity, only use extended access lists if you are very familiar with the Cisco IOS software. Further, do not specify an offset value that is greater than the size of the packet.

Adjust Spanning-Tree Parameters

You might need to adjust certain spanning-tree parameters if the default values are not suitable for your bridge configuration. Parameters affecting the entire spanning tree are configured with variations of the bridge global configuration command. Interface-specific parameters are configured with variations of the bridge-group interface configuration command.

You can adjust spanning-tree parameters by performing any of the tasks in the following sections:


Note Only network administrators with a good understanding of how bridges and the Spanning-Tree Protocol work should make adjustments to spanning-tree parameters. Poorly planned adjustments to these parameters can have a negative impact on performance. A good source on bridging is the IEEE 802.1d specification; see the "References and Recommended Reading" appendix in the Configuration Fundamentals Command Reference for other references.

Set the Bridge Priority

You can globally configure the priority of an individual bridge when two bridges tie for position as the root bridge, or you can configure the likelihood that a bridge will be selected as the root bridge. This priority is determined by default; however, you can change it. To set the bridge priority, complete the following task in global configuration mode:
Task Command

Set the bridge priority.

bridge bridge-group priority number

Set an Interface Priority

You can set a priority for an interface. When two bridges tie for position as the root bridge, you configure an interface priority to break the tie. The bridge with the lowest interface value is elected. To set an interface priority, complete the following task in interface configuration mode:
Task Command

Establish a priority for a specified interface.

bridge-group bridge-group priority number

Assign Path Costs

Each interface has a path cost associated with it. By convention, the path cost is 1000/data rate of the attached LAN, in Mbps. You can set different path costs. Refer to the entry for this command in the Bridging and IBM Networking Command Reference for the various media defaults. To assign path costs, complete the following task in interface configuration mode:
Task Command

Set a path cost different from the defaults.

bridge-group bridge-group path-cost cost

Adjust Bridge Protocol Data Unit (BPDU) Intervals

You can adjust BPDU intervals as described in the following sections:


Note Each bridge in a spanning tree adopts the interval between hello BPDUs, the forward delay interval, and the maximum idle interval parameters of the root bridge, regardless of what its individual configuration might be.

Adjust the Interval between Hello BPDUs

You can specify the interval between hello BPDUs. To adjust this interval, complete the following task in global configuration mode:
Task Command

Specify the interval between hello BPDUs.

bridge bridge-group hello-time seconds

Define the Forward Delay Interval

The forward delay interval is the amount of time spent listening for topology change information after an interface has been activated for bridging and before forwarding actually begins. To change the default interval setting, complete the following task in global configuration mode:
Task Command

Set the default of the forward delay interval.

bridge bridge-group forward-time seconds

Define the Maximum Idle Interval

If a bridge does not hear BPDUs from the root bridge within a specified interval, it assumes that the network has changed and recomputes the spanning-tree topology. To change the default interval setting, performing the following task in global configuration mode:
Task Command

Change the amount of time a bridge will wait to hear BPDUs from the root bridge.

bridge bridge-group max-age seconds

Disable the Spanning Tree on an Interface

When a loop-free path exists between any two bridged subnetworks, you can prevent BPDUs generated in one transparent bridging subnetwork from impacting nodes in the other transparent bridging subnetwork, yet still permit bridging throughout the bridged network as a whole. For example, when transparently bridged LAN subnetworks are separated by a WAN, BPDUs can be prevented from traveling across the WAN link.

To disable the spanning tree on an interface, complete the following task in interface configuration mode:
Task Command

Disable the spanning tree on an interface.

bridge-group bridge-group spanning-disabled

Tune the Transparently Bridged Network

The following sections describe how to configure features that enhance network performance by reducing the number of packets that traverse the backbone network:

Configure Circuit Groups

In the Cisco ONS 15304, Multilink PPP should be used instead of the circuit group feature. The circuit group feature is available, but not fully supported on the Cisco ONS 15304 platform.

In the process of loop elimination, the spanning-tree algorithm always blocks all but one of a group of parallel network segments between two bridges. When those segments are of limited bandwidth, it might be preferable to augment the aggregate bandwidth between two bridges by forwarding across multiple parallel network segments. Circuit groups can be used to group multiple parallel network segments between two bridges to distribute the load while still maintaining a loop-free spanning tree.

Deterministic load distribution distributes traffic between two bridges across multiple parallel network segments grouped together into a single circuit group. As long as one port of the circuit group is in the forwarding state, all ports in that circuit group will participate in load distribution regardless of their spanning-tree port states. This process guarantees that the computed spanning tree is still adaptive to any topology change and the load is distributed among the multiple segments. Deterministic load distribution guarantees packet ordering between source-destination pairs, and always forwards traffic for a source-destination pair on the same segment in a circuit group for a given circuit-group configuration.


Note You should configure all parallel network segments between two bridges into a single circuit group. Deterministic load distribution across a circuit group adjusts dynamically to the addition or deletion of network segments, and to interface state changes.

If a circuit-group port goes down and up as a result of configuration or a line protocol change, the spanning-tree algorithm will bypass port transition and will time out necessary timers to force the eligible circuit-group ports to enter the forwarding state. This avoids the long disruption time caused by spanning-tree topology recomputation and therefore resumes the load distribution as quickly as possible.

To tune the transparently bridged network, complete the following tasks:

Step 1 Define a circuit group.

Step 2 Optionally, configure a transmission pause interval.

Step 3 Modify the load distribution strategy.

To define a circuit group, complete the following task in interface configuration mode:
Task Command

Add a serial interface to a circuit group.

bridge-group bridge-group circuit-group circuit-group

For circuit groups of mixed-bandwidth serial interfaces, it might be necessary to configure a pause interval during which transmission is suspended to avoid misordering packets following changes in the composition of a circuit group. Changes in the composition of a circuit group include the addition or deletion of an interface and interface state changes. To configure a transmission pause interval, complete the following task in global configuration mode:
Task Command

Configure a transmission pause interval.

bridge bridge-group circuit-group circuit-group pause milliseconds

For applications that depend on the ordering of mixed unicast and multicast traffic from a given source, load distribution must be based upon the source MAC address only. To modify the load distribution strategy to accommodate such applications, complete the following task in global configuration mode:
Task Command

Base load distribution on the source MAC address only.

bridge bridge-group circuit-group circuit-group source-based

Configure Constrained Multicast Flooding

In a transparent bridge, multicast packets are flooded on all forwarding ports on the bridge. For some protocols, it is possible for a bridge to determine the membership of multicast groups, and constrain the flooding of multicasts to a subset of the forwarding ports. Constrained multicast flooding enables a bridge to determine group membership of IP multicast groups dynamically and flood multicast packets only on those ports that reach group members.

To enable constrained multicast flooding, complete the following task in global configuration mode:
Task Command

Enable constrained multicast flooding for all configured bridge groups.

bridge cmf

Monitor and Maintain the Transparent Bridge Network

This section describes how to monitor and maintain activity on the bridged network. You can complete one or more of the following tasks in privileged EXEC mode:
Task Command

Remove any learned entries from the forwarding database and clear the transmit and receive counts for any statically configured forwarding entries.

clear bridge bridge-group

Remove multicast-group state information and clear the transmit and receive counts.

clear bridge [bridge-group] multicast [router-ports | groups | counts] [group-address] [interface-unit] [counts]

Display classes of entries in the bridge forwarding database.

show bridge [bridge-group] [interface] [address [mask]] [verbose]

Display the interfaces configured in each circuit group and show whether they are participating in load distribution.

show bridge [bridge-group] circuit-group [circuit-group] [src-mac-address] [dst-mac-address]

Display transparent bridging multicast state information.

show bridge [bridge-group] multicast [router-ports | groups] [group-address]

Display information about configured bridge groups.

show bridge group [verbose]

Display the configuration for each interface that has been configured for routing or bridging.

show interfaces crb

Display the protocols that can be routed or bridged for the specified interface.

show interfaces [interface] irb

Display the spanning-tree topology known to the router, including whether or not filtering is in effect.

show span

Transparent Bridging Configuration Examples

The following sections provide example configurations that you can use as a guide to configuring your bridging environment:

Basic Bridging and Bridge Group Example

Figure 10-1 is an example of a basic bridging configuration involving three independent bridge groups. Traffic from each Ethernet is bridged to the affiliated serial line in the same bridge group. The IEEE-compatible bridging algorithm with default parameters is being used.


Figure 10-1:
Example of Basic Bridging


The configuration file for the router depicted in Figure 10-1 would be as follows:

interface ethernet 1
 no ip address
 bridge-group 1
 no shutdown
!
interface ethernet 2
 no ip address
 bridge-group 2
 no shutdown
!
interface ethernet 3
 no ip address
 bridge-group 3
 no shutdown
!
interface serial 1
 no ip address
 encapsulation ppp
 bridge-group 2
 no shutdown
!
interface serial 2
 no ip address
 encapsulation ppp
 bridge-group 2
 no shutdown
!
interface serial 3
 no ip address
 encapsulation ppp
 bridge-group 3
 no shutdown
!
bridge 1 protocol ieee
bridge 2 protocol ieee
bridge 3 protocol ieee

Transparent Bridging over PPP Example

The following example illustrates a router configured for transparent bridging over PPP encapsulation. IP routing is turned off on all interfaces in this example.

!
no ip routing
!
interface ethernet 1
 no ip address
 no mop enabled
 bridge-group 1
!
interface serial 1
 no ip address
 encapsulation ppp
 bridge-group 1
!
 bridge 1 protocol ieee

Ethernet Bridging Example

In the following example, two buildings have networks that must be connected via an E1 link. For the most part, the systems in each building use either IP or DECnet, and therefore, should be routed. There are some systems in each building that must communicate, but they can use only a proprietary protocol.

The example places two Ethernets in each building. One of the Ethernets is attached to the hosts that use a proprietary protocol, and the other is used to attach to the rest of the building network running IP and DECnet. The Ethernet attached to the hosts using a proprietary protocol is enabled for bridging to the serial line and to the other building.

Figure 10-2 shows an example configuration. The interfaces marked with an asterisk (*) are configured as part of spanning tree 1. The routers are configured to route IP and DECnet. This configuration permits hosts on any Ethernet to communicate with hosts on any other Ethernet using IP or DECnet. In addition, hosts on Ethernet 1 in either building can communicate using protocols not supported for routing.


Figure 10-2: Ethernet Bridging Configuration Example


Router/Bridge in Building 1

The configuration file for the router in Building 1 would be as follows. Note that no bridging takes place over Ethernet 0. Both IP and DECnet routing are enabled on all interfaces.

decnet address 3.34
interface ethernet 0
 ip address 128.88.1.6 255.255.255.0
 decnet cost 10
!
interface serial 0
 ip address 128.88.2.1 255.255.255.0
 bridge-group 1
 decnet cost 10
!
interface ethernet 1
 ip address 128.88.3.1 255.255.255.0
 bridge-group 1
 decnet cost 10
!
bridge 1 protocol dec
Router/Bridge in Building 2

The configuration file for the router in Building 2 is similar:

decnet address 3.56
!
interface ethernet 0
 ip address 128.88.11.9 255.255.255.0
 decnet cost 10
!
interface serial 0
 ip address 128.88.2.2 255.255.255.0
 bridge-group 1
 decnet cost 10
!
interface ethernet 1
 ip address 128.88.16.8 255.255.255.0
 bridge-group 1
 decnet cost 10
!
bridge 1 protocol dec

Concurrent Routing and Bridging Example

In the following example, DECnet and IPX are concurrently routed and bridged. IP and AppleTalk are routed on all interfaces, DECnet and IP are routed on all interfaces not in the bridge group, and all protocols other than IP and AppleTalk are bridged on all interfaces in the bridge group:

!
ipx routing 0000.0c36.7a43
appletalk routing
!
decnet routing 9.65
decnet node-type routing-iv
!
!
interface Ethernet0/0
 ip address 172.19.160.65 255.255.255.0
 ipx network 160
 appletalk address 160.65
 decnet cost 7
!
interface Ethernet0/1
 ip address 172.19.161.65 255.255.255.0
 ipx network 161
 appletalk address 161.65
 decnet cost 7
!
interface Ethernet0/2
 ip address 172.19.162.65 255.255.255.0
 appletalk address 162.65
 bridge-group 1
!
interface Ethernet0/3
 ip address 172.19.14.65 255.255.255.0
 appletalk address 14.65
 appletalk zone california
 bridge-group 1
!
router igrp 666
network 172.19.0.0
!
bridge crb
bridge 1 protocol ieee
bridge 1 route appletalk
bridge 1 route ip
!

The relevant portions of the configuration for the router are listed below:

interface Ethernet 1
 bridge-group 1
!
interface Ethernet 2
 bridge-group 1
!
interface Ethernet 3
 bridge-group 2
!
interface Ethernet 4
 bridge-group 2
!
interface BVI 1
 ip address 3.0.0.1 255.0.0.0
!
interface BVI 2
 ip address 5.0.0.1 255.0.0.0
!
bridge irb
bridge 1 protocol ieee
 bridge 1 route ip
bridge 2 protocol ieee
 bridge 2 route ipMulticast or Broadcast Packets Filtering Example
 

When filtering specific MAC destination addresses, allow for multicast or broadcast packets that are required by the bridged network protocols.



hometocprevnextglossaryfeedbacksearchhelp
Posted: Thu Feb 24 12:22:03 PST 2000
Copyright 1989 - 2000©Cisco Systems Inc.