cc/td/doc/product/l3sw/8540/rel_12_0/w5_15
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Overview of Layer 3 Switching and Software Features

Overview of Layer 3 Switching and Software Features

This chapter gives an overview of Layer 3 switching. It shows how a Layer 3 switch router fits into the network, and lists the type of interfaces used in Layer 3 switching. Also included is a list of Layer 3 switching software features with brief descriptions of selected features. This chapter includes the following sections:

Defining Layer 3 Switching

Layer 3 switching refers to a class of high-performance routers optimized for the campus LAN or intranet, providing both wirespeed Ethernet routing and switching services.

A Layer 3 switch router performs the following three major functions:

Compared to other routers, Layer 3 switch routers process more packets faster by using application-specific integrated circuit (ASIC) hardware instead of microprocessor-based engines. Layer 3 switch routers also improve network performance with two software functions—route processing and intelligent network services.

Switch Routers with Layer 3 Switching Software

You can use Layer 3 switching software features in both campus switch routers (CSR) and multiservice switch routers (MSR). You can also combine Layer 3 (packet switching) and ATM (cell switching) at the same time in a Catalyst 8540 MSR chassis equipped with the ATM router module.

Layer 3 switching software features are present in the Catalyst 8540 CSR, Catalyst 8540 MSR, and the Catalyst 8510 CSR.

Network Configuration Examples

Figure 1-1 shows how the switch router can be used as a campus backbone.


Figure 1-1: Typical Network Configuration for the Switch Router


The Catalyst 8540 MSR combines Layer 3 (packet) and ATM (cell) switching on a single platform for campus and WAN networks. Figure 1-2 shows an example of a Catalyst 8540 MSR used as a campus backbone.


Figure 1-2: Typical Network Configuration for the Catalyst 8540 MSR


Interface Types

Table 1-1 lists the interfaces supported.


Table 1-1: Interfaces Supported
Interface Types Platform Ports Per Slot Max. Density

10/100 Mbps Fast Ethernet—UTP

Catalyst 8540 CSR

Catalyst 8540 MSR

16

128

10/100 Mbps Fast Ethernet—UTP

Catalyst 8510 CSR

8

32

100 Mbps Fast Ethernet—multimode fiber

Catalyst 8540 CSR

Catalyst 8540 MSR

16

128

100 Mbps Fast Ethernet—multimode fiber

Catalyst 8510 CSR

8

32

1 Gbps Gigabit Ethernet

Catalyst 8540 CSR

Catalyst 8540 MSR

2

16

1 Gbps enhanced Gigabit Ethernet1

Catalyst 8540 CSR

Catalyst 8540 MSR

2

16

1 Gbps Gigabit Ethernet

Catalyst 8540 CSR

Catalyst 8540 MSR

8

64

1 Gbps Gigabit Ethernet

Catalyst 8510 CSR

1

4

POS OC-12c uplink—single-mode fiber intermediate reach2

Catalyst 8540 CSR

Catalyst 8540 MSR

1

8

POS OC-12c uplink—single-mode fiber long reach2

Catalyst 8540 CSR

Catalyst 8540 MSR

1

8

ATM OC-12c uplink—single-mode fiber intermediate reach2

Catalyst 8540 CSR

Catalyst 8540 MSR3

1

8

ATM OC-12c uplink—multimode fiber intermediate reach2

Catalyst 8540 CSR

Catalyst 8540 MSR3

1

8

ATM OC-3c uplink—single-mode fiber intermediate reach4

Catalyst 8540 CSR

Catalyst 8540 MSR3

1

8

ATM OC-3c uplink—multimode fiber intermediate reach4

Catalyst 8540 CSR

Catalyst 8540 MSR3

1

8

1With built-in ACL support; no daughter card is required. The enhanced Gigabit Ethernet interface module is available with a 32K, 64K, or 256K address space.
2A second port on this module provides an enhanced Gigabit Ethernet interface with either a 64K or 256K address space.
3
This interface module cannot be used on the Catalyst 8540 MSR with the ATM router module.
4
A second port on this module provides an enhanced Gigabit Ethernet interface with a 64K address space.

Layer 3 Switching Software Features

This section lists Layer 3 switching software features.

Layer 1 Features

Layer 2 Bridging Features

Virtual LAN (VLAN) Features

Layer 3 Routing, Switching, and Forwarding

Supported Routing Protocols

Fast EtherChannel (FEC) Features

Gigabit EtherChannel (GEC) Features

Access Control List (ACL) Features

Layer 2 filtering:

Layer 3 filtering using an ACL daughter card:

Additional Protocols and Features

About Key Features

This section briefly describes key features supported in Layer 3 switching software.

Spanning Tree Protocol

Spanning Tree Protocol is a bridge protocol that enables a learning bridge to dynamically work around loops in a network topology by creating a spanning tree. Bridges exchange Bridge Protocol Data Unit (BPDU) messages with other bridges to detect loops, and then remove the loops by shutting down selected bridge interfaces.

Spanning Tree Protocol is a standardized technique for maintaining a network of multiple bridges or switches. When the topology changes, Spanning Tree Protocol transparently reconfigures bridges and switches to avoid the creation of loops by placing ports in a forwarding or blocking state. Each VLAN is treated as a separate bridge and a separate instance of Spanning Tree Protocol is applied to each.

Spanning Tree Protocol parameters are set for each VLAN. For each spanning tree instance, you configure a set of global options with a set of port parameters. The port parameter list contains only ports that are members of a given VLAN. A maximum of 64 spanning tree instances are supported, one for each VLAN.

To configure Spanning Tree Protocol, see the Cisco IOS Bridging and IBM Networking Configuration Guide.

Integrated Routing and Bridging

Integrated routing and bridging (IRB) allows you to route a given protocol between routed interfaces and various bridge groups or between bridge groups within a single router. Multiple ports in the switch router can reside in one bridge group with one IP address and be routed to other switch router interfaces with different IP addresses.

Specifically, you bridge local or unroutable traffic among the bridged interfaces in the same bridge group, while you route routable traffic to other routed interfaces or bridge groups.

Layer 3 switching software supports IRB for IP and IPX only.

Here are some examples of when to use IRB:

  For example, when you are migrating a bridged network to a routed network, or when the remote site does not have routing capabilities, you can use the switch router to interconnect the bridged and routed networks.

To configure IRB, see the "Configuring IRB" section.

Virtual LANs

A virtual LAN (VLAN) configures switches and routers according to logical rather than physical topologies. Using VLANs, a network administrator can combine any collection of LAN segments within an internetwork into an autonomous user group, which appears as a single LAN. VLANs logically segment the network into different broadcast domains so that packets are switched only between ports within the VLAN. Typically, a VLAN corresponds to a particular subnet, although not necessarily.

Layer 3 switching software supports up to 255 VLANs per system. Because routing will take place, it is assumed that each VLAN terminates at the switch router. Since this might not necessarily be the case, Layer 3 switching software also supports integrated routing and bridging (IRB). To configure IRB, see the "About Integrated Routing and Bridging" section.

To configure VLANs, you define a subinterface at the interface, define a bridge group, and map a VLAN to the subinterface.

To configure VLANs, see the "About Virtual LANs" section.

IEEE 802.1Q VLAN Encapsulation

The IEEE 802.1Q standard provides a method for secure bridging of data across a shared backbone. Layer 3 switching software supports IEEE 802.1Q VLAN encapsulation over all media including Fast Ethernet, Gigabit Ethernet, Fast EtherChannel, and GigaChannel. The Layer 3 switch router can also route and bridge between IEEE 802.1Q and ISL stations.

IEEE 802.1Q encapsulation uses an internal, or one level, packet tagging scheme to multiplex VLANs across a single physical link, while maintaining strict adherence to the individual VLAN domains. IEEE 802.1Q can have access ports—untagged ports where frames are assigned to VLANs based on a port VLAN identifier (PVID)—or a native VLAN for the port. It can also have trunked ports where some frames can be tagged and others untagged. IEEE 802.1Q uses Per VLAN Spanning Tree Plus (PVST+), mapping multiple spanning trees to the spanning tree of pure IEEE 802.1Q switches.

For an example of how to configure IEEE 802.1Q encapsulation, see the "Configuring 802.1Q VLAN Encapsulation" section.

Inter-Switch Link VLAN Encapsulation

Layer 3 switching software also supports Inter-Switch Link (ISL) encapsulation over all media, including Fast Ethernet, Gigabit Ethernet, Fast EtherChannel, and GigaChannel. The Layer 3 switch router can be deployed in environments with the ISL trunking protocol or the IEEE 802.1Q trunking protocol, and can route and bridge between ISL and 802.1Q stations.

ISL encapsulation uses an external, or two level, packet tagging scheme to multiplex VLANs across a single physical link, while maintaining strict adherence to the individual VLAN domains. With ISL, all packets must be tagged on a physical link.

ISL uses one spanning tree per VLAN (PVST) over ISL trunks.

For an example of how to configure ISL encapsulation, see the "Configuring ISL VLAN Encapsulation" section.

To configure encapsulation over EtherChannel, see the "About Encapsulation over EtherChannel" section.

Gigabit EtherChannel

Gigabit EtherChannel (GEC) allows grouping of multiple Gigabit Ethernet ports into a single multigigabit logical EtherChannel link. GEC establishes a high-bandwidth connection between two Catalyst switch devices. Thus, the members of the bundle can be on different interface modules, providing flexibility and fault tolerance.

You can bundle up to four Gigabit Ethernet connections as one logical link, which can provide up to 8-Gb aggregate capacity on up to 64-Gb EtherChannel logical links. If a failure of any one link is detected, the packets are switched on the remaining active links in the EtherChannel.

No dependencies are placed on which ports to configure in the channel. The ports can exist on the same or on different interface modules in the chassis.

Gigabit EtherChannel uses a source-destination IP address load-balancing scheme for up to four ports in a channel group. Each channel group has its own IP address.When the switch router queues a packet to exit out of the port channel interface, the last two bits of the IP source and destination address determine which interface in the channel the packet takes.

As with all EtherChannel technologies, all links share the traffic load within the bundled ports; convergence occurs within one second of a Gigabit EtherChannel failure.


Note   GEC does not support IP/IPX filtering at Layer 3 with the ACL daughter card.

See "Configuring EtherChannel."

Fast EtherChannel

Fast EtherChannel (FEC) establishes a high-bandwidth connection between two Layer 3 switch devices. You can use up to four Fast Ethernet connections as one Layer 3 forwarding path, which can provide up to 800 Mbps full duplex aggregate capacity. If link detection determines a failure of any one link, the packets are switched on the remaining active links in the FEC.

No dependencies are placed on which ports to configure in the channel. The ports can exist on the same or on different interface modules in the chassis.

Fast EtherChannel uses a source-destination IP address load-balancing scheme for up to four ports in a channel group. Each channel group has its own IP address.When the switch router queues a packet to exit out of the port channel interface, the last two bits of the IP source and destination address determine which interface in the channel the packet takes.


Note   FEC does not support IP/IPX filtering at Layer 3 with the ACL daughter card.

See "Configuring EtherChannel."

Packet-over-SONET Uplink

Packet-over-SONET (Synchronous Optical Network) technology is ideally suited for networks that are built for providing Internet or IP data. It provides superior bandwidth utilization and efficiency over other transport methods. For expensive WAN links, packet-over-SONET can provide as much as 25 to 30 percent higher throughput than ATM-based networks. Transporting frames directly into the SONET/SDH payload over a packet-over-SONET interface eliminates the overhead required in ATM cell header, IP over ATM encapsulation, and segmentation and reassembly (SAR) functionality.

To configure packet over SONET, see the "Configuring the POS OC-12c Uplink Interface (Catalyst 8540)" section.

ATM Uplink

ATM is a common network technology for enterprise backbones, MANs, and WANs. With an ATM uplink, you can route Layer 3 traffic over an ATM network using common protocols such as RFC 1483 (Multiprotocol Encapsulation over ATM). Such an arrangement allows the Catalyst 8540 CSR to be deployed as part of an existing network where a router with an ATM interface would otherwise have been utilized. It also allows the Catalyst 8540 CSR to be connected directly to a Catalyst 8540 MSR.

To configure the ATM uplink interface, see the "Configuring the ATM Uplink Interface (Catalyst 8540)" section.

Distributed Hardware Forwarding

Layer 3 switching software employs a distributed architecture in which the control path and data path are relatively independent. The control path code, such as routing protocols, runs on the route processor, whereas most of the data packets are forwarded by the Ethernet interface module and the switching fabric.

Each interface module includes a microcoded processor that handles all packet forwarding. The following are the main functions of the control layer between the routing protocol and the firmware datapath microcode.

QoS-Based Forwarding

Quality of service (QoS) includes technologies such as Resource Reservation Protocol (RSVP) and weighted round robin (WRR), which help control bandwidth, network delay, jitter, and packet loss in networks that become congested. In the switch router, QoS-based forwarding sorts traffic into a small number of classes and marks the packets accordingly. The QoS identifier provides specific treatment to traffic in different classes, so that each class receives a different quality of service.

The class to which the frames and packets belong determine the frame and packet scheduling and discarding policies. For example, the overall service given to frames and packets in the premium class will be better than that given to the standard class; the premium class is expected to experience lower loss rate or delay.

The switch router has QoS-based forwarding for IP traffic only. The implementation of QoS forwarding is based on local administrative policy and IP precedence. The mapping between the IP precedence field and the QoS field determines the delay priority of the packet.

For a summary of QoS features and related commands, see "Configuring Quality of Service."

Network Class Redundancy

Layer 3 switching features hot-swappable Ethernet interface modules. The redundancy of Cisco IOS software provides key network features, such as Hot Standby Router Protocol (HSRP), routing protocol convergence with Routing Information Protocol (RIP), Open Shortest Path First (OSPF), Enhanced Interior Gateway Routing Protocol (EIGRP), Fast EtherChannel, and load sharing across equal cost Layer 3 paths and spanning trees (for Layer 2 based networks).

Remote Monitoring

Layer 3 switching software supports the first four remote monitoring (RMON) groups.

RMON is a network management protocol for gathering network information and monitoring traffic data within remote LAN segments from a central location. RMON allows you to monitor all nodes and their interaction on a LAN segment. RMON, used in conjunction with the SNMP agent in the switch router, allows you to view both the traffic that flows through the switch router and segment traffic not necessarily destined for the switch router. Layer 3 switching software combines RMON alarms and events with existing MIBs so you can choose where monitoring will occur.

To configure RMON, refer to the Cisco IOS Configuration Fundamentals Configuration Guide .

Port-Based Snooping

Port-based snooping augments the RMON events and alarms. Port-based snooping, or mirroring, lets you transparently mirror traffic from an individual source port or multiple source ports to a destination port. Typically, the destination port has a network analyzer or RMON probe attached.

In addition to having multiple source ports active, multiple snooping sessions can operate simultaneously. You can specify whether the source ports are mirrored for transmit, receive, or both. Up to ten ports may be monitored, but the combined bandwidth of the source ports must not exceed the bandwidth of the destination port.

To configure port-based snooping, refer to the "About Port Snooping" section.

Access Control Lists

Access control lists (ACLs) provide a tool for network control and security, allowing you to filter packet flow into or out of switch router interfaces. They are sometimes called filters. You can use ACLs to limit network traffic and restrict network use by certain users or devices. ACLs can be configured for all routed network protocols (IP, Appletalk, Novell IPX) to filter packets for the protocol as they pass through a router. You create access lists for each protocol you wish to filter, per router interface. For some protocols, you create one access list to filter inbound traffic, and one access list to filter outbound traffic.

When creating access lists, you define criteria to apply to each packet processed by the switch router; and the switch router decides whether to forward or block the packet based on whether or not the packet matches the criteria in your list. Packets that do not match any criteria in your list are automatically blocked by the implicit "deny all traffic" criteria statement at the end of every access list.

The specific instructions for creating access lists and applying them to interfaces vary from protocol to protocol. Configuration of Layer 3 switching access lists is identical to the configuration methods currently employed on all Cisco routers.

For complete command information about access lists, refer to the Cisco IOS documentation.

Standard MAC address filtering is supported at Layer 2. IP/IPX filtering is supported at Layer 3 through the use of an ACL daughter card. For a list of supported ACLs, see the "Access Control List (ACL) Features" section.


Note   The 16-port Fast Ethernet interface module (for Catalyst 8540), 8-port Fast Ethernet interface module (for Catalyst 8510), and 1-port Gigabit Ethernet interface module (for the Catalyst 8510) support IP/IPX filtering at Layer 3 with the ACL daughter card. GEC, FEC, BVI, and the 8-port Gigabit Ethernet interface module do not support the ACL daughter card. The ACL daughter card does not support dynamic and reflexive ACLs, IPX extended ACLs, or ACL logging. The Gigabit Ethernet interfaces on the enhanced Gigabit Ethernet interface module, the POS uplink interface module, and the ATM uplink interface modules for the Catalyst 8540 support ACLs without a daughter card.

Traffic that is switched by interface modules does not support ACL logging. However, ACL logging is supported for all traffic that goes to the CPU (such as control packets).

Load Balancing

A router that employs load balancing can distribute traffic over all its network ports that are the same distance from the destination address. Load balancing increases the utilization of network segments, thus increasing effective network bandwidth.

Layer 3 switching software uses source + destination-based load balancing, an enhanced version of the Cisco IOS software per-destination load balancing. Essentially, this method takes certain bits from the source and destination addresses and maps them into a path.

Using this method has the following two benefits:

Layer 3 switching software supports load balancing on IP and IPX routing protocols for up to two equal-cost paths (six on the enhanced Gigabit Ethernet interfaces) and uses the destination and source address pair to perform load balancing.

Cisco IOS Routing Protocols

Layer 3 switching software provides a comprehensive suite of routing protocols based on Cisco IOS software. Table 1-2 lists supported routing protocols by networking protocol.


Table 1-2: Supported Routing Protocols
IP Networks IPX Networks AppleTalk Networks

RIP

RIP-2

OSPF

IGRP

EIGRP

BGP

IS-IS

IPX RIP

EIGRP

RTMP

EIGRP

AURP

Many of the Cisco IOS routing protocol features, such as route redistribution and load balancing over equal cost paths (for OSPF and EIGRP) are supported. Configuration of these routing protocols is identical to the configuration methods currently employed on all Cisco routers.

To configure network and routing protocols, see "Configuring Networking Protocols."

Cisco Discovery Protocol

Cisco Discovery Protocol (CDP) is a device-discovery protocol that is both media and protocol independent. CDP is available on all Cisco products, including routers, switches, bridges, and access servers. Using CDP, a device can advertise its existence to other devices and receive information about other devices on the same LAN. CDP enables Cisco products to exchange information with each other regarding their MAC addresses, IP addresses, and outgoing interfaces. CDP runs over the data link layer only, thereby allowing two systems that support different network-layer protocols to learn about each other.

Each device configured for CDP sends periodic messages to a multicast address. Each device advertises at least one address at which it can receive Simple Network Management Protocol (SNMP) messages.

Hot Standby Router Protocol

The Hot Standby Router Protocol (HSRP) provides high network availability by routing IP traffic from hosts on Ethernet networks without relying on the availability of any single router. This feature is particularly useful for hosts that do not support a router discovery protocol (such as the Intermediate System-to-Intermediate System Interdomain Routing Protocol) and do not have the functionality to switch to a new router when their selected router reloads or loses power.

Devices that are running the HSRP detect a failure by sending and receiving multicast User Datagram Protocol (UDP) "hello" packets. When HSRP detects that the designated active router has failed, the selected backup router assumes control of the HSRP group's MAC and IP addresses. (You can also select a new standby router at that time.)

The chosen MAC address and IP addresses are unique and do not conflict with any others on the same network segment. The MAC address is selected from a pool of Cisco MAC addresses. Configure the last byte of the MAC address by configuring the HSRP group number. You also configure the unique virtual IP address. The IP address must be specified on a single router within the same group. When the HSRP is running, it selects an active router and instructs its device layer to listen on an additional (dummy) MAC address.

Layer 3 switching software supports HSRP over 10/100 Ethernet, Gigabit Ethernet, FEC, GEC, and BVI (Bridge-Group Virtual Interface).

Cisco Express Forwarding

Layer 3 switching software features Cisco Express Forwarding (CEF). CEF is advanced Layer 3 IP switching technology. CEF optimizes network performance and scalability for networks with large and dynamic traffic patterns, such as the Internet, on networks characterized by intensive Web-based applications, or interactive sessions. Although you can use CEF in any part of a network, it is designed for high-performance, highly resilient Layer 3 IP backbone switching.

CEF manages route distribution and forwarding by distributing routing information from the route processor (RP) to the individual Ethernet interface modules. This technology, used within the Internet, provides scalability in large campus core networks. CEF provides Layer 3 forwarding based on a topology map of the entire network, resulting in high-speed routing table lookups and forwarding.

One of the key benefits of CEF in Layer 3 switching is its routing convergence. Since the forwarding information base (FIB) is distributed to all interface modules, whenever a route goes away or is added, the FIB updates that information and provides it to the interface modules. Thus, RP interrupts are minimized. The interface modules receive the new topology very quickly and reconverge around a failed link based on the routing protocol being used.


Caution  We strongly recommend that you do not issue any CEF configuration commands. The CEF default settings should not be altered, and doing so may adversely affect the performance of your system.

Switching Database Manager

Layer 3 switching software features the switching database manager (SDM). SDM resides on the central processor and its primary function is to maintain the Layer 3 switching database in ternary content addressable memory (TCAM). SDM maintains the address entries contained in TCAM in an appropriate order. SDM manages TCAM space by partitioning protocol-specific switching information into multiple regions.

The key benefit of SDM in Layer 3 switching is its ability to configure the size of the protocol regions in TCAM. SDM enables exact-match and longest-match address searches, which result in high-speed forwarding.

See "Configuring Switching Database Manager."


hometocprevnextglossaryfeedbacksearchhelp
Posted: Tue Sep 26 13:17:29 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.