cc/td/doc/product/lan/cat5000/rel_4_2
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Configuring FDDI/CDDI Switching

Configuring FDDI/CDDI Switching

This chapter describes how to configure Fiber Distributed Data Interface/Copper Distributed Data Interface (FDDI/CDDI) switching on the Catalyst  5000 series switch.


Note For complete syntax and usage information for the commands used in this chapter, refer to the Catalyst  5000 Series Command Reference publication.

This chapter consists of these sections:

Understanding How FDDI Switching Works

FDDI is a LAN standard, defined by ANSI X3T9.5, specifying a 100-Mbps, token-passing network using fiber-optic cable, with transmission distances of up to 2  kilometers (km). FDDI uses a dual-ring architecture to provide redundancy. CDDI is the implementation of FDDI protocols over shielded twisted-pair (STP) and unshielded twisted-pair (UTP) cabling. CDDI transmits at data rates of 100 Mbps over relatively short distances (about 100 meters), also using a dual-ring architecture to provide redundancy.

The Catalyst 5000 series FDDI module functions as an FDDI-Ethernet translation bridge. It translates packets on the external FDDI ring into Ethernet packets within the Catalyst  5000 series switch. Inside a Catalyst  5000 series switch, Ethernet VLAN packets are translated into FDDI VLAN packets and encoded in 802.10 format with a Security Association Identifier (SAID) value before they are transmitted across an external FDDI trunk to another Catalyst  5000 series switch.

The Catalyst  5000 series switch that receives the packets from the trunk decodes the 802.10 format using the SAID value and internally translates the FDDI VLAN packets into Ethernet VLAN packets. Each Ethernet VLAN requires a unique FDDI VLAN translation.


Note When you insert or replace FDDI modules in the switch, clear the module configuration information using the command clear config mod_num (where mod_num is the FDDI slot number) to obtain the correct spanning-tree parameters for the modules.

Note The Catalyst  1200 series switch is hardcoded with a specific VLAN-to-SAID configuration. Therefore, if you connect a Catalyst  5000 series switch Ethernet VLAN to a Catalyst  1200 Ethernet VLAN over an FDDI trunk, the SAID value of the FDDI VLAN must be the same value as the Ethernet VLAN. For example, if a Catalyst  1200 Ethernet VLAN value is 20, the translation FDDI VLAN SAID value must be 20.

Default FDDI/CDDI Configuration

Table 11-1 shows the FDDI/CDDI default configuration:


Table 11-1: FDDI/CDDI Default Configuration
Feature Default Value

Port enable state

All ports are enabled

User-data string

Catalyst 5000

IP fragmentation

Enabled

ICMP unreachable message

Enabled

Native VLAN

VLAN 1

Ethernet-FDDI mapping

None

Trunking

Off

Allowed VLAN range

VLANs 1-1005

TL_MIN

40 microseconds

TNotify

30 seconds

TRequest

165,000 microseconds

LER-Alarm

8 (10¯8)

LER-Cutoff

7 (10¯7)

Novell IPX1 protocol translations

  • FDDI SNAP2 to Ethernet 802.3 RAW

  • FDDI 802.2 to Ethernet 802.3

  • Ethernet 802.3 RAW to FDDI SNAP

1IPX=Internetwork Packet Exchange
2SNAP=Subnetwork Access Protocol

Configuring FDDI/CDDI Switching

These sections describe how to configure FDDI/CDDI switching on the Catalyst 5000 series switch:

Specifying the User-Data String

The user-data string identifies the user-data string in the Station Management (SMT) Management Information Base (MIB) of an FDDI module. The default value is Catalyst  5000. You should modify this value to a more meaningful description.

To modify the user-data string, perform this task in privileged mode:
Task Command

Step 1 Enter a module number and a unique description or name to identify the FDDI module.

set fddi userdata mod_num userdata_string

Step 2 Verify the user-data string setting.

show fddi

This example shows how to set the user-data string and verify the setting:

Console> (enable) set fddi userdata 4 Engineering
Module 4 userdata set to Engineering.
Console> (enable) show fddi
Mod  SMT User-Data               T-Notify  TReq
---  --------------------------  --------  -------
4    Engineering                 15        3500
5    abc                         20        150000
 
Port   Tlmin     Ler-CutOff  Ler-Alarm
-----  --------  ----------  ---------
4/1    40        10          11
4/2    40        10          11
5/1    40        10          11
5/2    40        9           12
Console> (enable)

Setting the Port Name

To set an FDDI/CDDI port name, perform this task in privileged mode
Task Command

Step 1 Configure a name for a port.

set port name mod_num/port_num [name_string]

Step 2 Verify the port name assignment.

show port [mod_num[/port_num]]

:

This example shows how to set the name of a port and verify the configuration:

Console> (enable) set port name 4/1 FDDI Backbone
Port 4/1 name set.
Console> (enable) show port 4
Port Name                 Status   Vlan       Level  Duplex Speed  Type
---- -------------------- -------- ---------- ------ ------ -----  ------------
4/1   FDDI Backbone       connect  1                 half   100    FDDI
4/2                       standby  1                 half   100    FDDI
        Ler
Port CE-State Conn-State Type Neig Con Est Alm Cut Lem-Ct     Lem-Rej-Ct Tl-Min
---- -------- ---------- ---- ---- --------------- ---------- ---------- ------
4/1  isolated active     B    U    yes   9  11  10          0          0 1340000
4/2  isolated standby    A    U    yes   9  11  10          0          0 40
Last-Time-Cleared
----------------------------
Fri May 1 1998, 18:28:51
Console> (enable)

Setting the Port Priority Level

When ports request simultaneous access to the switching bus, the Catalyst  5000 series switch uses the port priority level to determine the order in which ports have access to the switching bus.

To set the priority level, enter this command in privileged mode:
Task Command

Step 1 Configure the priority level for each CDDI or FDDI port.

set port level mod_num/port_num normal  |  high

Step 2 Verify the port priority configuration.

show port [mod_num[/port_num]]

This example shows how to set the port priority of an FDDI/CDDI port to high and verify the configuration:

Console> (enable) set port level 4/1 high
Port 4/1 level set to high.
Console> (enable) show port 4
Port Name                 Status   Vlan       Level  Duplex Speed  Type
---- -------------------- -------- ---------- ------ ------ -----  ------------
4/1   FDDI Backbone       connect  1          high   half   100    FDDI
4/2                       standby  1                 half   100    FDDI
        Ler
Port CE-State Conn-State Type Neig Con Est Alm Cut Lem-Ct     Lem-Rej-Ct Tl-Min
---- -------- ---------- ---- ---- --------------- ---------- ---------- ------
4/1  isolated active     B    U    yes   9  11  10          0          0 1340000
4/2  isolated standby    A    U    yes   9  11  10          0          0 40
Last-Time-Cleared
----------------------------
Fri May 1 1998, 18:28:51
Console> (enable)

Setting the Native VLAN on FDDI

To assign an Ethernet VLAN to map to the native VLAN on an FDDI port, perform the following task. The native VLAN must be an Ethernet type. The FDDI module translates all native (non-802.10) FDDI traffic to the assigned Ethernet VLAN.

To set up a native VLAN on FDDI, perform this task in privileged mode:
Task Command

Step 1 Assign a VLAN to map to native traffic on an FDDI port. The VLAN specified must be an Ethernet type VLAN.

set vlan vlan_num mod_num/port_num

Step 2 Verify the VLAN configuration.

show vlan

This example shows how to set VLAN 50 as the native VLAN for FDDI port 4/1 and how to verify the configuration:

Console> (enable) set vlan 50 4/1
VLAN 50 modified.
VLAN 1 modified.
VLAN  Mod/Ports
----  -----------------------
50    4/1
Console> (enable) show vlan 50
VLAN Name                       Type  Status    Mod/Ports
---- -------------------------- ----- --------- ----------------
50   VLAN0050                   enet  active    4/1-2
                                                
VLAN SAID       MTU   RingNo BridgeNo StpNo Parent Trans1 Trans2
---- ---------- ----- ------ -------- ----- ------ ------ ------
50   100050     1500  0      0        0     0      0      0
Console> (enable)

Configuring IP Fragmentation

IP fragmentation allows the Catalyst  5000 series switch to fragment large FDDI IP frames (frames greater than 1514 bytes) into multiple smaller packets so that they can be transmitted on an Ethernet segment. IP fragmentation is enabled by default.

If you disable IP fragmentation, large IP packets are dropped instead of fragmented and forwarded.

To disable IP fragmentation, perform this task in privileged mode:
Task Command

Step 1 Disable IP fragmentation.

set ip fragmentation disable

Step 2 Verify that IP fragmentation is disabled.

show ip route

After entering the set ip fragmentation disable command, you see this display:

Console> (enable) set ip fragmentation disable
IP fragmentation disabled for module 4
Console> (enable) show ip route
Fragmentation   Redirect   Unreachable
-------------   --------   -----------
disabled        enabled    disabled
The primary gateway: 172.16.52.65
Destination             Gateway                 Flags   Use         Interface
----------------------- ----------------------- ------  ----------  ---------
default                 172.16.52.65            UG            8761  sc0
172.16.52.64            172.16.52.70            U             9734  sc0
default                 default                 UH               0  sl0
Console> (enable)

To enable IP fragmentation, perform this task in privileged mode:
Task Command

Step 1 Enable IP fragmentation.

set ip fragmentation enable

Step 2 Verify that IP fragmentation is enabled.

show ip route

Configuring ICMP Unreachable Messages

When you enable Internet Control Message Protocol (ICMP) unreachable messages, the switch returns an ICMP unreachable message to the Internet source host whenever it receives an IP datagram that it cannot deliver. When you disable ICMP unreachable messages, the switch does not notify the Internet source host when it receives an IP datagram that it cannot deliver. ICMP unreachable messages are enabled by default.

To disable ICMP unreachable messages, perform this task in privileged mode:
Task Command

Step 1 Disable ICMP unreachable messages.

set ip unreachable disable

Step 2 Verify that ICMP unreachable messages are disabled.

show ip route

This example shows how to disable ICMP unreachable messages and verify the configuration:

Console> (enable) set ip unreachable disable
ICMP Unreachable message disabled.
Console> (enable) show ip route
Fragmentation   Redirect   Unreachable
-------------   --------   -----------
enabled         enabled    disabled
The primary gateway: 172.16.52.65
Destination             Gateway                 Flags   Use         Interface
----------------------- ----------------------- ------  ----------  ---------
default                 172.16.52.65            UG            8761  sc0
172.16.52.64            172.16.52.70            U             9734  sc0
default                 default                 UH               0  sl0
Console> (enable)

To enable ICMP unreachable messages, perform this task in privileged mode:
Task Command

Step 1 Enable ICMP unreachable messages.

set ip unreachable enable

Step 2 Verify that ICMP unreachable messages are enabled.

show ip route

Setting the Link Error Rate Alarm

The link error rate (LER)-alarm value defines the LER at which a link connection exceeds a preset alarm threshold. This value is used in the LER threshold test. The default setting of 8 (10¯8) link errors per second is sufficient for most networks.

To modify the setting for the LER-alarm, perform this task in privileged mode:
Task Command

Step 1 Change the LER-alarm setting.

set fddi alarm mod_num/port_num value

Step 2 Verify the LER-alarm setting.

show fddi

This example shows how to change the LER-alarm setting to 11 (10-11) and verify the configuration:

Console> (enable) set fddi alarm 4/1 11
Port 4/1 alarm value set to 11.
Console> (enable) show fddi 
Mod  SMT User-Data               T-Notify  TReq
---  --------------------------  --------  -------
4    Engineering                 15        3500
5    abc                         20        150000
 
Port   Tlmin     Ler-CutOff  Ler-Alarm
-----  --------  ----------  ---------
4/1    40        10          11
4/2    40        10          8
5/1    40        10          8
5/2    40        9           8
Console> (enable)

Setting the Link Error Rate Cutoff

The LER-cutoff value determines the LER at which a connection is flagged as faulty. This value is used in the LER threshold test. The default setting of 7 (10¯7) is sufficient for most networks.

To modify the LER-cutoff setting, perform this task in privileged mode:
Task Command

Step 1 Change the LER-cutoff setting.

set fddi cutoff mod_num/port_num value

Step 2 Verify the LER-cutoff setting.

show fddi

This example shows how to change the LER-cutoff value to 10 (10-10) and verify the configuration:

Console> (enable) set fddi cutoff 4/1 10
Port 4/1 cutoff value set to 10.
Console> (enable) show fddi 
Mod  SMT User-Data               T-Notify  TReq
---  --------------------------  --------  -------
4    Engineering                 15        3500
5    abc                         20        150000
 
Port   Tlmin     Ler-CutOff  Ler-Alarm
-----  --------  ----------  ---------
4/1    40        10          11
4/2    40        7           8
5/1    40        7           8
5/2    40        7           8
Console> (enable)

Setting the Interval between Neighbor Notification Frames

The TNotify parameter sets the interval (in seconds) between neighbor notification frames. These frames are sent out to notify neighboring devices of FDDI module Media Access Control (MAC) addresses. Usually, the default of 30 seconds is sufficient. By shortening the interval, you cause more notification frames to be sent.

To adjust the interval between neighbor notification frames, perform this task in privileged mode:
Task Command

Step 1 Set TNotify to a value between 2 and 30  seconds.

set fddi tnotify mod_num time

Step 2 Verify the TNotify setting.

show fddi

This example shows how to change the TNotify setting to 15 and verify the configuration:

Console> (enable) set fddi tnotify 4 15
Module 4 tnotify set to 15.
Console> (enable) show fddi 
Mod  SMT User-Data               T-Notify  TReq
---  --------------------------  --------  -------
4    Engineering                 15        3500
5    abc                         30        150000
 
Port   Tlmin     Ler-CutOff  Ler-Alarm
-----  --------  ----------  ---------
4/1    40        10          11
4/2    40        7           8
5/1    40        7           8
5/2    40        7           8
Console> (enable)

Setting the Minimum Time to Transfer the FDDI PHY Line State

The TL_MIN parameter sets the minimum time to transmit an FDDI physical sublayer (PHY) line state before advancing to the next physical connection management (PCM) state. This setting affects the station and switch interoperability and might hinder the implementation of FDDI repeaters. By default, the TL_MIN parameter is set to 40 microseconds. Normally, you do not need to adjust this parameter.

To set the minimum time to transmit a FDDI PHY line state, perform this task in privileged mode:
Task Command

Step 1 Set TL_MIN to a value between 40 and 1,340,006 microseconds.

set fddi tlmin mod_num/port_num microseconds

Step 2 Verify the TL_MIN setting.

show fddi

This example shows how to change the TL_MIN setting to 30 and verify the configuration:

Console> (enable) set fddi tlmin 4/1 30
Port 4/1 tlmin set to 30.
Console> (enable) show fddi 
Mod  SMT User-Data               T-Notify  TReq
---  --------------------------  --------  -------
4    Engineering                 15        3500
5    abc                         30        150000
 
Port   Tlmin     Ler-CutOff  Ler-Alarm
-----  --------  ----------  ---------
4/1    30        10          11
4/2    40        7           8
5/1    40        7           8
5/2    40        7           8
Console> (enable)

Setting the Timer for Negotiating Token Ring Timer

The TRequest parameter specifies the required value for the Token Ring Timer (TRT) on the FDDI switch. The switch uses this value to negotiate the TRT with other stations. The TRT controls ring scheduling during normal operation and can help detect and recover from serious ring errors. Whenever the TRT value expires, the station uses the TRequest value to negotiate with other stations for the lowest value. The default setting of 165,000 microseconds is sufficient for most networks.

To modify the setting for the TRequest parameter, perform this task in privileged mode:
Task Command

Step 1 Set TRequest to a value between 2502 and 165,000 microseconds.

set fddi trequest mod_num time

Step 2 Verify the TRequest setting.

show fddi

After entering the set fddi trequest command, you see this display:

Console> (enable) set fddi trequest 4 3500
Mac 4/1 treq set to 3500.
Console> (enable) show fddi 
Mod  SMT User-Data               T-Notify  TReq
---  --------------------------  --------  -------
4    Engineering                 15        3500
5    abc                         30        165000
 
Port   Tlmin     Ler-CutOff  Ler-Alarm
-----  --------  ----------  ---------
4/1    30        10          11
4/2    40        7           8
5/1    40        7           8
5/2    40        7           8
Console> (enable)

Setting the Default Internet Packet Exchange Protocol Translations

The Catalyst  5000 series switch can forward IPX packets received on FDDI ports to Ethernet ports, or it can forward IPX packets received on Ethernet ports to FDDI ports. To do this, you must configure the switch for specific IPX protocol translations. By default, these IPX protocol translations are configured as follows:

You can customize these settings if your environment requires it.

Setting the FDDI SNAP-to-Ethernet Translation

FDDI SNAP frames can be translated into these Ethernet frames:

To specify the Ethernet frame type to which FDDI SNAP frames are translated, perform this task in privileged mode:
Task Command

Step 1 Configure the desired IPX translation for FDDI SNAP frames.

set bridge ipx snaptoether {8023  |  snap  |  eii  |  8023raw}

Step 2 Verify the IPX translation.

show bridge

This example shows how to specify FDDI SNAP-to-Ethernet 802.3 translation and verify the configuration (shown by the arrow):

Console> (enable) set bridge ipx snaptoether 8023
Bridge snaptoether default IPX translation set.
Console> (enable) show bridge
APaRT Enabled
FDDICHECK Disabled
IP fragmentation Enabled
Default IPX translations:

    FDDI SNAP  to Ethernet     8023
    FDDI 802.2 to Ethernet     8023
    Ethernet 802.3 Raw to FDDI snap
Console> (enable)

Setting the FDDI 802.2-to-Ethernet Translation

FDDI 802.2 frames can be translated into these Ethernet frames:

To specify the Ethernet frame type to which FDDI 802.2 packets are translated, perform this task in privileged mode:
Task Command

Step 1 Configure the desired IPX translation for FDDI 802.2 frames.

set bridge ipx 8022toether {8023  |  snap  |  eii  |  8023raw}

Step 2 Verify the IPX translation.

show bridge

This example shows how to specify FDDI 802.2-to-Ethernet SNAP translation and verify the configuration (shown by the arrow):

Console> (enable) set bridge ipx 8022toether snap
8022 to ETHER translation set.
Console> (enable) show bridge
APaRT Enabled
FDDICHECK Disabled
IP fragmentation Enabled
Default IPX translations:
    FDDI SNAP  to Ethernet     8023

    FDDI 802.2 to Ethernet     snap
    Ethernet 802.3 Raw to FDDI snap
Console> (enable)

Setting the Ethernet 802.3 RAW-to-FDDI Protocol

Ethernet 802.3 RAW frames can be translated into these FDDI frames:

To specify the FDDI frame type to which Ethernet 802.3 RAW frames are translated, perform this task in privileged mode:
Task Command

Step 1 Configure the desired IPX translation for Ethernet 802.3 RAW frames.

set bridge ipx 8023rawtofddi {8022  |  snap  |  fddiraw}

Step 2 Verify the IPX translation.

show bridge

This example shows how to specify Ethernet 802.3 RAW-to-FDDI 802.2 translation and verify the configuration (shown by the arrow):

Console> (enable) set bridge ipx 8023rawtofddi 8022
8023RAW to FDDI translation set.
Console> (enable) show bridge
APaRT Enabled
FDDICHECK Disabled
IP fragmentation Enabled
Default IPX translations:
    FDDI SNAP  to Ethernet     8023
    FDDI 802.2 to Ethernet     snap

    Ethernet 802.3 Raw to FDDI 8022
Console> (enable)

Configuring APaRT

To increase throughput performance, you can disable the software content-addressable memory (CAM) of the FDDI module. The CAM stores IPX translation information to support automatic packet recognition and translation (APaRT). Disabling the CAM disables APaRT, which automatically disables fddicheck. When APaRT is disabled, you can configure FDDI-to-Ethernet translation values using the set bridge ipx command. However, the Enhanced Address Recognition Logic (EARL) CAM continues to provide packet forwarding functionality. To enable fddicheck, first enable APaRT.


Note There are serious drawbacks to disabling the CAM in the FDDI software that could impact system performance. When you disable APaRT, only default IPX translations are used. Also, FDDI module hardware filtering is disabled, and all traffic from the FDDI ring is translated and forwarded to the Catalyst  5000 series switch backplane before the EARL CAM can filter it.

To disable APaRT, perform this task in privileged mode:
Task Command

Step 1 Disable APaRT on the FDDI module.

set bridge apart disable

Step 2 Verify that APaRT is disabled.

show bridge

This example shows how to disable APaRT and verify the configuration (shown by the arrow):

Console> (enable) set bridge apart disable
APaRT disabled
Console> (enable) show bridge

APaRT Disabled
FDDICHECK Disabled
IP fragmentation Enabled
Default IPX translations:
    FDDI SNAP  to Ethernet     8023
    FDDI 802.2 to Ethernet     snap
    Ethernet 802.3 Raw to FDDI 8022
Console> (enable)

To enable APaRT, perform this task in privileged mode:
Task Command

Step 1 Enable APaRT on the FDDI module.

set bridge apart enable

Step 2 Verify that APaRT is enabled.

show bridge

This example shows how to enable APaRT and verify the configuration (shown by the arrow):

Console> (enable) set bridge apart enable
APaRT enabled
Console> (enable) show bridge

APaRT Enabled
FDDICHECK Disabled
IP fragmentation Enabled
Default IPX translations:
    FDDI SNAP  to Ethernet     8023
    FDDI 802.2 to Ethernet     snap
    Ethernet 802.3 Raw to FDDI 8022
Console> (enable)

Configuring MAC Address Learning

You can specify whether an FDDI interface learns MAC addresses that it previously learned from an Ethernet interface. Disabling MAC address learning resolves the problem that occurs when void frames on the FDDI ring and translated Ethernet frames sent by the FDDI interface are received and learned on the same FDDI interface instead of being stripped by the MAC hardware.

To reject MAC address learning, perform this task in privileged mode:
Task Command

Step 1 Ensure that APaRT is enabled. You must enable APaRT before you enable fddicheck.

set bridge apart enable

Step 2 Set the switch to reject MAC address learning.

set bridge fddicheck enable

Step 3 Verify the MAC address learning configuration.

show bridge

This example shows how to reject MAC address learning on the switch and verify the configuration:

Console> (enable) set bridge apart enable
APaRT enabled
Console> (enable) set bridge fddicheck enable
FDDICHECK enabled
Console> (enable) show bridge
APaRT Enabled

FDDICHECK Enabled
IP fragmentation Enabled
Default IPX translations:
    FDDI SNAP  to Ethernet     8023
    FDDI 802.2 to Ethernet     snap
    Ethernet 802.3 Raw to FDDI 8022
Console> (enable)

To allow MAC address learning, perform this task in privileged mode:
Task Command

Step 1 Set the switch to reject MAC address learning.

set bridge fddicheck disable

Step 2 Verify the MAC address learning configuration.

show bridge

This example shows how to enable MAC address learning on the switch and verify the configuration:

Console> (enable) set bridge fddicheck disable
FDDICHECK disabled
Console> (enable) show bridge
APaRT Enabled

FDDICHECK Disabled
IP fragmentation Enabled
Default IPX translations:
    FDDI SNAP  to Ethernet     8023
    FDDI 802.2 to Ethernet     snap
    Ethernet 802.3 Raw to FDDI 8022
Console> (enable)

Checking Connectivity

Use the ping and traceroute commands to test connectivity out FDDI/CDDI ports.

To check connectivity out a port, perform this task in privileged mode:
Task Command

Step 1 Ping a remote host that is located out the port you want to test.

ping [-s] host [packet_size] [packet_count]

Step 2 Trace the hop-by-hop route of packets from the switch to a remote host located out the port you want to test.

traceroute host

Step 3 If the host is unresponsive, check the IP address and default gateway configured on the switch.

show interface
show ip route

This example shows how to ping a remote host and how to trace the hop-by-hop path of packets through the network using the traceroute command:

Console> (enable) ping somehost
somehost is alive
Console> (enable) traceroute somehost
traceroute to somehost.company.com (10.1.2.3), 30 hops max, 40 byte packets
 1 engineering-1.company.com (173.31.192.206) 2 ms 1 ms 1 ms
 2 engineering-2.company.com (173.31.196.204) 2 ms 3 ms 2 ms
 3 gateway_a.company.com (173.16.1.201) 6 ms 3 ms 3 ms
 4 somehost.company.com (10.1.2.3) 3 ms * 2 ms

Using FDDI IEEE  802.10 Trunks

These sections describe how to use FDDI IEEE 802.10 trunks:

Understanding How IEEE 802.10 Trunking Works


Note For complete information on configuring VLANs, refer to the "Configuring VTP and Virtual LANs" chapter.

You can extend VLANs across an FDDI backbone by multiplexing switched packets over a FDDI/CDDI interface using the 802.10 protocol. Catalyst  5000 series FDDI/CDDI interface links can operate as interswitch trunks that provide broadcast control between configured VLANs. The 802.10 protocol encapsulates frames with a VLAN identifier and packet data according to the IEEE  802.10 specification. FDDI/CDDI interfaces that support 802.10 make selective forwarding decisions within a network domain based upon the VLAN identifier.

The VLAN identifier is a user-configurable four-byte Security Association Identifier (SAID). The SAID identifies traffic as belonging to a particular VLAN. It also determines to which VLAN each packet is switched.

Figure 11-1 shows an example FDDI trunk configuration. In this example, the SAID ensures that packets destined for a particular VLAN are received on that VLAN after they are transmitted across the FDDI trunks.


Figure 11-1: FDDI Trunk Configuration


The VLAN Trunk Protocol (VTP) provides FDDI/CDDI module configuration for 802.10-based VLANs. VTP requires a protocol type (Ethernet, FDDI, or Token Ring) to be configured for each VLAN. A VLAN can only have one type associated with it. Each VLAN type must have its own unique identifier, and translations between different identifiers must be mapped. VTP advertises VLAN translation mappings to all Catalyst 5000 series switches in a management domain.

FDDI/CDDI modules integrate switched Ethernet and Fast Ethernet LANs into the FDDI network. To map an 802.10 FDDI VLAN to an Ethernet VLAN, you must map the 802.10 VLAN SAID to an Ethernet VLAN by mapping an Ethernet VLAN to an FDDI VLAN and assigning a SAID value to the FDDI VLAN.

If a FDDI/CDDI module receives a packet containing a VLAN SAID that maps to a locally supported Ethernet VLAN on the Catalyst 5000 series switch, the FDDI/CDDI module translates the packet into Ethernet format and forwards it across the switch backplane to the Ethernet module. FDDI/CDDI modules filter the packets they receive from reaching the backplane if the VLAN SAIDs in the packets do not map to a locally supported VLAN.

Figure 11-2 illustrates the configuration for forwarding a packet from the Ethernet module port  1 in slot 2 to the FDDI module port 1 in slot 5. For this example, you would specify the translation of Ethernet  VLAN 2 to FDDI VLAN 22. FDDI VLAN  22 is translated automatically to Ethernet VLAN 2. The VLAN SAID must be identical on both FDDI modules. Since 802.10 FDDI/CDDI interface links can operate as interswitch trunks, you can configure multiple VLAN translations over a link.


Figure 11-2: VLAN Identifiers for an FDDI 802.10 Configuration


FDDI/CDDI modules also support one native (nontrunk) VLAN, which handles all non-802.10 encapsulated FDDI traffic. You do not need to configure a translation number for the native VLAN since packets that are forwarded to the native VLAN do not contain VLAN identifiers. To map an Ethernet VLAN to an FDDI native VLAN, you must configure the FDDI port to be on the Ethernet VLAN. To do this, configure the Ethernet VLAN with the module number and port number of the FDDI-native VLAN.

802.10 Trunk Configuration Guidelines

These recommendations apply to setting up an FDDI 802.10 configuration:

The Catalyst 1200 series switch is hardcoded with a specific VLAN-to-Security Association Identifier (SAID) configuration. Therefore, if you are connecting a Catalyst  5000 series switch Ethernet VLAN to a Catalyst 1200 series switch Ethernet VLAN via an FDDI trunk, the SAID value of the FDDI VLAN must be the same value as the Ethernet VLAN to which it is translated. For example, if a Catalyst 1200 series switch Ethernet VLAN value is 20, the translation FDDI VLAN SAID value must be 20.

Configuring FDDI 802.10 Trunks

To set up an FDDI 802.10  VLAN trunk configuration, perform this task in privileged mode:
Task Command

Step 1 Create an Ethernet VLAN.

set vlan vlan_num

Step 2 Create an FDDI VLAN.

set vlan vlan_num type fddi

Step 3 Map the Ethernet VLAN to the FDDI VLAN.

set vlan ether_vlan translation fddi_vlan

Step 4 Turn trunking on for the FDDI port.

set trunk mod_num/port_num on

Step 5 Verify the trunk configuration.

show vlan trunk
show trunk

FDDI/CDDI Switching Configuration Examples

These sections show examples of FDDI/CDDI switching configurations:

Single Switch Configuration

Figure 11-3 shows a simple Catalyst  5000 series switch configuration and includes these elements:


Figure 11-3: Single Catalyst 5000 Series Switch Configuration


Multiple Switch VLAN Configuration Without Trunking

You can set up VLAN groups across multiple Catalyst  5000 series switches without trunking if the switches have any two ports of the same VLAN connected, as shown in Figure 11-4. You need to configure the VLANs individually for both switches using the set vlan command.


Note You can set up VLAN groups across multiple Catalyst  5000 series switches using trunking, as described in the "Using FDDI IEEE 802.10 Trunks" section and as shown in Figure 11-4.

Figure 11-4: Multiple Catalyst  5000 VLAN Configuration without Trunking


This example sets VLAN 10 for the Catalyst  5000 series switch in building A:

System1> (enable) set vlan 10 4/1-2
VLAN 10 modified.
VLAN 1 modified.
VLAN Mod/Ports
---- -----------------------
10 4/1-2

This example sets VLAN 10 for the Catalyst  5000 series switch in building B:

System2> (enable) set vlan 10 4/1-2
VLAN 10 modified.
VLAN 1 modified.
VLAN  Mod/Ports
---- -----------------------
10    4/1-2

This example displays the VLAN 10 setting for the Catalyst  5000 series switch in building A:

System1> (enable) show vlan 10
VLAN Name                       Type  Status    Mod/Ports
---- -------------------------- ----- --------- ----------------
10   VLAN0010                   enet  active    4/1-2
                                                
VLAN SAID       MTU   RingNo BridgeNo StpNo Parent Trans1 Trans2
---- ---------- ----- ------ -------- ----- ------ ------ ------
10   100010     1500  0      0        0     0      0      0

This example displays the VLAN settings for the Catalyst  5000 series switch in building A:

System1> (enable) show vlan
VLAN Name                       Type  Status    Mod/Ports
---- -------------------------- ----- --------- ----------------
1    default                    enet  active    1/1-2
10   VLAN0010                   enet  active    4/1-2
20   VLAN0020                   enet  active    2/1-24
1002 fddi-default               fddi  active    
1003 token-ring-default         tring active    
1004 fddinet-default            fdnet active    
1005 trnet-default              trnet active    
VLAN SAID       MTU   RingNo BridgeNo StpNo Parent Trans1 Trans2
---- ---------- ----- ------ -------- ----- ------ ------ ------
1    100001     1500  0      0        0     0      0      0
10   100010     1500  0      0        0     0      0      0
20   100020     1500  0      0        0     0      0      0
1002 101002     1500  0      0        0     0      0      0
1003 101003     1500  0      0        0     0      0      0
1004 101004     1500  0      0        0     0      0      0
1005 101005     1500  0      0        0     0      0      0
System1> (enable) 

This example displays the VLAN 10 setting for the Catalyst  5000 series switch in building B:

System2> (enable) show vlan 10
VLAN Name                       Type  Status    Mod/Ports
---- -------------------------- ----- --------- ----------------
10   VLAN0010                   enet  active    4/1-2
VLAN SAID       MTU   RingNo BridgeNo StpNo Parent Trans1 Trans2
---- ---------- ----- ------ -------- ----- ------ ------ ------
10   100010     1500  0      0        0     0      0      0

This example displays the VLAN settings for the Catalyst  5000 series switch in building B:

System2> (enable) show vlan
VLAN Name                       Type  Status    Mod/Ports
---- -------------------------- ----- --------- ----------------
1    default                    enet  active    1/1-2
10   VLAN0010                   enet  active    4/1-2
20   VLAN0020                   enet  active    2/1-24
1002 fddi-default               fddi  active    
1003 token-ring-default         tring active    
1004 fddinet-default            fdnet active    
1005 trnet-default              trnet active    
VLAN SAID       MTU   RingNo BridgeNo StpNo Parent Trans1 Trans2
---- ---------- ----- ------ -------- ----- ------ ------ ------
1    100001     1500  0      0        0     0      0      0
10   100010     1500  0      0        0     0      0      0
20   100020     1500  0      0        0     0      0      0
1002 101002     1500  0      0        0     0      0      0
1003 101003     1500  0      0        0     0      0      0
1004 101004     1500  0      0        0     0      0      0
1005 101005     1500  0      0        0     0      0      0

FDDI 802.10 Trunk Configuration Example

Figure 11-5 shows two Catalyst  5000 series switches in an FDDI 802.10 VLAN configuration.


Figure 11-5: FDDI 802.10 Configuration Example


The following prerequisites apply to the FDDI 802.10 configuration example shown in Figure 11-5:

After completing the tasks in "Configuring VTP and Virtual LANs," complete this task in privileged mode to set up the FDDI 802.10 VLAN configuration for VLAN 33:
Task Command

Step 1 Provide a VLAN number and activate a VLAN in the management domain.

set vlan 33

Step 2 Create a VLAN with the type FDDI.

set vlan 33 type fddi

Step 3 Map the Ethernet VLAN translation to an FDDI VLAN.

set vlan 333 translation 33

or

set vlan 33 translation 333

Step 4 Turn trunking on for the FDDI port.

set trunk 1/1 on

After entering the set vlan 33 command, you see this display:

Console> (enable) set vlan 33
VTP: vlan addition successful

This command creates a VLAN but does not assign it to a port. VTP advertises the VLAN to all available trunks of all types (such as Ethernet or FDDI) that are set to on, for all Catalyst  5000 series switches in the same management domain.

After entering the set vlan vlan_num type fddi command, you see this display:

Console> (enable) set vlan 333 type fddi (said 338)
VTP: vlan addition successful

After entering the set vlan vlan_num translation vlan_num command or the set vlan vlan_num translation vlan_num command, you see this display:

Console> (enable) set vlan 33 translation 333
VTP: vlan modification successful

After entering the set trunk 1/1 on command, you see this display:

Console> (enable) set trunk 1/1 on
Port 1/1 mode set to on.
Console> (enable) 

Note You can enter the set vlan command to set up the native FDDI VLAN. The native VLAN overrides any trunking-allowed (802.10) VLANs. For example, if the VLAN range allowed for trunking is 1 through 1000 and the native VLAN is 1, VLAN 1 is not 802.10-encapsulated on the FDDI link.

To verify that the VLAN configuration is correct, including the mapping between Ethernet, FDDI, and Token Ring, enter the show vlan command and the show trunk command. After entering the show vlan command, you see this display:

Console> (enable) show vlan
VLAN Name                                              Type  Status    Mod/Ports
---- --------------------------  ----- --------- ----------------
1    default                    enet    active        1/1
                                                                                                2/3-4,2/7-12,2/14-16,2/18-24
11   VLAN0011                   enet  active    2/1-2
22   VLAN0022                    enet  active     2/5-6
33   VLAN0033                   enet  active    2/13,2/17
111  VLAN0111                   fddi  active    
222  VLAN0222                   fddi  active    
333  VLAN0333                   fddi  active    
1002 fddi-default               fddi  active    
1003 token-ring-default         tring active    
1004 fddinet-default            fdnet active    
1005 trnet-default              trnet active    
VLAN SAID              MTU   RingNo BridgeNo StpNo Parent Trans1 Trans2
---- ---------- ----- ------ -------- ----- ------ ------ ------
1    1          1500  0      0        0     0      0      0
11   11         1500  0      0        0     0      111    0
22   22         1500  0      0        0     0      222    0
33   100033     1500  0      0        0     0      333    0
111  111        1500  0      0        0     0      11     0
222  222        1500  0      0        0     0      22     0
333  338 	       1500  0      0        0     0      33     0
1002 1002       1500  0      0        0     0      0      0
1003 1003       1500  0      0        0     0      0      0
1004 1004       1500  0      0        0     0      0      0
1005 1005       1500  0      0        0     0      0      0
Console> (enable)


hometocprevnextglossaryfeedbacksearchhelp
Copyright 1989-1998 © Cisco Systems Inc.