cc/td/doc/product/software/ios121/121cgcr/ibm_c
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Configuring DSPU and SNA Service Point Support

Configuring DSPU and SNA Service Point Support

This chapter describes Cisco IOS support for Systems Network Architecture (SNA) downstream physical unit (DSPU) devices and SNA Service Point. For a complete description of the DSPU and SNA Service Point commands mentioned in this chapter, refer to the "DSPU and SNA Service Point Configuration Commands" chapter of the Cisco IOS Bridging and IBM Networking Command Reference, Volume II. To locate documentation of other commands that appear in this chapter, use the command reference master index or search online.

This chapter contains the following sections:

Technology Overview

DSPU is a software feature that enables the router to function as a physical unit (PU) concentrator for SNA PU type 2 nodes. PU concentration at the device simplifies the task of PU definition at the upstream host while providing additional flexibility and mobility for downstream PU devices.

The DSPU feature allows you to define downstream PU type 2 devices in the Cisco IOS software. DSPU reduces the complexity of host configuration by letting you replace multiple PU definitions that represent each downstream device with one PU definition that represents the router.

Because you define the downstream PUs at the router rather than the host, you isolate the host from changes in the downstream network topology. Therefore you can insert and remove downstream PUs from the network without making any changes on the host.

The concentration of downstream PUs at the router also reduces network traffic on the WAN by limiting the number of sessions that must be established and maintained with the host. The termination of downstream sessions at the router ensures that idle session traffic does not appear on the WAN.

SNA service point support in the Cisco IOS software assumes that NetView or an equivalent product is available at the SNA host. The user interacts with the network management feature in the router and at the SNA host. In the Cisco IOS software, you can configure the host connection and show the status of this connection. At the SNA host, you can use the NetView operator's console to view alerts and to send and receive Cisco syntax commands to the Cisco device.

Figure 218 shows a router functioning as a DSPU concentrator.


Figure 218: Router Acting as a DSPU Concentrator


Typically, a router establishes one or more upstream connections with one or more hosts and many downstream connections with PU type 2 devices. From an SNA perspective, the router appears as a PU type 2 device to the upstream host and assumes the role of a system services control point (SSCP) appearing as a PU type 5 device to its downstream PUs.

The SSCP sessions established between the router and its upstream host are completely independent of the SSCP sessions established between the router and its downstream PUs. SNA traffic is routed at a logical unit (LU) level using a routing algorithm that maps downstream LUs onto upstream LUs.

Figure 219 illustrates the SNA perspective of DSPU.


Figure 219: SNA Perspective of DSPU


DSPU Configuration Task List

To configure DSPU, perform the tasks in the following sections:

Defining DSPU Upstream Hosts

The upstream host provides logical units (LUs) that the Cisco IOS software assigns for use by its downstream PUs. Because one upstream host can only provide a maximum of 255 LUs, the DSPU feature supports multiple hosts. Multiple upstream host support allows the DSPU router to provide more than 255 LUs for use by its downstream PUs.

To define a DSPU host over Token Ring, Ethernet, Fiber Distributed Data Interface (FDDI), remote source-route bridging (RSRB), or virtual data-link control connections, use the following command in global configuration mode:

Command Purpose
dspu host host-name xid-snd 
xid rmac remote-mac [rsap remote-sap] [lsap 
local-sap] [interface slot/port] [window 
window-size] [maxiframe max-iframe] [retries 
retry-count] [retry-timeout retry-timeout] 
[focalpoint]

Defines a DSPU host over Token Ring, Ethernet, FDDI, RSRB, or virtual data-link control connections.

To define a DSPU host over a Synchronous Data-Link Control (SDLC) connection, use the following command in global configuration mode:

Command Purpose
dspu host host-name xid-snd 
xid sdlc sdlc-addr [interface slot/port] [window 
window-size] [maxiframe max-iframe] [retries 
retry-count] [retry-timeout retry-timeout] 
[focalpoint]

Defines a DSPU host over an SDLC connection.

To define a DSPU host over an X.25/Qualified Logical Link Control (QLLC) connection, use the following command in global configuration mode:

Command Purpose
dspu host host-name xid-snd 
xid x25 remote-x121-addr [qllc 
local-x121-subaddr] [interface slot/port] 
[window window-size] [maxiframe max-iframe] 
[retries retry-count] [retry-timeout 
retry-timeout] [focalpoint]

Defines a DSPU host over an X.25/QLLC connection.

To define a DSPU host over a Frame Relay connection, use the following command in global configuration mode:

Command Purpose
dspu host host-name xid-snd 
xid dlci dlci-number [rsap remote-sap] [lsap 
local-sap] [interface slot/port] [window 
window-size] [maxiframe max-iframe] [retries 
retry-count] [retry-timeout retry-timeout] 
[focalpoint]

Defines a DSPU host over a Frame Relay connection.

Defining Downstream PUs

To define the downstream PUs, perform either of the tasks in the following sections, depending on your circumstances:

Explicitly Defining a Downstream PU

Explicitly define a downstream PU if you require the Cisco IOS software to perform verification checking on incoming downstream connections or to initiate an outgoing downstream connection.

For Cisco IOS Release 11.3 and later releases, the number of DSPU PUs you can configure is 1024.

To explicitly define a downstream PU over Token Ring, Ethernet, FDDI, RSRB, virtual data-link control, or native client interface architecture (NCIA) connections, use the following command in global configuration mode:

Command Purpose
dspu pu pu-name [rmac 
remote-mac] [rsap remote-sap] [lsap local-sap] 
[xid-rcv xid] [interface slot/port] [window 
window-size] [maxiframe max-iframe] [retries 
retry-count] [retry-timeout retry-timeout]

Explicitly defines a downstream PU over Token Ring, Ethernet, FDDI, RSRB, virtual data-link control, or NCIA connections.

To explicitly define a downstream PU over an SDLC connection, use the following command in global configuration mode:

Command Purpose
dspu pu pu-name [sdlc 
sdlc-addr] [xid-rcv xid] [interface slot/port] 
[window window-size] [maxiframe max-iframe] 
[retries retry-count] [retry-timeout 
retry-timeout]

Explicitly defines a downstream PU over an SDLC connection.

To explicitly define a downstream PU over an X.25/QLLC connection, use the following command in global configuration mode:

Command Purpose
dspu pu pu-name [x25 
remote-x121-addr] [qllc local-x121-subaddr] 
[xid-rcv xid] [interface slot/port] [window 
window-size] [maxiframe max-iframe] [retries 
retry-count] [retry-timeout retry-timeout]

Explicitly defines a downstream PU over an X.25/QLLC connection.

To explicitly define a downstream PU over a Frame Relay connection, use the following command in global configuration mode:

Command Purpose
dspu pu pu-name [dlci 
dlci-number] [rsap remote-sap] [lsap local-sap] 
[xid-rcv xid] [interface type slot/port] [window 
window-size] [maxiframe max-iframe] [retries 
retry-count] [retry-timeout retry-timeout] 

Explicitly defines a downstream PU over a Frame Relay connection.

A PU definition must have either an xid-rcv parameter or an address (rmac, sdlc, x25 or dlci) parameter.

If the Cisco IOS software will perform verification checking on incoming downstream connections, there are several combinations of parameters that you can configure for verification matching. Note that the address parameter, when specified, is considered to be the primary key on the PU definition. Therefore, if both an address and xid-rcv are configured, the matching algorithm will match on the address and ignore the xid-rcv parameter.

User may define a downstream PU using only the xid-rcv value so that any connecting PU that specifies the value of the configured XID will match that PU definition.
User may define a downstream PU using the xid-rcv and interface values so that any PU connecting into the configured interface that specifies the value of the configured XID will match the PU definition.
User may define a downstream PU using only the addressing values (RMAC/RSAP/LSAP, SDLC, DLCI/RSAP/LSAP, or X25/QLLC) so that any connecting PU with addressing that matches the configured addressing will match that PU definition. If no PU definition is found to match the incoming RSAP, then a match is accepted on a PU that has the correct RMAC/LSAP or DLCI/LSAP.
User may define a downstream PU using the interface and addressing values (RMAC/RSAP/LSAP, SDLC, DLCI/RSAP/LSAP, or X25/QLLC) so that any PU connecting into the configured interface with addressing that matches the configured addressing will match the PU definition. If no PU definition is found to match the incoming RSAP, then a match is accepted on a PU that has the correct RMAC/LSAP or DLCI/LSAP and interface.

The Cisco IOS software rejects any incoming downstream connections that do not match the parameters of a defined downstream PU unless the default PU option is also enabled.

Enabling the Default PU Option

Configure the DSPU default PU option if you do not require the Cisco IOS software to verify incoming downstream connections. The default PU option allows the software to accept incoming downstream connections without an explicit definition for the downstream PU.

To enable the default PU option, use the following command in global configuration mode:

Command Purpose
dspu default-pu [window 
window-size] [maxiframe max-iframe]

Enables the default PU option.

Defining DSPU LUs

Specify the LU routing algorithm used to map the upstream LUs to the downstream LUs and to define all LUs for each upstream and downstream PU.

The DSPU feature assigns upstream LUs to downstream LUs based on the selected LU routing algorithm and performs the mapping necessary for SNA data transfer.

The DSPU feature supports two alternative mapping algorithms that are described in the following sections:

An upstream host PU or downstream PU can support up to 255 LU sessions. The DSPU feature allows each LU to be individually configured for either dedicated LU routing or pooled LU routing.

Defining Dedicated LU Routing

You can configure an upstream LU so that it is reserved, or dedicated, for use by a specific downstream LU.

To define a dedicated LU or a range of dedicated LUs for an upstream host and downstream PU, use the following command in global configuration mode:

Command Purpose
dspu lu lu-start 
[lu-end] {host host-name host-lu-start | pool 
pool-name} [pu pu-name]

Defines a dedicated LU or a range of dedicated LUs for a downstream PU.

See the "Dedicated LU Routing Example" section later in this chapter for an example of dedicated LU routing.

Defining Pooled LU Routing

You can configure an upstream host LU so that it is a member of a pool of LUs. When a downstream connection is established and the downstream LU is configured as a pooled LU, the Cisco IOS software selects an upstream LU from the pool for assignment to the downstream LU.

Pooled LU routing allows a limited number of upstream host LUs to be shared (at different times) among many downstream LUs.

To define a host LU or a range of host LUs in an LU pool, use the following command in global configuration mode:

Command Purpose
dspu pool pool-name host 
host-name lu lu-start [lu-end] 
[inactivity-timeout inactivity-minutes]

Defines a host LU or a range of host LUs in an LU pool.

You can configure a downstream LU as a pooled LU. When a downstream connection is established and the downstream LU is configured as a pooled LU, the software selects an upstream LU from the specified pool for assignment to the downstream LU.

To define a pooled LU or a range of pooled LUs for a downstream PU, use the following command in global configuration mode:

Command Purpose
dspu lu lu-start 
[lu-end] pool pool-name 
pu
pu-name

Defines a pooled LU or a range of pooled LUs for a downstream PU.

See the section "Pooled LU Routing Example" section" for an example of pooled LU routing.

Configuring DSPU to Use a Data-Link Control

The final step in configuring DSPU is to define the data-link controls that will be used for upstream host and downstream PU connections.

The DSPU feature supports the data-link controls described in the following sections:

Configuring DSPU to Use Token Ring, Ethernet, or FDDI

You can configure DSPU to use the Token Ring, Ethernet, or FDDI data-link controls by enabling a service access point (SAP) address on the interface. Each interface can support up to 254 local SAPs enabled for either upstream or downstream connections; a local SAP cannot be enabled for both upstream and downstream connections on the same interface.

To enable a local SAP on the Token Ring, Ethernet, or FDDI interfaces for use by upstream hosts, use the following command in interface configuration mode:

Command Purpose
dspu enable-host [lsap 
local-sap]

Enables local SAP for upstream hosts.

To enable a local SAP on the Token Ring, Ethernet, or FDDI interfaces for use by downstream PUs, use the following command in interface configuration mode:

Command Purpose
dspu enable-pu [lsap 
local-sap]

Enables local SAP for downstream PUs.

Once a local SAP is enabled, it is ready to accept incoming connection attempts from the remote device (upstream host or downstream PU). Alternatively, initiate an outgoing connection to the remote device by using the following command in interface configuration mode:

Command Purpose
dspu start {host-name | 
pu-name}

Initiates a connection with an upstream host or a downstream PU via Token Ring or Ethernet.

Configuring DSPU to Use RSRB

To configure DSPU to use RSRB, you must create a DSPU/RSRB data-link control.

Cisco's implementation of DSPU/RSRB data-link control uses the concept of a virtual Token Ring device residing on a virtual Token Ring to represent the Cisco IOS software to upstream hosts and downstream PUs across an RSRB network. This is similar to Cisco's implementation of SDLLC.

Because the upstream host and downstream PU expects its peer to also be on a Token Ring, you must assign a virtual Token Ring address (the DSPU virtual MAC address) to the DSPU/RSRB data-link control. Like real Token Ring addresses, the DSPU virtual MAC address must be unique across the network.

In addition to assigning the DSPU virtual MAC address, you must also assign a DSPU virtual ring number to the DSPU/RSRB data-link control. The DSPU virtual ring number must be unique across the network.


NoteThe DSPU virtual ring number is a different number from the virtual ring group numbers that you use to configure RSRB and multiport bridging.

The combination of the DSPU virtual MAC address and the DSPU virtual ring number identifies the DSPU/RSRB data-link control interface to the rest of an RSRB network.

When an end station (either an upstream host or a downstream PU) attempts to connect with the DSPU software, the following events occur:

    1. The end station sends explorer packets with the locally administered MAC address on the router interface to which the end station is connected.

    2. The router configured with that locally administered MAC address or with the hardware MAC address intercepts the frame, fills in the DSPU virtual ring number and the DSPU bridge number in the routing information field (RIF), and sends a response to the end station.

    3. The end station establishes a session with the DSPU router.

To define the DSPU/RSRB data-link control interface, use the following commands in global configuration mode:

Command Purpose

Step1

source-bridge 
ring-group ring-group 
[virtual-mac-address]

Defines an RSRB ring group.

Step2

source-bridge remote-peer ring-group 
tcp ip-address local-ack

Defines a remote peer with the local acknowledgment feature.

Step3

dspu rsrb 
local-virtual-ring bridge-number 
target-virtual-ring virtual-macaddr

Defines the DSPU/RSRB interface.

After you define the DSPU RSRB data-link control, configure DSPU to use the RSRB data-link control by enabling a local SAP for either upstream or downstream connections.

To enable a local SAP on RSRB for use by upstream hosts, use the following command in global configuration mode:

Command Purpose
dspu rsrb enable-host 
[lsap local-sap]

Enables local SAP for upstream hosts.

To enable a local SAP on RSRB for use by downstream PUs, use the following command in global configuration mode:

Command Purpose
dspu rsrb enable-pu 
[lsap local-sap]

Enables local SAP for downstream PUs.

Once a local SAP is enabled, it is ready to accept incoming connection attempts from the remote device (upstream host or downstream PU) over RSRB. Alternatively, initiate an outgoing connection to the remote device by using the following command in global configuration mode:

Command Purpose
dspu rsrb start 
{host-name | pu-name}

Initiates a connection with an upstream host or a downstream PU via RSRB.

Configuring DSPU to Use RSRB with Local Acknowledgment

Configuring DSPU to use RSRB with local acknowledgment is identical to configuring RSRB with local acknowledgment. If you add the local-ack keyword to the source-bridge remote-peer configuration command, DSPU will use local acknowledgment for any end stations that connect to DSPU from that peer.

To configure DSPU to use RSRB with local acknowledgment, use the following commands in global configuration mode:

Command Purpose

Step1

source-bridge 
ring-group ring-group 
[virtual-mac-address]

Defines an RSRB ring group.

Step2

source-bridge 
remote-peer ring-group tcp ip-address 
local-ack

Defines a remote peer with the local acknowledgment feature.

Step3

dspu rsrb 
local-virtual-ring bridge-number 
target-virtual-ring virtual-macaddr

Defines the DSPU/RSRB interface.

Configuring DSPU to Use Virtual Data-Link Control

To configure DSPU to use virtual data-link control, you must create a DSPU virtual data-link control interface.

Similar to our implementation of SDLLC, the DSPU virtual data-link control interface uses the concept of a virtual Token Ring device residing on a virtual Token Ring to represent the Cisco IOS software to upstream hosts and downstream PUs across a network.

Because the upstream host and downstream PU expects its peer to also be on a Token Ring, you must assign a virtual Token Ring address (the DSPU virtual MAC address) to the DSPU virtual data-link control interface. Like real Token Ring addresses, the DSPU virtual MAC address must be unique across the network.

In addition to assigning the DSPU virtual MAC address, you must also identify the source-route bridging virtual ring number with which the DSPU virtual MAC address will be associated. The source-route bridging virtual ring number is set using the source-bridge ring-group command. This is documented in the "Source-Route Bridging Commands" chapter of the Cisco IOS Bridging and IBM Networking Command Reference, Volume I.

The combination of the DSPU virtual MAC address and the source-route bridging virtual ring number identifies the DSPU virtual data-link control interface to the rest of the DLSw+ network.

When an end station (either an upstream host or a downstream PU) attempts to connect with the DSPU software, the following events occur:

    1. The end station sends explorer packets with the locally administered MAC address on the router interface to which the end station is connected.

    2. The router configured with that locally administered MAC address intercepts the frame, DLSw+ adjusts the routing information field (RIF), and sends a response to the end station.

    3. The end station establishes a session with the DSPU router.

Prior to creating the DSPU virtual data-link control interface, you must also configure DLSw+ peers so that DLSw+ can provide the communication path. The commands for defining DLSw+ local and remote peers are documented in the "DLSw+ Configuration Commands" chapter of the Cisco IOS Bridging and IBM Networking Command Reference, Volume I.

To define the DSPU virtual data-link control interface, use the following command in global configuration mode:

Command Purpose
dspu vdlc ring-group 
virtual-mac-address

Defines the DSPU virtual data-link control interface.

After you define the DSPU virtual data-link control interface, configure DSPU to use virtual data-link control by enabling a local SAP for either upstream or downstream connections.

To enable a local SAP on the virtual data-link control for use by upstream hosts, use the following command in global configuration mode:

Command Purpose
dspu vdlc enable-host 
[lsap local-sap]

Enables local SAP for upstream hosts.

To enable a local SAP on the virtual data-link control for use by downstream PUs, use the following command in global configuration mode:

Command Purpose
dspu vdlc enable-pu 
[lsap local-sap]

Enables local SAP for downstream PUs.

Once a local SAP is enabled, it is ready to accept incoming connection attempts from the remote device (upstream host or downstream PU) using virtual data-link control. Alternatively, initiate an outgoing connection to the remote device by using the following command in global configuration mode:

Command Purpose
dspu vdlc start 
{host-name | pu-name}

Initiates a connection with an upstream host or a downstream PU via virtual data-link control.

Configuring DSPU to Use SDLC

Before DSPU may be configured to use the SDLC data-link control, the serial interface must be defined for SDLC encapsulation and assigned an SDLC role.

To define the serial interface to use SDLC and specify the SDLC role, use the following commands in interface configuration mode:

Command Purpose

Step1

encapsulation 
sdlc

Enables SDLC encapsulation on the serial interface.

Step2

sdlc role {none 
| primary | secondary | 
prim-xid-poll}

Specifies the SDLC role of the router.

For the connection to be established without XID exchange, the SDLC role must be primary if DSPU will be initiating connections to the SDLC partner. The SDLC role must be secondary or none if the SDLC partner will be initiating connections with DSPU.

When an XID exchange is required, the SDLC role must be prim-xid-poll or none if DSPU will be initiating connections to the SDLC partner. The role must be none if the SDLC partner will be initiating connections with DSPU.

The SDLC addresses used on the SDLC link must also be defined. If DSPU is configured to initiate the connection, then the SDLC address identifies the SDLC partner. If the remote SDLC device initiates the connection, then the SDLC address identifies the address for which a connection will be accepted.

To configure the SDLC address, use the following command in interface configuration mode:

Command Purpose
sdlc address hexbyte

Defines the SDLC address.

Finally, the SDLC address must be enabled for use by DSPU. Each interface can support up to 255SDLC addresses enabled for either upstream or downstream connections; an SDLC address cannot be enabled for both upstream and downstream connections on the same interface. If the SDLC role is none, there can be only one SDLC address on that interface.

To enable an SDLC address for use by upstream host connections, use the following command in interface configuration mode:

Command Purpose
dspu enable-host sdlc 
sdlc-address

Enables the SDLC address for an upstream host.

To enable an SDLC address for use by downstream PU connections, use the following command in interface configuration mode:

Command Purpose
dsp
u enable-pu sdlc sdlc-address

Enables the SDLC address for the downstream PU.

When the SDLC role is configured as primary, DSPU initiates a connection with the remote device by sending set normal response mode (SNRM) when the SDLC address is enabled for DSPU.

When the SDLC role is configured as prim-xid-poll, DSPU initiates a connection with the remote device by sending a NULL XID when the SDLC address is enabled for DSPU.

When the SDLC role is configured as secondary, DSPU will not be ready to respond to SNRM until a dspu start pu-name command is issued.

When the SDLC role is configured as none, DSPU is ready to respond to a received XID or SNRM when the SDLC address is enabled for DSPU; otherwise, the connection may be initiated by issuing the dspu start pu-name command.

To configure DSPU to respond to SNRM when the SDLC role is configured as secondary, or to initiate a connection when the SDLC role is configured as none, use the following command in interface configuration mode:

Command Purpose
dspu start {host-name | 
pu-name}

Initiates a connection with a remote device when the SDLC role is configured as secondary or none.

Configuring DSPU to Use QLLC

Before DSPU may be configured to use the QLLC data-link control, the serial interface must be defined for X.25 encapsulation and assigned an X.121 address.

To define the serial interface to use X.25, use the following commands in interface configuration mode:

Command Purpose

Step1

encapsulation x25 [dce]

Enables X.25 encapsulation on the serial interface.

Step2

x25 address x121-addr

Defines an X.121 address.

X.25 routing must also be configured so that incoming calls to the local X.121 address can be appropriately routed to the serial interface and mapped into the QLLC data-link control.

To define X.25 routing, use the following commands in global configuration mode:

Command Purpose

Step1

x25 routing

Enables X.25 routing.

Step2

x25 route ^local-x121-addr.* alias 
serial slot/port

Enables routing of X.25 packets to the serial interface.

To define which calls get mapped into QLLC, use the following command in interface configuration mode:

Command Purpose
x25 map qllc x121-addr

Defines the remote X.121 address for mapping into QLLC.

Finally, the local X.121 subaddress must be enabled for use by DSPU. An X.121 subaddress can be enabled for either upstream or downstream connections; an X.121 subaddress cannot be enabled for both upstream and downstream connections on the same interface.

To enable an X.121 subaddress for use by upstream host connections via QLLC, use the following command in interface configuration mode:

Command Purpose
dspu enable-host qllc 
x121-subaddress

Enables an X.121 subaddress for an upstream host.

To enable an X.121 subaddress for use by downstream PU connections via QLLC, use the following command in interface configuration mode:

Command Purpose
dspu enable-pu qllc 
x121-subaddress

Enables an X.121 subaddress for a downstream PU.

Once an X.121 subaddress is enabled, it is ready to accept incoming connection attempts from the remote device (upstream host or downstream PU) over QLLC. Alternatively, initiate an outgoing connection to the remote device by using the following command in interface configuration mode:

Command Purpose
dspu start {host-name | 
pu-name}

Initiates a connection with an upstream host or a downstream PU via QLLC.

Configuring DSPU to Use Frame Relay

Before DSPU may be configured to use the LLC2/Frame Relay data-link control, the serial interface must be defined for Frame Relay encapsulation.

To define the serial interface for Frame Relay encapsulation, use the following command in interface configuration mode:

Command Purpose
encapsulation 
frame-relay ietf

Enables Frame Relay encapsulation on a serial interface.

The DLCI used on the Frame Relay link must be mapped into LLC2.

To configure the mapping of a DLCI into LLC2, use the following command in interface configuration mode:

Command Purpose
frame-relay map llc2 
dlci-number

Configures DLCI mapping into LLC2.

Finally, the local SAP address must be enabled for use by DSPU. A SAP address can be enabled for either upstream or downstream connections; a SAP address cannot be enabled for both upstream and downstream connections on the same interface.

To enable a local SAP on the LLC2/Frame Relay interface for use by upstream hosts, use the following command in interface configuration mode:

Command Purpose
dspu enable-host [lsap 
local-sap]

Enables local SAP for upstream hosts.

To enable a local SAP for the LLC2/Frame Relay interface for use by downstream PUs, use the following command in interface configuration mode:

Command Purpose
dspu enable-pu [lsap 
local-sap]

Enables local SAP for downstream PUs.

Once a local SAP is enabled, it is ready to accept incoming connection attempts from the remote device (upstream host or downstream PU) over Frame Relay. Alternatively, initiate an outgoing connection to the remote device by using the following command in interface configuration mode:

Command Purpose
dspu start {host-name | 
pu-name}

Initiates a connection with an upstream host or a downstream PU via LLC2/Frame Relay.

Configuring DSPU to Use NCIA

To configure DSPU to use NCIA, you must use the following commands:

To configure the NCIA server as the underlying transport mechanism, use the following command in global configuration mode:

Command Purpose
dspu ncia server-number

Configures the NCIA server as the underlying transport mechanism.

To enable a local SAP on the NCIA server for use by downstream PUs, use the following command in global configuration mode:

Command Purpose
dspu ncia enable-pu 
[lsap local-sap]

Enables local SAP for downstream PUs.

Defining the Number of Outstanding, Unacknowledged Activation RUs

The DSPU feature allows you to define the number of activation request/response units (RUs) such as ACTLUs or DDDLU NMVTs that can be sent by the Cisco IOS software before waiting for responses from the remote PU.

The DSPU activation window provides pacing to avoid depleting the router buffer pool during PU activation. Increasing the window size allows more LUs to become active in a shorter amount of time (assuming the required buffers for activation RUs are available). Decreasing the window size limits the amount of buffers the DSPU may use during PU activation. Typically, you do not need to change the default window size.

To define the number of unacknowledged activation RUs that can be outstanding, use the following command in global configuration mode:

Command Purpose
dsp
u activation-window window-size

Defines the number of unacknowledged activation RUs.

Configuring SNA Service Point Support

Cisco's implementation of SNA Service Point support includes support for three commands: Alerts, RUNCMD, and Vital Product Data support.

Alert support is provided as the Cisco IOS software sends unsolicited Alerts to NetView (or an equivalent network management application) at the host. This function occurs at the various router interfaces and protocol layers within the device.

RUNCMD support enables you to send commands to the router from the NetView console using the NetView RUNCMD facility, and the router sends the relevant replies back to the RUNCMD screen.

Vital Product Data support allows you to request Vital Product Data from the NetView console. The router replies to NetView with the relevant information.

To configure SNA Service Point support, perform the tasks in the following sections:


NoteYou do not need to perform the tasks in the next section if you have configured a DSPU host with the focalpoint parameter.

Defining a Link to an SNA Host

To define a link to an SNA host over Token Ring, Ethernet, FDDI, RSRB, or virtual data-link control connections, use the following command in global configuration mode:

Command Purpose
sna host host-name 
xid-snd xid rmac remote-mac [rsap remote-sap] 
[lsap local-sap] [interface slot/port] 
[window window-size] [maxiframe max-iframe] 
[retries retry-count] [retry-timeout 
retry-timeout] [focalpoint]

Defines a link to an SNA host over Token Ring, Ethernet, FDDI, RSRB, or virtual data-link control connections.

To define a link to an SNA host over an SDLC connection, use the following command in global configuration mode:

Command Purpose
sna host host-name 
xid-snd xid sdlc sdlc-addr [interface 
slot/port] [window window-size] [maxiframe 
max-iframe] [retries retry-count] 
[retry-timeout retry-timeout] [focalpoint]

Defines a link to an SNA host over an SDLC connection.

To define a link to an SNA host over an X.25/QLLC connection, use the following command in global configuration mode:

Command Purpose
sna host host-name 
xid-snd xid x25 remote-x121-addr [qllc 
local-x121-subaddr] [interface slot/port] 
[window window-size] [maxiframe max-iframe] 
[retries retry-count] [retry-timeout 
retry-timeout] [focalpoint]

Defines a link to an SNA host over an X.25/QLLC connection.

To define a link to an SNA host over a Frame Relay connection, use the following command in global configuration mode:

Command Purpose
sna host host-name 
xid-snd xid dlci dlci-number [rsap 
remote-sap] [lsap local-sap] [interface 
slot/port] [window window-size] [maxiframe 
max-iframe] [retries retry-count] 
[retry-timeout retry-timeout] [focalpoint]

Defines a link to an SNA host over a Frame Relay connection.

Configuring Service Point Support to Use a Data-Link Control

To configure Service Point to use a data-link control, perform the tasks in one of the following sections:


NoteYou do not need to perform this task if you have configured a DSPU host with the focalpoint parameter and have configured the DSPU host to use a data-link control.

Configuring Service Point to Use Token Ring, Ethernet, or FDDI

To enable a local SAP on the Token Ring, Ethernet, or FDDI interfaces for use by SNA Service Point, use the following command in interface configuration mode

:
Command Purpose
sna enable-host [lsap 
lsap-address]

Enables local SAP for Service Point.

Once a local SAP is enabled, it is ready to accept incoming connection attempts from the remote host. Alternatively, initiate an outgoing connection to the remote host by using the following command in interface configuration mode:

Command Purpose
 sna start host-name

Initiates a connection with a host via Token Ring, Ethernet, or FDDI.

Configuring Service Point to Use RSRB

To define the Service Point/RSRB data-link control interface, use the following commands in global configuration mode:

Command Purpose

Step1

source-bridge 
ring-group ring-group 
[virtual-mac-address]

Defines an RSRB ring group.

Step2

sna rsrb 
local-virtual-ring bridge-number 
target-virtual-ring virtual-macaddr

Defines the Service Point/RSRB interface.

To enable a local SAP on RSRB for use by hosts, use the following command in global configuration mode:

Command Purpose
sna rsrb enable-host 
[lsap local-sap]

Enables local SAP for hosts.

Once a local SAP is enabled, it is ready to accept incoming connection attempts from the remote host over RSRB. Alternatively, initiate an outgoing connection to the remote host by using the following command in global configuration mode:

Command Purpose
sna rsrb start host-name 

Initiates a connection with a host via RSRB.

Configuring Service Point to Use RSRB with Local Acknowledgment

To configure Service Point to use RSRB with local acknowledgment, use the following commands in global configuration mode:

Command Purpose

Step1

source-bridge 
ring-group ring-group 
[virtual-mac-address]

Defines an RSRB ring group.

Step2

source-bridge 
remote-peer ring-group tcp ip-address 
local-ack

Defines a remote peer with the local acknowledgment feature.

Step3

sna rsrb 
local-virtual-ring bridge-number 
target-virtual-ring virtual-macaddr

Defines the Service Point/RSRB interface.

Configuring Service Point to Use Virtual Data-Link Control

To configure SNA Service Point to use virtual data-link control, you must create an SNA virtual data-link control interface.

Similar to our implementation of SDLLC, the SNA virtual data-link control interface uses the concept of a virtual Token Ring device residing on a virtual Token Ring to represent the Cisco IOS software to upstream hosts and downstream PUs across a network.

Because the upstream host and downstream PU expect their peer to also be on a Token Ring, you must assign a virtual Token Ring address (the SNA virtual data-link control virtual MAC address) to the SNA virtual data-link control interface. Like real Token Ring addresses, the SNA virtual MAC address must be unique across the network.

You must also identify the source-route bridging virtual ring number with which the SNA virtual MAC address will be associated. The source-route bridging virtual ring number is set using the source-bridge ring-group command, which is documented in the "Source-Route Bridging Commands" chapter of the Cisco IOS Bridging and IBM Networking Command Reference, Volume I.

The combination of the SNA virtual MAC address and the source-route bridging virtual ring number identifies the SNA virtual data-link control interface to the rest of the DLSw+ network.

When an end station (either an upstream host or a downstream PU) attempts to connect with the SNA Service Point software, the following events occur:

    1. The end station sends explorer packets with the locally administered MAC address on the router interface to which the end station is connected.

    2. The router configured with that locally administered MAC address intercepts the frame, DLSw+ adjusts the RIF and sends a response to the end station.

    3. The end station establishes a session with the SNA Service Point router.

Prior to creating the SNA virtual data-link control interface, you must also configure DLSw+ peers so that DLSw+ can provide the communication path. The commands for defining DLSw+ local and remote peers are documented in the "DLSw+ Configuration Commands" chapter of the Cisco IOS Bridging and IBM Networking Command Reference, Volume I.

To define the Service Point virtual data-link control interface, use the following command in global configuration mode:

Command Purpose
sna vdlc ring-group 
virtual-mac-address

Defines the Service Point virtual data-link control interface.

After you create the SNA virtual data-link control interface, configure SNA Service Point to use virtual data-link control by enabling a local SAP for upstream connections. To enable a local SAP on virtual data-link control for use by hosts, use the following command in global configuration mode:

Command Purpose
sna vdlc enable-host 
[lsap local-sap]

Enables local SAP for hosts.

Once a local SAP is enabled, it is ready to accept incoming connection attempts from the remote host using virtual data-link control. Alternatively, initiate an outgoing connection to the remote host by using the following command in global configuration mode:

Command Purpose
sna vdlc start host-name 

Initiates a connection with a host via virtual data-link control.

Configuring Service Point Support for Frame Relay

To configure Service Point support for Frame Relay, use the following commands in interface configuration mode:

Command Purpose

Step1

frame-relay map llc2 
dlci-number

Defines DLCI mapping into LLC2.

Step2

sna enable-host lsap 
lsap-address

Enables a local SAP for hosts.

Configuring Service Point Support for SDLC

To configure Service Point support for SDLC, use the following commands in interface configuration mode:

Command Purpose

Step1

sdlc role {none | primary | 
secondary | prim-xid-poll}

Specifies the SDLC role of the router.

Step2

sdlc address hexbyte

Defines the SDLC address.

Step3

sna enable-host sdlc 
sdlc-address

Enables the SDLC address for the host.

Configuring Service Point Support for X.25

To configure Service Point support for X.25, use the following commands in interface configuration mode:

Command Purpose

Step1

x25 address x121-address

Defines an X.121 address.

Step2

x25 map qllc x121-addr

Defines remote X.121 address for mapping to QLLC.

Step3

sna enable-host qllc x121-subaddress

Enables QLLC subaddress for host.

Step4

x25 route ^x121-addr.* alias serial 
interface

Enables routing of X.25 packets to serial interface.

Specifying Names for All Attached LANs

You can specify names for all Token Ring or Ethernet LANs attached to the router. These names are used to identify the LAN when the Cisco IOS software sends an Alert to the host. To specify names for all attached LANs, use the following command in interface configuration mode:

Command Purpose
lan-name lan-name

Defines the name of an attached LAN.

Specifying the Physical Location of the Router

You can specify the physical location of the router if you intend requesting vital product information from the router. To specify the physical location, use the following command in interface configuration mode:

Command Purpose
location 
location-description 

Defines the physical location of the router.

Monitoring and Maintaining DSPU and SNA Service Point Feature Status

You can monitor the status of the DSPU and SNA Service Point features. To display information about the state of the DSPU and SNA Service Point features, use the following commands in EXEC mode:

Command Purpose
show dspu

Shows the status of all DSPU resources.

show dspu pu {host-name | pu-name} [all]

Shows the status of DSPU hosts or downstream PUs.

show dspu pool pool-name 
[all]

Shows the status of a DSPU pool.

show sna

Shows the status of all SNA hosts.

show sna pu host-name 
[all]

Shows the status of an SNA host.

To control the reporting of DSPU notification events (DSPU-specific SNMP Traps and Unsolicited SNA Messages to Operator), use the following command in global configuration mode:

Command Purpose
dspu notification-level 
{off | low | medium | high}

Specifies the level of notification event reporting.

DSPU and SNA Service Point Configuration Examples

The following sections provide DSPU and SNA Service Point configuration examples:

Dedicated LU Routing Example

Figure 220 illustrates the use of dedicated LU routing. Each upstream host LU is dedicated for use by a specific downstream LU.


Figure220: Dedicated LU Routing


The following is a configuration file for the dedicated LU routing shown in Figure 220:

    dspu host ciscohost xid-snd 06500001 rmac 4000.3745.0001
    dspu pu ciscopu-a xid-rcv 05D00001 rmac 1000.5AED.0001
    dspu lu 1 2 host ciscohost 2
    dspu lu 3 3 host ciscohost 20
    dspu pu ciscopu-b xid-rcv 05D00002 rmac 1000.5AED.0002
    dspu lu 1 2 host ciscohost 4
    dspu lu 3 3 host ciscohost 21
    

Pooled LU Routing Example

Figure 221 illustrates the use of pooled LU routing. Each upstream LU is configured in the LU pool and each downstream LU is configured as a pooled LU.


Figure221: Pooled LU Routing


The following is a configuration file for the pooled LU routing shown in Figure 221:

    dspu host ciscohost xid-snd 06500001 rmac 4000.3745.0001
    dspu pool lupool host ciscohost lu 2 21
    dspu pu ciscopu-a xid-rcv 05D00001 rmac 1000.5AED.0001
    dspu lu 1 3 pool lupool
    dspu pu ciscopu-b xid-rcv 05D00002 rmac 1000.5AED.0002
    dspu lu 1 3 pool lupool
    dspu pu ciscopu-c xid-rcv 05D00003 rmac 1000.5AED.0003
    dspu lu 1 3 pool lupool
    

Upstream Host via RSRB DSPU Configuration Example

The following configuration example represents one possible definition for the network topology shown in Figure 220. This example demonstrates the configuration of an upstream host via RSRB (with local acknowledgment) and downstream PUs via Token Ring.

    source-bridge ring-group 99
    source-bridge remote-peer 99 tcp 150.10.13.1
    source-bridge remote-peer 99 tcp 150.10.13.2 local-ack
     
    dspu rsrb 88 1 99 4000.ffff.0001
    dspu rsrb enable-host lsap 4
     
    dspu host ciscohost xid-snd 06500001 rmac 4000.3172.0001 rsap 4 lsap 4
    dspu pool ciscopool host ciscohost lu 2 8
    dspu rsrb start ciscohost
     
    dspu pu ciscopu1 xid-rcv 05d00001 
    dspu lu 2 3 pool ciscopool
     
    dspu pu ciscopu2 xid-rcv 05d00002
    dspu lu 2 4 pool ciscopool
     
    dspu pu ciscopu3 xid-rcv 05d00003
    dspu lu 2 2 pool ciscopool
     
    dspu pu ciscopu4 xid-rcv 05d00004
    dspu lu 2 2 pool ciscopool
    dspu lu 3 3 host ciscohost 9
     
    interface tokenring 0
    description tokenring connection for downstream PUs
    ring-speed 16
    dspu enable-pu lsap 8
    

DSPU over DLSw+ using Virtual Data-Link Control Configuration Example

The following example illustrates pooled LU routing over DLSw+ using virtual data-link control:

    source-bridge ring-group 99
    dlsw local-peer peer-id 150.10.16.2
    dlsw remote-peer 0 tcp 150.10.16.1
    !
    dspu vdlc 99 4000.4500.01f0
    dspu vdlc enable-pu lsap 8
    dspu vdlc enable-host lsap 12
    !
    dspu host HOST-B xid-snd 065bbbb0 rmac 4000.7000.01f1 rsap 4 lsap 12 focalpoint
    dspu pool pool-b host HOST-B lu 2 254
    !
    dspu pu PU3K-A xid-rcv 05d0000a rmac 4000.3000.0100 rsap 10 lsap 8
    dspu lu 2 254 pool pool-b
    !
    dspu default-pu
    dspu lu 2 5 pool pool3k-a
    !
    dspu vdlc start HOST-B
    dspu vdlc start PU3K-A
    !
    interface serial 3
    description IP connection to dspu7k
    ip address 150.10.16.2 255.255.255.0
    clockrate 4000000
    

Downstream PU via SDLC DSPU Configuration Example

The following example demonstrates the configuration of downstream PUs via SDLC and an upstream host via Token Ring:

    dspu host ciscohost xid-snd 06500001 rmac 4000.3172.0001 rsap 4 lsap 12
    dspu pool ciscopool host ciscohost lu 2 11
    !
    dspu pu pu-sdlc0 sdlc C1 interface serial 0
    dspu lu 2 6 pool ciscopool
    !
    dspu pu pu-sdlc1 sdlc C1 interface serial 1
    dspu lu 2 6 pool ciscopool
    !
    interface serial 0
    description SDLC connection for pu-sdlc0
    encapsulation sdlc
    sdlc role primary
    sdlc address C1 
    dspu enable-pu sdlc C1
    clockrate 56000
    !
    interface serial 1
    description SDLC connection for pu-sdlc1
    encapsulation sdlc
    sdlc role primary
    sdlc address C1 
    dspu enable-pu sdlc C1
    clockrate 56000
    !
    interface tokenring 0
    description tokenring connection for ciscohost
    ring-speed 16
    dspu enable-host lsap 12
    dspu start ciscohost
    

Upstream Host via SDLC DSPU Configuration Example

The following example demonstrates the configuration of an upstream host via SDLC and downstream PUs via Token Ring and Ethernet:

    dspu host ciscohost xid-snd 06500001 sdlc C1 interface serial 0
    dspu pool ciscopool host ciscohost lu 2 11
    !
    dspu pu pu-token rmac 4000.4444.0001 rsap 4 lsap 8
    dspu lu 2 6 pool ciscopool
    !
    dspu pu pu-ether rmac 0200.2222.0001 rsap 4 lsap 8
    dspu lu 2 6 pool ciscopool
    !
    interface serial 0
    description SDLC connection for ciscohost
    encapsulation sdlc
    sdlc role secondary
    sdlc address C1 
    dspu enable-host sdlc C1
    clockrate 56000
    !
    interface tokenring 0
    description tokenring connection for pu-token
    ring-speed 16
    dspu enable-pu lsap 8
    !
    interface ethernet 0
    description Ethernet connection for pu-ether
    dspu enable-pu lsap 8
    

Downstream PU via QLLC/X.25 DSPU Configuration Example

The following example demonstrates the configuration of a downstream PU via QLLC/X.25 and upstream host via Ethernet:

    x25 routing
    !
    dspu host ciscohost xid-snd 06500001 rmac 0200.2222.0001 rsap 4 lsap 12
    dspu pool ciscopool host ciscohost lu 2 11
    !
    dspu pu pu-qllc x25 320108 qllc 08
    dspu lu 2 11 pool ciscopool
    !
    interface serial 0
    description QLLC connection for pu-qllc
    encapsulation x25 
    x25 address 3202
    x25 map qllc 320108
    dspu enable-pu qllc 8
    !
    interface ethernet 0
    description Ethernet connection for pu-ether
    dspu enable-host lsap 12
    dspu start ciscohost
    !
    x25 route ^3202.* alias serial 0
    

Upstream Host via Frame Relay DSPU Configuration Example

The following example demonstrates the configuration of an upstream host via Frame Relay and downstream PUs via Token Ring and Ethernet:

    dspu host ciscohost xid-snd 06500001 dlci 200 rsap 4 lsap 12
    dspu pool ciscopool host ciscohost lu 2 11
    !
    dspu pu pu-token rmac 4000.4444.0001 rsap 4 lsap 8
    dspu lu 2 6 pool ciscopool
    !
    dspu pu pu-ether rmac 0200.2222.0001 rsap 4 lsap 8
    dspu lu 2 6 pool ciscopool
    !
    interface serial 0
    description Frame Relay connection for ciscohost
    encapsulation frame-relay ietf
    frame-relay map llc2 200
    dspu enable-host lsap 12
    dspu start ciscohost
    !
    interface tokenring 0
    description tokenring connection for pu-token
    ring-speed 16
    dspu enable-pu lsap 8
    !
    interface ethernet 0
    description Ethernet connection for pu-ether
    dspu enable-pu lsap 8
    

DSPU NCIA Configuration Example

The following example illustrates an NCIA client/server session using DSPU:

      ncia server 1 10.2.20.4 4000.3745.0001 1000.0000.0001 128
      !
      dspu ncia 1
      dspu ncia enable-pu lsap 8
      !
      dspu host HOST-9370 xid-snd 11100001 rmac 4000.1060.1000 rsap 4 lsap 4
      !
      dspu pu CISCOPU-A xid-rcv 01700001
      dspu lu 2 6 host HOST-9370 2
      !
      interface TokenRing 0
      ring-speed 16
      llc2 xid-retry-time 0
      dspu enable-host lsap 4
      dspu start HOST-9370
      !
      

SNA Service Point Support Configuration Example

The following is an example of an RSRB configuration that implements SNA Service Point:

    source-bridge ring-group 99
    source-bridge remote-peer 99 tcp 150.10.13.2 local-ack
    !
    sna rsrb 88 1 99 4000.ffff.0001
    !
    sna host CNM02 xid-snd 05dbc000 rmac 4001.3745.1088 rsap 4 lsap 4 focalpoint
    sna rsrb enable-host lsap 4
    sna rsrb start CNM02
    !
    

SNA Service Point over DLSw+ Using Virtual Data-Link Control Configuration Example

The following is an example of an SNA Service Point configuration that uses virtual data-link control over DLSw+:

    source-bridge ring-group 99
    dlsw local-peer peer-id 150.10.16.2
    dlsw remote-peer 0 tcp 150.10.16.1
    !
    sna vdlc 99 4000.4500.01f0
    sna vdlc enable-host lsap 12
    !
    sna host HOST-B xid-snd 065bbbb0 rmac 4000.7000.01f1 rsap 4 lsap 12 focalpoint
    !
    sna vdlc start HOST-B
    !
    interface serial 3
    description IP connection to dspu7k
    ip address 150.10.16.2 255.255.255.0
    clockrate 4000000
    

hometocprevnextglossaryfeedbacksearchhelp
Posted: Thu Jul 20 10:25:58 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.