Converged Networks (LAN and SAN) For EX
Converged Networks (LAN and SAN) For EX
Release
13.2X50
Published: 2013-09-30
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify,
transfer, or otherwise revise this publication without notice.
®
Junos OS for EX Series Ethernet Switches Converged Networks (LAN and SAN) for EX Series Switches
Release 13.2X50
Copyright © 2013, Juniper Networks, Inc.
All rights reserved.
The information in this document is current as of the date on the title page.
Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related limitations through the
year 2038. However, the NTP application is known to have some difficulty in the year 2036.
The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks
software. Use of such software is subject to the terms and conditions of the End User License Agreement (“EULA”) posted at
http://www.juniper.net/support/eula.html. By downloading, installing or using such software, you agree to the terms and conditions of
that EULA.
Part 1 Overview
Chapter 1 Converged Networks Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Understanding FIP Snooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
FC Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
FIP Snooping Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
FIP Snooping Firewall Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
FIP Snooping Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Server ENode-Facing Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
FCF-Facing Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
FCoE Mapped Address Prefix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
T11 FIP Snooping Specification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Understanding Using an FCoE Transit Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Understanding Priority-Based Flow Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Reliability of Packet Delivery in Standard Ethernet Networks and in Layer 2
Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Calculations for Buffer Requirements When Using PFC PAUSE . . . . . . . . . . . . 8
How PFC and Congestion Notification Profiles Work With or Without
DCBX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Understanding Data Center Bridging Capability Exchange Protocol for EX Series
Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Basic DCBX Functioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
DCBX and PFC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
DCBX and FCoE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
DCBX and iSCSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
How DCBX Is Implemented on the Switches . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Features That Are Not Fully Supported by DCBX on EX Series Switches . . . . 12
Part 2 Configuration
Chapter 2 Configuration Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Example: Configuring an FCoE Transit Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Example: Configuring DCBX to Support an iSCSI Application . . . . . . . . . . . . . . . . 33
Chapter 3 Configuration Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Configuring VN2VF_Port FIP Snooping on an FCoE Transit Switch . . . . . . . . . . . . 39
Configuring Priority-Based Flow Control for an EX Series Switch (CLI
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Disabling DCBX to Disable PFC Autonegotiation on EX Series Switches (CLI
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Disabling DCBX Application Protocol Exchange on EX Series Switches (CLI
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Defining an Application for DCBX Application Protocol TLV Exchange . . . . . . . . . 45
Configuring an Application Map for DCBX Application Protocol TLV
Exchange . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Applying an Application Map to an Interface for DCBX Application Protocol TLV
Exchange . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Disabling the ETS Recommendation TLV . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Chapter 4 Configuration Statements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
[edit class-of-service] Configuration Statement Hierarchy on EX Series
Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Supported Statements in the [edit class-of-service] Hierarchy Level . . . . . . 51
Unsupported Statements in the [edit class-of-service] Hierarchy Level . . . . 53
[edit ethernet-switching-options] Configuration Statement Hierarchy on EX
Series Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Supported Statements in the [edit ethernet-switching-options] Hierarchy
Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Unsupported Statements in the [edit ethernet-switching-options] Hierarchy
Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Part 3 Administration
Chapter 5 Operational Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
clear fip snooping enode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
clear fip snooping statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
clear fip snooping vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
show dcbx neighbors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
show fip snooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
show fip snooping enode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
show fip snooping fcf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
show fip snooping statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
show fip snooping vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Part 1 Overview
Chapter 1 Converged Networks Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Table 3: Input for PFC Congestion Notification Profile and Mapping to Traffic
Class and Egress Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Part 2 Configuration
Chapter 2 Configuration Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Table 4: Components of the FCoE Security Topology . . . . . . . . . . . . . . . . . . . . . . . 23
Table 5: Components of the DCBX iSCSI Topology . . . . . . . . . . . . . . . . . . . . . . . . 34
Chapter 4 Configuration Statements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Table 6: Unsupported [edit protocols dcbx] Configuration Statements on EX
Series Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Part 3 Administration
Chapter 5 Operational Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Table 7: show dcbx neighbors Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Table 8: show fip snooping Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Table 9: show fip snooping enode Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Table 10: show fip snooping fcf Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Table 11: show fip snooping statistics Output Fields . . . . . . . . . . . . . . . . . . . . . . . 128
Table 12: show fip snooping vlan Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
If the information in the latest release notes differs from the information in the
documentation, follow the product Release Notes.
Juniper Networks Books publishes books by Juniper Networks engineers and subject
matter experts. These books go beyond the technical documentation to explore the
nuances of network architecture, deployment, and administration. The current list can
be viewed at http://www.juniper.net/books.
Supported Platforms
For the features described in this document, the following platforms are supported:
• EX Series
If you want to use the examples in this manual, you can use the load merge or the load
merge relative command. These commands cause the software to merge the incoming
configuration into the current candidate configuration. The example does not become
active until you commit the candidate configuration.
If the example configuration contains the top level of the hierarchy (or multiple
hierarchies), the example is a full example. In this case, use the load merge command.
If the example configuration does not start at the top level of the hierarchy, the example
is a snippet. In this case, use the load merge relative command. These procedures are
described in the following sections.
1. From the HTML or PDF version of the manual, copy a configuration example into a
text file, save the file with a name, and copy the file to a directory on your routing
platform.
For example, copy the following configuration to a file and name the file ex-script.conf.
Copy the ex-script.conf file to the /var/tmp directory on your routing platform.
system {
scripts {
commit {
file ex-script.xsl;
}
}
}
interfaces {
fxp0 {
disable;
unit 0 {
family inet {
address 10.0.0.1/24;
}
}
}
}
2. Merge the contents of the file into your routing platform configuration by issuing the
load merge configuration mode command:
[edit]
user@host# load merge /var/tmp/ex-script.conf
load complete
Merging a Snippet
To merge a snippet, follow these steps:
1. From the HTML or PDF version of the manual, copy a configuration snippet into a text
file, save the file with a name, and copy the file to a directory on your routing platform.
For example, copy the following snippet to a file and name the file
ex-script-snippet.conf. Copy the ex-script-snippet.conf file to the /var/tmp directory
on your routing platform.
commit {
file ex-script-snippet.xsl; }
2. Move to the hierarchy level that is relevant for this snippet by issuing the following
configuration mode command:
[edit]
user@host# edit system scripts
[edit system scripts]
3. Merge the contents of the file into your routing platform configuration by issuing the
load merge relative configuration mode command:
For more information about the load command, see the CLI User Guide.
Documentation Conventions
Caution Indicates a situation that might result in loss of data or hardware damage.
Laser warning Alerts you to the risk of personal injury from a laser.
Table 2 on page xi defines the text and syntax conventions used in this guide.
Bold text like this Represents text that you type. To enter configuration mode, type
theconfigure command:
user@host> configure
Fixed-width text like this Represents output that appears on the user@host> show chassis alarms
terminal screen.
No alarms currently active
Italic text like this • Introduces or emphasizes important • A policy term is a named structure
new terms. that defines match conditions and
• Identifies guide names. actions.
• Junos OS CLI User Guide
• Identifies RFC and Internet draft titles.
• RFC 1997, BGP Communities Attribute
Italic text like this Represents variables (options for which Configure the machine’s domain name:
you substitute a value) in commands or
configuration statements. [edit]
root@# set system domain-name
domain-name
Text like this Represents names of configuration • To configure a stub area, include the
statements, commands, files, and stub statement at the[edit protocols
directories; configuration hierarchy levels; ospf area area-id] hierarchy level.
or labels on routing platform • The console port is labeled CONSOLE.
components.
< > (angle brackets) Enclose optional keywords or variables. stub <default-metric metric>;
# (pound sign) Indicates a comment specified on the rsvp { # Required for dynamic MPLS only
same line as the configuration statement
to which it applies.
[ ] (square brackets) Enclose a variable for which you can community name members [
substitute one or more values. community-ids ]
GUI Conventions
Bold text like this Represents graphical user interface (GUI) • In the Logical Interfaces box, select
items you click or select. All Interfaces.
• To cancel the configuration, click
Cancel.
> (bold right angle bracket) Separates levels in a hierarchy of menu In the configuration editor hierarchy,
selections. select Protocols>Ospf.
Documentation Feedback
Technical product support is available through the Juniper Networks Technical Assistance
Center (JTAC). If you are a customer with an active J-Care or JNASC support contract,
or are covered under warranty, and need post-sales technical support, you can access
our tools and resources online or open a case with JTAC.
• JTAC hours of operation—The JTAC centers have resources available 24 hours a day,
7 days a week, 365 days a year.
• Find solutions and answer questions using our Knowledge Base: http://kb.juniper.net/
To verify service entitlement by product serial number, use our Serial Number Entitlement
(SNE) Tool: https://tools.juniper.net/SerialNumberEntitlementSearch/
Overview
• Converged Networks Overview on page 3
Fibre Channel over Ethernet (FCoE) Initialization Protocol (FIP) snooping is a security
mechanism that is designed to prevent unauthorized access and data transmission to a
Fibre Channel (FC) network. It works by filtering traffic to permit only servers that have
logged in to the FC network to access the network. You enable FIP snooping on FCoE
VLANs when the switch is being used as an FCoE transit switch connecting FC initiators
(servers) on the Ethernet network to FCoE forwarders (FCFs) at the FC storage area
network (SAN) edge.
Through the FIP process, servers that have a converged network adapter (CNA) present
an FCoE Node (ENode) that can log in to the FC network. The login process establishes
a dedicated virtual link between the ENode and the FCF to emulate a point-to-point
connection that passes transparently through the FCoE transit switch.
The FCoE transit switch applies FIP snooping firewall filters at the edge access ports
associated with the FCoE VLANs on which you enable FIP snooping. FIP snooping provides
security for virtual links by automatically creating firewall filters based on information
gathered (snooped) about FC devices during FIP transactions.
FC Network Security
In traditional pure FC networks, the FCF is a trusted entity and server ENodes connect
directly to the FCF. After an ENode gains access to the network through the fabric login
(FLOGI) process, the FCF enforces zoning configurations, ensures that the ENode uses
valid addresses, monitors the connection, and performs other security functions to prevent
unauthorized access.
FIP snooping firewall filters emulate these security functions by preventing unauthorized
access to the FCF through the transit switch and by ensuring the security of the virtual
link between each ENode and the FCF. FIP snooping also prevents man-in-the-middle
attacks.
For example, when an ENode on an FCoE VLAN performs a successful login, the FCoE
transit switch snoops the FIP information, constructs a firewall filter that permits access
for the ENode, and adds the filter on all transit switch access ports associated with the
FCoE VLAN.
The firewall filters allow FCoE frames to pass through the transit switch only between
the server ENode FCoE port and the FCF FCoE port to which the server ENode has logged
in. This ensures that ENodes can only connect to the FCFs they have successfully logged
in to and that only valid FCoE traffic is transmitted. FIP snooping maintains the filters by
tracking FCoE sessions.
FIP snooping performs these actions and checks to ensure that FCoE traffic is valid:
• Denies ENodes that use the FCF media access control (MAC) address as the source
address.
• Denies all traffic from the ENode other than traffic addressed to the FCF that the Enode
has logged into.
• Restricts the ENode to sending only FCoE protocol traffic on the virtual link.
• Allows the ENode to transmit only FIP and FCoE frames to the FCF address.
• Ensures that the FCoE source address an ENode uses after fabic login and fabric
discovery (FDISC) is the address the FCF assigned to that ENode.
• Ensures that the FCoE source address the FCF assigns or accepts is only used for FCoE
traffic.
• Ensures that FCoE frames are only addressed to the accepting FCF.
FCoE VLANs can include both access ports and trunk ports. Access ports face the hosts
(FCoE servers and other FCoE initiators), and trunk ports face the FCF. When FIP snooping
is enabled, the FCoE transit switch inspects both FIP frames and FCoE frames.
We recommend that you enable FIP snooping on all FCoE access ports to ensure secure
connections to FCFs. After you enable FIP snooping on an FCoE VLAN, the transit switch
denies FCoE traffic from any server on that VLAN until the server performs a valid fabric
login with an FCF.
FCF-Facing Interfaces
You must configure the interface that you are using to connect to an FCF as FCoE trusted
interface, and it must be a 10 Gigabit Ethernet interface.
An FCoE trusted interface receives FCoE traffic only from an FCF. The following conditions
apply to FCFs and FCF-facing interfaces:
• The FCoE transit switch always processes FCF frames because they come from a
trusted source.
When you enable FIP snooping on a VLAN, optionally you can specify the FCoE Mapped
Address Prefix (FC-MAP) value for that VLAN if the network uses the fabric-provided
MAC address (FPMA) addressing scheme. The FC-MAP value is a 24-bit value that
identifies the FCF. The FCF combines the FC-MAP value with a unique 24-bit Fibre Channel
ID (FCID) value for the server during the fabric login process, creating a unique 48-bit
identifier. The FCF assigns the 48-bit value to the server ENode as its MAC address and
unique identifier for the session. Each server session the ENode establishes with the FCF
receives a unique FCID, so a server can host multiple virtual links to an FCF, each with a
unique 48-bit address identifier.
The FIP snooping filter compares the configured FC-MAP value with the FC-MAP value
in the header of frames coming from the server. If the values do not match, the FCoE
transit switch denies access.
You can use an EX4500 switch as a Fibre Channel over Ethernet (FCoE) transit switch.
An FCoE transit switch is a Layer 2 data center bridging (DCB) switch that can transport
FCoE frames and implement FCoE Initialization Protocol (FIP) snooping. The switch can
transport both FCoE and Ethernet LAN traffic over the same network infrastructure while
preserving the class of service (CoS) that Fibre Channel (FC) traffic requires.
When the switch acts as a transit switch, the VLANs you configure for FCoE traffic can
use any of the switch ingress and egress ports, because the traffic in both directions is
Ethernet traffic. FCoE traffic must use a VLAN dedicated only to FCoE traffic that does
not carry any other traffic.
When the switch acts as a transit switch, you must enable priority-based flow control
(PFC, IEEE standard 802.1Qbb) as a link-level flow control mechanism. See
“Understanding Priority-Based Flow Control” on page 7 for additional information. FIP
snooping adds security by filtering access so that only traffic from servers that have
successfully logged in to the FC network passes through the transit switch and reaches
the FC network.
Encapsulated FCoE server traffic flows through the transit switch to the FCoE ports on
the FCF. The FCF removes the Ethernet encapsulation from the FCoE frames to restore
the native FC frames. Native FC traffic travels out FCF FC ports to storage devices in the
FC SAN.
Native FC traffic from storage devices flows to the FCF FC ports, and the FCF encapsulates
that traffic in Ethernet as FCoE traffic. The FCoE traffic flows through the transit switch
to the appropriate server, and the server decapsulates the traffic.
Priority-based flow control (PFC), IEEE standard 802.1Qbb, is a link-level flow control
mechanism. The flow control mechanism is similar to that used by IEEE 802.3x Ethernet
PAUSE, but it operates on individual priorities. Instead of pausing all traffic on a link, PFC
allows you to selectively pause traffic according to its class.
Applications that require reliability in Layer 2 must have flow control that includes
feedback from a receiver to a sender regarding buffer availability. Using IEEE 802.3x
Ethernet PAUSE control frames, a receiver can generate a MAC control frame and send
a PAUSE request to a sender when a specified threshold of receiver buffer has been filled
to prevent buffer overflow. Upon receiving a PAUSE request, the sender stops transmission
of any new packets until the receiver notifies the sender that it has sufficient buffer space
to accept them again. The disadvantage of using Ethernet PAUSE is that it operates on
the entire link, which might be carrying multiple traffic flows. Some traffic flows do not
need flow control in Layer 2, because they are carrying applications that rely on upper-layer
protocols for reliability. PFC enables you to configure Layer 2 flow control selectively for
the traffic that requires it, such as Fibre Channel over Ethernet (FCoE) traffic, without
impacting other traffic on the link. You can also enable PFC for other traffic types, such
as iSCSI.
• Processing and queuing delay of the PFC PAUSE—In general, the time to detect the
lack of sufficient buffer space and to transmit the PFC PAUSE is negligible. However,
delays can occur if the switch detects a reduction in buffer space just as the transmitter
is beginning to transmit a maximum length frame.
• Propagation delay across the media—The delay amount depends on the length and
speed of the physical link.
How PFC and Congestion Notification Profiles Work With or Without DCBX
PFC can be applied to an interface regardless of whether the Data Center Bridging
Capability Exchange protocol (DCBX) is enabled (DCBX is enabled by default for
10-Gigabit Ethernet interfaces on EX4500 CEE-enabled switches).
• When DCBX is enabled—DCBX detects the data center bridging (DCB) neighbor’s PFC
configuration, uses autonegotiation to advertise local and peer PFC configuration, and
then enables or disables PFC depending on whether the configurations are compatible
or not. When PFC is enabled, it uses the congestion notification profile, which you have
configured and applied to the interface.
• When DCBX is not enabled—Class of service (CoS) triggers PFC when the incoming
frame has a User Priority (UP) field that matches the three-bit pattern specified for
the congestion notification profile.
To manually control the use of PFC on the interface regardless of the configuration of
the peer data center devices, you can explicitly change the configuration of DCBX on the
interface to disable PFC autonegotiation. See “Disabling DCBX to Disable PFC
Autonegotiation on EX Series Switches (CLI Procedure)” on page 44. When PFC
NOTE: PFC functions effectively only when the peer devices connected to
the local interface are also using PFC and are configured compatibly with
the local interface. PFC must be symmetrical—if PFC is not configured to use
the same traffic class (code point) on both the local and the peer interface,
it does not have any impact on the traffic.
Table 3 on page 9 shows the one-to-one mapping between the UP field of an IEEE
802.1Q tagged frame, the traffic class, and the egress queue. In addition to setting a PFC
congestion notification profile on an ingress port, you must set a forwarding class to
match the priority specified in the PFC congestion notification profile and to forward the
frame to the appropriate queue.
Juniper Networks EX Series Ethernet Switches support up to six traffic classes and allow
you to associate those classes with six different congestion notification profiles. (The
switches support up to 16 forwarding classes.)
Table 3: Input for PFC Congestion Notification Profile and Mapping to Traffic Class and Egress
Queue
UP Field of IEEE-802.1Q Tagged
Frame Traffic Class Egress Queue
000 TC 0 queue 0
001 TC 1 queue 1
010 TC 2 queue 2
011 TC 3 queue 3
101 TC 5 queue 5
Related • Understanding Data Center Bridging Capability Exchange Protocol for EX Series
Documentation Switches on page 10
• schedulers
• congestion-notification-profile on page 66
Data Center Bridging Capability Exchange protocol (DCBX) is a discovery and exchange
protocol for communicating configuration and capabilities among neighbors to ensure
consistent configuration across the data center bridging network. It is an extension of
Link Layer Discovery Protocol (LLDP). Data center bridging devices use DCBX to exchange
configuration information with directly connected peers (devices such as switches and
servers in a data center bridging network).
On Juniper Networks EX Series Ethernet Switches, you can use DCBX to:
If the peer device connected to the interface does not support DCBX, DCBX remains
enabled on the switch, but the switch detects that DCBX is not enabled on the peer and
reports a misconfiguration for that interface when you issue the show dcbx neighbors
command.
During negotiation of capabilities, the switch pushes the PFC configuration to an attached
peer if the peer is configured as willing to learn the PFC configuration from other peers.
The switch does not support autoprovisioning and does not change its own configuration
during autonegotiation to match the peer configuration—that is, the switch is not willing
to learn the PFC configuration from peers.
DCB devices must use the same traffic class (code point) on both the local and peer
device. If the peer device connected to the interface supports PFC and is provisioned for
the same traffic class as the switch interface, DCBX sets the PFC operational state to
enabled. If the peer device connected to the interface does not support PFC or is not
provisioned for the same traffic class, DCBX sets the operational state to disabled.
If the peer advertises that it is willing to learn its PFC configuration from the switch, DCBX
pushes the switch’s PFC configuration to the peer and does not check the peer’s
administrative state.
You can manually override DCBX control of the PFC operational state on a per-interface
basis by disabling autonegotiation. If you disable autonegotiation on an interface on
which you have configured PFC, then PFC remains enabled on that interface regardless
of the peer configuration. To disable PFC on an interface, delete any PFC configuration
on the interface.
The FCoE application is configured by default on DCBX interfaces. Because of the FCoE
requirement for lossless transport, we recommend that you configure the interfaces that
carry FCoE traffic for PFC. See “Configuring Priority-Based Flow Control for an EX Series
Switch (CLI Procedure)” on page 41.
• If you configure the fcoe forwarding class and PFC congestion notification profile and
assign these components to the interfaces that carry FCoE traffic, DCBX advertises
their FCoE capability and assigned 802.1p code points to the DCB peer, and DCBX
reports the FCoE capability and assigned 802.1p code points of the DCB peer to the
switch.
You might want to use iSCSI over DCB to reduce latency in a network that is
oversubscribed. You might also want to use it to provide predictable and certain
application responsiveness, eliminating Ethernet’s dependence on TCP/IP for the
retransmission of dropped Ethernet frames.
DCBX advertises switch interfaces that are configured to support the iSCSI application,
their PFC capability, and their assigned 802.1p code points.
• Supported on EX4500 switches only (See EX4500 Switch Models for a list of
CEE-capable models.)
On the switches, DCBX supports the application type-length-value (TLV) —thus, DCBX
interfaces on the switch can exchange information with their DCB peers about application
capability, PFC capability, and 802.1p code-point settings. This implementation includes
the following:
• The FCoE application is enabled by default on DCBX interfaces on the switch. Therefore,
you do not configure an application map for the default FCoE application.
The switches do not have a default FCoE forwarding class—therefore, you must explicitly
configure a forwarding class with the name fcoe and associate that class with the
interfaces carrying FCoE traffic. If PFC is enabled, the 802.1p code points are assigned,
and the interfaces are associated with a forwarding class, the switch negotiates FCoE
application capability on the DCBX interface.
• Do not explicitly configure an FCoE application map, because that generates a commit
error.
• If the peer device connected to the local interface does not support PFC or the peer’s
PFC configuration is not the same as the local interface’s PFC configuration, DCBX
automatically disables PFC for the local interface.
NOTE: You can manually override DCBX control of the PFC operational
state on a per-interface basis. See “Disabling DCBX to Disable PFC
Autonegotiation on EX Series Switches (CLI Procedure)” on page 44.
• However, the switches do support the ETS Recommendation TLV. The ETS
Recommendation TLV communicates the ETS settings that the switch wants the
connected DCBX peer interface to use.
• If the peer interface is willing, it changes its configuration to match the configuration
in the ETS Recommendation TLV sent by the switch (group 7).
• The switch also advertises that it is not willing to change its ETS settings.
• The advertisement of ETS TLV is enabled by default for DCBX interfaces. If you want,
you can disable this advertisement. See “Disabling the ETS Recommendation TLV”
on page 48.
• A default FCoE forwarding class—The switch does not have a default FCoE forwarding
class with default mapping to a priority queue for FCoE traffic.
Data center bridging (DCB) is a set of enhancements to the IEEE 802.1 bridge
specifications. DCB modifies and extends Ethernet behavior to support I/O convergence
in the data center. I/O convergence includes but is not limited to the transport of Ethernet
LAN traffic and Fibre Channel (FC) storage area network (SAN) traffic on the same
physical Ethernet network infrastructure.
A converged architecture saves cost by reducing the number of networks and switches
required to support both types of traffic, reducing the number of interfaces required,
reducing cable complexity, and reducing administration activities.
You can use DCB features on Juniper Networks EX4500 CEE-enabled switches to
transport converged Ethernet and FC traffic while providing the class-of-service (CoS)
characteristics and other characteristics FC requires for transmitting storage traffic.
• High-bandwidth interface
• A flow control mechanism called priority-based flow control (PFC, described in IEEE
802.1Qbb) to help provide lossless transport.
NOTE: The switches support the DCBX standards and PFC, but do not support
enhanced transmission selection (ETS) and quantized congestion notification
(QCN).
Physical Interfaces
The switches provide the high-bandwidth interfaces (10-Gigabit Ethernet interfaces)
required to support DCB and converged traffic. Your switch can have both 1-gigabit and
10-gigabit interfaces, depending on the configuration. DCBX works only on 10-gigabit,
full-duplex interfaces. However, LLDP and DCBX are enabled by default on all the
interfaces.
DCBX
DCB devices use DCBX to exchange configuration information with directly connected
peers (switches and data center devices such as servers). DCBX is an extension of LLDP.
See “Understanding Data Center Bridging Capability Exchange Protocol for EX Series
Switches” on page 10 for details.
Lossless Transport
FC traffic requires lossless transport (defined as no frames dropped because of
congestion). Standard Ethernet does not support lossless transport, but the DCB
extensions to Ethernet along with proper buffer management enable an Ethernet network
to provide the level of CoS necessary to transport FC frames encapsulated in Ethernet
over an Ethernet network.
This section describes these factors in creating lossless transport over Ethernet:
• PFC on page 15
• Buffer Management on page 15
PFC
PFC is a link-level flow control mechanism similar to Ethernet PAUSE (described in IEEE
802.3x). Ethernet PAUSE stops all traffic on a link for a specified period of time. PFC
allows you to assign special priority to a specific traffic class for a specified period of time
without stopping the traffic assigned to other priorities on the link. You assign this priority
by using a congestion notification profile.
The switches support up to six traffic classes and allow you to associate those classes
with six different congestion notification profiles.
PFC enables you to provide lossless transport for traffic assigned to use the PFC
congestion notification profile and to use standard Ethernet transport for the rest of the
link traffic.
Buffer Management
Buffer management is critical to the proper functioning of PFC, because if buffers are
allowed to overflow, frames are dropped and transport is not lossless.
For each lossless flow priority, the switch requires sufficient buffer space to:
• Store frames sent during the time it takes to send the PFC PAUSE across the cable
between devices
• Store frames that are already on the wire when the sender receives the PFC PAUSE
The amount of buffer space needed to prevent frame loss due to congestion depends
on the cable length, cable speed, and processing speed.
The switch automatically sets the threshold for sending a PFC PAUSE frame to
accommodate delay from cables as long as 984 feet (300 meters) and to accommodate
large frames that might be on the wire when the switch sends the PAUSE. This ensures
that the switch sends PAUSEframes early enough to allow the sender to stop transmitting
before the receive buffers on the switch overflow.
Related • Understanding Data Center Bridging Capability Exchange Protocol for EX Series
Documentation Switches on page 10
Data Center Bridging Capability Exchange protocol (DCBX) discovers the data center
bridging (DCB) capabilities of connected peers. DCBX also advertises the capabilities of
applications on interfaces by exchanging application protocol information through
application type, length, and value (TLV) elements. DCBX is an extension of Link Layer
Discovery Protocol (LLDP). LLDP must remain enabled on every interface on which you
want to use DCBX.
NOTE: LLDP and DCBX are enabled by default on all 10-Gigabit Ethernet
interfaces of EX4500 CEE-enabled switches.
• Configuring the fcoe forwarding class for IEEE 802.1p code point 011
We recommend that you use code point 011 for the fcoe forwarding class, because this
is the conventional IEEE 802.1p code point for FCoE traffic. We recommend that you
configure PFC to use the same code point. See “Example: Configuring an FCoE Transit
Switch” on page 21.
• Defining applications
• Configuring classifiers to prioritize incoming traffic map and map the incoming traffic
to the application by the traffic code points
Except for FCoE applications, you must explicitly define and map all applications that
you want an interface to advertise.
Applications
Before an interface can exchange application protocol information, you must define the
applications that you want to advertise, except for the FCoE application, which is defined
by default. You can define:
The EtherType is a two-octet field in the Ethernet frame that denotes the protocol
encapsulated in the frame. For a list of common EtherTypes, see
http://standards.ieee.org/develop/regauth/ethertype/eth.txt on the IEEE standards
organization website. For a list of port numbers and protocols, see the Service Name and
Transport Protocol Port Number Registry at
http://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xml
on the Internet Assigned Numbers Authority (IANA) website.
Application Maps
An application map maps defined applications to one or more IEEE 802.1p code points.
Each application map contains one or more applications. DCBX includes the configured
application code points in the protocol TLVs exchanged with the connected peer.
To exchange protocol TLVs for an application, you must include the application in an
application map (with the exception of the FCoE application).
• Maps incoming traffic with the same code points to that application.
• Allows you to configure classifiers that map incoming application traffic, by code point,
to a forwarding class and a loss priority to apply class of service (CoS) to application
traffic and prioritize application traffic.
map that you apply to the interface (except the FCoE application). Do not explicitly
configure an FCoE application map, because doing that generates a commit error.
When you map an application to an IEEE 802.1p code point in an application map and
apply the application map to an interface, incoming traffic on the interface that matches
the application code points is mapped to the appropriate application. The application
receives the loss priority and the CoS associated with the forwarding class for those code
points, and its trafffic is placed in the output queue associated with the forwarding class.
You can use the default classifier or you can configure a classifier to map the application
code points defined in the application map to forwarding classes and loss priorities.
Traffic for the FCoE application is classified and prioritized by your configuration of the
fcoe forwarding class.
• A classifier
See “Defining an Application for DCBX Application Protocol TLV Exchange” on page 45
and “Configuring an Application Map for DCBX Application Protocol TLV Exchange” on
page 46.
Related • Understanding Data Center Bridging Capability Exchange Protocol for EX Series
Documentation Switches on page 10
Configuration
• Configuration Examples on page 21
• Configuration Tasks on page 39
• Configuration Statements on page 51
Configuration Examples
You can use an EX4500 CEE-enabled switch as a Fibre Channel over Ethernet (FCoE)
transit switch, enabling it to transport both FCoE and Ethernet LAN traffic. Using the
same switch to support both your storage network and traditional IP-based data
communications reduces the costs of powering, cooling, provisioning, maintaining, and
managing your network.
• The FCoE forwarding class for the DCBX application protocol type, length, value (TLV)
exchange
• Enlarged maximum transmission unit (MTU) size for handling FCoE traffic
• Requirements on page 21
• Overview and Topology on page 22
• Configuration on page 24
• Verification on page 30
Requirements
This example uses the following hardware and software components:
• Configured the VLAN fcoe-vlan on the switch. See Configuring VLANs for EX Series
Switches (CLI Procedure).
FIP snooping is disabled by default. You enable FIP snooping on a per-VLAN basis for
VLANs that carry FCoE traffic. Ensure that a VLAN that carries FCoE traffic carries only
FCoE traffic, because enabling FIP snooping denies access for all other Ethernet traffic.
This example shows how to configure FIP snooping on a VLAN of the EX4500 switch
that is connected with one ENode, that is, a server equipped with converged network
adapters (CNAs). The setup for this example includes the VLAN fcoe-vlan on the switch.
This example also shows how to configure PFC on the interfaces that are being used for
FCoE traffic and how to configure an FCoE trusted port to handle traffic between the
switch and the FCF gateway to the storage area network (SAN).
You must configure PFC properties for the interfaces that are carrying FCoE traffic,
because flow control must be implemented on the link level for this type of traffic.
You configure trunk interfaces that connect to the FCF as trusted interfaces. The switch
must use the same FCoE MAC Address Prefix (FC-MAP) value that is being used by the
FCF. Therefore, if the FCF is using a nondefault FC-MAP value, you must configure the
FC-MAP value on the switch to match that value.
You must also enlarge the MTU size for all interfaces (both access and trunk) that are
handling FCoE traffic to accommodate the maximum FC frame and Ethernet header
sizes.
This example also includes configuring the fcoe forwarding class to be used for the FCoE
traffic, so that it can take advantage of DCBX support for the Application Protocol TLV
Exchange. See “Understanding Data Center Bridging Capability Exchange Protocol for
EX Series Switches” on page 10 for additional information.
NOTE: Configuring and applying PFC and a forwarding class fcoe on the
DCBX interfaces automatically enables the DCBX FCoE application protocol
exchange on those interfaces. Do not explicitly configure an FCoE application
map, because doing that generates a commit error. See “Understanding Data
Center Bridging Capability Exchange Protocol for EX Series Switches” on
page 10 for additional information.
• Configure the PFC congestion notification profile for the same 802.1p code
points that you are using for the fcoe forwarding class. We recommend
code point 011, because this is the conventional IEEE 802.1p code point for
FCoE traffic.
• Configure at least 20 percent of the buffer for the queue that is using PFC.
• Do not specify the exact option when configuring the buffer for the queue
that is using PFC.
• Configure the loss-priority statement to low for a traffic class that is using
PFC.
The components of the topology for this example are shown in Table 4 on page 23.
Properties Settings
Switch hardware One EX4500 CEE-enabled switch
Properties Settings
PFC interfaces xe-0/0/1
xe-0/0/2
xe-0/0/3
xe-0/0/30
xe-0/0/2
xe-0/0/3
xe-0/0/30
• The port connecting the switch to the FCF is configured as a trunk port.
Configuration
To configure an FCoE transit switch, perform these tasks:
CLI Quick To quickly configure an FCoE transit switch, copy the following commands and paste
Configuration them into the switch terminal window:
[edit]
set ethernet-switching-options secure-access-port vlan fcoe-vlan examine-fip fc-map 0x0EFC03
set ethernet-switching-options secure-access-port interface xe-0/0/30 fcoe-trusted
set interfaces xe-0/0/1 ether-options no-flow-control
set interfaces xe-0/0/2 ether-options no-flow-control
set interfaces xe-0/0/3 ether-options no-flow-control
set interfaces xe-0/0/30 ether-options no-flow-control
set class-of-service congestion-notification-profile cn-profile input ieee-802.1 code-point 011 pfc
set class-of-service interfaces xe-0/0/1 congestion-notification-profile cn-profile
set class-of-service interfaces xe-0/0/2 congestion-notification-profile cn-profile
set class-of-service interfaces xe-0/0/3 congestion-notification-profile cn-profile
set class-of-service interfaces xe-0/0/30 congestion-notification-profile cn-profile
set class-of-service classifiers ieee-802.1 pfc-class import default
set class-of-service classifiers ieee-802.1 pfc-class forwarding-class fcoe loss-priority low
code-points 011
set class-of-service interfaces xe-0/0/1 unit 0 classifiers ieee-802.1 pfc-class
set class-of-service interfaces xe-0/0/2 unit 0 classifiers ieee-802.1 pfc-class
set class-of-service interfaces xe-0/0/3 unit 0 classifiers ieee-802.1 pfc-class
set class-of-service interfaces xe-0/0/30 unit 0 classifiers ieee-802.1 pfc-class
set class-of-service forwarding-classes class fcoe queue-num 3
set class-of-service schedulers pfc-sched buffer-size percent 25
set class-of-service schedulers default-sched buffer-size percent 17
NOTE: The ENode and the switch must use the same traffic class for
the FCoE traffic. DCBX advertises the traffic class being used by the
switch and detects the traffic class being used by the ENode. If there is
a mismatch, the switch disables the PFC capability of the switch
interface.
[edit class-of-service]
user@switch# set congestion-notification-profile cn-profile input ieee-802.1 code-point
011 pfc
4. Disable standard flow control on the interfaces that you want to use for the FCoE
VLAN.
NOTE: PFC and standard flow control cannot be enabled on the same
interface, and you must use PFC for FCoE traffic.
[edit interfaces]
user@switch# set xe-0/0/1 ether-options no-flow-control
user@switch# set xe-0/0/2 ether-options no-flow-control
user@switch# set xe-0/0/3 ether-options no-flow-control
user@switch# set xe-0/0/30 ether-options no-flow-control
5. Bind the congestion notification profile to all interfaces of the FCoE VLAN:
[edit class-of-service]
user@switch# set interface xe-0/0/1 congestion-notification-profile cn-profile
user@switch# set interface xe-0/0/2 congestion-notification-profile cn-profile
user@switch# set interface xe-0/0/3 congestion-notification-profile cn-profile
user@switch# set interface xe-0/0/30 congestion-notification-profile cn-profile
6. Create a CoS classifier for the fcoe forwarding class:
[edit class-of-service]
user@switch# set forwarding-classes fcoe queue-num 3
7. Configure this forwarding class (fcoe) to use a low loss priority value and to use the
same code point that is used for PFC:
NOTE: We recommend that you use code point 011, because this is the
conventional IEEE 802.1p code point for FCoE traffic.
[edit class-of-service]
user@switch# set classifiers ieee-802.1 pfc-class forwarding-class fcoe loss-priority low
code-points 011
8. Bind the pfc-class classifier to all interfaces of the FCoE VLAN:
[edit class-of-service]
user@switch# set interfaces xe-0/0/1 unit 0 classifiers ieee-802.1 pfc-class
user@switch# set interfaces xe-0/0/2 unit 0 classifiers ieee-802.1 pfc-class
user@switch# set interfaces xe-0/0/3 unit 0 classifiers ieee-802.1 pfc-class
user@switch# set interfaces xe-0/0/30 unit 0 classifiers ieee-802.1 pfc-class
9. Assign forwarding-class fcoe to an egress queue:
[edit class-of-service]
user@switch# set forwarding-classes fcoe queue-num 3
10. Set a scheduler for this queue, allocating at least 20 percent of the buffer to
pfc-sched:
[edit class-of-service]
user@switch# set schedulers pfc-sched buffer-size percent 25
11. Set a scheduler for the default queue, allocating 17 percent of the buffer to that
queue:
[edit class-of-service]
uuser@switch# set schedulers default-sched buffer-size percent 17
12. Configure a scheduler map (pfc-map) that associates the scheduler (pfc-sched)
with the fcoe forwarding class and associates the default forwarding classes
(assured-forwarding, best-effort and network-control) with the default schedule:
[edit class-of-service]
user@switch# set scheduler-maps pfc-map forwarding-class fcoe scheduler pfc-sched
user@switch# set scheduler-maps pfc-map forwarding-class assured-forwarding
schedulerdefault-sched
user@switch# set scheduler-maps pfc-map forwarding-class best-effort scheduler
default-sched
user@switch# set scheduler-maps pfc-map forwarding-class network-control scheduler
default-sched
user@switch# set scheduler-maps pfc-map forwarding-class expedited-forwarding
scheduler default-sched
13. Assign the scheduler map (pfc-map) to the FCF-facing interface (xe-0/0/30):
[edit class-of-service]
user@switch# set interfaces xe-0/0/30 scheduler-map pfc-map
14. Enlarge the MTU size to 2500 bytes for all the interfaces (both access and trunk)
that are handling FCoE traffic:
[edit interfaces]
user@switch# set xe-0/0/1 mtu 2500
user@switch# set xe-0/0/2 mtu 2500
user@switch# set xe-0/0/3 mtu 2500
user@switch# set xe-0/0/30 mtu 2500
interfaces {
xe-0/0/1 {
mtu 2500;
ether-options {
no-flow-control;
}
unit 0 {
family ethernet-switching {
vlan {
members fcoe-vlan;
}
}
}
}
xe-0/0/2 {
mtu 2500;
ether-options {
no-flow-control;
}
unit 0 {
family ethernet-switching {
vlan {
members fcoe-vlan;
}
}
}
}
xe-0/0/3 {
mtu 2500;
ether-options {
no-flow-control;
}
unit 0 {
family ethernet-switching {
vlan {
members fcoe-vlan;
}
}
}
}
xe-0/0/30 {
mtu 2500;
ether-options {
no-flow-control;
}
unit 0 {
family ethernet-switching {
port-mode trunk;
vlan {
members fcoe-vlan;
}
}
}
}
}
class-of-service {
classifiers {
ieee-802.1 pfc-class {
import default;
forwarding-class fcoe {
loss-priority low code-points 011;
}
forwarding-classes {
class fcoe queue-num 3;
}
congestion-notification-profile {
cn-profile {
input {
ieee-802.1 {
code-point 011 {
pfc;
}
}
}
}
}
interfaces {
xe-0/0/1 {
congestion-notification-profile cn-profile;
unit 0 {
classifiers {
ieee-802.1 pfc-class;
}
}
}
xe-0/0/2 {
congestion-notification-profile cn-profile;
unit 0 {
classifiers {
ieee-802.1 pfc-class;
}
}
xe-0/0/3 {
congestion-notification-profile cn-profile;
unit 0 {
classifiers {
ieee-802.1 pfc-class;
}
}
}
xe-0/0/30 {
congestion-notification-profile cn-profile;
scheduler-map pfc-map;
unit 0 {
classifiers {
ieee-802.1 pfc-class;
}
}
}
scheduler-maps {
pfc-map {
forwarding-class fcoe scheduler pfc-sched;
forwarding-class assured-forwarding scheduler default-sched;
forwarding-class best-effort scheduler default-sched;
forwarding-class network-control scheduler default-sched;
forwarding-class expedited-forwarding scheduler default-sched;
}
}
schedulers {
pfc-sched {
buffer-size percent 25;
}
default-sched {
buffer-size percent 17;
}
}
}
}
ethernet-switching-options {
secure-access-port {
interface xe-0/0/30.0 {
fcoe-trusted;
}
vlan fcoe-vlan {
examine-fip {
fc-map 0x0EFC03;
}
}
}
}
Verification
Confirm that the configuration of the FCoE transit switch is working properly:
Purpose Verify that FIP snooping is being implemented on the appropriate VLAN.
Meaning The output for this VLAN (fcoe-vlan) includes the FC MAP value that you configured. It
shows the MAC addresses of the FCF and the ENode that are transmitting FCoE traffic
through the switch.
Verifying That PFC is Enabled, That the FCoE Application Is Advertised, and That
the Switch Interface and DCB Peer Are Using the Same 802.1p Code Points
Purpose Verify that PFC is enabled on the local switch interface and on the peer interface, and
that the local interface and the peer interface are using the same code point.
Display the DCBX information advertised by the configured CoS forwarding class interface
(xe-0/0/30) and detected by the switch:
Interface : xe-0/0/30.0
Protocol-State: in-sync
Local-Advertisement:
Operational version: 0
sequence-number: 1, acknowledge-id: 1
Peer-Advertisement:
Operational version: 0
sequence-number: 1, acknowledge-id: 1
Local-Advertisement:
Enable: Yes, Willing: No, Error: No
Maximum Traffic Classes capable to support PFC: 6
Peer-Advertisement:
Enable: Yes, Willing: No, Error: No
Maximum Traffic Classes capable to support PFC: 6
Local-Advertisement:
Peer-Advertisement:
Meaning PFC is a requirement for transmitting FCoE traffic and PFC works only when the local
and peer devices are both enabled for PFC and are both using the same traffic class
(code point) for transmitting the PFC traffic.
In the output for Feature: PFC, check the status of Local-Advertisement to verify that PFC
is enabled. If DCBX detects a misconfiguration with the DCB peer, it disables the PFC
capability. In this example, the PFC Operational State is enabled, because PFC is configured
symmetrically on the switch and the DCB peer. Both devices are using code point 011 for
forwarding the traffic.
If the results show that PFC is disabled, you van use the information provided by this
command to reconfigure the congestion notification profile to match the code point
being used for PFC by the peer device. See “Configuring Priority-Based Flow Control for
an EX Series Switch (CLI Procedure)” on page 41.
Appl-Name shows the default FCoE application. The FCoE application always indicates
Ethernet-Type 0x8906. The Priority-Map for the FCoE application shows the 8-bit format
of the code-point setting that was specified for the PFC congestion notification profile.
In this case, the three bit code point is 3, 011. So the Priority-Map for the default FCoe
application is 00001000.
The fcoe forwarding-class and PFC were configured; and the configuration of the
application on the switch and on the DCB are synchronized. Therefore, the Status of the
FCoE application is Enabled.
If the configuration of the FCoE application on the switch did not match the FCoE
application of the DCB peer, the status of the application would appear as Disabled.
Data Center Bridging Capability Exchange protocol (DCBX) support for the application
protocol type, length, and value (TLV) enables you to implement DCBX for various Layer
2 and Layer 4 applications. Internet small computer system interface (iSCSI) is a Layer
4 storage application that can benefit from DCBX. Implementing iSCSI over data center
bridging (DCB) reduces latency in networks that are oversubscribed and provides a
predictable and certain application responsiveness, eliminating Ethernet’s dependence
on TCP/IP for the retransmission of dropped Ethernet frames. Although DCBX is not a
requirement for such applications, it adds the reliability required for enterprise data
storage.
NOTE: You can configure and apply priority flow control (PFC) for any DCBX
interfaces, but it is not a requirement for applications other than Fiber Channel
over Ethernet (FCoE).
• Requirements on page 33
• Overview and Topology on page 33
• Configuration on page 34
• Verification on page 35
Requirements
This example uses the following hardware and software components:
The switch supports DCBX information exchange for other applications, such as iSCSI,
as specified in your configuration by EtherType or by the destination port and protocol.
To take advantage of this feature for non-FCoE applications, you must configure the
application and application map and associate the application map with the interface
that is carrying the application’s traffic. This configuration includes specifying the 802.1
code points to be used for this application.
When you configure an iSCSI application, you must always designate destination-port
3260.
This example shows how to configure an iSCSI application on a DCBX interface of the
EX4500 switch that is connected to an iSCSI storage device.
The components of the topology for this example are shown in Table 5 on page 34.
Properties Settings
Switch hardware One EX4500 switch (CEE capable model)
Application iSCSI
Configuration
To configure DCBX to support an iSCSI application, perform these tasks:
CLI Quick To quickly configure a DCBX interface for an iSCSI application, copy the following
Configuration commands and paste them into the switch terminal window:
[edit]
set applications application iscsi protocol tcp destination-port 3260
set policy-options application-maps iscsi-map application iscsi code-points 101
set protocols dcbx interface xe-0/0/37 application-map iscsi-map
[edit policy-options]
user@switch# set application-maps iscsi-map application iscsi code-points 101
3. Apply the application map to the DCBX interface that you want to use for iSCSI:
[edit protocols]
user@switch# set dcbx interface xe-0/0/37 application-map iscsi-map
Verification
To confirm that the configuration is working properly:
• Verifying That the iSCSI Application Is Advertised and That the Switch Interface and
DCB Peer Are Using the Same 802.1p Code Points on page 35
Verifying That the iSCSI Application Is Advertised and That the Switch Interface
and DCB Peer Are Using the Same 802.1p Code Points
Purpose Verify that both the switch and the DCB peer are using a DCBX iSCSI application
configured for the same 802.1p code points.
Action Send some requests from the switch to the DCB peer.
Display the DCBX information advertised by DCBX interface (xe-0/0/37) and detected
by the switch:
Interface : xe-0/0/37.0
Protocol-State: in-sync
Active-application-map: iscsi-map
Local-Advertisement:
Operational version: 0
sequence-number: 1, acknowledge-id: 1
Peer-Advertisement:
Operational version: 0
sequence-number: 1, acknowledge-id: 1
Local-Advertisement:
Enable: Yes, Willing: No, Error: No
Maximum Traffic Classes capable to support PFC: 6
Peer-Advertisement:
Enable: Yes, Willing: No, Error: No
Maximum Traffic Classes capable to support PFC: 6
Local-Advertisement:
Peer-Advertisement:
Meaning Check the status for Local-Advertisement in the section Feature: Application.
If there is misconfiguration between the switch and the DCB peer, the status displays
Error: Yes.
In this example, there is no error. The output for Feature: Application, Protocol-State,
displays a list of DCBX applications under Appl-Name.
This field displays information for the user-configured application iscsi. When you configure
an iSCSI application, you must always designate the destination port as 3260. The output
displays this as the Socket-Number .
The Priority-Map for the iSCSI application reflects the 802.1p code points that were
specified in this example for the iSCSI-map. The example specified 101 for the iSCSI
application map code points. The Priority-Map is an 8-bit code point format of the 802.1p
code points; thus, 0010000.
The Status of the iSCSI application is Enabled, because the switch and the DCB are using
the same code points for the iSCI application.
Configuration Tasks
VN2VF_Port FIP snooping is disabled by default. You enable VN2VF_Port FIP snooping
on a per-VLAN basis for VLANs that carry FCoE traffic. Ensure that a VLAN that carries
FCoE traffic carries only FCoE traffic, because enabling VN2VF_Port FIP snooping denies
access for all other Ethernet traffic.
NOTE: All of the transit switch ports are untrusted by default. If an ENode
on an FCoE device logs in to an FCF before you enable VN2VF_Port FIP
snooping on the VLAN and you then enable VN2VF_Port FIP snooping, the
transit switch denies traffic from the ENode because the transit switch has
not snooped (learned) the ENode state. The following process automatically
logs the ENode back in to the FCF to reestablish the connection:
2. The switch denies existing connections between servers and the FCF on
the FCoE VLAN by filtering the FCoE traffic and FIP traffic, so no keepalive
messages from the ENodes reach the FCF.
3. The FCF port timer for each ENode and for each VN_Port on each ENode
expires.
4. The FCF sends each ENode whose port timer has expired a Clear Virtual
LInks (CVL) message.
Because the FCF is a trusted source, you configure interfaces that connect to the FCF as
trusted interfaces. VN2VF_Port FIP snooping continues to run on trusted interfaces so
that the switch learns the FCF state.
Optionally, you can specify an FC-MAP value for each FCoE VLAN. On a given FCoE VLAN,
the switch learns only FCFs that have a matching FC-MAP value. The default FC-MAP
value is 0EFC00h for all FC devices. (Enter hexadecimal values for FC-MAP preceded
by the hexadecimal indicator “0x”—for example, 0x0EFC00.) If you change the FC-MAP
value of an FCF, change the FC-MAP value for the FCoE VLAN it belongs to on the switch
and on the servers you want to communicate with the FCF. An FCoE VLAN can have one
and only one FC-MAP value.
• To enable VN2VF_Port FIP snooping on a single VLAN and specify the optional FC-MAP
value:
[edit ethernet-switching-options secure-access-port]
user@switch# set vlan vlan-name examine-fip fc-map fc-map-value
For example, to enable VN2VF_Port FIP snooping on a VLAN named san1_vlan and
change the FC-MAP value to 0x0EFC03:
NOTE: Changing the FC-MAP value causes all logins to drop and forces
ENodes to log in again.
• To enable VN2VF_Port FIP snooping on all VLANs and use the default FC-MAP value:
[edit ethernet-switching-options secure-access-port]
user@switch# set vlan all examine-fip
You can configure priority-based flow control (PFC) on EX4500 switches to apply
link-level flow control on a specific traffic class so that different types of traffic can
efficiently use the same network interface card (NIC). You must configure PFC for all
interfaces carrying Fibre Channel over Ethernet (FCoE) traffic. You can also configure
PFC on interfaces carrying other traffic types, such as Internet small computer system
interface (iSCSI) traffic. Using PFC is optional for traffic types other than FCoE.
NOTE:
• PFC is supported only on 10-Gigabit Ethernet interfaces.
• If you are using PFC for a non-FCoE DCBX application, use the same 802.1p
code points for the PFC congestion notification profile and for the
application map that is carrying that application traffic.
Data Center Bridging Capability Exchange protocol (DCBX) is enabled by default on all
10-Gigabit Ethernet interfaces on EX4500 switches. DCBX enables or disables PFC on
the local interface depending on whether the PFC configuration on that interface is the
same as the PFC configuration of the connected interface on the data center bridging
(DCB) peer.
• Configure at least 20 percent of the buffer for the queue that is using PFC.
• Do not specify the exact option when configuring the buffer for the queue
that is using PFC.
• Configure the loss-priority statement to low for a traffic class that is using
PFC.
• Verify that the PFC configurations of the local interfaces are the same as
the PFC configurations of the connected interfaces on the DCB peer. See
show dcbx neighbors.
To configure PFC:
1. Configure a congestion notification profile, specifying the name of the profile and
specifying the three-bit pattern of the User Priority bits in an incoming frame that will
trigger the priority-based flow control on that traffic class:
[edit class-of-service]
user@switch# set congestion-notification-profile profile-name input ieee-802.1 code-point
up-bits pfc
2. Disable standard Ethernet flow control on the interfaces that will be used for the
traffic class that you have selected for PFC:
[edit interfaces]
user@switch# set interface-name ether-options no-flow-control
NOTE: You cannot apply PFC to interfaces that are using standard Ethernet
flow control. You must first disable flow control on those interfaces.
3. Bind the congestion notification profile to the interfaces that will be used for the traffic
class that you have selected for PFC:
[edit class-of-service]
user@switch# set interfaces interface-name congestion-notification-profile profile-name
4. Create a CoS classifier for a traffic class that will use PFC:
[edit class-of-service]
user@switch# set classifiers ieee-802.1 classifier-name import default
5. Configure this traffic class (classifier-name) to use a user-defined or default forwarding
class with a low loss priority value and specify the 802.1p code points::
[edit class-of-service]
user@switch# set classifiers ieee-802.1 classifier-name forwarding-class class-name
loss-priority low code-points 3 bit-patterns
6. Bind the classifier-name classifier to all interfaces that require PFC:
[edit class-of-service]
user@switch# set interfaces interface-name unit logical-unit-number classifiers ieee-802.1
classifier-name
7. Assign the specified forwarding-class to an egress queue:
[edit class-of-service]
user@switch# set forwarding-classes class-name queue-number
8. Set a scheduler for this queue, allocating at least 20 percent of the buffer to be used
for FCoE traffic:
[edit class-of-service]
user@switch# set schedulers scheduler-name buffer-size percent
9. Set a scheduler to allocate buffer space for forwarding classes carrying other traffic:
NOTE: You must explicitly allocate some buffer space for the other
forwarding classes. The default allocation of buffer space for forwarding
classes is overridden when you manually configure the requisite amount
of buffer space for the FCoE traffic.
[edit class-of-service]
user@switch# set scheduler-name buffer-size percent
10. Configure a scheduler map that associates the specified scheduler with the specified
forwarding class:
[edit class-of-service]
user@switch# set scheduler-maps map-name forwarding-class class-name scheduler
scheduler-name
For example:
[edit class-of-service]
user@switch# set scheduler-maps pfc-map forwarding-class af2 scheduler pfc-sched
user@switch# set scheduler-maps pfc-map forwarding-class best-effort scheduler
default-sched user@switch# set scheduler-maps pfc-map forwarding-class network-control
scheduler default-sched
user@switch# set scheduler-maps pfc-map forwarding-class expedited-forwarding scheduler
default-sched
11. Assign the scheduler map to the egress interface:
[edit class-of-service]
user@switch# set interfaces interface-name scheduler-map pfc-map
As part of its autonegotiation capabilities, the Data Center Bridging Capability Exchange
protocol (DCBX) automatically does the following:
• Advertises the priority flow control (PFC) configuration of the local interfaces to directly
connected peers (switches and data center devices such as servers)
• Enables the local interface’s PFC capabilities if DCBX detects that the peer interface’s
PFC configuration is the same as the PFC configuration of the local interface.
• Disables the local interface’s PFC capabilities if DCBX detects that the peer interface’s
PFC configuration is not the same as the PFC configuration of the local interface.
• On an individual interface:
[edit protocols]
user@switch# set dcbx interface interface-name priority-flow-control no-auto-negotiation
• On all 10-Gigabit Ethernet interfaces:
[edit protocols]
user@switch# set dcbx interface all priority-flow-control no-auto-negotiation
You can disable the Data Center Bridging Capability Exchange protocol (DCBX)
Application Protocol exchange on a specific interface or on all interfaces.
To disable the DCBX application protocol exchange for any DCBX application, do the
following:
NOTE: If you disable the DCBX application protocol exchange, the show
dcbx neighbors command displays Feature: Application, Protocol-State:
not-applicable.
Define each application for which you want DCBX to exchange application protocol
information. You can define Layer 2 and Layer 4 applications. After you define applications,
you map them to IEEE 802.1p code points, and then apply the application map to the
interfaces on which you want DCBX to exchange application protocol information with
connected peers. (See Related Documentation for how to configure application maps
and apply them to interfaces, and for an example of the entire procedure that also includes
classifier configuration.)
• To define a Layer 2 application, specify the name of the application and its EtherType:
[edit applications]
user@switch# set application application-name ether-type ether-type
For example, to configure an application named PTP (for Precision Time Protocol)
that uses the EtherType 0x88F7:
• To define a Layer 4 application, specify the name of the application, its protocol (TCP
or UDP), and its destination port:
[edit]
user@switch# set applications application application-name protocol (tcp | udp)
destination-port port-value
For example, to configure an application named iscsi (for Internet Small Computer
System Interface) that uses the protocol TCP and the destination port 3260:
Related • Configuring an Application Map for DCBX Application Protocol TLV Exchange on
Documentation page 46
After you define applications for which you want to exchange DCBX application protocol
information, map the applications to IEEE 802.1p code points. The IEEE 802.1p code
points identify incoming traffic and allow you to map that traffic to the desired application.
You then apply the application map to the interfaces on which you want DCBX to
exchange application protocol information with connected peers. (See Related
Documentation for how to define applications and apply the application map to interfaces,
and for an example of the entire procedure that also includes classifier configuration.)
• To define an application map, specify the name of the application map, the name of
the application, and the IEEE 802.1p code points of the incoming traffic that you want
to associate with the application in the application map:
[edit policy-options]
user@switch# set application-maps application-map-name application application-name
code-points [ aliases ] [ bit-patterns ]
Related • Defining an Application for DCBX Application Protocol TLV Exchange on page 45
Documentation
• Applying an Application Map to an Interface for DCBX Application Protocol TLV
Exchange on page 47
After you define applications and map them to IEEE 802.1p code points in an application
map, apply the application map to the interfaces on which you want DCBX to exchange
the application protocol information with connected peers. (See Related Documentation
for how to define applications and configure application maps to interfaces, and for an
example of the entire procedure that also includes classifier configuration.)
• To apply an application map to a DCBX interface, specify the DCBX interface and the
application map name:
[edit protocols]
user@switch# set dcbx interface interface-name application-map application-map-name
Related • Defining an Application for DCBX Application Protocol TLV Exchange on page 45
Documentation
• Configuring an Application Map for DCBX Application Protocol TLV Exchange on
page 46
We recommend that you use the same ETS settings on the connected peer that you use
on the switch interface and that you leave the ETS Recommendation TLV enabled.
However, on interfaces that use IEEE DCBX as the DCBX mode, if you want an asymmetric
configuration between the switch interface and the connected peer, you can disable the
ETS Recommendation TLV.
NOTE: Disabling the ETS Recommendation TLV on interfaces that use DCBX
version 1.01 as the DCBX mode has no effect and does not change DCBX
behavior.
If you disable the ETS Recommendation TLV, the switch still sends the ETS Configuration
TLV to the connected peer. The result is that the connected peer is informed about the
switch DCBX ETS configuration, but even if the peer is “willing,” the peer does not change
its configuration to match the switch configuration. This is asymmetric configuration—the
two interfaces can have different parameter values for the ETS attribute.
• Understanding DCBX
Configuration Statements
This topic lists supported and unsupported configuration statements in the [edit
class-of-service] hierarchy level on EX Series switches.
• Supported statements are those that you can use to configure some aspect of a
software feature on the switch.
• Unsupported statements are those that appear in the command-line interface (CLI)
on the switch, but that have no effect on switch operation if you configure them.
• Not all features are supported on all switch platforms. For detailed information about
feature support on specific EX Series switch platforms, see EX Series Switch Software
Features Overview
class-of-service {
classifiers {
(dscp | dscp-ipv6 |ieee-802.1 | inet-precedence) classifier-name {
forwarding-class class-name {
loss-priority (high | low | medium-high | medium-low) {
code-points [ aliases ] [ 6 bit-patterns ];
}
}
import (classifier-name | default);
}
}
code-point-aliases {
(dscp | dscp-ipv6 | ieee-802.1 | inet-precedence) {
alias-name bits;
}
}
drop-profiles {
profile-name {
interpolate {
drop-probability [values];
fill-level [values]
}
}
}
forwarding-classes {
class class-name
queue queue-number;
}
interfaces interface-name {
scheduler-map map-name;
shaping-rate rate;
unit (logical-unit-number | * ) {
classifiers {
(dscp | dscp-ipv6|ieee-802.1 | inet-precedence) (classifier-name | default);
}
forwarding-class class-name ;
}
}
rewrite-rules {
(dscp | dscp-ipv6 | ieee-802.1 | inet-precedence) (rewrite-rule-name | default);
}
}
rewrite-rules {
(dscp | dscp-ipv6 | ieee-802.1 | inet-precedence ) rewrite-name {
import (default | rewrite-name);
forwarding-class class-name {
loss-priority (high | low | medium-high | medium-low) code-point (alias | bits);
}
}
}
scheduler-maps {
map-name {
forwarding-class class-name {
scheduler scheduler-name;
}
}
}
schedulers {
scheduler-name {
buffer-size (exact | percent percentage | remainder);
drop-profile-map {
loss-priority (any | high | medium-high | medium-low);
protocol any;
{
drop-profile profile-name
}
}
excess-rate {
percent percentage;
}
priority (low | strict-high);
shaping-rate (rate | percent percentage);
transmit-rate (EX Series Switches) (rate | percent percentage | remainder) ;
}
}
shared-buffer {
percent;
}
traceoptions {
file (file-name | files files | match match | no-world-readable | size size | world-readable);
flag ( all | asynch | chassis-scheduler | cos-adjustment | dynamic | hardware-database
| init | parse | performance-monitor | process | restart | route-socket | show | snmp |
util);
no-remote-trace;
}
tri-color;
}
• Defining CoS Classifiers (CLI Procedure) or Defining CoS Classifiers (J-Web Procedure)
• Defining CoS Forwarding Classes (CLI Procedure) or Defining CoS Forwarding Classes
(J-Web Procedure)
• Defining CoS Schedulers and Scheduler Maps (CLI Procedure) or Defining CoS Schedulers
(J-Web Procedure)
• Defining CoS Rewrite Rules (CLI Procedure) or Defining CoS Rewrite Rules (J-Web
Procedure)
This topic lists supported and unsupported configuration statements in the [edit
ethernet-switching-options] hierarchy level on EX Series switches.
• Supported statements are those that you can use to configure some aspect of a
software feature on the switch.
• Unsupported statements are those that appear in the command-line interface (CLI)
on the switch, but that have no effect on switch operation if you configure them.
• Not all features are supported on all switch platforms. For detailed information about
feature support on specific EX Series switch platforms, see EX Series Switch Software
Features Overview.
ethernet-switching-options {
analyzer {
name {
input {
egress {
interface (all | interface-name);
}
ingress {
interface (all | interface-name);
vlan (vlan-id | vlan-name);
}
}
loss-priority priority;
output {
interface interface-name;
vlan (vlan-id | vlan-name);
}
ratio number;
}
}
authentication-whitelist {
interface;
vlan-assignment;
}
bpdu-block {
disable-timeout timeout;
interface (all | [interface-name]) {
(disable | drop | shutdown);
}
}
dot1q-tunneling {
ether-type (0x8100 | 0x88a8 | 0x9100);
}
interfaces interface-name {
no-mac-learning;
}
mac-notification {
notification-interval seconds;
}
mac-table-aging-time seconds;
port-error-disable {
disable-timeout timeout;
}
redundant-trunk-group {
group name {
description;
interface interface-name {
primary;
}
preempt-cutover-timer seconds;
}
}
secure-access-port {
dhcp-snooping-file {
location local_pathname | remote_URL;
timeout seconds;
write-interval seconds;
}
interface (all | interface-name) {
allowed-mac {
mac-address-list;
}
(dhcp-trusted | no-dhcp-trusted );
fcoe-trusted;
mac-limit limit action action;
no-allowed-mac-log;
static-ip ip-address {
mac mac-address;
vlan vlan-name;
}
}
uac-policy;
}
vlan (all | vlan-name) {
(arp-inspection | no-arp-inspection );
dhcp-option82 {
disable;
circuit-id {
prefix hostname;
use-interface-description;
use-vlan-id;
}
remote-id {
prefix (hostname | mac | none);
use-interface-description;
use-string string;
}
vendor-id [string];
}
(examine-dhcp | no-examine-dhcp);
examine-fip {
fc-map fc-map-value;
}
(ip-source-guard | no-ip-source-guard);
mac-move-limit limit action action;
}
}
static {
vlan vlan-id {
mac mac-address next-hop interface-name;
}
}
storm-control {
action-shutdown;
interface (all | interface-name) {
bandwidth bandwidth;
multicast;
no-broadcast;
no-multicast;
no-registered-multicast;
no-unknown-unicast;
no-unregistered-multicast;
}
}
traceoptions {
file filename <files number> <no-stamp> <replace> <size size> <world-readable |
no-world-readable>;
flag flag <disable>;
}
unknown-unicast-forwarding {
vlan (all | vlan-name) {
interface interface-name;
}
}
voip {
interface (all | [interface-name | access-ports]) {
forwarding-class (assured-forwarding | best-effort | expedited-forwarding |
network-control);
vlan vlan-name;
}
}
}
This topic lists supported and unsupported configuration statements in the [edit protocols
dcbx] hierarchy level on EX Series switches.
• Supported statements are those that you can use to configure some aspect of a
software feature on the switch.
• Unsupported statements are those that appear in the command-line interface (CLI)
on the switch, but that have no effect on switch operation if you configure them.
• Not all features are supported on all switch platforms. For detailed information about
feature support on specific EX Series switch platforms, see EX Series Switch Software
Features Overview.
protocols {
dcbx {
disable;
interface (all | interface-name) {
application-map application-map-name;
applications {
fcoe {
no-auto-negotiation;
}
}
disable ;
priority-flow-control {
no-auto-negotiation;
}
}
}
}
NOTE: Variables, such as interface-name, are not shown in the statements or hierarchies.
application (Applications)
Release Information Statement introduced in Junos OS Release 12.1 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Related • Defining an Application for DCBX Application Protocol TLV Exchange on page 45
Documentation
• Example: Configuring DCBX Application Protocol TLV Exchange
Release Information Statement introduced in Junos OS Release 12.1 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Description Add an application to an application map and define the application’s code points.
Related • Configuring an Application Map for DCBX Application Protocol TLV Exchange on
Documentation page 46
applications (Applications)
Syntax applications {
application application-name {
destination-port port-value;
protocol (tcp | udp);
ether-type type;
}
}
Release Information Statement introduced in Junos OS Release 12.1 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Related • Defining an Application for DCBX Application Protocol TLV Exchange on page 45
Documentation
• Example: Configuring DCBX Application Protocol TLV Exchange
application-map
Release Information Statement introduced in Junos OS Release 12.1 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
application-maps
Release Information Statement introduced in Junos OS Release 12.1 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Description Define an application map by specifying the applications that belong to the application
map.
Related • Configuring an Application Map for DCBX Application Protocol TLV Exchange on
Documentation page 46
Release Information Statement introduced in Junos OS Release 10.4 for EX Series switches.
Description Configure the IEEE 802.1p (User Priority) code point bits as input for creating the
priority-based flow control (PFC) congestion notification profile, which you will associate
with a particular traffic class.
Release Information Statement introduced in Junos OS Release 12.1 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Description Define one or more code-point aliases or bit sets for an application.
Related • Configuring an Application Map for DCBX Application Protocol TLV Exchange on
Documentation page 46
Release Information Statement introduced in Junos OS Release 10.4 for EX Series switches.
Description (EX4500 and EX4550 switches only) Configure a congestion notification profile for
priority-based flow control (PFC).
NOTE: You must configure PFC for FCoE traffic. The interface where PFC is
enabled must be a 10-Gigabit Ethernet interface.
dcbx
Syntax dcbx {
disable;
interface (interface-name | all) {
disable;
application-map application-map-name;
applications {
no-auto-negotiation;
}
enhanced-transmission-selection {
no-auto-negotiation;
no-recommendation-tlv;
recommendation-tlv {
no-auto-negotiation;
}
}
dcbx-version (auto-negotiate | ieee-dcbx | dcbx-version-1.01);
priority-flow-control {
no-auto-negotiation;
}
}
}
Release Information Statement introduced in Junos OS Release 11.1 for the QFX Series.
Statement introduced in Junos OS Release 11.3 for EX Series switches.
mode and recommendation-tlv statements introduced in Junos OS Release 12.2 for the
QFX Series.
destination-port (Applications)
Release Information Statement introduced in Junos OS Release 12.1 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Description Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) destination port
number, which combines with protocol to identify an application type. The Internet
Assigned Numbers Authority (IANA) assigns port numbers. See the IANA Service Name
and Transport Protocol Port Number Registry at
http://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xml
for a list of assigned port numbers.
NOTE: To create an application for iSCSI, use the protocol tcp with the
destination port number 3260.
Related • Defining an Application for DCBX Application Protocol TLV Exchange on page 45
Documentation
• Example: Configuring DCBX Application Protocol TLV Exchange
disable (DCBX)
Syntax disable
Release Information Statement introduced in Junos OS Release 11.1 for the QFX Series.
Statement introduced in Junos OS Release 11.3 for EX Series switches.
Description Disable Data Center Bridging Capability Exchange protocol (DCBX) on one or more
10-Gigabit Ethernet interfaces.
ether-type
Release Information Statement introduced in Junos OS Release 12.1 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Description Two-octet field in an Ethernet frame that defines the protocol encapsulated in the frame
payload. See http://standards.ieee.org/develop/regauth/ethertype/eth.txt for a list of
Institute of Electrical and Electronics Engineers (IEEE) EtherTypes.
Related • Defining an Application for DCBX Application Protocol TLV Exchange on page 45
Documentation
• Example: Configuring DCBX Application Protocol TLV Exchange
ethernet-switching-options
Syntax ethernet-switching-options {
analyzer {
name {
loss-priority priority;
ratio number;
input {
ingress {
interface (all | interface-name);
vlan (vlan-id | vlan-name);
}
egress {
interface (all | interface-name);
}
}
output {
interface interface-name;
vlan (vlan-id | vlan-name) {
no-tag;
}
}
}
}
bpdu-block {
disable-timeout timeout;
interface (all | [interface-name]) {
(disable | drop | shutdown);
}
}
dot1q-tunneling {
ether-type (0x8100 | 0x88a8 | 0x9100);
}
interfaces interface-name {
no-mac-learning;
}
mac-notification {
notification-interval seconds;
}
mac-table-aging-time seconds;
nonstop-bridging;
port-error-disable {
disable-timeout timeout;
}
redundant-trunk-group {
group name {
interface interface-name <primary>;
interface interface-name;
}
}
secure-access-port {
dhcp-snooping-file {
location local_pathname | remote_URL;
timeout seconds;
write-interval seconds;
}
interface (all | interface-name) {
allowed-mac {
mac-address-list;
}
(dhcp-trusted | no-dhcp-trusted);
fcoe-trusted;
mac-limit limit action action;
no-allowed-mac-log;
persistent-learning;
static-ip ip-address {
vlan vlan-name;
mac mac-address;
}
}
vlan (all | vlan-name) {
(arp-inspection | no-arp-inspection) [
forwarding-class class-name;
}
dhcp-option82 {
circuit-id {
prefix hostname;
use-interface-description;
use-vlan-id;
}
remote-id {
prefix hostname | mac | none;
use-interface-description;
use-string string;
}
vendor-id [string];
}
(examine-dhcp | no-examine-dhcp) {
forwarding-class class-name;
}
examine-fip {
fc-map fc-map-value;
}
(ip-source-guard | no-ip-source-guard);
mac-move-limit limit action action;
}
static {
vlan name {
mac mac-address {
next-hop interface-name;
}
}
}
storm-control {
action-shutdown;
interface (all | interface-name) {
bandwidth bandwidth;
level level;
multicast;
no-broadcast;
no-multicast;
no-registered-multicast;
no-unknown-unicast;
no-unregistered-multicast;
}
}
traceoptions {
file filename <files number> <no-stamp> <replace> <size size> <world-readable |
no-world-readable>;
flag flag <disable>;
}
unknown-unicast-forwarding {
vlan (all | vlan-name) {
interface interface-name;
}
}
voip {
interface (all | [interface-name | access-ports]) {
vlan vlan-name ;
forwarding-class (assured-forwarding | best-effort | expedited-forwarding |
network-control);
}
}
}
Release Information Statement introduced in Junos OS Release 9.0 for EX Series switches.
• Understanding BPDU Protection for STP, RSTP, and MSTP on EX Series Switches
examine-fip
Syntax examine-fip {
examine-vn2vn {
beacon-period milliseconds;
}
fc-map fc-map-value;
}
Release Information Statement introduced in Junos OS Release 10.4 for EX Series switches.
Statement introduced in Junos OS Release 11.1 for the QFX Series.
Statement examine-vn2vn introduced in Junos OS Release 12.2 for the QFX Series.
Description Enable FIP snooping on a specified VLAN. Ensure that the VLAN is a dedicated FCoE
VLAN that transports only FCoE traffic.
(QFX Series only) Enable VN_Port to VN_Port (VN2VN_Port) FIP snooping on a specified
VLAN. The VLAN must be a dedicated FCoE VLAN that transports only VN2VN_Port
traffic. One FCoE VLAN cannot support both VN_Port to VF_Port (VN2VF_Port) FIP
snooping and VN2VN_Port FIP snooping. Configure separate, dedicated FCoE VLANs for
VN2VN_Port FIP snooping and VN2VN_Port FIP snooping.
fc-map
Hierarchy Level [edit ethernet-switching options secure-access-port vlan (all | vlan-name) examine-fip]
Release Information Statement introduced in Junos OS Release 10.4 for EX Series switches.
Statement introduced in Junos OS Release 11.1 for the QFX Series.
Description Set the FCoE mapped address prefix (FC-MAP) value for the FCoE VLAN to match the
FC switch (or FCoE forwarder) FC-MAP value for the FC fabric. The FC-MAP value is a
unique MAC address prefix an FC switch uses to identify FCoE traffic for a given FC fabric
(traffic on a particular FCoE VLAN).
You can configure the FC-MAP value or use the default value. The FC switch provides
the FC-MAP value to FCoE nodes (ENodes) in the FIP discovery advertisement message.
If the EX Series switch or the QFX Series FCoE VLAN FC-MAP value does not match the
FC switch FC-MAP value, neither device discovers the FC switch on that VLAN, and the
ENodes on that VLAN cannot access the FC switch. The FC switch accepts only FCoE
traffic that uses the correct FC-MAP value as part of the VN_Port MAC address.
When the QFX Series acts as an FCoE-FC gateway, the FC-MAP value for the gateway
and the FCoE devices must match the FC switch FC-MAP value in order to communicate
with the FC switch.
NOTE: Changing the FC-MAP value causes all logins to drop and forces the
ENodes to log in again.
fcoe
Syntax fcoe {
no-auto-negotiation;
}
Release Information Statement introduced in Junos OS Release 11.1 for the QFX Series.
Statement introduced in Junos OS Release 12.1 for the EX Series switches.
Description Disable advertising the FCoE state of the interface to the peer. To disable FCoE on the
interface, do not configure the FCoE forwarding class on the interface.
fcoe-trusted
Syntax fcoe-trusted;
Release Information Statement introduced in Junos OS Release 10.4 for EX Series switches.
Statement introduced in Junos OS Release 11.1 for the QFX Series.
Statement introduced for the FC fabric in Junos OS Release 11.3 for the QFX Series.
Description Configure the specified 10-Gigabit Ethernet interface to trust Fibre Channel over Ethernet
(FCoE) traffic. If an interface is connected to another switch such as an FCoE forwarder
(FCF) or a transit switch, you can configure the interface as trusted so that the interface
forwards FCoE traffic from the switch to the FCoE devices without installing FIP snooping
filters.
(QFX Series only) Configure the specified local Fibre Channel fabric to trust FCoE traffic
on all ports in the fabric. Changing the fabric ports from untrusted to trusted removes
any existing FIP snooping filters from the ports. Changing the fabric ports from trusted
to untrusted by removing the fcoe-trusted configuration from the fabric forces all of the
FCoE sessions on those ports to log out so that when the ENodes and VN_Ports log in
again, the switch can build the appropriate FIP snooping filters.
Syntax ieee-802.1 {
code-point up-bits pfc ;
}
Release Information Statement introduced in Junos OS Release 10.4 for EX Series switches.
Description Set an association between the traffic class and the congestion notification profile.
Syntax input {
ieee-802.1 {
code-point up-bits pfc ;
}
}
Release Information Statement introduced in Junos OS Release 10.4 for EX Series switches.
Description Identify the three-bit pattern of the User Priority field that triggers the priority-based
congestion notification profile for a specified traffic class.
Release Information Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description Apply port security features to all interfaces or to the specified interface.
• Example: Configuring MAC Limiting, Including Dynamic and Allowed MAC Addresses, to
Protect the Switch from Ethernet Switching Table Overflow Attacks
• Example: Configuring MAC Limiting to Protect the Switch from DHCP Starvation Attacks
• Example: Configuring a DHCP Server Interface as Untrusted to Protect the Switch from
Rogue DHCP Server Attacks
• Configuring Static IP Addresses for DHCP Bindings on Access Ports (CLI Procedure)
interface (DCBX)
Release Information Statement introduced in Junos OS Release 11.1 for the QFX Series.
Statement introduced in Junos OS Release 11.3 for the EX Series switches.
Mode and recommendation-tlv statements introduced in Junos OS Release 12.2 for the
QFX Series.
interfaces
Syntax interfaces {
interface-name {
congestion-notification-profile profile-name {
input {
ieee-802.1 {
code-point up-bits pfc;
}
}
}
}
scheduler-map map-name;
unit logical-unit-number {
forwarding-class class-name;
classifiers {
(dscp | ieee-802.1 | inet-precedence) (classifier-name | default);
}
}
}
}
Release Information Statement introduced in Junos OS Release 9.0 for EX Series switches.
• Defining CoS Forwarding Classes (CLI Procedure) or Defining CoS Forwarding Classes
(J-Web Procedure)
• Defining CoS Schedulers and Scheduler Maps (CLI Procedure) or Defining CoS Schedulers
(J-Web Procedure)
policy-options
Syntax policy-options
application-maps application-map-name {
application application-name {
code-points [ aliases ] [ bit-patterns ];
}
}
policy-statement policy-name {
term term-name {
from {
family family-name;
match-conditions;
policy subroutine-policy-name;
prefix-list prefix-list-name;
prefix-list-filter prefix-list-name match-type <actions>;
route-filter destination-prefix match-type <actions>;
source-address-filter source-prefix match-type <actions>;
}
to {
match-conditions;
policy subroutine-policy-name;
}
then actions;
}
}
Release Information Statement introduced in Junos OS Release 12.1 for the QFX Series.
Statement introduced in Junos OS Release 12.1 for the EX Series.
Description Configure options such as application maps for DCBX application protocol exchange
and policy statements.
Related • Defining an Application for DCBX Application Protocol TLV Exchange on page 45
Documentation
• Example: Configuring DCBX Application Protocol TLV Exchange
priority-flow-control
Syntax priority-flow-control {
no-auto-negotiation;
}
Release Information Statement introduced in Junos OS Release 11.1 for the QFX Series.
Statement introduced in Junos OS Release 11.3 for EX Series switches.
Description Disable autonegotiation of priority-based flow control (PFC) on one or more Ethernet
interfaces. Autonegotiation enables PFC on an interface only if the switch and the peer
device connected to the switch both support PFC and have the same PFC configuration.
Disabling autonegotiation on an interface forces the interface to use the PFC state
(enabled or disabled) that is configured on the switch by the configuration and assignment
of the congestion notification profile.
protocol (Applications)
Release Information Statement introduced in Junos OS Release 12.1 for EX Series switches.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Description Networking protocol type, which combines with destination-port to identify an application
type.
NOTE: To create an application for iSCSI, use the protocol tcp with the
destination port number 3260.
Related • Defining an Application for DCBX Application Protocol TLV Exchange on page 45
Documentation
• Example: Configuring DCBX Application Protocol TLV Exchange
secure-access-port
Syntax secure-access-port {
dhcp-snooping-file {
location local_pathname | remote_URL;
timeout seconds;
write-interval seconds;
}
interface (all | interface-name) {
allowed-mac {
mac-address-list;
}
(dhcp-trusted | no-dhcp-trusted);
fcoe-trusted;
mac-limit limit action action;
no-allowed-mac-log;
persistent-learning;
static-ip ip-address {
vlan vlan-name;
mac mac-address;
}
}
vlan (all | vlan-name) {
(arp-inspection | no-arp-inspection) [
forwarding-class class-name;
}
dhcp-option82 {
circuit-id {
prefix hostname;
use-interface-description;
use-vlan-id;
}
remote-id {
prefix hostname | mac | none;
use-interface-description;
use-string string;
}
vendor-id <string>;
}
(examine-dhcp | no-examine-dhcp) {
forwarding-class class-name;
}
examine-fip {
fc-map fc-map-value;
}
(ip-source-guard | no-ip-source-guard);
mac-move-limit limit action action;
}
}
Release Information Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description Configure port security features, including MAC limiting, dynamic ARP inspection, whether
interfaces can receive DHCP responses, DHCP snooping, IP source guard, DHCP option
82, MAC move limiting, and FIP snooping.
• Example: Configuring IP Source Guard on a Data VLAN That Shares an Interface with a
Voice VLAN
• Example: Setting Up DHCP Option 82 with a Switch with No Relay Agent Between Clients
and a DHCP Server
Release Information Statement introduced in Junos OS Release 9.0 for EX Series switches.
• DHCP snooping
• DHCP option 82
• FIP snooping
• IP source guard
TIP: To display a list of all configured VLANs on the system, including VLANs
that are configured but not committed, type ? after vlan or vlans in your
configuration mode command line. Note that only one VLAN is displayed for
a VLAN range.
• Example: Setting Up DHCP Option 82 with a Switch with No Relay Agent Between Clients
and a DHCP Server
Administration
• Operational Commands on page 91
Operational Commands
Release Information Command introduced in Junos OS Release 10.4 for EX Series switches.
Command introduced in Junos OS Release 11.1 for the QFX Series.
Description Clear FIP snooping information for the specified FCoE Node (ENode) or (optionally) only
on a specified VLAN. This operation deletes the ENode state from the switch database
and from the FIP snooping firewall filters, which causes the ENode to lose its connection
to the FCoE forwarder (FCF) and to log in to the FCF again.
Sample Output
clear fip snooping enode enode-mac
user@switch> clear fip snooping enode 00:10:94:00:00:02
Release Information Command introduced in Junos OS Release 10.4 for EX Series switches.
Command introduced in Junos OS Release 11.1 for the QFX Series.
Sample Output
clear fip snooping statistics
user@switch> clear fip snooping statistics
Release Information Command introduced in Junos OS Release 10.4 for EX Series switches.
Command introduced in Junos OS Release 11.1 for the QFX Series.
Description Clear FIP snooping information for the specified VLAN. This operation deletes all ENode
and FCF information for the VLAN from the switch database and causes the ENodes to
lose their connections to the FCFs. After clearing a VLAN, the switch relearns all of the
FCFs and ENodes on the VLAN, and the ENodes must log in to the FCF again.
Sample Output
clear fip snooping vlan vlan-name
user@switch> clear fip snooping vlan fcoevlan1
Release Information Command introduced in Junos OS Release 11.1 for the QFX Series.
Command introduced in Junos OS Release 11.3 for EX Series switches.
Description Display information about Data Center Bridging Capability Exchange protocol (DCBX)
neighbor interfaces.
• dcbx on page 67
List of Sample Output show dcbx neighbors interface (QFX Series, DCBX Version 1.01 Mode) on page 108
show dcbx neighbors interface (QFX Series, IEEE DCBX Mode) on page 110
show dcbx neighbors terse (QFX Series) on page 112
show dcbx neighbors (EX4500 Switch: FCoE Interfaces on Both Local and Peer with
PFC Configured Compatibly) on page 112
show dcbx neighbors (EX4500 Switch: DCBX Interfaces on Local and Peer Are
Configured Compatibly with iSCSI Application) on page 113
show dcbx neighbors (EX4500 Switch: Includes ETS) on page 114
Output Fields Table 7 on page 95 lists the output fields for the show dcbx neighbors command. Output
fields are listed in the approximate order in which they appear.
Parent Interface Name of the link aggregation group (LAG) interface to which
the DCBX interface belongs.
NOTE: On interfaces that use the IEEE DCBX mode, the show
dcbx neighbors interface interface-name operational command
does not include application, PFC, or ETS operational state
in the output.
sequence-number Number of state change messages the peer sent to the local
interface.
Code Point PFC code point, which is specified in the 3-bit class-of-service
field in the VLAN header.
Admin Mode PFC administrative state for each code point on the local
interface:
Operational (QFX Series) PFC operational mode for each code point:
Mode
• Enable—PFC is enabled on the code point.
• Disable—PFC is disabled on the code point.
Maximum Largest number of traffic classes the peer supports for PFC:
Traffic Classes
capable to • 6 (EX Series switches)
support PFC • 8 (QFX Series)
Code Point PFC code point, which is specified in the 3-bit class-of-service
field in the VLAN header.
Admin Mode PFC administrative state for each code point on the peer:
Willing Willingness of the local interface to learn the ETS state from
the peer using DCBX (EX Series switches always advertise
No for this field):
Credit Based
Shaper
Code Point PFC code point, which is specified in the 3-bit class-of-service
field in the VLAN header.
Enable
Willing Willingness of the peer to learn the ETS state from the local
interface using DCBX:
Code Point
ETS (terse option only) Local DCBX TLV advertisement state for
ETS:
ETS Rec (terse option only) DCBX TLV peer advertisement state for
ETS (state received from the connected DCBX peer):
Version (terse option only) The DCBX version used on the interface
and whether the DCBX version was autonegotiated or
explicitly configured:
Sample Output
show dcbx neighbors interface (QFX Series, DCBX Version 1.01 Mode)
user@switch> show dcbx neighbors interface xe-0/0/0
Interface : xe-0/0/0.0 - Parent Interface: ae0.0
Active-application-map: app-map-1
Protocol-State: in-sync
Protocol-Mode: DCBX Version 1.01
Local-Advertisement:
Operational version: 1
sequence-number: 130, acknowledge-id: 102
Peer-Advertisement:
Operational version: 1
sequence-number: 102, acknowledge-id: 130
Local-Advertisement:
Enable: Yes, Willing: No, Error: No
Maximum Traffic Classes capable to support PFC: 8
Peer-Advertisement:
Enable: Yes, Willing: No, Error: No
Maximum Traffic Classes capable to support PFC: 8
001 Disabled
010 Disabled
011 Enabled
100 Enabled
101 Disabled
110 Disabled
111 Disabled
Local-Advertisement:
Enable: Yes, Willing: No, Error: No
Peer-Advertisement:
Enable: Yes, Willing: Yes, Error: No
Local-Advertisement:
Enable: Yes, Willing: No, Error: No
Maximum Traffic Classes capable to support PFC: 8
Peer-Advertisement:
Enable: Yes, Willing: No, Error: No
Maximum Traffic Classes capable to support PFC: 8
111 7
Feature: PFC
Local-Advertisement:
Willing: No
Mac auth Bypass Capability: No
Operational State: Enabled
Peer-Advertisement:
Willing: No
Mac auth Bypass Capability: No
Operational State: Enabled
Feature: Application
Local-Advertisement:
Peer-Advertisement:
Appl-Name Ethernet-Type Socket-Number Priority-field
Feature: ETS
Local-Advertisement:
TLV Type: Configuration/Recommendation
Willing: No
Credit Based Shaper: No
Maximum Traffic Classes supported: 3
Peer-Advertisement:
TLV Type: Configuration
Willing: No
Credit Based Shaper: No
Peer-Advertisement:
101 1
110 1
111 7
show dcbx neighbors (EX4500 Switch: FCoE Interfaces on Both Local and Peer with PFC Configured Compatibly)
user@switch> show dcbx neighbors interface xe-0/0/14
Local-Advertisement:
Operational version: 0
sequence-number: 6, acknowledge-id: 6
Peer-Advertisement:
Operational version: 0
sequence-number: 6, acknowledge-id: 6
Local-Advertisement:
Enable: Yes, Willing: No, Error: No
Maximum Traffic Classes capable to support PFC: 6
Peer-Advertisement:
Enable: Yes, Willing: No, Error: No
Maximum Traffic Classes capable to support PFC: 6
Local-Advertisement:
Enable: Yes, Willing: No, Error: No <<< Error bit will not be set as
there is no miss configuration between local and peer.
Peer-Advertisement:
Enable: Yes, Willing: No, Error: No
show dcbx neighbors (EX4500 Switch: DCBX Interfaces on Local and Peer Are Configured Compatibly with
iSCSI Application)
user@switch> show dcbx neighbors interface xe-0/0/14
Protocol-State: in-sync
Active-application-map: iscsi-map
Local-Advertisement:
Operational version: 0
sequence-number: 9, acknowledge-id: 12
Peer-Advertisement:
Operational version: 0
sequence-number: 12, acknowledge-id: 9
Local-Advertisement:
Enable: Yes, Willing: No, Error: No
Maximum Traffic Classes capable to support PFC: 6
Peer-Advertisement:
Enable: Yes, Willing: No, Error: No
Maximum Traffic Classes capable to support PFC: 6
Peer-Advertisement:
Enable: Yes, Willing: No, Error: No
Interface : xe-0/0/3.0
Protocol-State: in-sync
Active-application-map: map_iscsi
Local-Advertisement:
Operational version: 0
sequence-number: 1, acknowledge-id: 5
Peer-Advertisement:
Operational version: 0
sequence-number: 5, acknowledge-id: 1
Local-Advertisement:
Enable: Yes, Willing: No, Error: No
Maximum Traffic Classes capable to support PFC: 6
Peer-Advertisement:
Enable: Yes, Willing: Yes, Error: No
Maximum Traffic Classes capable to support PFC: 8
Local-Advertisement:
Enable: Yes, Willing: No, Error: No
Peer-Advertisement:
Enable: Yes, Willing: Yes, Error: No
Local-Advertisement:
Enable: Yes, Willing: No, Error: No
Maximum Traffic Classes supported : 3
Peer-Advertisement:
Enable: Yes, Willing: Yes, Error: No
Maximum Traffic Classes supported : 8
Release Information Command introduced in Junos OS Release 10.4 for EX Series switches.
Command introduced in Junos OS Release 11.1 for the QFX Series.
Output Fields Table 8 on page 117 lists the output fields for the show fip snooping command. Output
fields are listed in the approximate order in which they appear.
FC-MAP FCoE mapped address prefix of the FCoE forwarder for the VLAN. All
Session Count or Active Sessions Current number of virtual link sessions with VN_Ports. All
Configured FKA-ADV FIP keepalive interval in seconds configured on the FCF multiplied detail
by three. For example, if the FKA_ADV period configured on the FCF
is 86 seconds, the value of this field is 258.
For the QFX Series only, the output of this field is always 0 (zero) if
the VLAN is an FCoE-FC gateway VLAN. If the VLAN is a FIP snooping
VLAN (a transit switch VLAN), then the output is accurate. This is
because for an FCoE-FC gateway VLAN, FIP snooping is performed
internally and the keepalive advertisements are not tracked by the
switch’s Ethernet module.
Running FKA-ADV Runtime interval in seconds of the last FIP keepalive advertisement detail
the FCF received. This value changes every time the FCF receives
an FKA_ADV.
For the QFX Series only, the output of this field is always 0 (zero) if
the VLAN is an FCoE-FC gateway VLAN. If the VLAN is a FIP snooping
VLAN (a transit switch VLAN), then the output is accurate. This is
because for an FCoE-FC gateway VLAN, FIP snooping is performed
internally and the keepalive advertisements are not tracked by the
switch’s Ethernet module.
FKA-ADV Runtime interval in seconds of the last FIP keepalive advertisement detail
the ENode sent to the FCF on behalf of the VN_Port (VN_Port
FKA_ADV). This value changes every time the ENode sends a
VN_Port FKA_ADV to the FCF.
Sample Output
show fip snooping
user@switch> show fip snooping
VLAN : fcoevlan1 FC-MAP : 0e:fc:00
FCF : 00:10:94:00:00:01 Session Count : 2
Enode-MAC : 00:10:94:00:00:02
VN-Port-MAC : 0E:FC:00:00:00:05
VN-Port-MAC : 0E:FC:00:00:00:01
Release Information Command introduced in Junos OS Release 10.4 for EX Series switches.
Command introduced in Junos OS Release 11.1 for the QFX Series.
vlan vlan-name—(Optional) Display FIP snooping information for the ENode on only the
specified VLAN.
Output Fields Table 9 on page 121 lists the output fields for the show fip snooping enode command.
Output fields are listed in the approximate order in which they appear.
Session Count Current number of virtual link sessions with VN_Ports. All
Configured FKA-ADV FIP keepalive interval in seconds configured on the FCoE forwarder detail
(FCF) multiplied by three. For example, if the FKA_ADV period
configured on the FCF is 86 seconds, the value of this field is 258.
This value remains constant.
For the QFX Series only, the output of this field is always 0 (zero)
if the VLAN is an FCoE-FC gateway VLAN. If the VLAN is a FIP
snooping VLAN (a transit switch VLAN), then the output is accurate.
This is because for an FCoE-FC gateway VLAN, FIP snooping is
performed internally and the keepalive advertisements are not
tracked by the switch’s Ethernet module.
Running FKA-ADV Runtime interval in seconds of the last FIP keepalive advertisement detail
the ENode sent to the FCF. This value changes every time the
ENode sends an FKA_ADV to the FCF.
For the QFX Series only, the output of this field is always 0 (zero)
if the VLAN is an FCoE-FC gateway VLAN. If the VLAN is a FIP
snooping VLAN (a transit switch VLAN), then the output is accurate.
This is because for an FCoE-FC gateway VLAN, FIP snooping is
performed internally and the keepalive advertisements are not
tracked by the switch’s Ethernet module.
FKA-ADV Runtime interval in seconds of the last FIP keepalive advertisement detail
the ENode sent to the FCF on behalf of the VN_Port (VN_Port
FKA_ADV). This value changes every time the ENode sends a
VN_Port FKA_ADV to the FCF.
FCF or FCF-MAC MAC address of the FCF to which the VN_Port is connected. All
Sample Output
show fip snooping enode
user@switch> show fip snooping enode 00:10:94:00:00:02
Enode : 00:10:94:00:00:02 VLAN : vlan1 Interface : xe-0/0/1
VN-Port-MAC FCF-MAC
0E:FC:00:00:00:05 00:10:94:00:00:01
0E:FC:00:00:00:01 00:10:94:00:00:01
Release Information Command introduced in Junos OS Release 10.4 for EX Series switches.
Command introduced in Junos OS Release 11.1 for the QFX Series.
vlan-name—(Optional) Display FIP snooping information for the FCF on only the specified
VLAN.
Output Fields Table 10 on page 125 lists the output fields for the show fip snooping fcf command. Output
fields are listed in the approximate order in which they appear.
Session Count Current number of virtual link sessions with VN_Ports. None
Configured FKA-ADV FIP keepalive interval in seconds configured on the FCF detail
multiplied by three. For example, if the FKA_ADV period
configured on the FCF is 86 seconds, the value of this
field is 258.
Running FKA-ADV Runtime interval in seconds of the last FIP keepalive detail
advertisement the FCF received. This value changes
every time the FCF receives an FKA_ADV.
• Configured FKA-ADV FIP keepalive interval in seconds configured on the FCF detail
multiplied by three. For example, if the FKA_ADV period
configured on the FCF is 86 seconds, the value of this
field is 258. This value remains constant.
• Running FKA-ADV Runtime interval in seconds of the last FIP keepalive detail
advertisement the ENode sent to the FCF. This value
changes every time the ENode sends an FKA_ADV to
the FCF.
Sample Output
show fip snooping fcf
user@switch> show fip snooping fcf 00:10:94:00:00:01
FCF : 00:10:94:00:00:01 VLAN : vlan1 Session Count : 2
Enode-MAC : 00:10:94:00:00:02
VN-Port-MAC : 0E:FC:00:00:00:05
VN-Port-MAC : 0E:FC:00:00:00:01
Release Information Command introduced in Junos OS Release 10.4 for EX Series switches.
Command introduced in Junos OS Release 11.1 for the QFX Series.
Options vlan vlan-name—(Optional) Display FIP snooping statistics for the specified VLAN.
List of Sample Output show fip snooping statistics (FIP Snooping) on page 130
show fip snooping statistics (VN2VN_Port Snooping) on page 130
Output Fields Table 11 on page 128 lists the output fields for the show fip snooping statistics command.
Output fields are listed in the approximate order in which they appear.
Number of CVL Number of clear virtual links (CVL) actions on the VLAN.
Sample Output
show fip snooping statistics (FIP Snooping)
user@switch> show fip snooping statistics
VLAN: fcoevlan1 Mode: VN2VF Snooping
Number of MDS: 2
Number of UDS: 2
Number of FLOGI: 2
Number of FDISC: 2
Number of LOGO: 0
Number of Enode-keep-alive: 200
Number of VNPort-keep-alive: 200
Number of MDA: 25
Number of UDA: 2
Number of FLOGI_ACC: 2
Number of FLOGI_RJT: 0
Number of FDISC_ACC: 2
Number of FDISC_RJT: 0
Number of LOGO_ACC: 0
Number of LOGO_RJT: 0
Number of CVL: 0
Release Information Command introduced in Junos OS Release 10.4 for EX Series switches.
Command introduced in Junos OS Release 11.1 for the QFX Series.
Output Fields Table 12 on page 131 lists the output fields for the show fip snooping vlan command. Output
fields are listed in the approximate order in which they appear.
FC-MAP FCoE mapped address prefix of the FCoE forwarder for All
the VLAN.
Session Count or Active Sessions Current number of virtual link sessions with VN_Ports. All
Configured FKA-ADV FIP keepalive interval in seconds configured on the FCF detail
multiplied by three. For example, if the FKA_ADV period
configured on the FCF is 86 seconds, the value of this
field is 258.
Running FKA-ADV Runtime interval in seconds of the last FIP keepalive detail
advertisement the FCF received. This value changes
every time the FCF receives an FKA_ADV.
• Configured FKA-ADV FIP keepalive interval in seconds configured on the FCF detail
multiplied by three. For example, if the FKA_ADV period
configured on the FCF is 86 seconds, the value of this
field is 258. This value remains constant.
• Running FKA-ADV Runtime interval in seconds of the last FIP keepalive detail
advertisement the ENode sent to the FCF. This value
changes every time the ENode sends an FKA_ADV to
the FCF.
Sample Output
show fip snooping vlan
user@switch> show fip snooping vlan fcoevlan1
VLAN : fcoevlan1 FC-MAP : 0e:fc:00
FCF : 00:10:94:00:00:01 Session Count : 2
Enode-MAC : 00:10:94:00:00:02
VN-Port-MAC : 0E:FC:00:00:00:05
VN-Port-MAC : 0E:FC:00:00:00:01
show fip snooping vlan detail (QFX Series, VN2VN_Port FIP Snooping)
user@switch> show fip snooping vlan vlan101 detail
VLAN: vlan101, Mode: VN2VN Snooping
FC-MAP: 0e:fc:00
Beacon_Period: 90000
VN2VN Mode: Multi-Point
Enode Information
Enode-MAC: 10:10:94:01:00:02, Interface: xe-0/0/10
Active VN_Ports : 1
VN_Port Information
VN-Port MAC: 0e:fc:00:01:0a:01
Active Sessions : 2
Session Information
Vlink far-end VN-Port-MAC: 0e:fc:00:01:0b:01
Vlink far-end VN-Port-MAC: 0e:fc:00:01:0c:01
Enode-MAC: 10:10:94:01:00:02, Interface: xe-0/0/11
Active VN_Ports : 0