| Well, my first reaction to reading the description in the base
note, is that the customer is maybe over-reacting, and trying
to overly "micro-manage" what should be seen as a natural behavior.
"Inactive" addresses in the forwarding database will age out and
dissapear in short time. On the traffic level changing and addresses
coming from the FDDI side and being seen on the Ethernet ports, this
can be resolved with filtering, and also understanding whether these
source & destination addresses are unicast packets or multicast in
nature. If they are multicast, then enabling and tweaking the value
of rate-limiting may help ease whatever bandwidth loss may be occuring
on the Ethernet ports. I'm not sure I understand why the customer
absolutely needs the FDDI side in manual mode. I've forwarded the
base note to a couple of people who may be able to offer additional
suggestions.
Bob
|
| 100 Alpha's on a single FDDI ring and no GIGAswitch/FDDI?? Your
customer is much braver than you think. 8^)
You need to find out much more as to what systems are talking to what
systems and how. Also are any applications sending out data from the
Alpha's to users via multicast? Is a satutared FDDI ring, Alpha to
Alpha traffic, keeping the users from getting onto the ring?
Get V.1.7.0 on the EF switches and use MCM to show the packet stats
(RMON) for the 6 ethernets. It may offer some clues as to what is
happening.
dave
|
| I believe all of the questions in the previous replies need to be
answered. I'd also like to add some comments and questions in this
discussion.
My first question, which I believe Bob also asked, is
what is the customer trying to accomplish by putting the
FDDI port in manual mode?
Putting a port, say "port X", in manual mode does the following:
- disables learning on port X.
- filters all packets on port X who's SA is not
management-specified as allowed on port X.
- filters packets destined to port X who's DA
is not management-specified as allowed to go
to port X.
So, the intention of manual mode is a security feature. In this
case, it sounds like the customer wants to insure that any unauthorized
node on the FDDI ring is not allowed to communicate with nodes on the
ethernet ports. Also, nodes on the ethernet ports are not allowed
to communicate with unauthorized nodes on the FDDI port. Realize that
this does not protect against unauthorized nodes on the ethernet ports.
With that said, it sounds like there are nodes on the FDDI ring
who's MAC address has not been management defined in the
switch database. Remember, learning has been disabled on the FDDI
port if it's been placed in manual mode. So, if a node who's MAC
address has been management-specified on the FDDI port sends a packet
to another node on the FDDI ring who's address has NOT been
mgmt-specified, the packet will be flooded by the switch because
the SA is allowed and the DA is unknown and cannot be dynamically
learned.
So, the customer needs to make sure that EVERY MAC address that
resides on the FDDI ring is mgmt-specified in the switch's
forwarding database. Otherwise, pkts destined to the unspecified
addresses will be flooded by the switches.
Hope this helps!
Chris
|