Manual:CRS1xx/2xx series switches: Difference between revisions
No edit summary |
|||
(58 intermediate revisions by 5 users not shown) | |||
Line 1: | Line 1: | ||
{{Versions| v6.12 +}} | {{Versions| v6.12 +}} | ||
{{Warning|This manual is moved to [[https://help.mikrotik.com/docs/pages/viewpage.action?pageId=103841835 CRS1xx/2xx series switches]]}} | |||
__TOC__ | __TOC__ | ||
Line 8: | Line 10: | ||
The Cloud Router Switch series are highly integrated switches with high performance MIPS CPU and feature-rich packet processor. The CRS switches can be designed into various Ethernet applications including unmanaged switch, Layer 2 managed switch, carrier switch and wireless/wired unified packet processing. | The Cloud Router Switch series are highly integrated switches with high performance MIPS CPU and feature-rich packet processor. The CRS switches can be designed into various Ethernet applications including unmanaged switch, Layer 2 managed switch, carrier switch and wireless/wired unified packet processing. | ||
{{Warning | This article applies to CRS1xx and CRS2xx series switches and not to CRS3xx series switches.}} | {{Warning | This article applies to CRS1xx and CRS2xx series switches and not to CRS3xx series switches. For CRS3xx series devices read the [[Manual:CRS3xx_series_switches | CRS3xx series switches]] manual.}} | ||
<table class="styled_table"> | <table class="styled_table"> | ||
Line 23: | Line 25: | ||
<li>Configurable Port based MAC learning limit | <li>Configurable Port based MAC learning limit | ||
<li>Jumbo frame support (CRS1xx: 4064 Bytes; CRS2xx: 9204 Bytes) | <li>Jumbo frame support (CRS1xx: 4064 Bytes; CRS2xx: 9204 Bytes) | ||
<li>IGMP Snooping support</li> | |||
</ul></td> | </ul></td> | ||
</tr> | </tr> | ||
Line 121: | Line 124: | ||
| nowrap style="background-color: #CCC;* " | <b>Access Control List</b> | | nowrap style="background-color: #CCC;* " | <b>Access Control List</b> | ||
| nowrap style="background-color: #CCC;* " | <b>Jumbo Frame (Bytes)</b> | | nowrap style="background-color: #CCC;* " | <b>Jumbo Frame (Bytes)</b> | ||
|- | |||
| style="background-color: #CCC;font-weight: bold;" | CRS105-5S-FB | |||
| <b>QCA-8511</b> | |||
| <b>400MHz</b> | |||
| style="background-color: #F99;" | <b>-</b> | |||
| style="background-color: #F99;" | <b>-</b> | |||
| <b>+</b> | |||
| <b>9204</b> | |||
|- | |- | ||
| style="background-color: #CCC;font-weight: bold;" | CRS106-1C-5S | | style="background-color: #CCC;font-weight: bold;" | CRS106-1C-5S | ||
Line 206: | Line 217: | ||
===Port Switching=== | ===Port Switching=== | ||
In order to setup port switching on CRS1xx/2xx series switches, check the [[Manual:Interface/Bridge#Bridge_Hardware_Offloading | Bridge Hardware Offloading]] page. | |||
{{Note | Dynamic reserved VLAN entries (VLAN4091; VLAN4090; VLAN4089; etc.) are created in CRS switch when switched port groups are added when a hardware offloaded bridge is created. These VLANs are necessary for internal operation and have lower precedence than user configured VLANs.}} | |||
====Multiple switch groups==== | |||
The CRS1xx/2xx series switches allow you to use multiple bridges with hardware offloading, this allows you to easily isolate multiple switch groups. This can be done by simply creating multiple bridges and enabling hardware offloading. | |||
{{ Note | Multiple hardware offloaded bridge configuration is designed as fast and simple port isolation solution, but it limits a part of VLAN functionality supported by CRS switch-chip. For advanced configurations use one bridge within CRS switch chip for all ports, configure VLANs and isolate port groups with port isolation profile configuration. }} | |||
{{ Warning | CRS1xx/2xx series switches are capable of running multiple hardware offloaded bridges with (R)STP enabled, but it is not recommended since the device is not designed to run multiple (R)STP instances on a hardware level. To isolate multiple switch groups and have (R)STP enabled you should isolate port groups with port isolation profile configuration. }} | |||
===Global Settings=== | |||
<p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch</code></p><br /> | |||
</ | |||
CRS switch chip is configurable from the <code>/interface ethernet switch</code> | |||
console menu. | |||
<table class="styled_table"> | |||
<tr> | |||
<th width="50%">Property</th> | |||
<th >Description</th> | |||
</tr> | |||
<tr> | |||
<td><var><b>name</b></var> (<em>string value</em>; Default: | |||
<b>switch1</b>)</td> | |||
<td>Name of the switch.</td> | |||
</tr> | |||
<tr> | |||
<td><var><b>bridge-type</b></var> (<em>customer-vid-used-as-lookup-vid | | |||
service-vid-used-as-lookup-vid</em>; Default: <b>customer-vid-used-as-lookup-vid</b>)</td> | |||
<td>Bridge type defines which VLAN tag is used as Lookup-VID. Lookup-VID | |||
serves as the VLAN key for all VLAN-based lookup.</td> | |||
</tr> | |||
<tr> | |||
<td><var><b>mac-level-isolation</b></var> (<em>yes | no</em>; Default: | |||
<b>yes</b>)</td> | |||
<td>Globally enables or disables MAC level isolation. Once enabled, the switch will check the source and destination MAC address entries and their <var>isolation-profile</var> from the unicast forwarding table. By default, the switch will learn MAC addresses and place them into a <code>promiscuous</code> isolation profile. Other isolation profiles can be used when creating static unicast entries. If the source or destination MAC address are located on a <code>promiscuous</code> isolation profile, the packet is forwarded. If both source and destination MAC addresses are located on the same <code>community1</code> or <code>community2</code> isolation profile, the packet is forwarded. The packet is dropped when the source and destination MAC address isolation profile is <code>isolated</code>, or when the source and destination MAC address isolation profiles are from different communities (e.g. source MAC address is <code>community1</code> and destination MAC address is <code>community2</code>). When MAC level isolation is globally disabled, the isolation is bypassed.</td> | |||
</tr> | |||
<tr> | |||
<td><var><b>use-svid-in-one2one-vlan-lookup</b></var> (<em>yes | no</em>; | |||
Default: <b>no</b>)</td> | |||
< | <td>Whether to use service VLAN id for 1:1 VLAN switching lookup.</td> | ||
</tr> | |||
/ | <tr> | ||
<td><var><b>use-cvid-in-one2one-vlan-lookup</b></var> (<em>yes | no</em>; | |||
Default: <b>yes</b>)</td> | |||
<td>Whether to use customer VLAN id for 1:1 VLAN switching lookup.</td> | |||
</tr> | |||
<tr> | |||
<td><var><b>multicast-lookup-mode</b></var> | |||
(<em>dst-ip-and-vid-for-ipv4 | dst-mac-and-vid-always</em>; | |||
Default:<b>dst-ip-and-vid-for-ipv4</b>)</td> | |||
<td>Lookup mode for IPv4 multicast bridging. | |||
<ul class="bullets"> | |||
<li> <var>dst-mac-and-vid-always</var> - For all packet types lookup key is | |||
destination MAC and VLAN id. | |||
<li> <var>dst-ip-and-vid-for-ipv4</var> - For IPv4 packets lookup key is | |||
destination IP and VLAN id. For other packet types lookup key is destination MAC | |||
< | and VLAN id. | ||
</ul></td> | |||
</tr> | |||
< | <tr> | ||
<td><var><b>unicast-fdb-timeout</b></var> (<em>time interval</em>; Default: | |||
<b>5m</b>)</td> | |||
<td>Timeout for Unicast FDB entries.</td> | |||
/ | </tr> | ||
<tr> | |||
<td><var><b>override-existing-when-ufdb-full</b></var> (<em>yes | no</em>; | |||
Default: <b>no</b>)</td> | |||
<td>Enable or disable to override existing entry which has the lowest aging | |||
value when UFDB is full.</td> | |||
</tr> | |||
</table> | |||
<br> | |||
</ | |||
| | |||
| | |||
< | |||
<table class="styled_table"> | <table class="styled_table"> | ||
Line 457: | Line 301: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>drop-if-no-vlan-assignment-on-ports</b></var> (<em>ports</em>; | ||
<b> | Default: <b>none</b>)</td> | ||
<td> | <td>Ports which drop frames if no MAC-based, Protocol-based VLAN assignment or Ingress | ||
VLAN Translation is applied.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>drop-if-invalid-or-src-port-<br>-not-member-of-vlan-on-ports</b></var><br> | |||
(<em>ports</em>; Default: <b>none</b>)</td> | |||
<td> | <td>Ports which drop invalid and other port VLAN id frames.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>unknown-vlan-lookup-mode</b></var> (<em>ivl | svl</em>; Default: | ||
<b> | <b>svl</b>)</td> | ||
<td> | <td>Lookup and learning mode for packets with invalid VLAN.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>forward-unknown-vlan</b></var> (<em>yes | no</em>; Default: | ||
Default: <b> | <b>yes</b>)</td> | ||
<td>Whether to | <td>Whether to allow forwarding VLANs which are not members of VLAN | ||
table.</td> | |||
</tr> | </tr> | ||
</table> | |||
<br> | |||
<table class="styled_table"> | |||
<tr> | <tr> | ||
<th width="50%">Property</th> | |||
<th >Description</th> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>bypass-vlan-ingress-filter-for</b></var> (<em>protocols</em>; | ||
(<em> | Default: <b>none</b>)</td> | ||
Default:<b> | <td>Protocols which are excluded from Ingress VLAN filtering. These | ||
<td> | protocols are not dropped if they have invalid VLAN. (arp, dhcpv4, dhcpv6, | ||
eapol, igmp, mld, nd, pppoe-discovery, ripv1)</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>bypass-ingress-port-policing-for</b></var> (<em>protocols</em>; | ||
<b> | Default: <b>none</b>)</td> | ||
<td> | <td>Protocols which are excluded from Ingress Port Policing. (arp, dhcpv4, dhcpv6, | ||
eapol, igmp, mld, nd, pppoe-discovery, ripv1)</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>bypass-l2-security-check-filter-for</b></var> | ||
Default: <b> | (<em>protocols</em>; Default: <b>none</b>)</td> | ||
<td> | <td>Protocols which are excluded from Policy rule security check. (arp, | ||
dhcpv4, dhcpv6, eapol, igmp, mld, nd, pppoe-discovery, ripv1)</td> | |||
</tr> | </tr> | ||
</table> | </table> | ||
Line 515: | Line 358: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>ingress-mirror0</b></var> (<em>port | trunk,format</em>; Default: <b>none,modified</b>)</td> | ||
Default: <b>none</b>)</td> | <td>The first ingress mirroring analyzer port or trunk and mirroring format: | ||
<td> | <ul class="bullets"> | ||
VLAN | <li> <var>analyzer-configured</var> - The packet is same as the packet to | ||
destination. VLAN format is modified based on the VLAN configurations of the | |||
analyzer port. | |||
<li> <var>modified</var> - The packet is same as the packet to destination. | |||
VLAN format is modified based on the VLAN configurations of the egress port. | |||
<li> <var>original</var> - Traffic is mirrored without any change to the | |||
original incoming packet format. But service VLAN tag is stripped in edge port. | |||
</ul> | |||
</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>ingress-mirror1</b></var> (<em>port | trunk,format</em>; Default: <b>none,modified</b>)</td> | ||
<td>The second ingress mirroring analyzer port or trunk and mirroring format: | |||
<td> | <ul class="bullets"> | ||
< | <li> <var>analyzer-configured</var> - The packet is same as the packet to | ||
< | destination. VLAN format is modified based on the VLAN configurations of the | ||
analyzer port. | |||
<li> <var>modified</var> - The packet is same as the packet to destination. | |||
VLAN format is modified based on the VLAN configurations of the egress port. | |||
<li> <var>original</var> - Traffic is mirrored without any change to the | |||
original incoming packet format. But service VLAN tag is stripped in edge port. | |||
</ul> | |||
</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>ingress-mirror-ratio</b></var> (<em>1/32768..1/1</em>; Default: | ||
<b> | <b>1/1</b>)</td> | ||
<td> | <td>Proportion of ingress mirrored packets compared to all packets.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>egress-mirror0</b></var> (<em>port | trunk,format</em>; Default: <b>none,modified</b>)</td> | |||
<td>The first egress mirroring analyzer port or trunk and mirroring format: | |||
<ul class="bullets"> | |||
<li> <var>analyzer-configured</var> - The packet is same as the packet to | |||
<td><var><b> | destination. VLAN format is modified based on the VLAN configurations of the | ||
Default: <b>none</b>)</td> | analyzer port. | ||
<td> | <li> <var>modified</var> - The packet is same as the packet to destination. | ||
VLAN format is modified based on the VLAN configurations of the egress port. | |||
<li> <var>original</var> - Traffic is mirrored without any change to the | |||
original incoming packet format. But service VLAN tag is stripped in edge port. | |||
</ul> | |||
</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>egress-mirror1</b></var> (<em>port | trunk,format</em>; Default: <b>none,modified</b>)</td> | ||
Default: <b>none</b>)</td> | <td>The second egress mirroring analyzer port or trunk and mirroring format: | ||
<td> | <ul class="bullets"> | ||
<li> <var>analyzer-configured</var> - The packet is same as the packet to | |||
destination. VLAN format is modified based on the VLAN configurations of the | |||
analyzer port. | |||
<li> <var>modified</var> - The packet is same as the packet to destination. | |||
VLAN format is modified based on the VLAN configurations of the egress port. | |||
<li> <var>original</var> - Traffic is mirrored without any change to the | |||
original incoming packet format. But service VLAN tag is stripped in edge port. | |||
</ul> | |||
</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>egress-mirror-ratio</b></var> (<em>1/32768..1/1</em>; Default: | ||
(<em> | <b>1/1</b>)</td> | ||
<td> | <td>Proportion of egress mirrored packets compared to all packets.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>mirror-egress-if-ingress-mirrored</b></var> (<em>yes | no</em>; | |||
Default: <b>no</b>)</td> | |||
<td>When packet is applied to both ingress and egress mirroring, if this | |||
setting is disabled, only ingress mirroring is performed on the packet; if this | |||
setting is enabled both mirroring types are applied.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>mirror-tx-on-mirror-port</b></var> (<em>yes | no</em>; Default: | ||
<td> | <b>no</b>)</td> | ||
<td></td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>mirrored-packet-qos-priority</b></var> (<em>0..7</em>; Default: | ||
<td> | <b>0</b>)</td> | ||
< | <td>Remarked priority in mirrored packets.</td> | ||
< | </tr> | ||
<tr> | |||
<td><var><b>mirrored-packet-drop-precedence</b></var> (<em>drop | green | | |||
< | red | yellow</em>; Default: <b>green</b>)</td> | ||
<td>Remarked drop precedence in mirrored packets. This QoS attribute is used | |||
< | for mirrored packet enqueuing or dropping.</td> | ||
</ | |||
</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>fdb-uses</b></var> (<em>mirror0 | mirror1</em>; Default: | ||
<b> | <b>mirror0</b>)</td> | ||
<td> | <td>Analyzer port used for FDB-based mirroring.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>vlan-uses</b></var> (<em>mirror0 | mirror1</em>; Default: | ||
<td> | <b>mirror0</b>)</td> | ||
< | <td>Analyzer port used for VLAN-based mirroring.</td> | ||
< | </tr> | ||
</table> | |||
< | <p></p> | ||
< | ===Port Settings=== | ||
</ | <p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | ||
port</code></p><br /> | |||
<table class="styled_table"> | |||
<tr> | |||
<th width="50%">Property</th> | |||
<th >Description</th> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>vlan-type</b></var> (<em>edge-port | network-port</em>; | ||
<td> | Default: <b>network-port</b>)</td> | ||
<td>Port VLAN type specifies whether VLAN id is used in UFDB learning. Network port learns | |||
VLAN id in UFDB, edge port does not - VLAN 0. It can be observed only in IVL learning mode.</td> | |||
VLAN | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>isolation-leakage-profile-override</b></var> (<em>yes | no</em>; Default: | ||
<b> | <b>!isolation-leakage-profile-override</b>)<br> | ||
<td> | <var><b>isolation-leakage-profile</b></var> (<em>0..31</em>;)</td> | ||
<td>Custom port profile for port isolation/leakage configurations. | |||
<ul class="bullets"> | |||
<li> Port-level isolation profile 0. Uplink port - allows the port to | |||
communicate with all ports in the device. | |||
<li> Port-level isolation profile 1. Isolated port - allows the port to | |||
communicate only with uplink ports. | |||
<li> Port-level isolation profile 2 - 31. Community port - allows | |||
communication among the same community ports and uplink ports. | |||
</ul></td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>learn-override</b></var> (<em>yes | no</em>; Default: <b>!learn-override</b>)<br> | ||
Default: <b> | <var><b>learn-limit</b></var> (<em>1..1023</em>; Default: <b>!learn-limit</b>)</td> | ||
<td> | <td>Enable or disable MAC address learning and set MAC limit on the port. | ||
MAC learning limit is disabled by default when !learn-override and !learn-limit. Property <var>learn-override</var> is replaced with <var>learn</var> under <code>/interface bridge port</code> menu since RouterOS v6.42.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>drop-when-ufdb-entry-src-drop</b></var> (<em>yes | no</em>; | ||
<b> | Default: <b>yes</b>)</td> | ||
<td></td> | <td>Enable or disable to drop packets when UFDB entry has action | ||
<var>src-drop</var>.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>allow-unicast-loopback</b></var> (<em>yes | no</em>; Default: | ||
<b> | <b>no</b>)</td> | ||
<td> | <td>Unicast loopback on port. When enabled, it permits sending back when | ||
source port and destination port are the same one for known unicast | |||
packets.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>allow-multicast-loopback</b></var> (<em>yes | no</em>; Default: | ||
<b>no</b>)</td> | |||
<td> | <td>Multicast loopback on port. When enabled, it permits sending back when | ||
for | source port and destination port are the same for registered multicast or | ||
broadcast packets.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>action-on-static-station-move</b></var> (<em>copy-to-cpu | drop | ||
<b> | | forward | redirect-to-cpu</em>; Default: <b>forward</b>)</td> | ||
<td> | <td>Action for packets when UFDB already contains static entry with such MAC but with a different port.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>drop-dynamic-mac-move</b></var> (<em>yes | no</em>; Default: | ||
<b> | <b>no</b>)</td> | ||
<td> | <td>Prevents MAC relearning until UFDB timeout if MAC is already learned on other port.</td> | ||
</tr> | </tr> | ||
</table> | </table> | ||
<br> | |||
<table class="styled_table"> | <table class="styled_table"> | ||
Line 685: | Line 535: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>vlan- | <td><var><b>allow-fdb-based-vlan-translate</b></var> (<em>yes | no</em>; Default: | ||
Default: <b> | <b>no</b>)</td> | ||
<td> | <td>Enable or disable MAC-based VLAN translation on the port.</td> | ||
</tr> | |||
<tr> | |||
<td><var><b>allow-mac-based-service-vlan-assignment-for</b></var> (<em>all-frames | none | | |||
tagged-frame-only | untagged-and-priority-tagged-frame-only</em>; Default: | |||
<b>none</b>)</td> | |||
<td>Frame type for which applies MAC-based service VLAN translation.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>allow-mac-based-customer-vlan-assignment-for</b></var> (<em>all-frames | none | | ||
<b> | tagged-frame-only | untagged-and-priority-tagged-frame-only</em>; Default: | ||
<b>none</b>)</td> | |||
<td> | <td>Frame type for which applies MAC-based customer VLAN translation.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>default-customer-pcp</b></var> (<em>0..7</em>; Default: | ||
<b>0</b>)</td> | |||
<td> | <td>Default customer PCP of the port.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>default-service-pcp</b></var> (<em>0..7</em>; Default: | ||
Default: <b> | <b>0</b>)</td> | ||
<td> | <td>Default service PCP of the port.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>pcp-propagation-for-initial-pcp</b></var> (<em>yes | no</em>; | ||
<b>no</b>)</td> | Default: <b>no</b>)</td> | ||
<td>Enables or disables PCP propagation for initial PCP assignment on ingress. | |||
<ul class="bullets"> | |||
<li> If the port <var>vlan-type</var> is Edge port, the service PCP is copied from the | |||
customer PCP. | |||
<li> If the port <var>vlan-type</var> is Network port, the customer PCP is copied from the | |||
service PCP. | |||
</ul></td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>filter-untagged-frame</b></var> (<em>yes | no</em>; Default: | ||
<b>no</b>)</td> | <b>no</b>)</td> | ||
<td> | <td>Whether to filter untagged frames on the port.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>filter-priority-tagged-frame</b></var> (<em>yes | no</em>; | ||
| | Default: <b>no</b>)</td> | ||
<td> | <td>Whether to filter tagged frames with priority on the port.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>filter-tagged-frame</b></var> (<em>yes | no</em>; Default: | ||
<b>no</b>)</td> | <b>no</b>)</td> | ||
<td> | <td>Whether to filter tagged frames on the port.</td> | ||
</tr> | </tr> | ||
</table> | </table> | ||
Line 749: | Line 596: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>egress-vlan-tag-table-lookup-key</b></var> (<em>according-to-bridge-type | | ||
<b> | egress-vid</em>; Default: <b>egress-vid</b>)</td> | ||
<td> | <td>Egress VLAN table (VLAN Tagging) lookup: | ||
< | <ul class="bullets"> | ||
< | <li> <var>egress-vid</var> - Lookup VLAN id is CVID when | ||
Edge port is configured, SVID when Network port is configured. | |||
<li> <var>according-to-bridge-type</var> - Lookup VLAN id is CVID when customer | |||
VLAN bridge is configured, SVID when service VLAN bridge is configured. Customer | |||
tag is unmodified for Edge port in service VLAN bridge. | |||
</ul></td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>egress-vlan-mode</b></var> (<em>tagged | unmodified | | ||
untagged</em>; Default: <b>unmodified</b>)</td> | |||
<b> | <td>Egress VLAN tagging action on the port.</td> | ||
<td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>egress-pcp-propagation</b></var> (<em>yes | no</em>; Default: | ||
<b> | <b>no</b>)</td> | ||
<td> | <td>Enables or disables egress PCP propagation. | ||
<ul class="bullets"> | |||
<li> If the port <var>vlan-type</var> is Edge port, the service PCP is copied from the | |||
customer PCP. | |||
<li> If the port <var>vlan-type</var> is Network port, the customer PCP is copied from the | |||
service PCP. | |||
</ul></td> | |||
</tr> | </tr> | ||
</table> | |||
<br> | |||
<table class="styled_table"> | |||
<tr> | <tr> | ||
<th width="50%">Property</th> | |||
<th >Description</th> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>ingress-mirror-to</b></var> (<em>mirror0 | mirror1 | none</em>; | ||
Default: <b> | Default: <b>none</b>)</td> | ||
<td>Analyzer port for port-based ingress mirroring.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>ingress-mirroring-according-to-vlan</b></var> (<em>yes | | ||
<b>no</b>)</td> | no</em>; Default: <b>no</b>)</td> | ||
<td> | <td></td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>egress-mirror-to</b></var> (<em>mirror0 | mirror1 | none</em>; Default: | ||
<b>none</b>)</td> | |||
<td>Analyzer port for port-based egress mirroring.</td> | |||
<b> | |||
<td> | |||
</tr> | </tr> | ||
</table> | </table> | ||
Line 810: | Line 655: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>qos-scheme-precedence</b></var> (<em>da-based | dscp-based | ingress-acl-based | pcp-based | protocol-based | sa-based | vlan-based</em>; | ||
Default: <b>pcp-based, sa-based, da-based, dscp-based, protocol-based, vlan-based</b>)</td> | |||
<td> | <td>Specifies applied QoS assignment schemes on ingress of the port. | ||
<ul class="bullets"> | <ul class="bullets"> | ||
<li> <var> | <li> <var>da-based</var> | ||
<li> <var>dscp-based</var> | |||
<li> <var> | <li> <var>ingress-acl-based</var> | ||
<li> <var>pcp-based</var> | |||
<li> <var>protocol-based</var> | |||
<li> <var>sa-based</var> | |||
<li> <var>vlan-based</var> | |||
</ul></td> | </ul></td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>pcp-or-dscp-based-qos-change-dei</b></var> (<em>yes | no</em>; Default: | ||
<b>no</b>)</td> | |||
<td> | <td>Enable or disable PCP or DSCP based DEI change on port.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>pcp-or-dscp-based-qos-change-pcp</b></var> (<em>yes | no</em>; Default: | ||
<b>no</b>)</td> | <b>no</b>)</td> | ||
<td> | <td>Enable or disable PCP or DSCP based PCP change on port.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>pcp-or-dscp-based-qos-change-dscp</b></var> (<em>yes | no</em>; Default: | |||
<b>no</b>)</td> | |||
<td>Enable or disable PCP or DSCP based DSCP change on port.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>dscp-based-qos-dscp-to-dscp-mapping</b></var> (<em>yes | no</em>; Default: | ||
Default: <b> | <b>yes</b>)</td> | ||
<td> | <td>Enable or disable DSCP to internal DSCP mapping on port.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>pcp-based-qos-drop-precedence-mapping</b></var> (<em>PCP/DEI-range:drop-precedence</em>; Default: | ||
<b>0-15:green</b>)</td> | |||
<td></td> | <td>The new value of drop precedence for the PCP/DEI to drop precedence (drop | green | red | yellow) mapping. | ||
Multiple mappings allowed separated by comma e.g. "0-7:yellow,8-15:red".</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>pcp-based-qos-dscp-mapping</b></var> (<em>PCP/DEI-range:DEI</em>; Default: | ||
<b> | <b>0-15:0</b>)</td> | ||
<td> | <td>The new value of DSCP for the PCP/DEI to DSCP (0..63) mapping. | ||
Multiple mappings allowed separated by comma e.g. "0-7:25,8-15:50".</td> | |||
</tr> | |||
<tr> | |||
<td><var><b>pcp-based-qos-dei-mapping</b></var> (<em>PCP/DEI-range:DEI</em>; Default: | |||
<b>0-15:0</b>)</td> | |||
<td>The new value of DEI for the PCP/DEI to DEI (0..1) mapping. Multiple mappings allowed separated by comma e.g. "0-7:0,8-15:1".</td> | |||
</tr> | |||
<tr> | |||
<td><var><b>pcp-based-qos-pcp-mapping</b></var> (<em>PCP/DEI-range:DEI</em>; Default: | |||
<b>0-15:0</b>)</td> | |||
<td>The new value of PCP for the PCP/DEI to PCP (0..7) mapping. | |||
Multiple mappings allowed separated by comma e.g. "0-7:3,8-15:4".</td> | |||
</tr> | |||
<tr> | |||
<td><var><b>pcp-based-qos-priority-mapping</b></var> (<em>PCP/DEI-range:DEI</em>; Default: | |||
<b>0-15:0</b>)</td> | |||
<td>The new value of internal priority for the PCP/DEI to priority (0..15) mapping. | |||
Multiple mappings allowed separated by comma e.g. "0-7:5,8-15:15".</td> | |||
</tr> | </tr> | ||
</table> | </table> | ||
Line 869: | Line 726: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>priority-to-queue</b></var> (<em>priority-range:queue</em>; Default: | ||
<b>0-15:0,1:1,2:2,3:3</b>)</td> | |||
<td> | <td>Internal priority (0..15) mapping to queue (0..7) per port.</td> | ||
< | </tr> | ||
<tr> | |||
< | <td><var><b>per-queue-scheduling</b></var> (<em>Scheduling-type:Weight</em>; | ||
< | Default: <b>wrr-group0:1,wrr-group0:2,wrr-group0:4,wrr-group0:8,wrr-group0:16,wrr-group0:32, | ||
< | wrr-group0:64,wrr-group0:128</b>)</td> | ||
< | <td>Set port to use either strict or weighted round robin policy for traffic shaping for each queue group, each queue is separated by a comma.</td> | ||
< | |||
</tr> | </tr> | ||
</table> | |||
<br> | |||
<table class="styled_table"> | |||
<tr> | <tr> | ||
<th width="50%">Property</th> | |||
<th >Description</th> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>ingress-customer-tpid-override</b></var> (<em>yes | no</em>; | ||
<b> | Default:<b>!ingress-customer-tpid-override</b>)<br> | ||
<td> | <var><b>ingress-customer-tpid</b></var> (<em>0..10000</em>; Default: <b>0x8100</b>)</td> | ||
<td>Ingress customer TPID override allows accepting specific frames with a custom customer tag TPID. | |||
Default value is for tag of 802.1Q frames.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>egress-customer-tpid-override</b></var> (<em>yes | no</em>; Default: | ||
<b> | <b>!egress-customer-tpid-override</b>)<br> | ||
<td> | <var><b>egress-customer-tpid</b></var> (<em>0..10000</em>; Default: | ||
<b>0x8100</b>)</td> | |||
<td>Egress customer TPID override allows custom identification for egress frames with a customer tag. | |||
Default value is for tag of 802.1Q frames.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>ingress-service-tpid-override</b></var> (<em>yes | no</em>; Default: | ||
<b> | <b>!ingress-service-tpid-override</b>)<br> | ||
<td> | <var><b>ingress-service-tpid</b></var> (<em>0..10000</em>; Default: <b>0x88A8</b>)</td> | ||
<td>Ingress service TPID override allows accepting specific frames with a custom service tag TPID. | |||
Default value is for service tag of 802.1AD frames.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>egress-service-tpid-override</b></var> (<em>yes | no</em>; Default: | ||
<b> | <b>!egress-service-tpid-override</b>)<br> | ||
<td> | <var><b>egress-service-tpid</b></var> (<em>0..10000</em>; Default: | ||
<b>0x88A8</b>)</td> | |||
<td>Egress service TPID override allows custom identification for egress frames with a service tag. | |||
Default value is for service tag of 802.1AD frames.</td> | |||
</tr> | </tr> | ||
</table> | |||
<br> | |||
<table class="styled_table"> | |||
<tr> | <tr> | ||
<th width="50%">Property</th> | |||
< | <th >Description</th> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>custom-drop-counter-includes</b></var> (<em>counters</em>; Default: | ||
<b> | <b>none</b>)</td> | ||
<td> | <td>Custom include to count dropped packets for switch port <var>custom-drop-packet</var> counter. | ||
*'''device-loopback''' | |||
*'''fdb-hash-violation''' | |||
*'''exceeded-port-learn-limitation''' | |||
*'''dynamic-station-move''' | |||
*'''static-station-move''' | |||
*'''ufdb-source-drop''' | |||
*'''host-source-drop''' | |||
*'''unknown-host''' | |||
*'''ingress-vlan-filtered''' | |||
</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>queue-custom-drop-counter0-includes</b></var> (<em>counters</em>; | ||
<b> | Default: <b>none</b>)</td> | ||
<td>Custom include to count dropped packets for switch port <var>tx-queue-custom0-drop-packet</var> | |||
and bytes for <var>tx-queue-custom0-drop-byte</var> counters. | |||
*'''red''' | |||
*'''yellow''' | |||
*'''green''' | |||
*'''queue0''' | |||
*'''...''' | |||
*'''queue7''' | |||
</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>queue-custom-drop-counter1-includes</b></var> (<em>counters</em>; | |||
Default: <b>none</b>)</td> | |||
<td>Custom include to count dropped packets for switch port <var>tx-queue-custom1-drop-packet</var> | |||
and bytes for <var>tx-queue-custom1-drop-byte</var> counters. | |||
*'''red''' | |||
*'''yellow''' | |||
*'''green''' | |||
*'''queue0''' | |||
*'''...''' | |||
*'''queue7''' | |||
</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>policy-drop-counter-includes</b></var> (<em>counters</em>; | ||
<b> | Default: <b>none</b>)</td> | ||
<td>Custom include to count dropped packets for switch port <var>policy-drop-packet</var> counter. | |||
*'''ingress-policing''' | |||
*'''ingress-acl''' | |||
*'''egress-policing''' | |||
*'''egress-acl''' | |||
</td> | |||
</tr> | </tr> | ||
</table> | </table> | ||
<br> | |||
<p></p> | |||
===Forwarding Databases=== | |||
====Unicast FDB==== | |||
<p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | |||
unicast-fdb</code></p><br /> | |||
The unicast forwarding database supports up to 16318 MAC entries. | |||
<table class="styled_table"> | <table class="styled_table"> | ||
Line 959: | Line 852: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>action</b></var> (<em>action</em>; Default: <b>forward</b>)</td> | ||
Default:<b> | <td>Action for UFDB entry: | ||
<var>< | <ul class="bullets"> | ||
<li> <var>dst-drop</var> - Packets are dropped when their destination MAC match | |||
the entry. | |||
<li> <var>dst-redirect-to-cpu</var> - Packets are redirected to CPU when their | |||
destination MAC match the entry. | |||
<li> <var>forward</var> - Packets are forwarded. | |||
<li> <var>src-and-dst-drop</var> - Packets are dropped when their source MAC or | |||
destination MAC match the entry. | |||
<li> <var>src-and-dst-redirect-to-cpu</var> - Packets are redirected to CPU | |||
when their source MAC or destination MAC match the entry. | |||
<li> <var>src-drop</var> - Packets are dropped when their source MAC match the | |||
entry. | |||
<li> <var>src-redirect-to-cpu</var> - Packets are redirected to CPU when their | |||
source MAC match the entry. | |||
</ul> | |||
</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>disabled</b></var> (<em>yes | no</em>; Default: <b>no</b>)</td> | ||
<b> | <td>Enables or disables Unicast FDB entry.</td> | ||
<td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>isolation-profile</b></var> (<em>community1 | community2 | | ||
<b> | isolated | promiscuous</em>; Default: <b>promiscuous</b>)</td> | ||
<var><b> | <td>MAC level isolation profile.</td> | ||
<td> | </tr> | ||
<tr> | |||
<td><var><b>mac-address</b></var> (<em>MAC address</em>)</td> | |||
<td>The <var>action</var> command applies to the packet when the destination MAC or | |||
source MAC matches the entry.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>mirror</b></var> (<em>yes | no</em>; Default: <b>no</b>)</td> | ||
<b> | <td>Enables or disables mirroring based on source MAC or destination | ||
MAC.</td> | |||
<td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>port</b></var> (<em>port</em>)</td> | |||
<td>Matching port for the Unicast FDB entry.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>qos-group</b></var> (<em>none</em>; Default: <b>none</b>)</td> | ||
<b>none</b>)</td> | <td>Defined QoS group from [[#QoS_Group | QoS group]] menu.</td> | ||
<td> | |||
</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>svl</b></var> (<em>yes | no</em>; Default: <b>no</b>)</td> | ||
Default: <b> | <td>Unicast FDB learning mode: | ||
<ul class="bullets"> | |||
<li> Shared VLAN Learning (svl) - learning/lookup is based on MAC addresses - | |||
not on VLAN IDs. | |||
<li> Independent VLAN Learning (ivl) - learning/lookup is based on both MAC | |||
addresses and VLAN IDs. | |||
</ul> | |||
</td> | |||
</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>vlan-id</b></var> (<em>0..4095</em>)</td> | ||
<td>Unicast FDB lookup/learning VLAN id.</td> | |||
</ | |||
</td> | |||
</tr> | </tr> | ||
</table> | </table> | ||
Line 1,051: | Line 917: | ||
<p></p> | <p></p> | ||
=== | ====Multicast FDB==== | ||
<p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | <p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | ||
multicast-fdb</code></p><br /> | |||
CRS125 switch-chip supports up to 1024 entries in MFDB for multicast forwarding. | |||
For each multicast packet, destination MAC or destination IP lookup is performed | |||
in MFDB. MFDB entries are not | |||
automatically learnt and can only be configured. | |||
<table class="styled_table"> | <table class="styled_table"> | ||
Line 1,066: | Line 933: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>address</b></var> (<em>X.X.X.X | XX:XX:XX:XX:XX:XX</em>)</td> | ||
<td> | <td>Matching IP address or MAC address for multicast packets.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>bypass-vlan-filter</b></var> (<em>yes | no</em>; Default: | ||
<td> | <b>no</b>)</td> | ||
<td>Allow to bypass VLAN filtering for matching multicast packets.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>disabled</b></var> (<em>yes | no</em>; Default: <b>no</b>)</td> | ||
<td>Enables or disables Multicast FDB entry.</td> | |||
<td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>ports</b></var> (<em>ports</em>)</td> | ||
<td> | <td>Member ports for multicast traffic.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
Line 1,114: | Line 955: | ||
<tr> | <tr> | ||
<td><var><b>svl</b></var> (<em>yes | no</em>; Default: <b>no</b>)</td> | <td><var><b>svl</b></var> (<em>yes | no</em>; Default: <b>no</b>)</td> | ||
<td> | <td>Multicast FDB learning mode: | ||
<ul class="bullets"> | <ul class="bullets"> | ||
<li> Shared VLAN Learning (svl) - learning/lookup is based on MAC addresses - | <li> Shared VLAN Learning (svl) - learning/lookup is based on MAC addresses - | ||
Line 1,124: | Line 965: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>vlan-id</b></var> (<em>0..4095</em>)</td> | <td><var><b>vlan-id</b></var> (<em>0..4095</em>; Default: <b>0</b>)</td> | ||
<td> | <td>Multicast FDB lookup VLAN id. If VLAN learning mode is IVL, VLAN id is | ||
lookup id, otherwise VLAN id = 0.</td> | |||
</tr> | </tr> | ||
</table> | </table> | ||
Line 1,131: | Line 973: | ||
<p></p> | <p></p> | ||
==== | ====Reserved FDB==== | ||
<p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | <p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | ||
reserved-fdb</code></p><br /> | |||
Cloud Router Switch supports 256 RFDB entries. Each RFDB entry can store either | |||
Layer2 unicast or multicast MAC address with specific commands. | |||
<table class="styled_table"> | <table class="styled_table"> | ||
Line 1,147: | Line 987: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>action</b></var> (<em>copy-to-cpu | drop | forward | | ||
<td> | redirect-to-cpu</em>; Default: <b>forward</b>)</td> | ||
<td>Action for RFDB entry: | |||
<ul class="bullets"> | |||
<li> <var>copy-to-cpu</var> - Packets are copied to CPU when their destination | |||
MAC match the entry. | |||
<li> <var>drop</var> - Packets are dropped when their destination MAC match the | |||
entry. | |||
<li> <var>forward</var> - Packets are forwarded when their destination MAC | |||
match the entry. | |||
<li> <var>redirect-to-cpu</var> - Packets are redirected to CPU when their | |||
destination MAC match the entry. | |||
</ul> | |||
</td> | |||
</tr> | |||
<tr> | |||
<td><var><b>bypass-ingress-port-policing</b></var> (<em>yes | no</em>; Default: | |||
<b>no</b>)</td> | |||
<td>Allow to bypass Ingress Port Policer for matching packets.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>bypass-vlan-filter</b></var> (<em>yes | no</em>; Default: | <td><var><b>bypass-ingress-vlan-filter</b></var> (<em>yes | no</em>; Default: | ||
<b>no</b>)</td> | <b>no</b>)</td> | ||
<td>Allow to bypass VLAN filtering for matching | <td>Allow to bypass VLAN filtering for matching packets.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>disabled</b></var> (<em>yes | no</em>; Default: <b>no</b>)</td> | <td><var><b>disabled</b></var> (<em>yes | no</em>; Default: <b>no</b>)</td> | ||
<td>Enables or disables | <td>Enables or disables Reserved FDB entry.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>mac-address</b></var> (<em>MAC address</em>; Default: | ||
<td> | <b>00:00:00:00:00:00</b>)</td> | ||
<td>Matching MAC address for Reserved FDB entry.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>qos-group</b></var> (<em>none</em>; Default: <b>none</b>)</td> | <td><var><b>qos-group</b></var> (<em>none</em>; Default: <b>none</b>)</td> | ||
<td>Defined QoS group from [[#QoS_Group | QoS group]] menu.</td> | <td>Defined QoS group from [[#QoS_Group | QoS group]] menu.</td> | ||
</tr> | </tr> | ||
</table> | </table> | ||
Line 1,187: | Line 1,029: | ||
<p></p> | <p></p> | ||
==== | ===VLAN=== | ||
====VLAN Table==== | |||
<p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | <p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | ||
vlan</code></p><br /> | |||
The VLAN table supports 4096 VLAN entries for storing VLAN member information as | |||
well as | |||
other VLAN information such as QoS, isolation, forced VLAN, learning, and | |||
mirroring. | |||
<table class="styled_table"> | <table class="styled_table"> | ||
Line 1,201: | Line 1,047: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>disabled</b></var> (<em>yes | no</em>; Default: <b>no</b>)</td> | ||
<td>Indicate whether the VLAN entry is disabled. Only enabled entry is | |||
<td> | applied to lookup process and forwarding decision.</td> | ||
entry | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>flood</b></var> (<em>yes | no</em>; Default: <b>no</b>)</td> | ||
<b>no</b>)</td> | <td>Enables or disables forced VLAN flooding per VLAN. If the feature is | ||
<td> | enabled, the result of destination MAC lookup in the UFDB or MFDB is ignored, | ||
and the packet is forced to flood in the VLAN.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>ingress-mirror</b></var> (<em>yes | no</em>; Default: | ||
<b>no</b>)</td> | <b>no</b>)</td> | ||
<td> | <td>Enable the ingress mirror per VLAN to support the VLAN-based mirror | ||
function.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>learn</b></var> (<em>yes | no</em>; Default: | ||
<td>Enables or disables | <b>yes</b>)</td> | ||
<td>Enables or disables source MAC learning for VLAN.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>ports</b></var> (<em>ports</em>)</td> | ||
<td>Member ports of the VLAN.</td> | |||
<td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>qos-group</b></var> (<em>none</em>; Default: <b>none</b>)</td> | <td><var><b>qos-group</b></var> (<em>none</em>; Default: <b>none</b>)</td> | ||
<td>Defined QoS group from [[#QoS_Group | QoS group]] menu.</td> | <td>Defined QoS group from [[#QoS_Group | QoS group]] menu.</td> | ||
</tr> | |||
<tr> | |||
<td><var><b>svl</b></var> (<em>yes | no</em>; Default: <b>no</b>)</td> | |||
<td>FDB lookup mode for lookup in UFDB and MFDB. | |||
<ul class="bullets"> | |||
<li> Shared VLAN Learning (svl) - learning/lookup is based on MAC addresses - | |||
not on VLAN IDs. | |||
<li> Independent VLAN Learning (ivl) - learning/lookup is based on both MAC | |||
addresses and VLAN IDs. | |||
</ul> | |||
</td> | |||
</tr> | |||
<tr> | |||
<td><var><b>vlan-id</b></var> (<em>0..4095</em>)</td> | |||
<td>VLAN id of the VLAN member entry.</td> | |||
</tr> | </tr> | ||
</table> | </table> | ||
Line 1,243: | Line 1,095: | ||
<p></p> | <p></p> | ||
====Egress VLAN Tag==== | |||
====VLAN | |||
<p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | <p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | ||
vlan</code></p><br /> | egress-vlan-tag</code></p><br /> | ||
The VLAN table | Egress packets can be assigned different VLAN tag format. The VLAN tags can be | ||
removed, | |||
added, or remained as is when the packet is sent to the egress port (destination | |||
port). Each | |||
port has dedicated control on the egress VLAN tag format. The tag formats | |||
include: | |||
* Untagged | |||
* Tagged | |||
* Unmodified | |||
The Egress VLAN Tag table includes 4096 entries for VLAN tagging selection. | |||
<table class="styled_table"> | <table class="styled_table"> | ||
Line 1,262: | Line 1,119: | ||
<tr> | <tr> | ||
<td><var><b>disabled</b></var> (<em>yes | no</em>; Default: <b>no</b>)</td> | <td><var><b>disabled</b></var> (<em>yes | no</em>; Default: <b>no</b>)</td> | ||
<td> | <td>Enables or disables Egress VLAN Tag table entry.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>tagged-ports</b></var> (<em>ports</em>)</td> | ||
<td> | <td>Ports which are tagged in egress.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>vlan-id</b></var> (<em>0..4095</em>)</td> | ||
<td>VLAN id which is tagged in egress.</td> | |||
<td> | |||
</tr> | </tr> | ||
< | </table> | ||
<b> | <p></p> | ||
====Ingress/Egress VLAN Translation==== | |||
The Ingress VLAN Translation table allows for up to 15 entries for each port. One or multiple fields can be selected from packet header for lookup in the | |||
Ingress VLAN Translation table. The S-VLAN or C-VLAN or both configured in the first matched entry is assigned to the packet. | |||
<p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | |||
ingress-vlan-translation</code></p><br /> | |||
<p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | |||
egress-vlan-translation</code></p><br /> | |||
<table class="styled_table"> | |||
<tr> | |||
<th width="50%">Property</th> | |||
<th >Description</th> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>customer-dei</b></var> (<em>0..1</em>; Default: | ||
<td> | <b>none</b>)</td> | ||
<td>Matching DEI of the customer tag.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>customer-pcp</b></var> (<em>0..7</em>; Default: | ||
<td> | <b>none</b>)</td> | ||
<td>Matching PCP of the customer tag.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>customer-vid</b></var> (<em>0..4095</em>; Default: | ||
<td> | <b>none</b>)</td> | ||
< | <td>Matching VLAN id of the customer tag.</td> | ||
< | </tr> | ||
<tr> | |||
< | <td><var><b>customer-vlan-format</b></var> (<em>any | | ||
priority-tagged-or-tagged | tagged | untagged-or-tagged</em>; Default:<b>any</b>)</td> | |||
<td>Type of frames with customer tag for which VLAN translation rule is | |||
valid.</td> | |||
</tr> | |||
<tr> | |||
<td><var><b>disabled</b></var> (<em>yes | no</em>; Default: <b>no</b>)</td> | |||
<td>Enables or disables VLAN translation entry.</td> | |||
</tr> | |||
<tr> | |||
<td><var><b>new-customer-vid</b></var> (<em>0..4095</em>; Default: | |||
<b>none</b>)</td> | |||
<td>The new customer VLAN id which replaces matching customer VLAN id. If set to 4095 and ingress VLAN translation is used, then traffic is dropped.</td> | |||
</tr> | |||
<tr> | |||
<td><var><b>new-service-vid</b></var> (<em>0..4095</em>; Default: | |||
<b>none</b>)</td> | |||
<td>The new service VLAN id which replaces matching service VLAN id.</td> | |||
</tr> | |||
<tr> | |||
<td><var><b>pcp-propagation</b></var> (<em>yes | no</em>; Default: | |||
<b>no</b>)</td> | |||
<td>Enables or disables PCP propagation. | |||
<ul class="bullets"> | |||
<li> If the port type is Edge, the customer PCP is copied from the service PCP. | |||
<li> If the port type is Network, the service PCP is copied from the customer PCP. | |||
</ul> | </ul> | ||
</td> | </td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>ports</b></var> (<em>ports</em>)</td> | ||
<td>VLAN | <td>Matching switch ports for VLAN translation rule.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>protocol</b></var> (<em>protocols</em>; Default: | |||
<b>none</b>)</td> | |||
<td>Matching Ethernet protocol. ''(only for Ingress VLAN Translation)''</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>sa-learning</b></var> (<em>yes | no</em>; Default: | ||
<td>Enables or disables | <b>no</b>)</td> | ||
<td>Enables or disables source MAC learning after VLAN translation. ''(only for Ingress VLAN Translation)''</td> | |||
</tr> | |||
<tr> | |||
<td><var><b>service-dei</b></var> (<em>0..1</em>; Default: <b>none</b>)</td> | |||
<td>Matching DEI of the service tag.</td> | |||
</tr> | |||
<tr> | |||
<td><var><b>service-pcp</b></var> (<em>0..7</em>; Default: <b>none</b>)</td> | |||
<td>Matching PCP of the service tag.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>service-vid</b></var> (<em>0..4095</em>; Default: | ||
<td> | <b>none</b>)</td> | ||
<td>Matching VLAN id of the service tag.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>vlan- | <td><var><b>service-vlan-format</b></var> (<em>any | | ||
<td>VLAN | priority-tagged-or-tagged | tagged | untagged-or-tagged</em>; Default:<b>any</b>)</td> | ||
<td>Type of frames with service tag for which VLAN translation rule is | |||
valid.</td> | |||
</tr> | </tr> | ||
</table> | </table> | ||
Line 1,347: | Line 1,230: | ||
<p></p> | <p></p> | ||
==== | Below is a table of traffic that triggers a rule that has a certain VLAN format set, note that traffic that is tagged with VLAN ID 0 is a special case that is also taken into account. | ||
<table class="styled_table"> | |||
<tr> | |||
<th width="50%">Property</th> | |||
<th >Description</th> | |||
</tr> | |||
<tr> | |||
<td><var><b>any</b></var></td> | |||
<td>Accepts: | |||
* Untagged traffic | |||
* Tagged traffic | |||
* Tagged traffic with priority set | |||
* VLAN 0 traffic | |||
* VLAN 0 traffic with priority set | |||
</td> | |||
</tr> | |||
<tr> | |||
<td><var><b>priority-tagged-or-tagged</b></var></td> | |||
<td>Accepts: | |||
* Tagged traffic | |||
* Tagged traffic with priority set | |||
* VLAN 0 traffic | |||
* VLAN 0 traffic with priority set | |||
</td> | |||
</tr> | |||
<tr> | |||
<td><var><b>tagged</b></var></td> | |||
<td>Accepts: | |||
* Tagged traffic | |||
* Tagged traffic with priority set | |||
</td> | |||
<tr> | |||
<td><var><b>untagged-or-tagged</b></var></td> | |||
<td>Accepts: | |||
* Untagged traffic | |||
* Tagged traffic | |||
* Tagged traffic with priority set | |||
</td> | |||
</tr> | |||
</table> | |||
<br /> | |||
{{ Warning | If <code>VLAN-format</code> is set to <code>any</code>, then <code>customer-vid/service-vid</code> set to <code>0</code> will trigger the switch rule with VLAN 0 traffic. In this case the switch rule will be looking for untagged traffic or traffic with VLAN 0 tag, only <code>untagged-or-tagged</code> will filter out VLAN 0 traffic in this case. }} | |||
====Protocol Based VLAN==== | |||
<p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | <p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | ||
protocol-based-vlan</code></p><br /> | |||
Protocol Based VLAN table is used to assign VID and QoS attributes to related | |||
protocol packet per port. | |||
<table class="styled_table"> | <table class="styled_table"> | ||
Line 1,363: | Line 1,289: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>disabled</b></var> (<em>yes | no</em>; Default: <b>no</b>)</td> | ||
<b> | <td>Enables or disables Protocol Based VLAN entry.</td> | ||
<td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>frame-type</b></var> (<em>ethernet | llc | rfc-1042</em>; | ||
<b> | Default: <b>ethernet</b>)</td> | ||
<td> | <td>Encapsulation type of the matching frames.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>customer-vid</b></var> (<em>0..4095</em>; Default: | <td><var><b>new-customer-vid</b></var> (<em>0..4095</em>; Default: | ||
<b> | <b>0</b>)</td> | ||
<td> | <td>The new customer VLAN id which replaces original customer VLAN id for | ||
specified protocol. If set to 4095, then traffic is dropped.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>new-service-vid</b></var> (<em>0..4095</em>; Default: | ||
<b>0</b>)</td> | |||
<td> | <td>The new service VLAN id which replaces original service VLAN id for | ||
specified protocol.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>ports</b></var> (<em>ports</em>)</td> | ||
<td> | <td>Matching switch ports for Protocol based VLAN rule.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>protocol</b></var> (<em>protocol</em>; Default: <b>0</b>)</td> | ||
<b> | <td>Matching protocol for Protocol based VLAN rule.</td> | ||
<td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>qos-group</b></var> (<em>none</em>; Default: <b>none</b>)</td> | ||
<b>none</b>)</td> | <td>Defined QoS group from [[#QoS_Group | QoS group]] menu.</td> | ||
<td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>set-customer-vid-for</b></var> (<em>all | none | tagged | | ||
<b> | untagged-or-priority-tagged</em>; Default: <b>all</b>)</td> | ||
<td> | <td>Customer VLAN id assignment command for different packet type.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>set-qos-for</b></var> (<em>all | none | tagged | | ||
<td> | untagged-or-priority-tagged</em>; Default: <b>none</b>)</td> | ||
<td>Frame type for which QoS assignment command applies.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>set-service-vid-for</b></var> (<em>all | none | tagged | | ||
<b> | untagged-or-priority-tagged</em>; Default: <b>all</b>)</td> | ||
<td> | <td>Service VLAN id assignment command for different packet type.</td> | ||
</tr> | </tr> | ||
</table> | |||
<p></p> | |||
====MAC Based VLAN==== | |||
</table> | |||
<p></p> | |||
==== | |||
<p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | <p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | ||
mac-based-vlan</code></p><br /> | |||
MAC Based VLAN table is used to assign VLAN based on source MAC. | |||
<table class="styled_table"> | <table class="styled_table"> | ||
Line 1,459: | Line 1,354: | ||
<tr> | <tr> | ||
<td><var><b>disabled</b></var> (<em>yes | no</em>; Default: <b>no</b>)</td> | <td><var><b>disabled</b></var> (<em>yes | no</em>; Default: <b>no</b>)</td> | ||
<td>Enables or disables | <td>Enables or disables MAC Based VLAN entry.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>new-customer-vid</b></var> (<em>0..4095</em>; Default: | <td><var><b>new-customer-vid</b></var> (<em>0..4095</em>; Default: | ||
<b>0</b>)</td> | <b>0</b>)</td> | ||
<td>The new customer VLAN id which replaces original | <td>The new customer VLAN id which replaces original service VLAN id for | ||
matched packets. If set to 4095, then traffic is dropped.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
Line 1,476: | Line 1,366: | ||
<b>0</b>)</td> | <b>0</b>)</td> | ||
<td>The new service VLAN id which replaces original service VLAN id for | <td>The new service VLAN id which replaces original service VLAN id for | ||
matched packets.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>src-mac-address</b></var> (<em>MAC address</em>)</td> | ||
<td>Matching | <td>Matching source MAC address for MAC based VLAN rule.</td> | ||
</tr> | </tr> | ||
</table> | |||
{{Note | All CRS1xx/2xx series switches support up to 1024 MAC Based VLAN table entries.}} | |||
<p></p> | |||
====1:1 VLAN Switching==== | |||
<p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | |||
one2one-vlan-switching</code></p><br /> | |||
1:1 VLAN switching can be used to replace the regular L2 bridging for matched | |||
packets. | |||
When a packet hits an 1:1 VLAN switching table entry, the destination port | |||
information in | |||
the entry is assigned to the packet. The matched destination information in UFDB | |||
and MFDB | |||
entry no longer applies to the packet. | |||
<table class="styled_table"> | |||
<tr> | <tr> | ||
<th width="50%">Property</th> | |||
<th >Description</th> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>customer-vid</b></var> (<em>0..4095</em>; Default: | ||
<b>0</b>)</td> | |||
<td> | <td>Matching customer VLAN id for 1:1 VLAN switching.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>disabled</b></var> (<em>yes | no</em>; Default: <b>no</b>)</td> | ||
<td>Enables or disables 1:1 VLAN switching table entry.</td> | |||
<td> | |||
</tr> | </tr> | ||
</table> | <tr> | ||
<td><var><b>dst-port</b></var> (<em>port</em>)</td> | |||
<td>Destination port for matched 1:1 VLAN switching packets.</td> | |||
</tr> | |||
<tr> | |||
<td><var><b>service-vid</b></var> (<em>0..4095</em>; Default: <b>0</b>)</td> | |||
<td>Matching customer VLAN id for 1:1 VLAN switching.</td> | |||
</tr> | |||
</table> | |||
<p></p> | <p></p> | ||
=== | ===Port Isolation/Leakage=== | ||
<p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | <p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | ||
port-isolation</code></p><br /> | |||
<p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | |||
port-leakage</code></p><br /> | |||
The CRS switches support flexible multi-level isolation features, which can be | |||
used for user access control, traffic engineering and advanced security and | |||
network management. | |||
The isolation features provide an organized fabric structure allowing user to | |||
easily program and | |||
control the access by port, MAC address, VLAN, protocol, flow and frame type. | |||
The following isolation and leakage features are supported: | |||
* Port-level isolation | |||
* MAC-level isolation | |||
* VLAN-level isolation | |||
* Protocol-level isolation | |||
* Flow-level isolation | |||
* Free combination of the above | |||
<table class="styled_table"> | Port-level isolation supports different control schemes on source port and | ||
destination port. Each | |||
entry can be programmed with access control for either source port or | |||
destination port. | |||
* When the entry is programmed with source port access control, the entry is | |||
applied to the ingress packets. | |||
* When the entry is programmed with destination port access control, the entry | |||
is applied to the egress packets. | |||
Port leakage allows bypassing egress VLAN filtering on the port. Leaky port is | |||
allowed to access | |||
other ports for various applications such as security, network control and | |||
management. | |||
Note: When both isolation and leakage is applied to the same port, the port is | |||
isolated. | |||
<table class="styled_table"> | |||
<tr> | <tr> | ||
<th width="50%">Property</th> | <th width="50%">Property</th> | ||
Line 1,523: | Line 1,461: | ||
<tr> | <tr> | ||
<td><var><b>disabled</b></var> (<em>yes | no</em>; Default: <b>no</b>)</td> | <td><var><b>disabled</b></var> (<em>yes | no</em>; Default: <b>no</b>)</td> | ||
<td>Enables or disables | <td>Enables or disables port isolation/leakage entry.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>flow-id</b></var> (<em>0..63</em>; Default: <b>none</b>)</td> | ||
<b> | <td></td> | ||
<td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>forwarding-type</b></var> (<em>bridged; routed</em>; Default: <b>bridged,routed</b>)</td> | ||
<b> | <td>Matching traffic forwarding type on Cloud Router Switch.</td> | ||
<td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>mac-profile</b></var> (<em>community1 | community2 | isolated | | ||
<td>Matching | promiscuous</em>; Default: <b>none</b>)</td> | ||
<td>Matching MAC isolation/leakage profile.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>port-profile</b></var> (<em>0..31</em>; Default: | |||
<b>none</b>)</td> | |||
<td>Matching Port isolation/leakage profile.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>ports</b></var> (<em>ports</em>; Default: <b>none</b>)</td> | ||
<b> | <td>Isolated/leaked ports.</td> | ||
<td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>protocol-type</b></var> (<em>arp; nd; dhcpv4; dhcpv6; ripv1</em>; Default: <b>arp,nd,dhcpv4,dhcpv6,ripv1</b>)</td> | ||
<td> | <td>Included protocols for isolation/leakage.</td> | ||
</tr> | |||
<tr> | |||
<td><var><b>registration-status</b></var> (<em>known; unknown</em>; Default: <b>known,unknown</b>)</td> | |||
<td>Registration status for matching packets. Known are present in UFDB and MFDB, unknown are not.</td> | |||
</tr> | |||
<tr> | |||
<td><var><b>traffic-type</b></var> (<em>unicast; multicast; broadcast</em>; Default: <b>unicast,multicast,broadcast</b>)</td> | |||
<td>Matching traffic type.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>type</b></var> (<em>dst | src</em>; Default: <b>src</b>)</td> | ||
<td> | <td>Lookup type of the isolation/leakage entry: | ||
<ul class="bullets"> | |||
<li> <var>src</var> - Entry applies to ingress packets of the ports. | |||
<li> <var>dst</var> - Entry applies to egress packets of the ports. | |||
</ul> | |||
</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>vlan-profile</b></var> (<em>community1 | community2 | isolated | | ||
<td>Matching | promiscuous</em>; Default: <b>none</b>)</td> | ||
<td>Matching VLAN isolation/leakage profile.</td> | |||
</tr> | </tr> | ||
</table> | </table> | ||
Line 1,584: | Line 1,515: | ||
<p></p> | <p></p> | ||
=== | ===Trunking=== | ||
<p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | <p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | ||
port- | trunk</code></p><br /> | ||
The Trunking in the Cloud Router Switches provides static link aggregation groups with hardware automatic failover and load balancing. IEEE802.3ad and IEEE802.1ax compatible Link Aggregation Control Protocol is not supported. Up to 8 Trunk groups are supported with up to 8 Trunk member ports per Trunk group. CRS Port Trunking calculates transmit-hash based on all following parameters: L2 src-dst MAC + L3 src-dst IP + L4 src-dst Port. | |||
<table class="styled_table"> | |||
<tr> | |||
<th width="50%">Property</th> | |||
<th >Description</th> | |||
</tr> | |||
<tr> | |||
<td><var><b>disabled</b></var> (<em>yes | no</em>; Default: <b>no</b>)</td> | |||
<td>Enables or disables port trunking entry.</td> | |||
</tr> | |||
<tr> | |||
<td><var><b>member-ports</b></var> (<em>ports</em>)</td> | |||
<td>Member ports of the Trunk group.</td> | |||
</tr> | |||
<tr> | |||
<td><var><b>name</b></var> (<em>string value</em>; Default: | |||
<b>trunkX</b>)</td> | |||
<td>Name of the Trunk group.</td> | |||
</tr> | |||
</table> | |||
<p></p> | |||
===Quality of Service=== | |||
====Shaper==== | |||
<p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | <p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | ||
shaper</code></p><br /> | |||
Traffic shaping restricts the rate and burst size of the flow which is | |||
transmitted out from the | |||
interface. The shaper is implemented by a token bucket. If the packet exceeds | |||
The | the maximum rate or | ||
the burst size, which means no enough token for the packet, the packet is stored | |||
to buffer until | |||
there is enough token to transmit it. | |||
<table class="styled_table"> | |||
<tr> | |||
<th width="50%">Property</th> | |||
<th >Description</th> | |||
</tr> | |||
<table class="styled_table"> | |||
<tr> | <tr> | ||
<td><var><b>burst</b></var> (<em>integer</em>; Default: | |||
<b>100k</b>)</td> | |||
<td>Maximum data rate which can be transmitted while the burst is | |||
allowed.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>disabled</b></var> (<em>yes | no</em>; Default: <b>no</b>)</td> | <td><var><b>disabled</b></var> (<em>yes | no</em>; Default: <b>no</b>)</td> | ||
<td>Enables or disables | <td>Enables or disables traffic shaper entry.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>meter-unit</b></var> (<em>bit | packet</em>; Default: | ||
<td></td> | <b>bit</b>)</td> | ||
<td>Measuring units for traffic shaper rate.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>port</b></var> (<em>port</em>)</td> | ||
<td> | <td>Physical port for traffic shaper.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>rate</b></var> (<em>integer</em>; Default: | ||
<b>1M</b>)</td> | |||
<td> | <td>Maximum data rate limit.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>target</b></var> (<em>port | queueX | wrr-groupX</em>; Default: | ||
<b> | <b>port</b>)</td> | ||
<td> | <td>Three levels of shapers are supported on each port (including CPU port): | ||
<ul class="bullets"> | |||
<li> <var>Port level</var> - Entry applies to port of the switch-chip. | |||
<li> <var>WRR group level</var> - Entry applies to one of the 2 Weighted Round | |||
Robin queue groups (wrr-group0, wrr-group1) on port. | |||
<li> <var>Queue level</var> - Entry applies to one of the 8 queues (queue0 - | |||
queue7) on port. | |||
</ul> | |||
</td> | |||
</tr> | </tr> | ||
</table> | |||
<p></p> | |||
====Ingress Port Policer==== | |||
<p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | |||
ingress-port-policer</code></p><br /> | |||
<table class="styled_table"> | |||
<tr> | <tr> | ||
<th width="50%">Property</th> | |||
<th >Description</th> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>burst</b></var> (<em>integer</em>; Default: | ||
<td> | <b>100k</b>)</td> | ||
<td>Maximum data rate which can be transmitted while the burst is | |||
allowed.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>disabled</b></var> (<em>yes | no</em>; Default: <b>no</b>)</td> | ||
<td> | <td>Enables or disables ingress port policer entry.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>meter-len</b></var> (<em>layer-1 | layer-2 | layer-3</em>; Default: | ||
<td> | <b>layer-1</b>)</td> | ||
<td>Packet classification which sets the packet byte length for metering. | |||
<ul class="bullets"> | |||
<li> <var>layer-1</var> - includes entire layer-2 frame + FCS + inter-packet gap + preamble. | |||
<li> <var>layer-2</var> - includes layer-2 frame + FCS. | |||
<li> <var>layer-3</var> - includes only layer-3 + ethernet padding without layer-2 header and FCS. | |||
</ul></td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>meter-unit</b></var> (<em>bit | packet</em>; Default: | ||
<td> | <b>bit</b>)</td> | ||
<td>Measuring units for traffic ingress port policer rate.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>new-dei-for-yellow</b></var> (<em>0..1 | remap</em>; Default: | ||
<b>none</b>)</td> | |||
<td> | <td>Remarked DEI for exceeded traffic if yellow-action is remark.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>new-dscp-for-yellow</b></var> (<em>0..63 | remap</em>; Default: | |||
<b>none</b>)</td> | |||
<td>Remarked DSCP for exceeded traffic if yellow-action is remark.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>new-pcp-for-yellow</b></var> (<em>0..7 | remap</em>; Default: | ||
<td> | <b>none</b>)</td> | ||
<td>Remarked PCP for exceeded traffic if yellow-action is remark.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>packet-types</b></var> (<em>packet-types</em>; Default: | ||
<td> | <b>all types from description</b>)</td> | ||
<td>Matching packet types for which ingress port policer entry is valid.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>port</b></var> (<em>port</em>)</td> | ||
<b> | <td>Physical port or trunk for ingress port policer entry.</td> | ||
<td> | </tr> | ||
<tr> | |||
<td><var><b>rate</b></var> (<em>integer</em>)</td> | |||
<td>Maximum data rate limit.</td> | |||
</tr> | |||
<tr> | |||
<td><var><b>yellow-action</b></var> (<em>drop | forward | remark</em>; Default: | |||
<b>drop</b>)</td> | |||
<td>Performed action for exceeded traffic.</td> | |||
</tr> | </tr> | ||
</table> | </table> | ||
Line 1,711: | Line 1,678: | ||
<p></p> | <p></p> | ||
=== | ====QoS Group==== | ||
<p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | <p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | ||
qos-group</code></p><br /> | |||
The global QoS group table is used for VLAN-based, Protocol-based and MAC-based | |||
QoS group assignment configuration. | |||
<table class="styled_table"> | <table class="styled_table"> | ||
Line 1,733: | Line 1,692: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>dei</b></var> (<em>0..1</em>; Default: <b>none</b>)</td> | ||
<b> | <td>The new value of DEI for the QoS group.</td> | ||
<td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>disabled</b></var> (<em>yes | no</em>; Default: <b>no</b>)</td> | <td><var><b>disabled</b></var> (<em>yes | no</em>; Default: <b>no</b>)</td> | ||
<td>Enables or disables | <td>Enables or disables protocol QoS group entry.</td> | ||
</tr> | |||
<tr> | |||
<td><var><b>drop-precedence</b></var> (<em>drop | green | red | yellow</em>; | |||
Default: <b>green</b>)</td> | |||
<td>Drop precedence is internal QoS attribute used for packet enqueuing or | |||
dropping.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>dscp</b></var> (<em>0..63</em>; Default: <b>none</b>)</td> | ||
<b> | <td>The new value of DSCP for the QoS group.</td> | ||
<td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>name</b></var> (<em>string value</em>; Default: | ||
<td> | <b>groupX</b>)</td> | ||
<td>Name of the QoS group.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>pcp</b></var> (<em>0..7</em>; Default: <b>none</b>)</td> | ||
<b> | <td>The new value of PCP for the QoS group.</td> | ||
<td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>priority</b></var> (<em>0..15</em>; Default: <b>0</b>)</td> | ||
<b> | <td>Internal priority is a local significance of priority for classifying | ||
<td> | traffics to different egress queues on a port. (1 is highest, 15 is lowest)</td> | ||
</tr> | </tr> | ||
</table> | </table> | ||
Line 1,773: | Line 1,727: | ||
<p></p> | <p></p> | ||
==== | ====DSCP QoS Map==== | ||
<p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | <p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | ||
dscp-qos-map</code></p><br /> | |||
The global DSCP to QOS mapping table is used for mapping from DSCP of the packet | |||
to new QoS attributes configured in the table. | |||
<table class="styled_table"> | <table class="styled_table"> | ||
Line 1,784: | Line 1,741: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>dei</b></var> (<em>0..1</em>)</td> | ||
<td>The new value of DEI for the DSCP to QOS mapping entry.</td> | |||
<td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>drop-precedence</b></var> (<em>drop | green | red | yellow</em>)</td> | ||
<td> | <td>The new value of Drop precedence for the DSCP to QOS mapping entry.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>pcp</b></var> (<em>0..7</em>)</td> | ||
<td>The new value of PCP for the DSCP to QOS mapping entry.</td> | |||
<td> | </tr> | ||
</tr> | |||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>priority</b></var> (<em>0..15</em>)</td> | ||
<td>The new value of internal priority for the DSCP to QOS mapping | |||
<td> | entry.</td> | ||
</tr> | </tr> | ||
</table> | |||
<p></p> | |||
====DSCP To DSCP Map==== | |||
<p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | |||
dscp-to-dscp</code></p><br /> | |||
The global DSCP to DSCP mapping table is used for mapping from the packet's | |||
original DSCP to new DSCP value configured in the table. | |||
<table class="styled_table"> | |||
<tr> | <tr> | ||
<th width="50%">Property</th> | |||
<th >Description</th> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>new-dscp | <td><var><b>new-dscp</b></var> (<em>0..63</em>)</td> | ||
<td>The new value of DSCP for the DSCP to DSCP mapping entry.</td> | |||
<td> | |||
</tr> | </tr> | ||
</table> | |||
<p></p> | |||
====Policer QoS Map==== | |||
<p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | |||
policer-qos-map</code></p><br /> | |||
<table class="styled_table"> | |||
<tr> | <tr> | ||
<th width="50%">Property</th> | |||
<th >Description</th> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>dei-for-red</b></var> (<em>0..1</em>; Default: <b>0</b>)</td> | ||
<b> | <td>Policer DEI remapping value for red packets.</td> | ||
<td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>dei-for-yellow</b></var> (<em>0..1</em>; Default: <b>0</b>)</td> | ||
<td> | <td>Policer DEI remapping value for yellow packets.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>dscp-for-red</b></var> (<em>0..63</em>; Default: <b>0</b>)</td> | ||
<td> | <td>Policer DSCP remapping value for red packets.</td> | ||
</tr> | |||
<tr> | |||
<td><var><b>dscp-for-yellow</b></var> (<em>0..63</em>; Default: <b>0</b>)</td> | |||
<td>Policer DSCP remapping value for yellow packets.</td> | |||
</tr> | |||
<tr> | |||
<td><var><b>pcp-for-red</b></var> (<em>0..7</em>; Default: <b>0</b>)</td> | |||
<td>Policer PCP remapping value for red packets.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>yellow | <td><var><b>pcp-for-yellow</b></var> (<em>0..7</em>; Default: <b>0</b>)</td> | ||
<b> | <td>Policer PCP remapping value for yellow packets.</td> | ||
<td> | |||
</tr> | </tr> | ||
</table> | </table> | ||
Line 1,845: | Line 1,822: | ||
<p></p> | <p></p> | ||
==== | ===Access Control List=== | ||
{{Note | See Summary section for Access Control List supported Cloud Router Switch devices.}} | |||
Access Control List contains of ingress policy and egress policy engines and allows to configure up to 128 policy rules (limited by RouterOS). It is advanced tool for wire-speed packet filtering, forwarding, shaping and modifying based on Layer2, Layer3 and Layer4 protocol header field conditions. | |||
{{ Warning | Due to hardware limitation it is not possible to match broadcast/multicast traffic on specific ports. You should use port isolation, drop traffic on ingress ports or use VLAN filtering to prevent certain broadcast/multicast traffic from being forwarded. }} | |||
====ACL==== | |||
<p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | <p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | ||
acl</code></p><br /> | |||
ACL condition part for MAC related fields of packets. | |||
<table class="styled_table"> | <table class="styled_table"> | ||
Line 1,859: | Line 1,843: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>disabled</b></var> (<em>yes | no</em>; Default: | ||
<td> | <b>no</b>)</td> | ||
<td>Enables or disables ACL entry.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>table</b></var> (<em>egress | ingress</em>; Default: | ||
<td> | <b>ingress</b>)</td> | ||
<td>Selects policy table for incoming or outgoing packets.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>invert-match</b></var> (<em>yes | no</em>; Default: | ||
Default: <b> | <b>no</b>)</td> | ||
<td> | <td>Inverts whole ACL rule matching.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>src-ports</b></var> (<em>ports,trunks</em>)</td> | ||
<td> | <td>Matching physical source ports or trunks.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>dst-ports</b></var> (<em>ports,trunks</em>)</td> | ||
<td>Matching physical destination ports or trunks. It is not possible to match broadcast/multicast traffic on egress port due to a hardware limitation.</td> | |||
<td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>mac-src-address</b></var> (<em>MAC address/Mask</em>)</td> | ||
<td> | <td>Source MAC address and mask.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>mac-dst-address</b></var> (<em>MAC address/Mask</em>)</td> | ||
<td> | <td>Destination MAC address and mask.</td> | ||
</tr> | |||
<tr> | |||
<td><var><b>dst-addr-registered</b></var> (<em>yes | no</em>)</td> | |||
<td>Defines whether to match packets with registered state - packets which | |||
destination MAC address is in UFDB/MFDB/RFDB. Valid only in egress table.</td> | |||
</tr> | |||
<tr> | |||
<td><var><b>mac-protocol</b></var> (<em>802.2 | arp | homeplug-av | ip | ip-or-ipv6 | ipv6 | ipx | lldp | loop-protect | mpls-multicast | mpls-unicast | non-ip | packing-compr | packing-simple | pppoe | pppoe-discovery | rarp | service-vlan | vlan or integer: 0..65535 decimal format or 0x0000-0xffff hex format</em>)</td> | |||
<td>Ethernet payload type (MAC-level protocol) | |||
* <b>802.2</b> - 802.2 Frames (0x0004) | |||
* <b>arp</b> - Address Resolution Protocol (0x0806) | |||
* <b>homeplug-av</b> - HomePlug AV MME (0x88E1) | |||
* <b>ip</b> - Internet Protocol version 4 (0x0800) | |||
* <b>ip-or-ipv6</b> - IPv4 or IPv6 (0x0800 or 0x86DD) | |||
* <b>ipv6</b> - Internet Protocol Version 6 (0x86DD) | |||
* <b>ipx</b> - Internetwork Packet Exchange (0x8137) | |||
* <b>lldp</b> - Link Layer Discovery Protocol (0x88CC) | |||
* <b>loop-protect</b> - Loop Protect Protocol (0x9003) | |||
* <b>mpls-multicast</b> - MPLS multicast (0x8848) | |||
* <b>mpls-unicast</b> - MPLS unicast (0x8847) | |||
* <b>non-ip</b> - Not Internet Protocol version 4 (not 0x0800) | |||
* <b>packing-compr</b> - Encapsulated packets with compressed [[Manual:IP/Packing| IP packing]] (0x9001) | |||
* <b>packing-simple</b> - Encapsulated packets with simple [[Manual:IP/Packing| IP packing]] (0x9000) | |||
* <b>pppoe</b> - PPPoE Session Stage (0x8864) | |||
* <b>pppoe-discovery</b> - PPPoE Discovery Stage (0x8863) | |||
* <b>rarp</b> - Reverse Address Resolution Protocol (0x8035) | |||
* <b>service-vlan</b> - Provider Bridging (IEEE 802.1ad) & Shortest Path Bridging IEEE 802.1aq (0x88A8) | |||
* <b>vlan</b> - VLAN-tagged frame (IEEE 802.1Q) and Shortest Path Bridging IEEE 802.1aq with NNI compatibility (0x8100) | |||
</td> | |||
</tr> | |||
<tr> | |||
<td><var><b>drop-precedence</b></var> (<em>drop | green | red | yellow</em>)</td> | |||
<td>Matching internal drop precedence. Valid only in egress table.</td> | |||
</tr> | |||
<tr> | |||
<td><var><b>custom-fields</b></var></td> | |||
<td></td> | |||
</tr> | </tr> | ||
</table> | </table> | ||
<br> | |||
ACL condition part for VLAN related fields of packets. | |||
<table class="styled_table"> | <table class="styled_table"> | ||
Line 1,908: | Line 1,921: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>lookup-vid</b></var> (<em>0..4095</em>)</td> | ||
<td> | <td>VLAN id used in lookup. It can be changed before reaching egress table.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>service-vid</b></var> (<em>0-4095</em>)</td> | ||
<td> | <td>Matching service VLAN id.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>pcp</b></var> (<em>0..7</em>)</td> | <td><var><b>service-pcp</b></var> (<em>0..7</em>)</td> | ||
<td> | <td>Matching service PCP.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>service-dei</b></var> (<em>0..1</em>)</td> | ||
<td> | <td>Matching service DEI.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>service-tag</b></var> (<em>priority-tagged | tagged | | |||
tagged-or-priority-tagged | untagged</em>)</td> | |||
<td>Format of the service tag.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>customer-vid</b></var> (<em>0-4095</em>)</td> | ||
<td> | <td>Matching customer VLAN id.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>customer-pcp</b></var> (<em>0..7</em>)</td> | |||
<td>Matching customer PCP.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>dei | <td><var><b>customer-dei</b></var> (<em>0..1</em>)</td> | ||
<td> | <td>Matching customer DEI.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>customer-tag</b></var> (<em>priority-tagged | tagged | | ||
<td> | tagged-or-priority-tagged | untagged</em>)</td> | ||
<td>Format of the customer tag.</td> | |||
</tr> | |||
<tr> | |||
<td><var><b>priority</b></var> (<em>0..15</em>)</td> | |||
<td>Matching internal priority. Valid only in egress table.</td> | |||
</tr> | </tr> | ||
</table> | |||
<br> | |||
ACL condition part for IPv4 and IPv6 related fields of packets. | |||
<table class="styled_table"> | |||
<tr> | <tr> | ||
<th width="50%">Property</th> | |||
<th >Description</th> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>ip-src</b></var> (<em>IPv4/0..32</em>)</td> | ||
<td> | <td>Matching source IPv4 address.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>ip-dst</b></var> (<em>IPv4/0..32</em>)</td> | ||
<td> | <td>Matching destination IPv4 address.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>ip-protocol</b></var> (<em>tcp | udp | udp-lite | other</em>)</td> | ||
<td> | <td>IP protocol type.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>src-l3-port</b></var> (<em>0-65535</em>)</td> | |||
<td>Matching Layer3 source port.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>dst-l3-port</b></var> (<em>0-65535</em>)</td> | ||
<td>Matching Layer3 destination port.</td> | |||
<td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>ttl</b></var> (<em>0 | 1 | max | other</em>)</td> | ||
<td>Matching TTL field of the packet.</td> | |||
<td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>dscp</b></var> (<em>0..63</em>)</td> | ||
<td>Matching DSCP field of the packet.</td> | |||
<td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>ecn</b></var> (<em>0..3</em>)</td> | ||
<td>Matching | <td>Matching ECN field of the packet.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>fragmented</b></var> (<em>yes | no</em>)</td> | ||
<td> | <td>Whether to match fragmented packets.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>first-fragment</b></var> (<em>yes | no</em>)</td> | ||
<td> | <td>YES matches not fragmented and the first fragments, NO matches other fragments.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>ipv6-src</b></var> (<em>IPv6/0..128</em>)</td> | ||
<td> | <td>Matching source IPv6 address.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>dst | <td><var><b>ipv6-dst</b></var> (<em>IPv6/0..128</em>)</td> | ||
<td> | <td>Matching destination IPv6 address.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>mac- | <td><var><b>mac-isolation-profile</b></var> (<em>community1 | community2 | | ||
isolated | promiscuous</em>)</td> | |||
<td>Matches isolation profile based on UFDB. Valid only in egress policy table.</td> | |||
<td> | |||
</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>src-mac-addr-state</b></var> (<em>dynamic-station-move | | ||
<td> | sa-found | sa-not-found | static-station-move</em>)</td> | ||
<td>Defines whether to match packets with registered state - packets which | |||
destination MAC address is in UFDB/MFDB/RFDB. Valid only in egress policy table.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>flow-id</b></var> (<em>0..63</em>)</td> | ||
<td></td> | <td></td> | ||
</tr> | </tr> | ||
Line 2,072: | Line 2,038: | ||
<br> | <br> | ||
ACL | ACL rule action part. | ||
<table class="styled_table"> | <table class="styled_table"> | ||
Line 2,080: | Line 2,046: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>action</b></var> (<em>copy-to-cpu | drop | forward | | ||
<td> | redirect-to-cpu | send-to-new-dst-ports</em>; Default: | ||
<b>forward</b>)</td> | |||
<td><ul class="bullets"> | |||
<li> <var>copy-to-cpu</var> - Packets are copied to CPU if they match the ACL conditions. | |||
<li> <var>drop</var> - Packets are dropped if they match the ACL conditions. | |||
<li> <var>forward</var> - Packets are forwarded if they match the ACL conditions. | |||
<li> <var>redirect-to-cpu</var> - Packets are redirected to CPU if they match the ACL conditions. | |||
<li> <var>send-to-new-dst-ports</var> - Packets are send to new destination ports if they match the ACL conditions. | |||
</ul></td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>new-dst-ports</b></var> (<em>ports,trunks</em>)</td> | ||
<td> | <td>If action is "send-to-new-dst-ports", then this property sets which ports/trunks is the new destination.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>mirror-to</b></var> (<em>mirror0 | mirror1</em>)</td> | ||
<td> | <td>Mirroring destination for ACL packets.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>policer</b></var> (<em>policer</em>)</td> | ||
<td> | <td>Applied ACL Policer for ACL packets.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>src-mac-learn</b></var> (<em>yes | no</em>)</td> | ||
<td>Whether to learn source MAC of the matched ACL packets. Valid only in ingress policy table.</td> | |||
<td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>new-service-vid</b></var> (<em>0..4095</em>)</td> | ||
<td> | <td>New service VLAN id for ACL packets.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>new-service-pcp</b></var> (<em>0..7</em>)</td> | ||
<td> | <td>New service PCP for ACL packets.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>new-service-dei</b></var> (<em>0..1</em>)</td> | ||
<td> | <td>New service DEI for ACL packets.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>customer- | <td><var><b>new-customer-vid</b></var> (<em>0..4095</em>)</td> | ||
<td>New customer VLAN id for ACL packets. If set to 4095, then traffic is dropped.</td> | |||
<td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>new-customer-pcp</b></var> (<em>0..7</em>)</td> | ||
<td> | <td>New customer PCP for ACL packets.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>new-customer-dei</b></var> (<em>0..1</em>)</td> | |||
<td>New customer DEI for ACL packets.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>new-dscp</b></var> (<em>0..63</em>)</td> | ||
<td> | <td>New DSCP for ACL packets.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>new-priority</b></var> (<em>0..15</em>)</td> | ||
<td> | <td>New internal priority for ACL packets.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>new-drop-precedence</b></var> (<em>drop | green | red | yellow</em>)</td> | ||
<td> | <td>New internal drop precedence for ACL packets.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>new-registered-state</b></var> (<em>yes | no</em>)</td> | ||
<td> | <td>Whether to modify packet status. YES sets packet status to registered, NO - unregistered. Valid only in ingress policy table.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>new-flow-id</b></var> (<em>0..63</em>)</td> | ||
<td> | <td></td> | ||
</tr> | </tr> | ||
</table> | |||
<br> | |||
Filter bypassing part for ACL packets. | |||
<table class="styled_table"> | |||
<tr> | <tr> | ||
<th width="50%">Property</th> | |||
<th >Description</th> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>attack-filter-bypass</b></var> (<em>yes | no</em>; Default: | ||
<td> | <b>no</b>)</td> | ||
<td></td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>ingress-vlan-filter-bypass</b></var> (<em>yes | no</em>; Default: | ||
<td> | <b>no</b>)</td> | ||
<td>Allows to bypass ingress VLAN filtering in VLAN table for matching packets. Applies only to ingress policy table.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>egress-vlan-filter-bypass</b></var> (<em>yes | no</em>; Default: | ||
<td> | <b>no</b>)</td> | ||
<td>Allows to bypass egress VLAN filtering in VLAN table for matching packets. Applies only to ingress policy table.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>isolation-filter-bypass</b></var> (<em>yes | no</em>; Default: | ||
<td> | <b>no</b>)</td> | ||
<td>Allows to bypass Isolation table for matching packets. Applies only to ingress policy table.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>egress-vlan-translate-bypass</b></var> (<em>yes | no</em>; Default: | ||
<td> | <b>no</b>)</td> | ||
<td>Allows to bypass egress VLAN translation table for matching packets.</td> | |||
</tr> | </tr> | ||
</table> | |||
<br> | |||
<p></p> | |||
====ACL Policer==== | |||
< | |||
<p id="shbox"><b>Sub-menu:</b> <code>/interface ethernet switch | |||
acl policer</code></p><br /> | |||
<table class="styled_table"> | <table class="styled_table"> | ||
Line 2,205: | Line 2,168: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>name</b></var> (<em>string</em>; Default: | ||
<b>policerX</b>)</td> | |||
<b> | <td>Name of the Policer used in ACL.</td> | ||
<td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>yellow-rate</b></var> (<em>integer</em>)</td> | ||
<td> | <td>Maximum data rate limit for packets with yellow drop precedence.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>yellow-burst</b></var> (<em>integer</em>; Default: | ||
<td> | <b>0</b>)</td> | ||
<td>Maximum data rate which can be transmitted while the burst is allowed for packets with yellow drop precedence.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>red-rate</b></var> (<em>integer</em>); Default: | ||
<td> | <b>0</b>)</td> | ||
<td>Maximum data rate limit for packets with red drop precedence.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>red-burst</b></var> (<em>integer</em>; Default: | ||
<td> | <b>0</b>)</td> | ||
<td>Maximum data rate which can be transmitted while the burst is allowed for packets with red drop precedence.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>meter-unit</b></var> (<em>bit | packet</em>; Default: | ||
<td> | <b>bit</b>)</td> | ||
<td>Measuring units for ACL traffic rate.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>meter-len</b></var> (<em>layer-1 | layer-2 | layer-3</em>; Default: | ||
<b>layer-1</b>)</td> | |||
<td>Packet classification which sets the packet byte length for metering. | |||
<ul class="bullets"> | |||
<li> <var>layer-1</var> - includes entire layer-2 frame + FCS + inter-packet gap + preamble. | |||
<li> <var>layer-2</var> - includes layer-2 frame + FCS. | |||
<li> <var>layer-3</var> - includes only layer-3 + ethernet padding without layer-2 header and FCS. | |||
</ul></td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>color-awareness</b></var> (<em>yes | no</em>; Default: | ||
<td> | <b>no</b>)</td> | ||
<td>YES makes policer to take into account pre-colored drop precedence, NO - ignores drop precedence.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>bucket-coupling</b></var> (<em>yes | no</em>; Default: | ||
<td> | <b>no</b>)</td> | ||
<td></td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>yellow-action</b></var> (<em>drop | forward | remark</em>; Default: | ||
<td> | <b>drop</b>)</td> | ||
<td>Performed action for exceeded traffic with yellow drop precedence.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>new- | <td><var><b>new-dei-for-yellow</b></var> (<em>0..1 | remap</em>)</td> | ||
<td>New | <td>New DEI for yellow drop precedence packets.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>new-dscp</b></var> (<em>0..63</em>)</td> | <td><var><b>new-pcp-for-yellow</b></var> (<em>0..7 | remap</em>)</td> | ||
<td>New DSCP for | <td>New PCP for yellow drop precedence packets.</td> | ||
</tr> | |||
<tr> | |||
<td><var><b>new-dscp-for-yellow</b></var> (<em>0..63 | remap</em>)</td> | |||
<td>New DSCP for yellow drop precedence packets.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b> | <td><var><b>red-action</b></var> (<em>drop | forward | remark</em>; Default: | ||
<td> | <b>drop</b>)</td> | ||
<td>Performed action for exceeded traffic with red drop precedence.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>new- | <td><var><b>new-dei-for-red</b></var> (<em>0..1 | remap</em>)</td> | ||
<td>New | <td>New DEI for red drop precedence packets.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>new- | <td><var><b>new-pcp-for-red</b></var> (<em>0..7 | remap</em>)</td> | ||
<td> | <td>New PCP for red drop precedence packets.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><var><b>new- | <td><var><b>new-dscp-for-red</b></var> (<em>0..63 | remap</em>)</td> | ||
<td></td> | <td>New DSCP for red drop precedence packets.</td> | ||
</tr> | </tr> | ||
</table> | </table> | ||
<br> | <br> | ||
<p></p> | |||
=See also= | |||
* [[Manual:CRS1xx/2xx_series_switches_examples | CRS1xx/2xx series switches examples]] | |||
* [[Manual:CRS_Router | CRS Router]] | |||
* [[Manual:CRS1xx/2xx_VLANs_with_Trunks | CRS1xx/2xx VLANs with Trunks]] | |||
* [[Manual:Basic_VLAN_switching | Basic VLAN switching]] | |||
* [[Manual:Interface/Bridge#Bridge_Hardware_Offloading | Bridge Hardware Offloading]] | |||
* [[Manual:Interface/Bridge#Spanning_Tree_Protocol | Spanning Tree Protocol]] | |||
* [[Manual:Interface/Bridge#IGMP_Snooping | IGMP Snooping]] | |||
* [[Manual:Interface/Bridge#DHCP_Snooping_and_DHCP_Option_82 | DHCP Snooping and Option 82]] | |||
* [[M:Maximum_Transmission_Unit_on_RouterBoards | MTU on RouterBOARD]] | |||
* [[Manual:Layer2_misconfiguration | Layer2 misconfiguration]] | |||
* [[Manual:Master-port | Master-port]] | |||
{{cont}} | {{cont}} | ||
[[Category:Manual]] | [[Category:Manual]] | ||
[[Category: | [[Category:Bridging and switching]] | ||
[[Category:Routerboard]] | |||
[[Category:Routerboard |
Latest revision as of 10:01, 17 January 2022
Applies to RouterOS: v6.12 +
Warning: This manual is moved to [CRS1xx/2xx series switches]
Summary
The Cloud Router Switch series are highly integrated switches with high performance MIPS CPU and feature-rich packet processor. The CRS switches can be designed into various Ethernet applications including unmanaged switch, Layer 2 managed switch, carrier switch and wireless/wired unified packet processing.
Warning: This article applies to CRS1xx and CRS2xx series switches and not to CRS3xx series switches. For CRS3xx series devices read the CRS3xx series switches manual.
Features | Description |
---|---|
Forwarding |
|
Mirroring |
|
VLAN |
|
Port Isolation and Leakage |
|
Trunking |
|
Quality of Service (QoS) |
|
Shaping and Scheduling |
|
Access Control List |
|
Cloud Router Switch models
This table clarifies main differences between Cloud Router Switch models.
Model | Switch Chip | CPU | Wireless | SFP+ port | Access Control List | Jumbo Frame (Bytes) |
CRS105-5S-FB | QCA-8511 | 400MHz | - | - | + | 9204 |
CRS106-1C-5S | QCA-8511 | 400MHz | - | - | + | 9204 |
CRS112-8G-4S | QCA-8511 | 400MHz | - | - | + | 9204 |
CRS210-8G-2S+ | QCA-8519 | 400MHz | - | + | + | 9204 |
CRS212-1G-10S-1S+ | QCA-8519 | 400MHz | - | + | + | 9204 |
CRS226-24G-2S+ | QCA-8519 | 400MHz | - | + | + | 9204 |
CRS125-24G-1S | QCA-8513L | 600MHz | - | - | - | 4064 |
CRS125-24G-1S-2HnD | QCA-8513L | 600MHz | + | - | - | 4064 |
CRS109-8G-1S-2HnD | QCA-8513L | 600MHz | + | - | - | 4064 |
Cloud Router Switch configuration examples
Abbreviations and Explanations
CVID - Customer VLAN id: inner VLAN tag id of the IEEE 802.1ad frame
SVID - Service VLAN id: outer VLAN tag id of the IEEE 802.1ad frame
IVL - Independent VLAN learning - learning/lookup is based on both MAC addresses and VLAN IDs.
SVL - Shared VLAN learning - learning/lookup is based on MAC addresses - not on VLAN IDs.
TPID - Tag Protocol Identifier
PCP - Priority Code Point: a 3-bit field which refers to the IEEE 802.1p priority
DEI - Drop Eligible Indicator
DSCP - Differentiated services Code Point
Drop precedence - internal CRS switch QoS attribute used for packet enqueuing or dropping.
Port Switching
In order to setup port switching on CRS1xx/2xx series switches, check the Bridge Hardware Offloading page.
Note: Dynamic reserved VLAN entries (VLAN4091; VLAN4090; VLAN4089; etc.) are created in CRS switch when switched port groups are added when a hardware offloaded bridge is created. These VLANs are necessary for internal operation and have lower precedence than user configured VLANs.
Multiple switch groups
The CRS1xx/2xx series switches allow you to use multiple bridges with hardware offloading, this allows you to easily isolate multiple switch groups. This can be done by simply creating multiple bridges and enabling hardware offloading.
Note: Multiple hardware offloaded bridge configuration is designed as fast and simple port isolation solution, but it limits a part of VLAN functionality supported by CRS switch-chip. For advanced configurations use one bridge within CRS switch chip for all ports, configure VLANs and isolate port groups with port isolation profile configuration.
Warning: CRS1xx/2xx series switches are capable of running multiple hardware offloaded bridges with (R)STP enabled, but it is not recommended since the device is not designed to run multiple (R)STP instances on a hardware level. To isolate multiple switch groups and have (R)STP enabled you should isolate port groups with port isolation profile configuration.
Global Settings
Sub-menu: /interface ethernet switch
CRS switch chip is configurable from the /interface ethernet switch
console menu.
Property | Description |
---|---|
name (string value; Default: switch1) | Name of the switch. |
bridge-type (customer-vid-used-as-lookup-vid | service-vid-used-as-lookup-vid; Default: customer-vid-used-as-lookup-vid) | Bridge type defines which VLAN tag is used as Lookup-VID. Lookup-VID serves as the VLAN key for all VLAN-based lookup. |
mac-level-isolation (yes | no; Default: yes) | Globally enables or disables MAC level isolation. Once enabled, the switch will check the source and destination MAC address entries and their isolation-profile from the unicast forwarding table. By default, the switch will learn MAC addresses and place them into a promiscuous isolation profile. Other isolation profiles can be used when creating static unicast entries. If the source or destination MAC address are located on a promiscuous isolation profile, the packet is forwarded. If both source and destination MAC addresses are located on the same community1 or community2 isolation profile, the packet is forwarded. The packet is dropped when the source and destination MAC address isolation profile is isolated , or when the source and destination MAC address isolation profiles are from different communities (e.g. source MAC address is community1 and destination MAC address is community2 ). When MAC level isolation is globally disabled, the isolation is bypassed. |
use-svid-in-one2one-vlan-lookup (yes | no; Default: no) | Whether to use service VLAN id for 1:1 VLAN switching lookup. |
use-cvid-in-one2one-vlan-lookup (yes | no; Default: yes) | Whether to use customer VLAN id for 1:1 VLAN switching lookup. |
multicast-lookup-mode
(dst-ip-and-vid-for-ipv4 | dst-mac-and-vid-always; Default:dst-ip-and-vid-for-ipv4) |
Lookup mode for IPv4 multicast bridging.
|
unicast-fdb-timeout (time interval; Default: 5m) | Timeout for Unicast FDB entries. |
override-existing-when-ufdb-full (yes | no; Default: no) | Enable or disable to override existing entry which has the lowest aging value when UFDB is full. |
Property | Description |
---|---|
drop-if-no-vlan-assignment-on-ports (ports; Default: none) | Ports which drop frames if no MAC-based, Protocol-based VLAN assignment or Ingress VLAN Translation is applied. |
drop-if-invalid-or-src-port- -not-member-of-vlan-on-ports (ports; Default: none) |
Ports which drop invalid and other port VLAN id frames. |
unknown-vlan-lookup-mode (ivl | svl; Default: svl) | Lookup and learning mode for packets with invalid VLAN. |
forward-unknown-vlan (yes | no; Default: yes) | Whether to allow forwarding VLANs which are not members of VLAN table. |
Property | Description |
---|---|
bypass-vlan-ingress-filter-for (protocols; Default: none) | Protocols which are excluded from Ingress VLAN filtering. These
protocols are not dropped if they have invalid VLAN. (arp, dhcpv4, dhcpv6, eapol, igmp, mld, nd, pppoe-discovery, ripv1) |
bypass-ingress-port-policing-for (protocols; Default: none) | Protocols which are excluded from Ingress Port Policing. (arp, dhcpv4, dhcpv6, eapol, igmp, mld, nd, pppoe-discovery, ripv1) |
bypass-l2-security-check-filter-for (protocols; Default: none) | Protocols which are excluded from Policy rule security check. (arp, dhcpv4, dhcpv6, eapol, igmp, mld, nd, pppoe-discovery, ripv1) |
Property | Description |
---|---|
ingress-mirror0 (port | trunk,format; Default: none,modified) | The first ingress mirroring analyzer port or trunk and mirroring format:
|
ingress-mirror1 (port | trunk,format; Default: none,modified) | The second ingress mirroring analyzer port or trunk and mirroring format:
|
ingress-mirror-ratio (1/32768..1/1; Default: 1/1) | Proportion of ingress mirrored packets compared to all packets. |
egress-mirror0 (port | trunk,format; Default: none,modified) | The first egress mirroring analyzer port or trunk and mirroring format:
|
egress-mirror1 (port | trunk,format; Default: none,modified) | The second egress mirroring analyzer port or trunk and mirroring format:
|
egress-mirror-ratio (1/32768..1/1; Default: 1/1) | Proportion of egress mirrored packets compared to all packets. |
mirror-egress-if-ingress-mirrored (yes | no; Default: no) | When packet is applied to both ingress and egress mirroring, if this
setting is disabled, only ingress mirroring is performed on the packet; if this setting is enabled both mirroring types are applied. |
mirror-tx-on-mirror-port (yes | no; Default: no) | |
mirrored-packet-qos-priority (0..7; Default: 0) | Remarked priority in mirrored packets. |
mirrored-packet-drop-precedence (drop | green | red | yellow; Default: green) | Remarked drop precedence in mirrored packets. This QoS attribute is used for mirrored packet enqueuing or dropping. |
fdb-uses (mirror0 | mirror1; Default: mirror0) | Analyzer port used for FDB-based mirroring. |
vlan-uses (mirror0 | mirror1; Default: mirror0) | Analyzer port used for VLAN-based mirroring. |
Port Settings
Sub-menu: /interface ethernet switch
port
Property | Description |
---|---|
vlan-type (edge-port | network-port; Default: network-port) | Port VLAN type specifies whether VLAN id is used in UFDB learning. Network port learns VLAN id in UFDB, edge port does not - VLAN 0. It can be observed only in IVL learning mode. |
isolation-leakage-profile-override (yes | no; Default:
!isolation-leakage-profile-override) |
Custom port profile for port isolation/leakage configurations.
|
learn-override (yes | no; Default: !learn-override) learn-limit (1..1023; Default: !learn-limit) |
Enable or disable MAC address learning and set MAC limit on the port.
MAC learning limit is disabled by default when !learn-override and !learn-limit. Property learn-override is replaced with learn under /interface bridge port menu since RouterOS v6.42. |
drop-when-ufdb-entry-src-drop (yes | no; Default: yes) | Enable or disable to drop packets when UFDB entry has action src-drop. |
allow-unicast-loopback (yes | no; Default: no) | Unicast loopback on port. When enabled, it permits sending back when
source port and destination port are the same one for known unicast packets. |
allow-multicast-loopback (yes | no; Default: no) | Multicast loopback on port. When enabled, it permits sending back when
source port and destination port are the same for registered multicast or broadcast packets. |
action-on-static-station-move (copy-to-cpu | drop | forward | redirect-to-cpu; Default: forward) | Action for packets when UFDB already contains static entry with such MAC but with a different port. |
drop-dynamic-mac-move (yes | no; Default: no) | Prevents MAC relearning until UFDB timeout if MAC is already learned on other port. |
Property | Description |
---|---|
allow-fdb-based-vlan-translate (yes | no; Default: no) | Enable or disable MAC-based VLAN translation on the port. |
allow-mac-based-service-vlan-assignment-for (all-frames | none |
tagged-frame-only | untagged-and-priority-tagged-frame-only; Default: none) |
Frame type for which applies MAC-based service VLAN translation. |
allow-mac-based-customer-vlan-assignment-for (all-frames | none |
tagged-frame-only | untagged-and-priority-tagged-frame-only; Default: none) |
Frame type for which applies MAC-based customer VLAN translation. |
default-customer-pcp (0..7; Default: 0) | Default customer PCP of the port. |
default-service-pcp (0..7; Default: 0) | Default service PCP of the port. |
pcp-propagation-for-initial-pcp (yes | no; Default: no) | Enables or disables PCP propagation for initial PCP assignment on ingress.
|
filter-untagged-frame (yes | no; Default: no) | Whether to filter untagged frames on the port. |
filter-priority-tagged-frame (yes | no; Default: no) | Whether to filter tagged frames with priority on the port. |
filter-tagged-frame (yes | no; Default: no) | Whether to filter tagged frames on the port. |
Property | Description |
---|---|
egress-vlan-tag-table-lookup-key (according-to-bridge-type | egress-vid; Default: egress-vid) | Egress VLAN table (VLAN Tagging) lookup:
|
egress-vlan-mode (tagged | unmodified | untagged; Default: unmodified) | Egress VLAN tagging action on the port. |
egress-pcp-propagation (yes | no; Default: no) | Enables or disables egress PCP propagation.
|
Property | Description |
---|---|
ingress-mirror-to (mirror0 | mirror1 | none; Default: none) | Analyzer port for port-based ingress mirroring. |
ingress-mirroring-according-to-vlan (yes | no; Default: no) | |
egress-mirror-to (mirror0 | mirror1 | none; Default: none) | Analyzer port for port-based egress mirroring. |
Property | Description |
---|---|
qos-scheme-precedence (da-based | dscp-based | ingress-acl-based | pcp-based | protocol-based | sa-based | vlan-based; Default: pcp-based, sa-based, da-based, dscp-based, protocol-based, vlan-based) | Specifies applied QoS assignment schemes on ingress of the port.
|
pcp-or-dscp-based-qos-change-dei (yes | no; Default: no) | Enable or disable PCP or DSCP based DEI change on port. |
pcp-or-dscp-based-qos-change-pcp (yes | no; Default: no) | Enable or disable PCP or DSCP based PCP change on port. |
pcp-or-dscp-based-qos-change-dscp (yes | no; Default: no) | Enable or disable PCP or DSCP based DSCP change on port. |
dscp-based-qos-dscp-to-dscp-mapping (yes | no; Default: yes) | Enable or disable DSCP to internal DSCP mapping on port. |
pcp-based-qos-drop-precedence-mapping (PCP/DEI-range:drop-precedence; Default: 0-15:green) | The new value of drop precedence for the PCP/DEI to drop precedence (drop | green | red | yellow) mapping. Multiple mappings allowed separated by comma e.g. "0-7:yellow,8-15:red". |
pcp-based-qos-dscp-mapping (PCP/DEI-range:DEI; Default: 0-15:0) | The new value of DSCP for the PCP/DEI to DSCP (0..63) mapping. Multiple mappings allowed separated by comma e.g. "0-7:25,8-15:50". |
pcp-based-qos-dei-mapping (PCP/DEI-range:DEI; Default: 0-15:0) | The new value of DEI for the PCP/DEI to DEI (0..1) mapping. Multiple mappings allowed separated by comma e.g. "0-7:0,8-15:1". |
pcp-based-qos-pcp-mapping (PCP/DEI-range:DEI; Default: 0-15:0) | The new value of PCP for the PCP/DEI to PCP (0..7) mapping. Multiple mappings allowed separated by comma e.g. "0-7:3,8-15:4". |
pcp-based-qos-priority-mapping (PCP/DEI-range:DEI; Default: 0-15:0) | The new value of internal priority for the PCP/DEI to priority (0..15) mapping. Multiple mappings allowed separated by comma e.g. "0-7:5,8-15:15". |
Property | Description |
---|---|
priority-to-queue (priority-range:queue; Default: 0-15:0,1:1,2:2,3:3) | Internal priority (0..15) mapping to queue (0..7) per port. |
per-queue-scheduling (Scheduling-type:Weight;
Default: wrr-group0:1,wrr-group0:2,wrr-group0:4,wrr-group0:8,wrr-group0:16,wrr-group0:32, wrr-group0:64,wrr-group0:128) |
Set port to use either strict or weighted round robin policy for traffic shaping for each queue group, each queue is separated by a comma. |
Property | Description |
---|---|
ingress-customer-tpid-override (yes | no;
Default:!ingress-customer-tpid-override) |
Ingress customer TPID override allows accepting specific frames with a custom customer tag TPID. Default value is for tag of 802.1Q frames. |
egress-customer-tpid-override (yes | no; Default:
!egress-customer-tpid-override) |
Egress customer TPID override allows custom identification for egress frames with a customer tag. Default value is for tag of 802.1Q frames. |
ingress-service-tpid-override (yes | no; Default:
!ingress-service-tpid-override) |
Ingress service TPID override allows accepting specific frames with a custom service tag TPID. Default value is for service tag of 802.1AD frames. |
egress-service-tpid-override (yes | no; Default:
!egress-service-tpid-override) |
Egress service TPID override allows custom identification for egress frames with a service tag. Default value is for service tag of 802.1AD frames. |
Property | Description |
---|---|
custom-drop-counter-includes (counters; Default: none) | Custom include to count dropped packets for switch port custom-drop-packet counter.
|
queue-custom-drop-counter0-includes (counters; Default: none) | Custom include to count dropped packets for switch port tx-queue-custom0-drop-packet
and bytes for tx-queue-custom0-drop-byte counters.
|
queue-custom-drop-counter1-includes (counters; Default: none) | Custom include to count dropped packets for switch port tx-queue-custom1-drop-packet
and bytes for tx-queue-custom1-drop-byte counters.
|
policy-drop-counter-includes (counters; Default: none) | Custom include to count dropped packets for switch port policy-drop-packet counter.
|
Forwarding Databases
Unicast FDB
Sub-menu: /interface ethernet switch
unicast-fdb
The unicast forwarding database supports up to 16318 MAC entries.
Property | Description |
---|---|
action (action; Default: forward) | Action for UFDB entry:
|
disabled (yes | no; Default: no) | Enables or disables Unicast FDB entry. |
isolation-profile (community1 | community2 | isolated | promiscuous; Default: promiscuous) | MAC level isolation profile. |
mac-address (MAC address) | The action command applies to the packet when the destination MAC or source MAC matches the entry. |
mirror (yes | no; Default: no) | Enables or disables mirroring based on source MAC or destination MAC. |
port (port) | Matching port for the Unicast FDB entry. |
qos-group (none; Default: none) | Defined QoS group from QoS group menu. |
svl (yes | no; Default: no) | Unicast FDB learning mode:
|
vlan-id (0..4095) | Unicast FDB lookup/learning VLAN id. |
Multicast FDB
Sub-menu: /interface ethernet switch
multicast-fdb
CRS125 switch-chip supports up to 1024 entries in MFDB for multicast forwarding. For each multicast packet, destination MAC or destination IP lookup is performed in MFDB. MFDB entries are not automatically learnt and can only be configured.
Property | Description |
---|---|
address (X.X.X.X | XX:XX:XX:XX:XX:XX) | Matching IP address or MAC address for multicast packets. |
bypass-vlan-filter (yes | no; Default: no) | Allow to bypass VLAN filtering for matching multicast packets. |
disabled (yes | no; Default: no) | Enables or disables Multicast FDB entry. |
ports (ports) | Member ports for multicast traffic. |
qos-group (none; Default: none) | Defined QoS group from QoS group menu. |
svl (yes | no; Default: no) | Multicast FDB learning mode:
|
vlan-id (0..4095; Default: 0) | Multicast FDB lookup VLAN id. If VLAN learning mode is IVL, VLAN id is lookup id, otherwise VLAN id = 0. |
Reserved FDB
Sub-menu: /interface ethernet switch
reserved-fdb
Cloud Router Switch supports 256 RFDB entries. Each RFDB entry can store either Layer2 unicast or multicast MAC address with specific commands.
Property | Description |
---|---|
action (copy-to-cpu | drop | forward | redirect-to-cpu; Default: forward) | Action for RFDB entry:
|
bypass-ingress-port-policing (yes | no; Default: no) | Allow to bypass Ingress Port Policer for matching packets. |
bypass-ingress-vlan-filter (yes | no; Default: no) | Allow to bypass VLAN filtering for matching packets. |
disabled (yes | no; Default: no) | Enables or disables Reserved FDB entry. |
mac-address (MAC address; Default: 00:00:00:00:00:00) | Matching MAC address for Reserved FDB entry. |
qos-group (none; Default: none) | Defined QoS group from QoS group menu. |
VLAN
VLAN Table
Sub-menu: /interface ethernet switch
vlan
The VLAN table supports 4096 VLAN entries for storing VLAN member information as well as other VLAN information such as QoS, isolation, forced VLAN, learning, and mirroring.
Property | Description |
---|---|
disabled (yes | no; Default: no) | Indicate whether the VLAN entry is disabled. Only enabled entry is applied to lookup process and forwarding decision. |
flood (yes | no; Default: no) | Enables or disables forced VLAN flooding per VLAN. If the feature is
enabled, the result of destination MAC lookup in the UFDB or MFDB is ignored, and the packet is forced to flood in the VLAN. |
ingress-mirror (yes | no; Default: no) | Enable the ingress mirror per VLAN to support the VLAN-based mirror function. |
learn (yes | no; Default: yes) | Enables or disables source MAC learning for VLAN. |
ports (ports) | Member ports of the VLAN. |
qos-group (none; Default: none) | Defined QoS group from QoS group menu. |
svl (yes | no; Default: no) | FDB lookup mode for lookup in UFDB and MFDB.
|
vlan-id (0..4095) | VLAN id of the VLAN member entry. |
Egress VLAN Tag
Sub-menu: /interface ethernet switch
egress-vlan-tag
Egress packets can be assigned different VLAN tag format. The VLAN tags can be removed, added, or remained as is when the packet is sent to the egress port (destination port). Each port has dedicated control on the egress VLAN tag format. The tag formats include:
- Untagged
- Tagged
- Unmodified
The Egress VLAN Tag table includes 4096 entries for VLAN tagging selection.
Property | Description |
---|---|
disabled (yes | no; Default: no) | Enables or disables Egress VLAN Tag table entry. |
tagged-ports (ports) | Ports which are tagged in egress. |
vlan-id (0..4095) | VLAN id which is tagged in egress. |
Ingress/Egress VLAN Translation
The Ingress VLAN Translation table allows for up to 15 entries for each port. One or multiple fields can be selected from packet header for lookup in the Ingress VLAN Translation table. The S-VLAN or C-VLAN or both configured in the first matched entry is assigned to the packet.
Sub-menu: /interface ethernet switch
ingress-vlan-translation
Sub-menu: /interface ethernet switch
egress-vlan-translation
Property | Description |
---|---|
customer-dei (0..1; Default: none) | Matching DEI of the customer tag. |
customer-pcp (0..7; Default: none) | Matching PCP of the customer tag. |
customer-vid (0..4095; Default: none) | Matching VLAN id of the customer tag. |
customer-vlan-format (any | priority-tagged-or-tagged | tagged | untagged-or-tagged; Default:any) | Type of frames with customer tag for which VLAN translation rule is valid. |
disabled (yes | no; Default: no) | Enables or disables VLAN translation entry. |
new-customer-vid (0..4095; Default: none) | The new customer VLAN id which replaces matching customer VLAN id. If set to 4095 and ingress VLAN translation is used, then traffic is dropped. |
new-service-vid (0..4095; Default: none) | The new service VLAN id which replaces matching service VLAN id. |
pcp-propagation (yes | no; Default: no) | Enables or disables PCP propagation.
|
ports (ports) | Matching switch ports for VLAN translation rule. |
protocol (protocols; Default: none) | Matching Ethernet protocol. (only for Ingress VLAN Translation) |
sa-learning (yes | no; Default: no) | Enables or disables source MAC learning after VLAN translation. (only for Ingress VLAN Translation) |
service-dei (0..1; Default: none) | Matching DEI of the service tag. |
service-pcp (0..7; Default: none) | Matching PCP of the service tag. |
service-vid (0..4095; Default: none) | Matching VLAN id of the service tag. |
service-vlan-format (any | priority-tagged-or-tagged | tagged | untagged-or-tagged; Default:any) | Type of frames with service tag for which VLAN translation rule is valid. |
Below is a table of traffic that triggers a rule that has a certain VLAN format set, note that traffic that is tagged with VLAN ID 0 is a special case that is also taken into account.
Property | Description |
---|---|
any | Accepts:
|
priority-tagged-or-tagged | Accepts:
|
tagged | Accepts:
|
untagged-or-tagged | Accepts:
|
Warning: If VLAN-format
is set to any
, then customer-vid/service-vid
set to 0
will trigger the switch rule with VLAN 0 traffic. In this case the switch rule will be looking for untagged traffic or traffic with VLAN 0 tag, only untagged-or-tagged
will filter out VLAN 0 traffic in this case.
Protocol Based VLAN
Sub-menu: /interface ethernet switch
protocol-based-vlan
Protocol Based VLAN table is used to assign VID and QoS attributes to related protocol packet per port.
Property | Description |
---|---|
disabled (yes | no; Default: no) | Enables or disables Protocol Based VLAN entry. |
frame-type (ethernet | llc | rfc-1042; Default: ethernet) | Encapsulation type of the matching frames. |
new-customer-vid (0..4095; Default: 0) | The new customer VLAN id which replaces original customer VLAN id for specified protocol. If set to 4095, then traffic is dropped. |
new-service-vid (0..4095; Default: 0) | The new service VLAN id which replaces original service VLAN id for specified protocol. |
ports (ports) | Matching switch ports for Protocol based VLAN rule. |
protocol (protocol; Default: 0) | Matching protocol for Protocol based VLAN rule. |
qos-group (none; Default: none) | Defined QoS group from QoS group menu. |
set-customer-vid-for (all | none | tagged | untagged-or-priority-tagged; Default: all) | Customer VLAN id assignment command for different packet type. |
set-qos-for (all | none | tagged | untagged-or-priority-tagged; Default: none) | Frame type for which QoS assignment command applies. |
set-service-vid-for (all | none | tagged | untagged-or-priority-tagged; Default: all) | Service VLAN id assignment command for different packet type. |
MAC Based VLAN
Sub-menu: /interface ethernet switch
mac-based-vlan
MAC Based VLAN table is used to assign VLAN based on source MAC.
Property | Description |
---|---|
disabled (yes | no; Default: no) | Enables or disables MAC Based VLAN entry. |
new-customer-vid (0..4095; Default: 0) | The new customer VLAN id which replaces original service VLAN id for matched packets. If set to 4095, then traffic is dropped. |
new-service-vid (0..4095; Default: 0) | The new service VLAN id which replaces original service VLAN id for matched packets. |
src-mac-address (MAC address) | Matching source MAC address for MAC based VLAN rule. |
Note: All CRS1xx/2xx series switches support up to 1024 MAC Based VLAN table entries.
1:1 VLAN Switching
Sub-menu: /interface ethernet switch
one2one-vlan-switching
1:1 VLAN switching can be used to replace the regular L2 bridging for matched packets. When a packet hits an 1:1 VLAN switching table entry, the destination port information in the entry is assigned to the packet. The matched destination information in UFDB and MFDB entry no longer applies to the packet.
Property | Description |
---|---|
customer-vid (0..4095; Default: 0) | Matching customer VLAN id for 1:1 VLAN switching. |
disabled (yes | no; Default: no) | Enables or disables 1:1 VLAN switching table entry. |
dst-port (port) | Destination port for matched 1:1 VLAN switching packets. |
service-vid (0..4095; Default: 0) | Matching customer VLAN id for 1:1 VLAN switching. |
Port Isolation/Leakage
Sub-menu: /interface ethernet switch
port-isolation
Sub-menu: /interface ethernet switch
port-leakage
The CRS switches support flexible multi-level isolation features, which can be used for user access control, traffic engineering and advanced security and network management. The isolation features provide an organized fabric structure allowing user to easily program and control the access by port, MAC address, VLAN, protocol, flow and frame type. The following isolation and leakage features are supported:
- Port-level isolation
- MAC-level isolation
- VLAN-level isolation
- Protocol-level isolation
- Flow-level isolation
- Free combination of the above
Port-level isolation supports different control schemes on source port and destination port. Each entry can be programmed with access control for either source port or destination port.
- When the entry is programmed with source port access control, the entry is
applied to the ingress packets.
- When the entry is programmed with destination port access control, the entry
is applied to the egress packets.
Port leakage allows bypassing egress VLAN filtering on the port. Leaky port is allowed to access other ports for various applications such as security, network control and management. Note: When both isolation and leakage is applied to the same port, the port is isolated.
Property | Description |
---|---|
disabled (yes | no; Default: no) | Enables or disables port isolation/leakage entry. |
flow-id (0..63; Default: none) | |
forwarding-type (bridged; routed; Default: bridged,routed) | Matching traffic forwarding type on Cloud Router Switch. |
mac-profile (community1 | community2 | isolated | promiscuous; Default: none) | Matching MAC isolation/leakage profile. |
port-profile (0..31; Default: none) | Matching Port isolation/leakage profile. |
ports (ports; Default: none) | Isolated/leaked ports. |
protocol-type (arp; nd; dhcpv4; dhcpv6; ripv1; Default: arp,nd,dhcpv4,dhcpv6,ripv1) | Included protocols for isolation/leakage. |
registration-status (known; unknown; Default: known,unknown) | Registration status for matching packets. Known are present in UFDB and MFDB, unknown are not. |
traffic-type (unicast; multicast; broadcast; Default: unicast,multicast,broadcast) | Matching traffic type. |
type (dst | src; Default: src) | Lookup type of the isolation/leakage entry:
|
vlan-profile (community1 | community2 | isolated | promiscuous; Default: none) | Matching VLAN isolation/leakage profile. |
Trunking
Sub-menu: /interface ethernet switch
trunk
The Trunking in the Cloud Router Switches provides static link aggregation groups with hardware automatic failover and load balancing. IEEE802.3ad and IEEE802.1ax compatible Link Aggregation Control Protocol is not supported. Up to 8 Trunk groups are supported with up to 8 Trunk member ports per Trunk group. CRS Port Trunking calculates transmit-hash based on all following parameters: L2 src-dst MAC + L3 src-dst IP + L4 src-dst Port.
Property | Description |
---|---|
disabled (yes | no; Default: no) | Enables or disables port trunking entry. |
member-ports (ports) | Member ports of the Trunk group. |
name (string value; Default: trunkX) | Name of the Trunk group. |
Quality of Service
Shaper
Sub-menu: /interface ethernet switch
shaper
Traffic shaping restricts the rate and burst size of the flow which is transmitted out from the interface. The shaper is implemented by a token bucket. If the packet exceeds the maximum rate or the burst size, which means no enough token for the packet, the packet is stored to buffer until there is enough token to transmit it.
Property | Description |
---|---|
burst (integer; Default: 100k) | Maximum data rate which can be transmitted while the burst is allowed. |
disabled (yes | no; Default: no) | Enables or disables traffic shaper entry. |
meter-unit (bit | packet; Default: bit) | Measuring units for traffic shaper rate. |
port (port) | Physical port for traffic shaper. |
rate (integer; Default: 1M) | Maximum data rate limit. |
target (port | queueX | wrr-groupX; Default: port) | Three levels of shapers are supported on each port (including CPU port):
|
Ingress Port Policer
Sub-menu: /interface ethernet switch
ingress-port-policer
Property | Description |
---|---|
burst (integer; Default: 100k) | Maximum data rate which can be transmitted while the burst is allowed. |
disabled (yes | no; Default: no) | Enables or disables ingress port policer entry. |
meter-len (layer-1 | layer-2 | layer-3; Default: layer-1) | Packet classification which sets the packet byte length for metering.
|
meter-unit (bit | packet; Default: bit) | Measuring units for traffic ingress port policer rate. |
new-dei-for-yellow (0..1 | remap; Default: none) | Remarked DEI for exceeded traffic if yellow-action is remark. |
new-dscp-for-yellow (0..63 | remap; Default: none) | Remarked DSCP for exceeded traffic if yellow-action is remark. |
new-pcp-for-yellow (0..7 | remap; Default: none) | Remarked PCP for exceeded traffic if yellow-action is remark. |
packet-types (packet-types; Default: all types from description) | Matching packet types for which ingress port policer entry is valid. |
port (port) | Physical port or trunk for ingress port policer entry. |
rate (integer) | Maximum data rate limit. |
yellow-action (drop | forward | remark; Default: drop) | Performed action for exceeded traffic. |
QoS Group
Sub-menu: /interface ethernet switch
qos-group
The global QoS group table is used for VLAN-based, Protocol-based and MAC-based QoS group assignment configuration.
Property | Description |
---|---|
dei (0..1; Default: none) | The new value of DEI for the QoS group. |
disabled (yes | no; Default: no) | Enables or disables protocol QoS group entry. |
drop-precedence (drop | green | red | yellow; Default: green) | Drop precedence is internal QoS attribute used for packet enqueuing or dropping. |
dscp (0..63; Default: none) | The new value of DSCP for the QoS group. |
name (string value; Default: groupX) | Name of the QoS group. |
pcp (0..7; Default: none) | The new value of PCP for the QoS group. |
priority (0..15; Default: 0) | Internal priority is a local significance of priority for classifying traffics to different egress queues on a port. (1 is highest, 15 is lowest) |
DSCP QoS Map
Sub-menu: /interface ethernet switch
dscp-qos-map
The global DSCP to QOS mapping table is used for mapping from DSCP of the packet to new QoS attributes configured in the table.
Property | Description |
---|---|
dei (0..1) | The new value of DEI for the DSCP to QOS mapping entry. |
drop-precedence (drop | green | red | yellow) | The new value of Drop precedence for the DSCP to QOS mapping entry. |
pcp (0..7) | The new value of PCP for the DSCP to QOS mapping entry. |
priority (0..15) | The new value of internal priority for the DSCP to QOS mapping entry. |
DSCP To DSCP Map
Sub-menu: /interface ethernet switch
dscp-to-dscp
The global DSCP to DSCP mapping table is used for mapping from the packet's original DSCP to new DSCP value configured in the table.
Property | Description |
---|---|
new-dscp (0..63) | The new value of DSCP for the DSCP to DSCP mapping entry. |
Policer QoS Map
Sub-menu: /interface ethernet switch
policer-qos-map
Property | Description |
---|---|
dei-for-red (0..1; Default: 0) | Policer DEI remapping value for red packets. |
dei-for-yellow (0..1; Default: 0) | Policer DEI remapping value for yellow packets. |
dscp-for-red (0..63; Default: 0) | Policer DSCP remapping value for red packets. |
dscp-for-yellow (0..63; Default: 0) | Policer DSCP remapping value for yellow packets. |
pcp-for-red (0..7; Default: 0) | Policer PCP remapping value for red packets. |
pcp-for-yellow (0..7; Default: 0) | Policer PCP remapping value for yellow packets. |
Access Control List
Note: See Summary section for Access Control List supported Cloud Router Switch devices.
Access Control List contains of ingress policy and egress policy engines and allows to configure up to 128 policy rules (limited by RouterOS). It is advanced tool for wire-speed packet filtering, forwarding, shaping and modifying based on Layer2, Layer3 and Layer4 protocol header field conditions.
Warning: Due to hardware limitation it is not possible to match broadcast/multicast traffic on specific ports. You should use port isolation, drop traffic on ingress ports or use VLAN filtering to prevent certain broadcast/multicast traffic from being forwarded.
ACL
Sub-menu: /interface ethernet switch
acl
ACL condition part for MAC related fields of packets.
Property | Description |
---|---|
disabled (yes | no; Default: no) | Enables or disables ACL entry. |
table (egress | ingress; Default: ingress) | Selects policy table for incoming or outgoing packets. |
invert-match (yes | no; Default: no) | Inverts whole ACL rule matching. |
src-ports (ports,trunks) | Matching physical source ports or trunks. |
dst-ports (ports,trunks) | Matching physical destination ports or trunks. It is not possible to match broadcast/multicast traffic on egress port due to a hardware limitation. |
mac-src-address (MAC address/Mask) | Source MAC address and mask. |
mac-dst-address (MAC address/Mask) | Destination MAC address and mask. |
dst-addr-registered (yes | no) | Defines whether to match packets with registered state - packets which destination MAC address is in UFDB/MFDB/RFDB. Valid only in egress table. |
mac-protocol (802.2 | arp | homeplug-av | ip | ip-or-ipv6 | ipv6 | ipx | lldp | loop-protect | mpls-multicast | mpls-unicast | non-ip | packing-compr | packing-simple | pppoe | pppoe-discovery | rarp | service-vlan | vlan or integer: 0..65535 decimal format or 0x0000-0xffff hex format) | Ethernet payload type (MAC-level protocol)
|
drop-precedence (drop | green | red | yellow) | Matching internal drop precedence. Valid only in egress table. |
custom-fields |
ACL condition part for VLAN related fields of packets.
Property | Description |
---|---|
lookup-vid (0..4095) | VLAN id used in lookup. It can be changed before reaching egress table. |
service-vid (0-4095) | Matching service VLAN id. |
service-pcp (0..7) | Matching service PCP. |
service-dei (0..1) | Matching service DEI. |
service-tag (priority-tagged | tagged | tagged-or-priority-tagged | untagged) | Format of the service tag. |
customer-vid (0-4095) | Matching customer VLAN id. |
customer-pcp (0..7) | Matching customer PCP. |
customer-dei (0..1) | Matching customer DEI. |
customer-tag (priority-tagged | tagged | tagged-or-priority-tagged | untagged) | Format of the customer tag. |
priority (0..15) | Matching internal priority. Valid only in egress table. |
ACL condition part for IPv4 and IPv6 related fields of packets.
Property | Description |
---|---|
ip-src (IPv4/0..32) | Matching source IPv4 address. |
ip-dst (IPv4/0..32) | Matching destination IPv4 address. |
ip-protocol (tcp | udp | udp-lite | other) | IP protocol type. |
src-l3-port (0-65535) | Matching Layer3 source port. |
dst-l3-port (0-65535) | Matching Layer3 destination port. |
ttl (0 | 1 | max | other) | Matching TTL field of the packet. |
dscp (0..63) | Matching DSCP field of the packet. |
ecn (0..3) | Matching ECN field of the packet. |
fragmented (yes | no) | Whether to match fragmented packets. |
first-fragment (yes | no) | YES matches not fragmented and the first fragments, NO matches other fragments. |
ipv6-src (IPv6/0..128) | Matching source IPv6 address. |
ipv6-dst (IPv6/0..128) | Matching destination IPv6 address. |
mac-isolation-profile (community1 | community2 | isolated | promiscuous) | Matches isolation profile based on UFDB. Valid only in egress policy table. |
src-mac-addr-state (dynamic-station-move | sa-found | sa-not-found | static-station-move) | Defines whether to match packets with registered state - packets which destination MAC address is in UFDB/MFDB/RFDB. Valid only in egress policy table. |
flow-id (0..63) |
ACL rule action part.
Property | Description |
---|---|
action (copy-to-cpu | drop | forward |
redirect-to-cpu | send-to-new-dst-ports; Default: forward) |
|
new-dst-ports (ports,trunks) | If action is "send-to-new-dst-ports", then this property sets which ports/trunks is the new destination. |
mirror-to (mirror0 | mirror1) | Mirroring destination for ACL packets. |
policer (policer) | Applied ACL Policer for ACL packets. |
src-mac-learn (yes | no) | Whether to learn source MAC of the matched ACL packets. Valid only in ingress policy table. |
new-service-vid (0..4095) | New service VLAN id for ACL packets. |
new-service-pcp (0..7) | New service PCP for ACL packets. |
new-service-dei (0..1) | New service DEI for ACL packets. |
new-customer-vid (0..4095) | New customer VLAN id for ACL packets. If set to 4095, then traffic is dropped. |
new-customer-pcp (0..7) | New customer PCP for ACL packets. |
new-customer-dei (0..1) | New customer DEI for ACL packets. |
new-dscp (0..63) | New DSCP for ACL packets. |
new-priority (0..15) | New internal priority for ACL packets. |
new-drop-precedence (drop | green | red | yellow) | New internal drop precedence for ACL packets. |
new-registered-state (yes | no) | Whether to modify packet status. YES sets packet status to registered, NO - unregistered. Valid only in ingress policy table. |
new-flow-id (0..63) |
Filter bypassing part for ACL packets.
Property | Description |
---|---|
attack-filter-bypass (yes | no; Default: no) | |
ingress-vlan-filter-bypass (yes | no; Default: no) | Allows to bypass ingress VLAN filtering in VLAN table for matching packets. Applies only to ingress policy table. |
egress-vlan-filter-bypass (yes | no; Default: no) | Allows to bypass egress VLAN filtering in VLAN table for matching packets. Applies only to ingress policy table. |
isolation-filter-bypass (yes | no; Default: no) | Allows to bypass Isolation table for matching packets. Applies only to ingress policy table. |
egress-vlan-translate-bypass (yes | no; Default: no) | Allows to bypass egress VLAN translation table for matching packets. |
ACL Policer
Sub-menu: /interface ethernet switch
acl policer
Property | Description |
---|---|
name (string; Default: policerX) | Name of the Policer used in ACL. |
yellow-rate (integer) | Maximum data rate limit for packets with yellow drop precedence. |
yellow-burst (integer; Default: 0) | Maximum data rate which can be transmitted while the burst is allowed for packets with yellow drop precedence. |
red-rate (integer); Default: 0) | Maximum data rate limit for packets with red drop precedence. |
red-burst (integer; Default: 0) | Maximum data rate which can be transmitted while the burst is allowed for packets with red drop precedence. |
meter-unit (bit | packet; Default: bit) | Measuring units for ACL traffic rate. |
meter-len (layer-1 | layer-2 | layer-3; Default: layer-1) | Packet classification which sets the packet byte length for metering.
|
color-awareness (yes | no; Default: no) | YES makes policer to take into account pre-colored drop precedence, NO - ignores drop precedence. |
bucket-coupling (yes | no; Default: no) | |
yellow-action (drop | forward | remark; Default: drop) | Performed action for exceeded traffic with yellow drop precedence. |
new-dei-for-yellow (0..1 | remap) | New DEI for yellow drop precedence packets. |
new-pcp-for-yellow (0..7 | remap) | New PCP for yellow drop precedence packets. |
new-dscp-for-yellow (0..63 | remap) | New DSCP for yellow drop precedence packets. |
red-action (drop | forward | remark; Default: drop) | Performed action for exceeded traffic with red drop precedence. |
new-dei-for-red (0..1 | remap) | New DEI for red drop precedence packets. |
new-pcp-for-red (0..7 | remap) | New PCP for red drop precedence packets. |
new-dscp-for-red (0..63 | remap) | New DSCP for red drop precedence packets. |
See also
- CRS1xx/2xx series switches examples
- CRS Router
- CRS1xx/2xx VLANs with Trunks
- Basic VLAN switching
- Bridge Hardware Offloading
- Spanning Tree Protocol
- IGMP Snooping
- DHCP Snooping and Option 82
- MTU on RouterBOARD
- Layer2 misconfiguration
- Master-port
[ Top | Back to Content ]