Manual:CRS3xx series switches
The Cloud Router Switch series are highly integrated switches with high performance ARM CPU and feature-rich packet processor. The CRS switches can be designed into various Ethernet applications including unmanaged switch, Layer 2 managed switch, carrier switch and wired unified packet processing.
|Access Control List||
This table clarifies main differences between Cloud Router Switch models.
|Model||Switch Chip||CPU||Cores||Wireless||SFP+ port||Access Control List||Jumbo Frame (Bytes)|
- FDB - Forwarding Database
- MDB - Multicast Database
- SVL - Shared VLAN Learning
- IVL - Independent VLAN Learning
- PVID - Port VLAN ID
- ACL - Access Control List
Since v6.41 bridges will handle all Layer2 forwarding and the use of switch chip (
hw-offload) will automatically turn on if appropriate conditions are met.
The rest of RouterOS Switch features remain untouched in usual menus.
By default all newly created bridge ports have
hw=yes option and it allows enabling of
hw-offload when possible. If such functionality is not required, it can be disabled by
hw=no on bridge port to have completely software operated bridging.
Use the command lines below to create a bridge and add ports to it. On CRS3xx using other bridge protocol modes will also enable hardware offloading.
/interface bridge add name=bridge1 igmp-snooping=no protocol-mode=none /interface bridge port add bridge=bridge1 interface=ether2 add bridge=bridge1 interface=ether3 add bridge=bridge1 interface=ether4 add bridge=bridge1 interface=ether5
Make sure that hardware offloading is enabled. If H flag is available next to the desired interface, then hardware offloading is active on that port. If hardware offloading flag is not shown, then make sure you haven't enabled features that disable hardware offloading.
[admin@MikroTik] > /interface bridge port print Flags: X - disabled, I - inactive, D - dynamic, H - hw-offload # INTERFACE BRIDGE HW PVID PRIORITY PATH-COST INTERNAL-PATH-COST HORIZON 0 H ether2 bridge1 yes 1 0x80 10 10 none 1 H ether3 bridge1 yes 1 0x80 10 10 none 2 H ether4 bridge1 yes 1 0x80 10 10 none 3 H ether5 bridge1 yes 1 0x80 10 10 none
/interface bridge host
|age (read-only: time)||The time since the last packet was received from the host|
|bridge (read-only: name)||The bridge the entry belongs to|
|external-fdb (read-only: flag)||Whether the host was learned using wireless registration table|
|local (read-only: flag)||Whether the host entry is of the bridge itself (that way all local interfaces are shown)|
|mac-address (read-only: MAC address)||Host's MAC address|
|on-interface (read-only: name)||Which of the bridged interfaces the host is connected to|
- Use this command to get the active host table:
[admin@MikroTik] > /interface bridge host print Flags: L - local, E - external-fdb BRIDGE MAC-ADDRESS ON-INTERFACE AGE bridge1 00:00:00:00:00:01 ether2 3s bridge1 00:01:29:FF:1D:CC ether2 0s L bridge1 00:0C:42:52:2E:CF ether2 0s bridge1 00:0C:42:52:2E:D0 ether2 3s bridge1 00:0C:42:5C:A5:AE ether2 0s
Since RouterOS v6.41 bridges provides VLAN aware Layer2 forwarding and VLAN tag modifications within the bridge. This set of features makes bridge operation more like a traditional Ethernet switch and allows to overcome Spanning Tree compatibilty issues compared to configuration when tunnel-like VLAN interfaces are bridged. Bridge VLAN Filtering configuration is highly recommended to comply with STP (802.1D), RSTP (802.1w) standards and is mandatory to enable MSTP (802.1s) support in RouterOS.
The main VLAN setting is
vlan-filtering which globally controls vlan-awareness and VLAN tag processing in the bridge. If
vlan-filtering=no, bridge ignores VLAN tags, works in a shared-VLAN-learning (SVL) mode and cannot modify VLAN tags of packets. Turning on
vlan-filtering enables all bridge VLAN related functionality and independent-VLAN-learning (IVL) mode. Besides joining the ports for Layer2 forwarding, bridge itself is also an interface therefore it has Port VLAN ID (pvid).
|vlan-filtering (yes | no; Default: no)||Globally enables or disables VLAN functionality for bridge.|
|pvid (1..4094; Default: 1)||Port VLAN ID (pvid) specifies which VLAN the untagged ingress traffic is assigned to. It applies e.g. to frames sent from bridge IP and destined to a bridge port.|
/interface bridge port
|frame-types (admit-all | admit-only-untagged-and-priority-tagged | admit-only-vlan-tagged; Default: admit-all)||Specifies allowed ingress frame types on a bridge port.|
|ingress-filtering (yes | no; Default: no)||Enables or disables filtering which looks for an ingress port match in the Bridge VLAN table.|
|pvid (1..4094; Default: 1)||Port VLAN ID (pvid) specifies which VLAN the untagged ingress traffic is assigned to.|
Bridge VLAN table represents per-VLAN port mapping with an egress VLAN tag action.
tagged ports send out frames with a learned VLAN ID tag.
untagged ports remove VLAN tag before sending out frames if the learned VLAN ID matches the port
/interface bridge vlan
|bridge (name)||The bridge interface which the respective VLAN entry is intended for.|
|disabled (yes | no; Default: no)||Enables or disables Bridge VLAN entry.|
|tagged (interfaces; Default: none)||Interface list with a VLAN tag adding action in egress. This setting accepts comma separated values. E.g.
|untagged (interfaces; Default: none)||Interface list with a VLAN tag removing action in egress. This setting accepts comma separated values. E.g.
|vlan-ids (1..4094)||The list of VLAN IDs for certain port configuration. This setting accepts VLAN ID range as well as comma separated values. E.g.
Network loops may emerge (intentionally or not) in complex topologies. Without any special treatment, loops would prevent network from functioning normally, as they would lead to avalanche-like packet multiplication. Each bridge runs an algorithm which calculates how the loop can be prevented. STP and RSTP allows bridges to communicate with each other, so they can negotiate a loop free topology. All other alternative connections that would otherwise form loops, are put to standby, so that should the main connection fail, another connection could take its place. This algorithm exchanges configuration messages (BPDU - Bridge Protocol Data Unit) periodically, so that all bridges are updated with the newest information about changes in network topology. (R)STP selects a root bridge which is responsible for network reconfiguration, such as blocking and opening ports on other bridges. The root bridge is the bridge with the lowest bridge ID.
As of RouterOS v6.41 all CRS3xx series switches support (R/M)STP bridge protocol mode and hardware offloading simultaneously, meaning that it possible to use the switch chip's built-in VLAN filtering function in conjunction with bridge's Spanning Tree Protocol features and forward packets at wire-speed.
|protocol-mode (mstp | none | rstp | stp; Default: rstp)||
IGMP Snooping which controls multicast streams and prevents multicast flooding is implemented in RouterOS starting from version 6.41. It's settings are placed in bridge menu and it works independently in every bridge interface. Software driven implementation works on all devices with RouterOS but CRS1xx/2xx/3xx series switches also support IGMP Snooping with hardware offloading.
- Use this command to enable IGMP Snooping on a bridge interface:
/interface bridge set bridge1 igmp-snooping=yes
- Use this command to get current Multicast Database entries:
[admin@MikroTik] > /interface bridge mdb print BRIDGE VID GROUP PORTS bridge1 200 22.214.171.124 ether3 ether2 ether1 bridge1 300 126.96.36.199 ether4 ether3 ether2 bridge1 400 188.8.131.52 ether4 ether3 bridge1 500 184.108.40.206 ether5 ether1
Global Switch Settings
This sections holds general information about the switch chip built-in into the device and allows to specify port mirroring options.
/interface ethernet switch
To view the current switch chip for the device, use this command:
[admin@MikroTik] /interface ethernet switch> print Flags: I - invalid # NAME TYPE MIRROR-SOURCE MIRROR-TARGET 0 switch1 Marvell-98DX3236 none none
To change the switch chip's name, use this command:
/interface ethernet switch set switch1 name=switch_chip
Port mirroring lets switch 'sniff' all traffic that is going in and out of one port (mirror-source) and send a copy of those packets out of some other port (mirror-target). This feature can be used to easily set up a 'tap' device that receives all traffic that goes in/out of some specific port. Note that mirror-source and mirror-target ports have to belong to same switch. (See which port belong to which switch in
/interface ethernet menu). Also mirror-target can have a special 'cpu' value, which means that 'sniffed' packets should be sent out of switch chips cpu port. Port mirroring happens independently of switching groups that have or have not been set up.
Use this command to set a port mirror from ether2 to ether3:
/interface ethernet switch set switch1 mirror-source=ether2 mirror-target=ether3
It is possible to limit ingress and egress bandwidth per port using the
/interface ethernet switch port menu.
/interface ethernet switch port
|egress-rate (Default: none)||Specifies port egress rate in bps|
|ingress-rate (Default: none)||Specifies port ingress rate in bps|
Switch Rules (ACL)
Access Control List contains of ingress policy and egress policy engines and allows to configure up to 128 policy rules (limited by RouterOS). It is advanced tool for wire-speed packet filtering, forwarding and modifying based on Layer2, Layer3 and Layer4 protocol header field conditions.
/interface ethernet switch rule
|copy-to-cpu (no | yes; Default: no)||Clones the matching packet and sends it to the CPU.|
|disabled (yes | no; Default: no)||Enables or disables ACL entry.|
|dscp (0..63)||Matching DSCP field of the packet.|
|dst-address (IP address/Mask)||Matching destination IP address and mask.|
|dst-address6 (IPv6 address/Mask)||Matching destination IPv6 address and mask.|
|dst-mac-address (MAC address/Mask)||Matching destination MAC address and mask.|
|dst-port (0..65535)||Matching destination protocol port number.|
|flow-label (0..1048575)||Matching IPv6 flow label.|
|mac-protocol (802.2 | arp | homeplug-av | ip | ipv6 | ipx | lldp | loop-protect | mpls-multicast | mpls-unicast | packing-compr | packing-simple | pppoe | pppoe-discovery | rarp | service-vlan | vlan | or 0..65535 | or 0x0000-0xffff)||Matching particular MAC protocol specified by protocol name or number|
|mirror (no | yes)||Clones the matching packet and sends it to the mirror-target port.|
|new-dst-ports (ports)||Changes the destination port as specified. An empty setting will drop the packet. A specified port will redirect the packet to it. When the parameter is not used, the packet will be accepted. Multiple "new-dst-ports" are not supported on CRS3xx series switches.|
|new-vlan-id (0..4095)||Changes the VLAN ID to the specified value. Requires
|new-vlan-priority (0..7)||Changes the VLAN priority tag. Requires
|ports (ports)||Matching ports on which will the rule apply on received traffic.|
|protocol (dccp | ddp | egp | encap | etherip | ggp | gre | hmp | icmp | icmpv6 | idpr-cmtp | igmp | ipencap | ipip | ipsec-ah | ipsec-esp | ipv6 | ipv6-frag | ipv6-nonxt | ipv6-opts | ipv6-route | iso-tp4 | l2tp | ospf | pim | pup | rdp | rspf | rsvp | sctp | st | tcp | udp | udp-lite | vmtp | vrrp | xns-idp | xtp | or 0..255)||Matching particular IP protocol specified by protocol name or number.|
|redirect-to-cpu (no | yes)||Changes the destination port of a matching packet to the CPU.|
|src-address (IP address/Mask)||Matching source IP address and mask.|
|src-address6 (IPv6 address/Mask)||Matching source IPv6 address and mask.|
|src-mac-address (MAC address/Mask)||Matching source MAC address and mask.|
|src-port (0..65535)||Matching source protocol port number.|
|switch (switch group)||Matching switch group on which will the rule apply.|
|traffic-class (0..255)||Matching IPv6 traffic class.|
|vlan-id (0..4095)||Matching VLAN ID. Requires
|vlan-header (not-present | present)||Matching VLAN header, whether the VLAN header is present or not.|
|vlan-priority (0..7)||Matching VLAN priority.|
- new-dst-ports (can be used to drop packets)
- Layer2 conditions:
- Layer3 conditions:
- IPv4 conditions:
- IPv6 conditions:
- Layer4 conditions: