One document matched: draft-shah-extreme-eaps-00.txt
Individual Submission S. Shah
Internet-Draft Extreme Networks
Intended status: Informational October 27, 2008
Expires: April 30, 2009
Extreme Networks'
Ethernet Automatic Protection Switching (EAPS),
Version 1.3
draft-shah-extreme-eaps-00
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
This document may not be modified, and derivative works of it may not
be created, except to publish it as an RFC and to translate it into
languages other than English.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on April 30, 2009.
Abstract
This document describes version 1.3 of the Ethernet Automatic
Protection Switching (EAPS) (TM) technology invented by Extreme
Networks to increase the availability and robustness of Ethernet
rings. An Ethernet ring built using EAPS can have resilience
comparable to that provided by SONET rings, at lower cost and without
some of the constraints (e.g. ring size) of SONET.
Shah Expires April 30, 2009 [Page 1]
Internet-Draft Extreme Networks' EAPS Version 1.3 October 2008
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Concept of Operation . . . . . . . . . . . . . . . . . . . . . 3
2.1. Link Down Alert . . . . . . . . . . . . . . . . . . . . . 4
2.2. Ring Polling . . . . . . . . . . . . . . . . . . . . . . . 4
2.3. Ring Restoration . . . . . . . . . . . . . . . . . . . . . 5
2.4. Preventing False Failures . . . . . . . . . . . . . . . . 5
2.5. Enhancements to Aid in Trouble-Shooting . . . . . . . . . 6
2.6. PREFORWARDING State on Transit . . . . . . . . . . . . . . 7
3. Multiple EAPS Domains . . . . . . . . . . . . . . . . . . . . 8
4. Inter-operation with EAPS SHARED-PORTS . . . . . . . . . . . . 8
5. EAPS Frame Format . . . . . . . . . . . . . . . . . . . . . . 10
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 13
7. Security Considerations . . . . . . . . . . . . . . . . . . . 14
8. Intellectual Property . . . . . . . . . . . . . . . . . . . . 14
9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 14
10. Informative References . . . . . . . . . . . . . . . . . . . . 14
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 15
Intellectual Property and Copyright Statements . . . . . . . . . . 16
Shah Expires April 30, 2009 [Page 2]
Internet-Draft Extreme Networks' EAPS Version 1.3 October 2008
1. Introduction
Many Metropolitan Area Networks (MANs) and some Local Area Networks
(LANs) have a ring topology, as the fiber runs. The Ethernet
Automatic Protection Switching technology described here works well
in ring topologies for MANs or LANs.
Also, most MAN operators want to minimize the recovery time in the
event a fiber cut occurs. The Spanning Tree Protocol STP
[802.1D-1998] can take as long as 40 seconds to converge in the event
of a topology change. The newer Rapid Spanning Tree Protocol RSTP
[802.1D-2004] is considerably faster. However, its convergence time
is still dependent upon the number of switching nodes in the ring.
Both STP and RSTP limit the number of switches in the ring. The
Ethernet Automatic Protection Switching (EAPS) technology described
here converges in less than one second, often in less than 100
milliseconds. EAPS technology does not limit the number of switches
in the ring, and the convergence time is independent of the number of
switches.
EAPS version 1 is specified in [RFC3619].
2. Concept of Operation
An EAPS Domain exists on a single Ethernet ring. Any Ethernet
Virtual Local Area Network (VLAN) that is to be protected is
configured on all ports in the ring for the given EAPS Domain. Each
EAPS Domain has a single designated "Master node". Each other switch
on that ring is referred to as a "Transit node".
Of course, each switch on the ring will have 2 ports connected to the
ring. One port of the Master node is designated to be the "primary
port" to the ring for the Master node. The other port is designated
as the "secondary port".
In normal operation, the Master node blocks the secondary port for
all non-control Ethernet frames belonging to the given EAPS Domain,
thereby avoiding a loop in the ring. Existing Ethernet switching and
learning mechanisms operate per existing standards on this ring.
This is possible because the Master node makes the ring appear not to
have a loop, from the perspective of the Ethernet standard algorithms
used for switching and learning. If the Master node detects a ring
fault, it unblocks its secondary port and allows Ethernet data frames
to pass through that port. There is a special "Control VLAN" that
can always pass through all ports in the EAPS Domain, including the
secondary port of the Master node.
Shah Expires April 30, 2009 [Page 3]
Internet-Draft Extreme Networks' EAPS Version 1.3 October 2008
EAPS uses both a polling mechanism, described in detail below, and an
alert mechanism, also described below, to verify the connectivity of
the ring and to quickly detect any faults.
EAPS frames are encoded using the Extreme Networks' Encapsulation
Protocol. The EAPS frame format is defined in Section 5. All EAPS
frames use a source MAC address of 00-E0-2B-00-00-01 (assigned out of
an Extreme Networks OUI). All EAPS frames use a destination MAC
address of 00-E0-2B-00-00-04 (with the exception of FLUSH-FDB-PDU,
described in Section 4).
2.1. Link Down Alert
When any Transit node detects a link-down on any of its ports in the
EAPS Domain, that Transit node immediately sends a "link down"
control frame (LINK-DOWN-PDU) on the Control VLAN to the Master node.
When the Master node receives this "link down" control frame, the
Master node moves from the "normal" state (COMPLETE) to the ring-
fault state (FAILED) and unblocks its secondary port. The Master
node also flushes its bridging table. The Master node also sends a
control frame (RING-DOWN-FLUSH-FDB) to all other ring switches
instructing them to flush their bridging tables. Immediately after
flushing its bridging table, each switch starts learning the new
topology.
2.2. Ring Polling
The Master node sends a health-check frame (HEALTH-CHECK-PDU) on the
Control VLAN at a user-configurable interval. If the ring is
complete, this will be received on its secondary port. Upon receipt
of the HEALTH-CHECK-PDU, the Master node resets its Fail-period timer
and continues normal operation.
If the Master node does not receive the HEALTH-CHECK-PDU before the
Fail-period timer expires, the Master node moves from the normal
state to the "ring-fault" state (FAILED) and unblocks its secondary
port. The Master node also flushes its bridging table. The Master
node also sends a control frame (RING-DOWN-FLUSH-FDB) to all other
switches instructing them to also flush their bridging tables.
Immediately after flushing its bridge table, each switch starts
learning the new topology. This ring polling mechanism provides a
backup in the event the Link Down Alert frame (LINK-DOWN-PDU) should
get lost for some unforeseen reason.
Shah Expires April 30, 2009 [Page 4]
Internet-Draft Extreme Networks' EAPS Version 1.3 October 2008
2.3. Ring Restoration
The Master node continues sending periodic HEALTH-CHECK-PDUs out its
primary port even when operating in the ring-fault (FAILED) state.
Once the ring is restored, the very next HEALTH-CHECK-PDU sent will
be received on the Master node's secondary port. This will cause the
Master node to transition back to the normal (COMPLETE) state,
logically block non-control frames on the secondary port, flush its
own bridge table, and send a control frame (RING-UP-FLUSH-FDB-PDU) to
the Transit nodes instructing them to flush their bridging tables and
re-learn the topology.
During the time between the Transit node detecting that its link is
restored and the Master node detecting that the ring is restored, the
secondary port of the Master node is still open -- creating the
possibility of a temporary loop in the topology. To prevent any
temporary loop, the Transit node will put all the protected VLANs
transiting the newly restored port into a temporary blocked state,
remember which port has been temporarily blocked, and transition into
the "PREFORWARDING" state. When the Transit node in the
PREFORWARDING state receives a RING-UP-FLUSH-FDB-PDU instructing it
to flush its bridging table, it will flush the bridging table,
unblock the previously blocked protected VLANs on the newly restored
port, and transition to the "normal" (LINKS-UP) state.
2.4. Preventing False Failures
One of the biggest drawbacks of using the ring-polling mechanism in
detecting failures is when the EAPS HEALTH-CHECK-PDUs do not return
to the Master node, even though the ring itself is complete. This
could happen due to a number of reasons such as the Control VLAN not
being configured correctly on all switches in the ring; or bad
hardware dropping control PDUs; or too much traffic on the ring
causing control PDUs to get dropped or delayed; or the Master node's
CPU being too busy, and not getting a chance to process a HEALTH-
CHECK-PDU thereby causing its Fail-period timer to expire.
When the EAPS Master node enters into FAILED state due to its Fail-
period timer expiring, and unblocks its secondary port, it may
inadvertently cause a loop in the network if the ring is actually
complete.
The EAPS Master node can be configured to take one of two actions
when its Fail-period timer expires:
a. Open the secondary port - This is the earlier behavior, and can
still be used if the EAPS network has a non-EAPS switch not
capable of sending a LINK-DOWN-PDU when its link goes down. In
Shah Expires April 30, 2009 [Page 5]
Internet-Draft Extreme Networks' EAPS Version 1.3 October 2008
such a network, we would still need to use the polling mechanism
to detect failures in the ring. In these cases, when the Fail-
period timer expires, forwarding on the the secondary port needs
to be enabled.
b. Send alert - This is the preferred configuration and should be
the default setting. In this mode, if the Fail-period timer
expires, and the Master node has not received a LINK-DOWN-PDU, or
an event indicating a local link failure, it keeps its secondary-
port in blocking state, and sends an alert message to the network
administrator. A "Failed flag" is set to let the user know that
the Fail-period timer expired without any legitimate reason such
as a local link going down or receiving a LINK-DOWN-PDU.
To handle the situation where a LINK-DOWN-PDU may been missed or
dropped, a new PDU type has been introduced - QUERY-LINK-STATUS-PDU.
When the Master node's Fail-period timer expires while being
configured for send-alert, it's Failed flag gets set. The Master
node also sends the QUERY-LINK-STATUS-PDU out both its ring-ports.
If any Transit node in the ring has one of its links down, it will
respond with its regular LINK-DOWN-PDU. This way, if there is a
legitimate failure in the ring, the Master node will get a chance to
learn about it and transition to the regular FAILED state and unblock
its secondary-port.
2.5. Enhancements to Aid in Trouble-Shooting
A couple of enhancements have been added to the EAPS protocol since
[RFC3619] to help in trouble-shooting an EAPS network.
a. INIT state - This state was introduced to differentiate it from
the Master node's COMPLETE state. When the EAPS Master node is
coming up for the first time, and detects that both of its ring-
ports are up, it still doesn't know if the ring itself is
complete or not. It takes the safe approach and blocks its
secondary-port to prevent a possible loop in the network. The
Master node will transition into the COMPLETE state when it
receives its HEALTH-CHECK-PDU.
If say a switch had a misconfigured Control VLAN, the HEALTH-
CHECK-PDU would not make it back to the Master node, and it would
remain in INIT state. This would be a clue to the network
administrator that there is an apparent problem in the EAPS
network, while at the same time, the secondary port would remain
blocked, preventing a loop in the network.
b. LINK-UP-PDU - When a link comes up on a Transit node, it will
send a LINK-UP-PDU to the Master node, which would get logged in
Shah Expires April 30, 2009 [Page 6]
Internet-Draft Extreme Networks' EAPS Version 1.3 October 2008
its logging database. The timestamp of this log message could be
used in trouble-shooting an EAPS network if for example it never
transitioned to COMPLETE state.
2.6. PREFORWARDING State on Transit
On a Transit node, when one ring-port is already up, and the other
one transitions from down to up, this Transit node's state will
change from LINK-DOWN to PREFORWARDING. This is a state to prevent a
temporary loop in the network.
Without this state, a Transit node which already had one port up, and
had the other one coming up would have transitioned from LINK-DOWN
state to LINKS-UP state where both ports are forwarding. At that
moment the Master node is still in FAILED state where both of its
ports are forwarding. We would have a temporary loop in the network
until the Master node detected the ring is complete and blocked its
secondary port.
When a port comes up on the Transit node, it checks the status of its
other ring-port. If the other port is also up, it enters into
PREFORWARDING state, and keeps the port that just came up in blocking
state, while starting its Preforwarding timer. It now waits to
receive the RING-UP-FLUSH-FDB-PDU from the Master node. The Master
node sends this PDU when it enters into COMPLETE state and has
blocked its secondary-port.
When the Transit node sees the RING-UP-FLUSH-FDB-PDU message, it
knows that the ring has been blocked by the Master node, so it
transitions from PREFORWARDING state into the LINKS-UP state, enables
forwarding on its previously blocked port, and flushes its FDB. The
Transit node also stops the Preforwarding timer.
The role of the Preforwarding timer is to deal with a lost RING-UP-
FLUSH-FDB-PDU. It is also used in the case of another break in the
ring, in which case the Transit node would not receive a RING-UP-
FLUSH-FDB-PDU from the Master node. Without a Preforwarding timer,
the Transit node would remain in PREFORWARDING state with its port in
blocked state indefinitely, thereby causing a disconnected network.
The value of the Preforwarding timer is derived from the HEALTH-
CHECK-PDU sent by the Master node. The Transit node looks up the
hello-interval field in the PDU, then multiplies this value by 3, and
adds 3 to it.
Shah Expires April 30, 2009 [Page 7]
Internet-Draft Extreme Networks' EAPS Version 1.3 October 2008
3. Multiple EAPS Domains
An EAPS-enabled switch can be part of more than one ring. Hence, an
EAPS-enabled switch can belong to more than one EAPS Domain at the
same time. Each EAPS Domain on a switch requires a separate instance
of the EAPS protocol on that same switch, one instance per EAPS-
protected ring.
One can also have more than one EAPS Domain running on the same ring
at the same time. Each EAPS Domain has its own different Master node
and each EAPS Domain has its own set of protected VLANs. This
facilitates spatial reuse of the ring's bandwidth.
4. Inter-operation with EAPS SHARED-PORTS
EAPS Shared-Ports is the technology used with EAPS to break a loop
when multiple EAPS Domains have a common-link between them.
Without EAPS Shared-Ports there would be a loop in the network if the
common-link between them went down, and there were VLANs spanning two
or more domains.
EAPS Shared-Ports is a proprietary protocol run in addition to EAPS
on those switches that have one end of the common-link between the
domains. One switch is configured to be the CONTROLLER, which does
the blocking when the common-link goes down. Its peer is running on
the other end of the common-link, and is configured to be the
PARTNER. Both switches work together to prevent a loop in the
network when the common-link between them goes down.
Describing the operation of EAPS Shared-Ports is beyond the scope of
this document. Here, we will describe the additional changes that
have to be made to an EAPS switch which is participating in such a
network, but not running the EAPS Shared-Ports protocol itself. In
fact, it does not even have to know that there is EAPS Shared-Ports
configured on other switches in its network.
1. Processing and Forwarding of FLUSH-FDB-PDU: This PDU is sent by a
switch running EAPS Shared-Ports when a section of the network
needs to have its FDB flushed.
It is sent with a special destination MAC address
00-E0-2B-00-00-07. The EAPS PDU type is FLUSH-FDB-PDU whose
value is 0x0D.
When a Transit or Master node receives this PDU, it should flush
its own bridging table, and forward this PDU out the "other"
Shah Expires April 30, 2009 [Page 8]
Internet-Draft Extreme Networks' EAPS Version 1.3 October 2008
ring-port via slow-path.
2. A switch running EAPS Shared-Ports may send a QUERY-LINK-STATUS-
PDU to determine if there is a failure in a particular segment.
These PDUs would need to be forwarded out the "other" ring-port
to ensure they reach the EAPS Shared-Ports sender's peer switch.
A Transit node should always forward a QUERY-LINK-STATUS-PDU when
it is in LINKS-UP state. A Master node only forwards a QUERY-
LINK-STATUS-PDU when it is in FAILED state.
3. A switch that receives a LINK-DOWN-PDU needs to forward this PDU
out the "other" ring-port so that it reaches the EAPS Shared-
Ports switch at the end of this segment. A Transit node should
always forward a LINK-DOWN-PDU when possible (when in LINKS-UP
state), while a Master node should forward a LINK-DOWN-PDU only
while in FAILED state.
Shah Expires April 30, 2009 [Page 9]
Internet-Draft Extreme Networks' EAPS Version 1.3 October 2008
5. EAPS Frame Format
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Destination MAC address (6 bytes) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | Source MAC address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| (6 bytes) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| EtherType (2 bytes) | Pri | VLAN Id |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Frame length [0x005C] | DSAP [0xAA] | SSAP [0xAA] |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Control [0x03]| OUI [0x00] | OUI [0xE0] | OUI [0x2B] |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type [0x00BB] |EEP Ver [0x01] |EEP Resv[0x00] |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| EEP Len [0x0054] | EEP Checksum (2 bytes) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| EEP Sequence Num (2 bytes) | Device Id |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| (8 bytes) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | Marker [0x99]| EEP Type[0x0B] |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| EAPS length [0x0040] |EAPS Ver [0x01]| EAPS PDU Type |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|EAPS Control VLAN Id (2 bytes) | EAPS Reserved [0x0000] |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| [0x0000] | System MAC Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| (6 bytes) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| EAPS Hello Timer (2 bytes) | EAPS Fail Timer (2 bytes) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|EAPS State | [0x00] | EAPS Sequence Num (2 bytes) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| EAPS Reserved (38 bytes) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Shah Expires April 30, 2009 [Page 10]
Internet-Draft Extreme Networks' EAPS Version 1.3 October 2008
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | Marker [0x99] | EEP Type[0x00]|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| EEP NULL TLV Len [0x04] | Ethernet Frame... |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| ...Checksum (4 bytes) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 1: EAPS Frame Format
Where:
Dest MAC (6 bytes) = 0x00 E0 2B 00 00 04
Source MAC (6 bytes) = 0x00 E0 2B 00 00 01
EtherType (2 bytes) = 0x81 00 (for IEEE 802.1Q tagged packets)
Pri (4 bits) = 3 bits Priority + 1 bit reserved
VLAN Id (12 bits) = VLAN Id for Control VLAN in use
Frame Len (2 bytes) = 0x005C (Ethernet frame data length)
DSAP (1 byte) = 0xAA
SSAP (1 byte) = 0xAA
Control (1 byte) = 0x03
OUI (3 bytes) = 0x00 E0 2B (Extreme Networks OUI)
Type (2 bytes) = 0x00 BB
EEP Ver (1 byte) = 0x01 (Extreme's Encapsulation Protocol
version)
EEP Resv (1 byte) = 0x00
EEP Len (2 bytes) = 0x0054 (Length of EEP data + EEP header)
EEP Checksum (2 bytes) = Calculated checksum. (Described below)
EEP Seq Num (2 bytes) = The first EEP packet has a value of 1.
This value is incremented by 1 for each
subsequent EEP packet sent out. (This
field is only used for debugging
purposes.)
Device Id (8 bytes) = System MAC. The 2 MSBs of Device Id set
to 0.
Marker (1 byte) = 0x99 (EEP's Start of a new TLV marker.
This is the beginning of the EAPS
Shah Expires April 30, 2009 [Page 11]
Internet-Draft Extreme Networks' EAPS Version 1.3 October 2008
TLV)
EEP Type (1 byte) = 0x0B (EAPS PDU TLV)
EAPS Length (2 bytes) = 0x0040 (Length of EAPS TLV including
header)
EAPS Ver (1 byte) = 0x01 (EAPS Ver 1)
EAPS PDU Type (1 byte) = Identifies the type of EAPS PDU
(Values given below)
EAPS VLAN Id (2 bytes) = VLAN Id for Control VLAN being used to
send and receive EAPS PDUs
EAPS Reserved (4 bytes) = 0x00 00 00 00
System MAC (6 bytes) = System MAC of node issuing the EAPS
packet
EAPS Hello (2 bytes) = 0x04. Even though this is meant to
convey the EAPS Hello Interval, it is
hard-coded to 4. This is so that the
Transits can derive their preforwarding
interval to be 15 seconds.
EAPS Fail (2 bytes) = EAPS Fail Timer interval set by Master
EAPS State (1 byte) = EAPS node's state (Values given below)
EAPS Reserved (1 byte) = 0x00
EAPS Seq Num (2 bytes) = For debug, sequence number of
Health-PDUs in ascending order
EAPS Reserved (38 bytes) = All bytes are 0 for now
Marker (1 byte) = 0x99 (EEP's Start of a new TLV marker.
This is the beginning of the NULL
TLV)
EEP Type (1 byte) = 0x00 (EEP NULL TLV)
NULL TLV Len (2 bytes) = 0x04 (including header)
Checksum (4 bytes) = Ethernet Frame's checksum
EAPS PDU Type values:
HEALTH-CHECK-PDU = 0x05
RING-UP-FLUSH-FDB-PDU = 0x06
RING-DOWN-FLUSH-FDB-PDU = 0x07
LINK-DOWN-PDU = 0x08
FLUSH-FDB-PDU = 0x0D
QUERY-LINK-STATUS-PDU = 0x0F
LINK-UP-PDU = 0x10
All other values are reserved
Shah Expires April 30, 2009 [Page 12]
Internet-Draft Extreme Networks' EAPS Version 1.3 October 2008
EAPS State values:
IDLE = 0x00 (EAPS Domain (Master/Transit) still not
running)
COMPLETE = 0x01 (Master in Complete State)
FAILED = 0x02 (Master in Failed State)
LINKS-UP = 0x03 (Transit in Links-Up State. Both ring-ports
are up)
LINK-DOWN = 0x04 (Transit in Link-Down State. One or both
ring-ports are down)
PREFORWARDING = 0x05 (Transit in Preforwarding State)
INIT = 0x06 (Master in Init State)
All other values are reserved
EEP Checksum:
This is 16 bits wide and is calculated as follows:
o First set "EEP Checksum" field to 0.
o Calculate the checksum using the algorithm below starting from
"EEP Ver" field through "EEP NULL TLV Len" field.
o This size is the same value that is set in "EEP Len" field.
// Algorithm for EEP checksum calculation
int checksum (uint16_t *addr, int len)
{
int sum = 0;
o Using a 32 bit accumulator 'sum'
o In a while-loop, go on adding sequential 16 bit words
from 'addr' to accumulator 'sum'
o If there is an odd byte left at the end, add it to
accumulator 'sum'
o Add high 16 bits of 'sum' to low 16 bits of 'sum'
o If there is a carry bit, add it back to 'sum'
o Truncate to 16 bits, and return this as a 16 bit word.
}
6. IANA Considerations
This memo includes no request to IANA.
Shah Expires April 30, 2009 [Page 13]
Internet-Draft Extreme Networks' EAPS Version 1.3 October 2008
7. Security Considerations
Anyone with physical access to the physical layer connections could
forge any sort of Ethernet frame they wished, including but not
limited to Bridge frames or EAPS frames. Such forgeries could be
used to disrupt an Ethernet network in various ways, including
methods that are specific to EAPS or other unrelated methods such as
forged Ethernet bridge frames.
As such, it is recommended that users not deploy Ethernet without
some form of encryption in environments where such active attacks are
considered a significant operational risk. IEEE standards already
exist for link-layer encryption [802.1AE-2006]. Those IEEE standards
could be used to protect an Ethernet's links. Alternately, upper-
layer security mechanisms could be used if more appropriate to the
local threat model.
8. Intellectual Property
The IETF has been notified of intellectual property rights claimed in
regard to some or all of the specification contained in this
document. For more information, consult the online list of claimed
rights.
9. Acknowledgements
[RFC3619] was edited together and put into RFC format by R.J.
Atkinson from internal documents created by the authors of that
document. This version of the EAPS specification is derived from
[RFC3619]. Steven Blake edited this document based on a draft
prepared by Sunil Shah. Arnel Lim provided useful feedback.
This document was produced using the xml2rfc tool [RFC2629].
10. Informative References
[802.1D-1998]
IEEE LAN/MAN Standards Committee, "IEEE 802.1D Standard
for Local and Metropolitan Area Networks: Media Access
Control (MAC) Bridges", 1998.
[802.1D-2004]
IEEE LAN/MAN Standards Committee, "IEEE 802.1D Standard
for Local and Metropolitan Area Networks: Media Access
Control (MAC) Bridges", 2004.
Shah Expires April 30, 2009 [Page 14]
Internet-Draft Extreme Networks' EAPS Version 1.3 October 2008
[RFC3619] Shah, S. and M. Yip, "Extreme Networks' Ethernet Automatic
Protection Switching (EAPS) Version 1", RFC 3619,
October 2003.
[802.1AE-2006]
IEEE LAN/MAN Standards Committee, "IEEE 802.1AE Standard
for Local and Metropolitan Area Networks: Media Access
Control (MAC) Security", 2006.
[RFC2629] Rose, M., "Writing I-Ds and RFCs using XML", RFC 2629,
June 1999.
Author's Address
Sunil Shah
Extreme Networks
3585 Monroe Street
Santa Clara, CA 95051
USA
Phone: +1 408-579-2800
Email: sshah@extremenetworks.com
Shah Expires April 30, 2009 [Page 15]
Internet-Draft Extreme Networks' EAPS Version 1.3 October 2008
Full Copyright Statement
Copyright (C) The IETF Trust (2008).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Shah Expires April 30, 2009 [Page 16]
| PAFTECH AB 2003-2026 | 2026-04-19 07:42:03 |