Abstract:
A method, apparatus and computer program product for providing Virtual Routing and Forwarding (VRF) and gateway Media Access Controller (MAC) distribution is presented. At least one subnet associated with a Layer 2 Virtual Switching Network (L2VSN) is provided on a network device. A message is propagated to a distributed Datapath. Network devices install the message as a routable MAC address on the L2VSN for the Layer 3 Virtual Switching Network/Virtual Routing and Forwarding (L3VSN/VRF) associated with the message. Edge devices route packets on the L2VSN addressed to the gateway MAC address.
Abstract:
A computer-implemented method, apparatus and software for debugging auto-attach entities is presented. A Continuity Fault Management (CFM) request for a service is received over a network at an Auto-Attach (AA) server. The AA server responds with a first response regarding the AA server on the service. The AA server also responds to the CFM request with a second response regarding any AA clients and any AA proxies on the service.
Abstract:
A method, apparatus and computer program product for providing Virtual Routing and Forwarding (VRF) and gateway Media Access Controller (MAC) distribution is presented. At least one subnet associated with a Layer 2 Virtual Switching Network (L2VSN) is provided on a network device. A message is propagated to a distributed Datapath. Network devices install the message as a routable MAC address on the L2VSN for the Layer 3 Virtual Switching Network/Virtual Routing and Forwarding (L3VSN/VRF) associated with the message. Edge devices route packets on the L2VSN addressed to the gateway MAC address.
Abstract:
A method, apparatus and computer program product for providing Virtual Routing and Forwarding (VRF) and gateway Media Access Controller (MAC) distribution is presented. At least one subnet associated with a Layer 2 Virtual Switching Network (L2VSN) is provided on a network device. A message is propagated to a distributed Datapath. Network devices install the message as a routable MAC address on the L2VSN for the Layer 3 Virtual Switching Network/Virtual Routing and Forwarding (L3VSN/VRF) associated with the message. Edge devices route packets on the L2VSN addressed to the gateway MAC address.
Abstract:
A method, apparatus and computer readable medium for reducing traffic loss when bringing up a switch within a multi chassis switch cluster without using dedicated intra cluster links is presented. A first network device in a cluster discovers at least one path to a second network device in the cluster, wherein the cluster utilizes at least one virtual IST between the first network device and the second network device. The first network device starts an Inter Switch Trunk (IST) synchronization process with the second network device. The first network device installs redirection rules, wherein the redirection rules are used for datapath traffic and are not used for control channel traffic. The first network device determines that the IST synchronization process between the first network device and the second network device has completed, and removes the redirection rules.
Abstract:
Multicast link trace Connectivity Fault Management (CFM) is implemented in an Ethernet network by causing nodes on the network which perform Reverse Path Forwarding Check (RPFC) based on packet Source Address (SA) to not update the packet SA when updating the content of the CFM message. Alternatively multicast CFM is implemented by causing nodes on the network to update the packet SA when the content of the CFM message is updated, but cause a secondary RPFC process to be implemented by a control process in connection with processing the CFM message. The secondary RPFC process is based on a combination of source and content contained in the payload of the CFM message.
Abstract:
A method, apparatus and computer program product for providing a best route selection rule is presented. A determination is made at a first edge router, whether a second edge router in a network advertises a first BMAC address and at least one other BMAC address When the second edge router advertises only a first BMAC address, then the first BMAC address is used in a routing table for a Layer 3 (L3) next hop for a route. When the second edge router advertises more than one BMAC address, at least one other BMAC address is used in the routing table for said L3 next hop for the route.
Abstract:
A method, apparatus and computer program product for performing optimized distributed routing for stretched data center models through updating route advertisements based on changes to Address Resolution Protocol (ARP) Tables is presented. Port members of an Internet Protocol I (IP) interface or Virtual Local Area Network (VLAN) are distinguished into Access Interfaces which only lead to hosts on said subnet and TrunkInterfaces which lead to other redundant routers on said subnet. In the subnet of a network a network route for the subnet is always advertised. A separate host route corresponding to an Internet Protocol (IP) address of each Address Resolution Protocol (ARP) table record that points to an Access Interface is advertised and route advertisements are changed for a host in said subnet for tracked access interfaces.
Abstract:
A method and apparatus for providing Protocol-Independent Multicast (PIM) snooping for a Shortest Path Bridging Multicast (SPBM) Network is presented. An ingress Backbone Edge Bridge (BEB) device of a Shortest Path Bridging (SPB) network having at least one egress BEB coupled to at least one PIM network performs the following operations. The egress BEB, snoops join and prune messages for a multicast stream in the SPB network. A multicast tree is built in the SPB network for the multicast stream in accordance with the join and prune messages. The multicast stream is forwarded through the SPB network in accordance with the multicast tree.
Abstract:
A method, apparatus and computer program product for providing the use of an external metric as the primary tie-breaker in ISIS route selections is presented. A set of routes are identified that are to be advertised by the router as external routes within a network. The routes are advertised by the router using a Type Length Variable (TLV), wherein the TLV contains metric information to be used as a first tiebreaker when selecting routes. The network is running an Intermediate System To Intermediate System (ISIS) protocol. The TLV includes a 32-bit or a 64-bit administrative tag sub-TLV, the TLV comprising TLV#135, TLV#235, TLV#236, and TLV#237.