Configuring the eaps control vlan, Configuring the eaps protected vlans – Extreme Networks 200 Series User Manual

Page 153

Advertising
background image

Commands for Configuring and Monitoring EAPS

Summit 200 Series Switch Installation and User Guide

151

Configuring the EAPS Control VLAN

You must configure one control VLAN for each EAPS domain. The control VLAN is used only to send
and receive EAPS messages.

NOTE

A control VLAN cannot belong to more than one EAPS domain.

To configure the EAPS control VLAN for the domain, use the following command:

config eaps <name> add control vlan <name>

NOTE

To avoid loops in the network, the control VLAN must NOT be configured with an IP address, and
ONLY ring ports may be added to the VLAN.

NOTE

When you configure the VLAN that will act as the control VLAN, that VLAN must be assigned a QoS
profile of Qp8, and the ring ports of the control VLAN must be tagged.

By assigning the control VLAN a QoS profile of Qp8, you ensure that EAPS control VLAN traffic is
serviced before any other traffic and that control VLAN messages reach the intended destinations. For
example, if the control VLAN is not assigned the highest priority and a broadcast storm occurs in the
network, the control VLAN messages might be dropped at intermediate points. Assigning the control
VLAN the highest priority prevents dropped control VLAN messages.

NOTE

Because the QoS profiles Qp7 and Qp8 share the same hardware queue in the Summit 200 series
switch, you must limit the amount of traffic that uses these profiles; otherwise, the Summit 200 series
switch may drop EAPS control packets, preventing EAPS from operating reliably.

The following command example adds the control VLAN “keys” to the EAPS domain “eaps_1.”

config eaps eaps_1 add control vlan keys

Configuring the EAPS Protected VLANs

You must configure one or more protected VLANs for each EAPS domain. The protected VLANs are the
data-carrying VLANs.

NOTE

When you configure the VLAN that will act as a protected VLAN, the ring ports of the protected VLAN
must be tagged (except in the case of the default VLAN).

Advertising