Professional Documents
Culture Documents
Student guide
Issue: 1.10
Copyright 2010 Avaya Inc. All Rights Reserved.
This document contains Avaya Inc. confidential and proprietary information.
It is not to be copied, disclosed or distributed in any manner, in whole or in
part, without express written authorization of Avaya Inc. While the information
in this document is believed to be accurate and reliable, except as otherwise
expressly agreed to in writing AVAYA PROVIDES THIS DOCUMENT "AS IS"
WITHOUT WARRANTY OR CONDITION OF ANY KIND, EITHER EXPRESS
OR IMPLIED. The information and/or products described in this document are
subject to change without notice.
Avaya and the Avaya Logo are trademarks of Avaya Inc. and may be registered
in certain jurisdictions. All trademarks identified by , TM or SM are registered
marks, trademarks, and service marks,respectively, of Avaya Inc. All other
trademarks are the property of their respective owners.
- Page 1 -
Contents
Introduction............................................................................................................................3
Welcome............................................................................................................................ 3
IP Routing Overview............................................................................................................. 7
Introduction........................................................................................................................ 7
The function of routing...................................................................................................... 8
How an IP packet is forwarded through the network...................................................... 12
How routers work............................................................................................................ 15
IP addresses and IP Routing Tables.............................................................................. 22
Layer 2 or Layer 3 routing.............................................................................................. 31
Configuring routing on the ERS...................................................................................... 35
Characteristics of routing protocols.................................................................................37
Check your learning........................................................................................................ 40
Lesson summary............................................................................................................. 43
IP Forwarding and Static Routes........................................................................................45
Introduction...................................................................................................................... 45
IP Routing Table Manager.............................................................................................. 46
Static and default routes................................................................................................. 48
Route preference.............................................................................................................53
Check your learning........................................................................................................ 59
Lesson summary............................................................................................................. 61
Routing Information Protocol.............................................................................................. 63
Introduction...................................................................................................................... 63
Routing Information Protocol...........................................................................................64
Bellman-Ford algorithm................................................................................................... 65
Versions of RIP............................................................................................................... 67
Configuring RIP on the Ethernet Routing Switch............................................................79
Accept and Announce policies for RIP........................................................................... 85
Configuring RIP policies.................................................................................................. 90
Check your learning........................................................................................................ 96
Lesson summary........................................................................................................... 100
OSPF on the Ethernet Routing Switch............................................................................. 101
Introduction.................................................................................................................... 101
The routed enterprise network...................................................................................... 102
Basic components of OSPF.......................................................................................... 107
Types of OSPF Routers................................................................................................116
Types of OSPF networks.............................................................................................. 120
OSPF adjacencies.........................................................................................................122
OSPF interface configuration........................................................................................ 129
OSPF packet with message digest............................................................................... 136
Check your learning...................................................................................................... 139
Lesson summary........................................................................................................... 142
Advanced OSPF Features................................................................................................ 143
Introduction.................................................................................................................... 143
Compare Routing Table and OSPF LSDB................................................................... 144
Network summaries....................................................................................................... 151
OSPF route policies...................................................................................................... 162
Virtual links.................................................................................................................... 168
Check your learning...................................................................................................... 173
Lesson summary........................................................................................................... 176
BGP4 Overview.................................................................................................................177
Introduction.................................................................................................................... 177
Border Gateway Protocol.............................................................................................. 178
BGP4 Concepts and Terminology.................................................................................184
Check Your Learning.....................................................................................................194
Lesson summary........................................................................................................... 197
Configuring VRRP.............................................................................................................199
Introduction.................................................................................................................... 199
Understanding Virtual Router Redundancy Protocol.....................................................200
The VRRP state machine............................................................................................. 207
VRRP advertisement..................................................................................................... 212
Configuring VRRP on a VLAN...................................................................................... 221
Check your learning...................................................................................................... 224
Lesson summary........................................................................................................... 227
IPv6 Overview................................................................................................................... 229
Introduction.................................................................................................................... 229
What is IPv6?................................................................................................................ 230
Differences between IPv4 and IPv6..............................................................................234
IPv6 header format........................................................................................................237
Deploying IPv6.............................................................................................................. 248
Lesson summary........................................................................................................... 253
Summary........................................................................................................................... 255
Wrap up......................................................................................................................... 255
Appendix - OSPF Packet Format..................................................................................... 257
Introduction.................................................................................................................... 257
OSPF packets............................................................................................................... 258
Appendix - BGP Packet Format....................................................................................... 273
Introduction.................................................................................................................... 273
BGP4 message format.................................................................................................. 274
Acronym List - Avaya Converged Campus...................................................................... 283
Acronym List - Avaya Converged Campus................................................................... 283
Acronym List - Converged Campus..................................................................................311
Acronym List - Converged Campus.............................................................................. 311
IPv6 Overview
Introduction
Lesson introduction
The purpose of this lesson is to provide an overview of the benefits and features of IPv6,
as well as describe the differences between IPv4 and IPv6, and the requirements for
implementing IPv6.
Lesson objectives
What is IPv6?
Why use IPv6?
Internet Protocol Version 6 (IPv6) is a new IP datagram protocol designed by the Internet
Engineering Task Force (IETF) to replace IPv4. IPv6 was developed to solve the inefficiencies
in IPv4 and to remedy two issues that were not addressed in IPv4, using larger address space
and better mobility support.
IPv6 incorporates:
IG note
Student July 2007 Internet Engineering and Planning Group - Meeting IPv6
Notes transition presentation by Mr. Randy Bush, titled IPv6 Transition &
Operational Reality.
He cited various myths including: IPv4 is running out, IPv6 transition is
easy,IPv6 eliminates NAT, and IPv6 reduces routing load.
He pointed out various must-dos for each area of concern (servers,
corporate, applications.) for future deployment of IPv6.
One of the most significant changes in IPv6 is that the address length is now 128 bits.
340,282,366,920,938,463,463,374,607,431,768,211,456
38
(3.4 x 10 ) addresses (IPv4 = 4,294,967,296 addresses)
2
128
possible addresses
IPv6 terminology
IPv6 terminology
The following terms, listed below and shown in the following diagram, are used with IPv6:
Host
Neighbors
Bridge
Router
Intra-subnet Router
LAN Segment
Subnet
Network
The following diagram shows the Ethernet II encapsulation of IPv6 packets. The fields are:
IPv6
Extension Headers
Upper Layer PDU
IPv6 packet (46-1500 bytes)
Preamble (8 bytes)
DA (6 bytes)
SA (6 bytes)
Type (2 bytes, 86DD)
Payload
Frame Check (4 bytes)
IPv4 has 20 octets, 12 fields, including 3 flag bits and a fixed number of options.
IPv6 has 40 octets, 8 fields, and an unlimited number of chain extensions.
The following figure highlights the new functionality of IPv6, and also compares it to the
functionality of IPv4.
IHL Yes No
Identification Yes No
Flags Yes No
Options Yes No
Padding Yes No
IPv6 introduces the concept of extension headers, allowing greater flexibility to support optional
features.
If the optional extension headers are present, they immediately follow the header field.
Header, 40 octets
Version
Traffic Class
Flow Label
Payload Length
Next Header
Hop Limit
Source Address
Destination Address
Next Header
Extension Header, variable length
Data Portion
When multiple extension headers are present in the same IPv6 packet, they occur in the
following order:
Hop-by-Hop header: Carries information that must be examined by all the nodes
along the delivery path. When present, the Hop-by-Hop option always follows
immediately after the basic IPv6 header.
Destination header: Carries additional information that can be examined only by the
destination node
Routing header: Used by the source node to list all the nodes the packet needs to
traverse on the path to its destination
Fragmentation header: Used by the source to indicate that the packet has been
fragmented to fit within the MTU size. In IPv6, unlike IP4, the end nodes (not the
routers) perform packet fragmentation and assembly, which further improves the
efficiency of the IPv6 network.
Authentication Header (AH) and Encapsulating Security Payload (ESP)
headers: Used in IPsec to provide security services to ensure the authentication,
integrity, and confidentiality of a packet
The following table shows the values of the next header field:
Value Header
6 TCP
17 UDP
43 Routing Header
44 Fragment Header
51 Authentication Header
58 ICMPv6
59 No next header
IPv6 provides three categories of addresses; each category has specific types associated with
it.
Unicast addresses
Global
Link local
Site local
Special addresses like Unspecified and loopback addresses
Compatibility addresses
Multicast addresses
No broadcast as in IPv4
Similar operation to IPv4
Anycast addresses
A Unicast address used for several devices to allow communication with the
device closer to the source
IPv6 addresses are 128 bits long (16 bytes compared to IPv4's 4 bytes).
Examples:
A Unicast address is used to identify a single interface. A packet destined for a Unicast address
is delivered to the interface identified by that address.
Global
Link-local
Site-local
Special addresses
The Link-Local Unicast address has higher 10 bits at 1111 1110 10 (FE80).
The prefix is FE::/10. A packet with a Link-local Unicast address is never forwarded
beyond a link by routers.
A packet destined for a multicast address is routed to all interfaces identified by that address.
The elements of a Multicast Address are illustrated in the graphic below. The elements include:
Flags - First 1-3 bits are reserved, 1 if temporary, 0 if permanent (well-known address
assigned by IANA).
Scope - Used to limit the scope of multicast address:
1: node local
2: link local
3: subnet local
4: admin local
5: site local
8: organization local
B: community local
E: global
Defined multicast addresses:
All-Nodes addresses
The Solicited-Node Multicast address is formed by taking the low-order 24 bits of an IPv6
address and appending those bits to the well-known prefix FF02::1:FF00/104.
FF02::1:FF00:0000-FF02::1:FFFF:FFFF
For example:
Special addresses
Special Addresses
Unspecified address
Loopback address
Unspecified address
An unspecified address:
Loopback address
A loopback address:
Is helpful in troubleshooting and testing the IP stack because it can be used to send
a packet to the protocol stack without sending it out on the subnet
Should never be statically or dynamically assigned to an interface
Deploying IPv6
IPv6 deployment
IPv6 deployment
IPv6 deployment requires it to coexist with IPv4 for some extended period of time.
A number of strategies have been developed for managing this complex and prolonged
transition from IPv4 to IPv6, including:
Deploying IPv6 over dual-stack backbones
IPv6 in IPv4 tunnels
Configured tunnels
Configured tunnels
Configured tunnels allow you to connect IPv6 domains through an IPv4 network. This can also
be used for host communications.
For these tunnels, you need to manually configure tunnel end points.
ping6
tracert6
netsh -> command line
Sun Solaris 8
Ifconfig
Netstat -p,-rn
Ping/traceroute/snoop ip6
IPv6 with Linux 2.2.x
IPv6 with FreeBSD 4.x
The following table shows the operating systems which support IPv6.
IPv6 applications
IPv6 applications
http://httpd.apache.org/docs-2.0/new_features_2_0.html
http://www.microsoft.com/resources/documentation/IIS/6/all/techref/en-us/
iisRG_IP6_5.mspx
4. Useful Links
http://www.ipv6.org/v6-apps.html
http://win6.jp/
http://www.rfc-editor.org RFCs
http://www.6bone.net/6bone_hookup.html 6bone
Lesson summary
Lesson summary
Summary
Wrap up
Course summary
Course summary
Introduction
Lesson introduction
Introduction
The purpose of this appendix is to provide an Open Shortest Path First (OSPF) packet
format reference.
Lesson objectives
OSPF packets
OSPF packet types
The area ID, checksum, and authentication are validated for every OSPF packet. If any of these
checks fail, the OSPF packet is dropped and an appropriate error is logged.
The Type field within the OSPF packet header indicates which type of packet is in the OSPF
packet data field. The following table explains the type codes for each packet type:
Codes for OSPF packet types
1 Hello
2 Database description
IG note
Student Presenting This Slide: When talking about OSPF message detail, "type"
Notes is overused - OSPF message type, link state advertisement type, router
link types, as external link type.
This can be very confusing for students just learning this material.
Instead of just saying "a type 1" try using the descriptive name like "hello
message"or "router links advertisement".P>
Hello packet
Hello packet
The following figure illustrates the Hello packet.
Hello packet
DR by IP address
BDR by IP address
List of all neighboring routers on network by router ID
IG note
Student Value Added: The options field is xxxxxxET, where the E flag indicates
Notes the router supports external routes in this area (not a stub area) and the
T flag indicates the router supports type of service routing (which is not
functionally supported in RFC 2178 any longer).
LSAs
Each OSPF router maintains an LSDB for each area to which it is connected. From each
LSDB, the router constructs an SPF tree that yields the best routes from this router to all known
networks.
Sending updates
LSAs are sent to adjacent routers in a link state update message (OSPF message Type 4).
During the formation of an adjacency, a router requests a link state update when it notices that
its database does not match that of a neighbor.
A link state update consists of an OSPF header and a string of LSAs. Each LSA has its own
header indicating the router generating the advertisement.
Acknowledging receipt
Acknowledging receipt
A router acknowledges the receipt of an LSA (contained in a link state update message)
by returning a link state acknowledgment (ACK) message. This acknowledgment message
contains the link state header of each advertisement that was received.
A link state acknowledgment message can serve as a means of grouping multiple ACKs, but
implementations may acknowledge one LSA per message.
LSA header
LSA header
The link state type, link state ID, and advertising router fields uniquely identify the
LSA.
The sequence number is the primary means for identifying the more recent instance
of particular LSAs. The router originating the advertisement sets the sequence
number. Every time it reissues the advertisement, it increments the sequence
number. Therefore, higher sequence numbers indicate newer LSAs.
If the sequence number of two received LSAs is equal, the one with the larger
checksum is considered the most recent. This is an arbitrary tiebreaker since it is not
possible to determine which is correct from the content. The age is not calculated into
the checksum.
IG Note
Student Max age for a link state advertisement is one (1) hour (3600 seconds).
Notes The originating router should re-advertise every half hour (1800
seconds) to reset age.
In LSDB, any LSA whose age is much > 1800 is likely aging out and
may not be valid but is still used in the SPF tree calculation. When age
reaches 3600, it is no longer being used in calculations but remains in
LSDB until its demise is flooded through the area.
Router LSAs
Router LSAs
Every OSPF router generates a router links advertisement. It is sent to every other OSPF
router in the area and describes the routers links in that area. This advertisement is a basic
description of a routers network connections within that area.
When a router links advertisement is received from every OSPF router in the area, you have
almost enough information to build an SPF tree. Collectively, the LSAs contain almost enough
information to piece together the network topology.
Sample router links advertisement
The following figure shows a sample router links advertisement.
Sample router links advertisement
IG note
Student V bit Terminates a virtual link, E bit External Router (ASBR), B bit ABR.
Notes
This advertisement describes a transit network (multi-access network with more than one router
on it).
Contains a list of only those routers connected to the transit network, with each router
being identified by its router ID
Flooded to all adjacent routers within the same area
Originated by the DR of the transit network
Summary LSAs are Type 3 and Type 4 LSAs. Area border routers originate these types of
LSAs. Summary LSAs describe inter-area destinations.
Type 3 Summary LSAs are used when the destination is an IP network. In this case, the LSA's
Link State ID field is an IP network number (if necessary, the Link State ID can also have one
or more of the network's "host" bits set). When the destination is an AS boundary router, a
Type 4 Summary LSA is used, and the Link State ID field is the ASBR's OSPF Router ID. Other
than the difference in the Link State ID field, the format of Type 3 and 4 Summary LSAs is
identical.
Type 4 LSAs contains information about the ASBR along with the "gateway" or ABR to use to
get to the ASBR.
Network mask - For Type 3 Summary LSAs, this indicates the destination network's
IP address mask. For example, when advertising the location of a class A network
the value 0xff000000 would be used. This field is not meaningful and must be 0 for
Type 4 Summary LSAs.
Metric - This is the cost of this route, expressed in the same units as the interface
costs in the Router LSAs.
AS-external LSAs
AS-external LSAs
AS-external LSAs are Type 5 LSAs. These LSAs are originated by AS boundary routers, and
describe destinations external to the AS.
AS-external LSA
AS-external LSAs usually describe a particular external destination. For these LSAs, the Link
State ID field specifies an IP network number. AS-external LSAs are also used to describe a
default route. Default routes are used when no specific route exists to the destination. When
describing a default route, the Link State ID is always set to DefaultDestination (0.0.0.0) and the
Network Mask is set to 0.0.0.0.
Network mask - The IP address mask for the advertised destination. For example,
when advertising a Class A network, the mask 0xff000000 would be used.
bit E - The type of external metric. If bit E is set, the metric specified is a Type
2 external metric. This means the metric is considered larger than any link state
path. If bit E is 0, the specified metric is a Type 1 external metric. This means that
it is expressed in the same units as the link state metric (that is, the same units as
interface cost).
Metric - The cost of this route. Interpretation depends on the external type indication
(bit E above).
Forwarding address - Data traffic for the advertised destination is forwarded to this
address. If the Forwarding address is set to 0.0.0.0, data traffic is forwarded instead
to the LSA's originator (that is, the responsible ASBR).
External route tag - A 32-bit field attached to each external route. This is not used
by the OSPF protocol itself. It may be used to communicate information between AS
boundary routers.
NSSA-external LSA
NSSA-external LSA
NSSAs are defined in much the same manner as existing stub areas. To support NSSAs, a
new option bit (the N bit) and a new type of LSA (Type 7) are defined. The N bit ensures that
routers belonging to an NSSA agree on its configuration. Similar to the stub areas use of the
E bit, both NSSA neighbors must agree on the setting of the N bit. If the routers do not agree
the OSPF neighbor adjacency is not formed.
Type 7 LSAs are used to carry external route information within an NSSA. Type 7 AS-External
LSAs have virtually the same syntax as the Type 5 AS-External LSAs with the obvious
exception of the link-state type.
There are two major semantic differences between Type 5 and Type 7 LSAs, as follows:
Type 7 LSAs may be originated by and advertised throughout an NSSA; as with stub
areas, NSSAs do not receive or originate Type 5 LSAs.
Type 7 LSAs are advertised only within a single NSSA; they are not flooded into the
backbone area or any other area by border routers, though the information that they
contain can be propagated into the backbone area.
NSSA-external LSA
Introduction
Lesson introduction
Introduction
The purpose of this appendix is to describe the BGP4 (Border Gateway Protocol) Packet
Format
Appendix objectives
BGP Header
The BGP header is used for authentication, loss of synchronization, message type, and
keep-alive.
Marker
If message type is 1 (BGP Open msg) or if authentication is not being used, the Marker field is
all 1's.
If message type is other than 1 and authentication is being used, the value of the Marker field is
computed as part of the authentication process.
The Marker field is also used to detect loss of synchronization between Peers.
Length
Type
1 = Open
2 = Update
3 = Notification
4 = Keep Alive
A Keep Alive message is simply a BGP Header (19 octets). Keep Alive messages are sent
at an interval of 1/3 the negotiated Hold Time. If the Hold Time = 0, then Keep Alives are not
exchanged.
Negotiates BGP operating parameters between Peers. If Peers do not agree on parameter
values, a BGP Notification message is sent and new Open messages are exchanged.
Version
My AS
Hold time
Max # of seconds that may elapse between the receipt of successive Keep Alives &/or Updates.
Negotiated between Peers. Smallest value wins. Value can equal 0, 3, or a higher #, because
the Keep Alive timer must be 1/3 the Hold Time.
BGP ID
BGP router identifier, similar to OSPF's Router ID. ID must match a real IP address configured
within the BGP router.
Optional parameters
This field may contain a list of parameters where each parameter is displayed as <Type /
Length / Value>.
The most commonly used optional parameter is Authentication (Para Type 1) which is used to
authenticate the other BGP Peer.
The minimum length of an Open message is 29 octets, which includes the BGP Header.
Advertises dead routes to be withdrawn from service. Advertises only one route per Update,
the route's attributes, and a list of networks reachable through that path.
Unfeasible routes
Withdrawn Routes
A list of IP address prefixes of routes being withdrawn from service. Each IP prefix has the
following format:
Where:
Total length of Path Attribute field in octets. A length of 0 = no Network Layer Routing Info
(NLRI) field is in this Update message.
Path Attributes
List of IP address prefixes reachable thru this route. Length of 0 = the prefix matches all IP
addresses. Each IP prefix has the same format shown in the Withdrawn Routes field <Length /
Prefix>.
The Path Attribute field lists all path attributes being used for the advertised BGP route
shown in the NLRI field. Path Attributes use the format: Type, Length, Value (T,L,V).
Attribute Type
Consists of Attribute Flags + Attribute Type Code
Attribute Flags:
Optional bit (Bit 0) - 0 = Well Known, 1 = Optional Whether attribute is recognized
by all BGP Speakers or not.
Transitive bit (Bit 1) - 0 = Non-Transitive 1 = Transitive Whether attribute may or
may not appear in the description of a route.
Partial bit (Bit 2) - 0 = Complete 1 = Partial Determines if attribute is passed
unmodified or not passed at all to BGP Peer especially if attribute is optional
(unrecognized).
Extended Length bit (Bit 3) - 0 = 1 octet 1 = 2 octets If E = 0, 3rd octet = Length of
Data; If E = 1, 3rd & 4th octet = Length of Data
Bits 4-7 are unused
Value Meaning
0 IGP NLRI is internal to the AS that inserted this route.
1 EGP NLRI is learned via EGP.
2 INCOMPLETE - NLRI learned by other means. (RIP,
OSPF, static route)
Path Segment Length is the number of ASs in the Path Segment Value.
There may be more than one subcode with each error code.
If MED is enabled, for paths from same AS, prefer path with the lower metric.
Prefer path with better origin (in order: BGP, IGP, EGP, Incomplete).
Idle Idle
OpenConfirm
BGP Keep-Alive --->
Each BGP Update advertises a single path (AS_PATH) with associated destination network(s)
(NLRI). Multiple Updates can be encapsulated inside a TCP packet, or the Update message can
be appended onto a BGP Keep-Alive which is encapsulated in a TCP packet.
TCP ACKs are often sent after BGP messages (not shown in this example).
Acronym List
ABR - Area Border Router
ACE - Access Control Entity - One of the filter rules that make up an ACL
ACG - Access Control Group - A group of several ACLs
ACL - Access Control List - An ordered list of filter rules or ACEs
ACT - Access Control Template
ADAC - Auto Detect Auto Config
AES - Advanced Encryption Standard
AP - Access Point
ARP - Address Resolution Protocol
AS - Autonomous System
ASBR - Autonomous System Border Router
ASIC - Application Specific Integrated Circuit
ATM - Asynchronous Transfer Mode
BCP - Bridge Control Protocol
BPDU - Bridge Protocol Data Unit
BFM - Backplane Fabric Module
BGP - Border Gateway Protocol
BMC - Backplane Module Controller
BMC - Baseboard Management Controller - An FPGA device on the R module
CAN - Chassis Area Network
CANA - Configurable Auto-Negotiation Advertisement
CAPEX - Capital Expenditures
CFI - canonical field indicator
CIDR - classless inter-domain routing
CLIP - Circuitless IP
CLI - Command Line Interface
CLUE - Centralized Look Up Engine
CP-limit - Control Plane Limit
CPU - central processing unit
SF - Switch Fabric
SF/CPU - Switch Fabric/CPU
SFP - Small Form Factor Pluggable
SLPP - Simple Loop Prevention Protocol
SLT - Single Link Trunking
SMF - Single mode fiber
SMLT - Split MultiLink Trunking
SNA - Systems Network Architecture
SNAP - Standard Network Access Protocol
SNAS - Secure Network Access Switch
SNMP - Simple Network Management Protocol
SPT - Shortest Path Tree
SSF - Silicon Switch Fabric
SSH - Secure Shell
SSL - Secure Sockets Layer
SSM - Source Specific Multicast
SSMLT - Single Port SMLT
STG - Spanning Tree Group
STP - Spanning Tree Protocol
SLVAN - Stacked VLAN
TBPS - Terabits per second
TCG - Technical Configuration Guide
TCI - Tag Control Information
TCO - Total Cost of Ownership
TCP - Transmission Control Protocol
TDR - Time Domain Reflectometer
Telco - Telephone Company
TFTP - Trivial File Transfer Protocol
ToS - Type of Service
TPID - Tag Protocol Identifier
TPS - Threat Protection System
TTL - Time to Live (used to determine the life of an IP packet)
UBP - User Based Policies
Acronym
Definition
ACE Access Control Entity - One of the filter rules that make up an ACL
ACT
- Access
Control
Template
ADAC
-
Auto Detect
Auto Config
AES
- Advanced
Encryption
Standard
Acronym
Definition
AP - Access
Point
ARP
- Address
Resolution
Protocol
AS - Autonomous
System
ASBR
- Autonomous
System
Border
Router
ASIC
- Application
Specific
Integrated
Circuit
ATM
- Asynchronous
Transfer
Mode
BCP
- Bridge
Control
Protocol
BPDU
- Bridge
Protocol
Data
Unit
BFM
- Backplane
Fabric
Module
BGP
- Border
Gateway
Protocol
BMC
- Backplane
Module
Controller
Acronym
Definition
BMC
- Baseboard
Management
Controller
- An FPGA
device
on
the
R module
CAN
- Chassis
Area Network
CANA
- Configurable
Auto-
Negotiation
Advertisement
CAPEX
- Capital
Expenditures
CFI
- canonical
field indicator
CIDR
- classless
inter-
domain
routing
CLIP
- Circuitless
IP
CLI - Command
Line Interface
CLUE
- Centralized
Look
Up Engine
CP-
limit
- Control
Plane
Limit
Acronym
Definition
CPU
- central
processing
unit
CRM
- Customer
Relationship
Management
CS5
- Class
Selector
5
CWDM
- Coarse
Wave
Division
Multiplexing
DHCP
- Dynamic
Host Configuration
Protocol
DiffServ
- Differentiated
Services
DMLT
- Distributed
MultiLink
Trunking
DoS
- Denial
of Service
DPC
- Direct
Program
Control
- An FPGA
device
on
the
R module
DPC
- Distributed
Processing
Controller
Acronym
Definition
DSCP
- DiffServ
Code
Point
DVMRP
- Distance
Vector
Multicast
Routing
Protocol
DWRR
- Deficit
Weight
Round
Robin
EAP
- Extensible
Authentication
Protocol
ECMP
- Equal
Cost Multipath
EF - Expedited
Forwarding
ELAN
- Emulated
LAN
EPM
- Enterprise
Policy
Manager
ERP
- Enterprise
Resource
Planning
ERS
- Ethernet
Routing
Switch
ES - Ethernet
Switch
Acronym
Definition
ESM
- Enterprise
Switch
Manager
EPM
- Enterprise
Policy
Manager
FAST
- Flexible
Advanced
Stacking
Technology
FCS
- Frame
Check
Sequence
FDB
- Forwarding
Database
FEFI
- Far
End Fault
Identification
FFAD
-
Fast Fabric
Access
Device
FOQ
- Feedback
Output
Queue
FPGA
-
Fast
Path Gigabit
Adapter
FPGA
-
Field Programmable
Gate Array
Acronym
Definition
FPI -
Fast Packet
Inspector
FRU
-
Field Replaceable
Unit
FSWIP
-
Fast Switch
Processor
GBIC
- Gigabit
Ethernet
Interface
Card
GMT
- Greenwich
Meantime
GUI
- Graphical
User Interface
IANA
- Internet
Assigned
Numbers
Authority
ICMP
- Internet
Control
Message
Protocol
IEEE
- Institute
of Electrical
and Electronics
Engineers
IETF
- Internet
Engineering
Task Force
Acronym
Definition
IGAP
- IGMP
Authentication
Protocol
IGMP
- Internet
Group
Management
Protocol
IGP
- Interior
Gateway
Protocol
- Distributes
routing
information
between
routers
that belong
to a single
autonomous
system
(AS).
InLif
- Input
Logic
Interface
IOM
- Input
Output
Module
IP - Internet
Protocol
IPFIX
- IP
Flow Information
Export
ISP
- Internet
Service
Provider
IST - Inter-
switch
trunk
Acronym
Definition
IPX
- Internetwork
Packet
Exchange
JDM
-
Java Device
Manager
Kbps
- Kilobits
per second
LACP
-
Link Aggregation
Control
Protocol
LAG
-
Link Aggregation
Group
LAN
-
local
area network
LANE
-
LAN Emulation
LCP
-
Link Control
Protocol
LIS - Location
Information
Service
LQM
-
Link Quality
Monitoring
LSDB
-
Link State
Data Base
mA - milliamp
Acronym
Definition
MAC
- Media
Access
Control
Mbps
- Megabits
per second
MBS
- Maximum
Burst
Size
MDA
- Media
Dependent
Adapter
MDI
- Media
Dependent
Interfaces
MIB
- Management
Information
Base
MLL
- Multicast
Link
List
MLT
- MultiLink
Trunking
MMF
- Multimode
fiber
MPPS
- million
packets
per second
MSTP
- Multiple
Spanning
Tree Groups
Acronym
Definition
MTBF
- Mean
Time
Between
Failures
NACK
- Negative
Acknowledgement
(used
for protocol
hand-
shaking)
NEBS
- Network
Equipment
Building
System
NIC
- Network
Interface
Card
NLRI
- network
layer reachability
information
NNCLI
- Avaya
Command
Line Interface
NNI
- Network-
to-
Network
Interface
NSNA
- Avaya
Secure
Network
Access
NSSA
-
Not-
So-
Stubby
Area
Acronym
Definition
NTP
- Network
Time
Protocol
OAM
- Operations,
Administration,
Maintenance
OctaPID
- Octal
Port Interface
Device
OOB
-
Out-
of-
Band
OPEX
- Operating
Expenditures
OSPF
- Open
Shortest
Path
First
OSM
- Optivity
Switch
Manager
OUI
- Organizational
Unique
Identifiers
PCAP
- Packet
Capture
PCMCIA
- Personal
Computer
Memory
Card International
Association
Acronym
Definition
PCR
- Peak
Cell
Rate
PD - Powered
device
PDU
- Protocol
Data
Unit
PGM
- Pragmatic
General
Multicast
PHB
- Per
Hop Behavior
PID
- Protocol
ID
PIM
- Protocol
Independent
Multicast
PIM-
SM - Protocol
Independent
Multicast
- Sparse
Mode
PIM-
SSM
- Protocol
Independent
Multicast
- Source
Specific
Multicast
Mode
PoE
- Power
over Ethernet
Acronym
Definition
POS
- Packet
Over SONET
(Synchronous
Optical
Network)
PPS
- packets
per second
PrPMC
- Processor
PCI Mezzanine
Card
PSE
- Power
sourcing
equipment
PVC
- Permanent
Virtual
Circuit
(statically
allocated
AAL2
or AAL5
channel)
PVID
-
Port VLAN
Identifier
(used
on
the stackable
ERS
to define
VLAN
membership)
QFI
- Quad
Fabric
Interface
QoS
- Quality
of Service
Acronym
Definition
RADIUS
- Remote
Authentication
Dial-
in
User Services
RFI
- Remote
Fault
Identification
RIB
- Routing
Information
Base
RIP
- Routing
Information
Protocol
RMON
- Remote
Monitoring
RMT
- Remote
Mirroring
Termination
ROI
- Return
on Investment
RPS
- Redundant
Power
Supply
RPSU
- Redundant
Power
Supply
Unit
RSMLT
- Routed
Split MultiLink
Trunking
Acronym
Definition
RSP
- Route-
Switch-
Processor
RSTP
- Rapid
Spanning
Tree
RTC
-
Real Time
Clock
RTM
- Routing
Table
Manager
RP - Rendezvous
Points
RPF
- Reverse
Path Forwarding
SAM
-
SSL Acceleration
Module
SCP
- Secure
Copy
SCR
- Sustained
Cell
Rate
SDM
- Service
Delivery
Module
SERDES
- Serializer/
deserializer
SF - Switch
Fabric
Acronym
Definition
SF/
CPU
- Switch
Fabric/
CPU
SFP
- Small
Form
Factor
Pluggable
SLPP
- Simple
Loop
Prevention
Protocol
SLT
- Single
Link Trunking
SMF
- Single
mode
fiber
SMLT
-
Split MultiLink
Trunking
SNA
- Systems
Network
Architecture
SNAP
- Standard
Network
Access
Protocol
SNAS
- Secure
Network
Access
Switch
Acronym
Definition
SNMP
- Simple
Network
Management
Protocol
SPT
- Shortest
Path
Tree
SSF
- Silicon
Switch
Fabric
SSH
- Secure
Shell
SSL
- Secure
Sockets
Layer
SSM
- Source
Specific
Multicast
SSMLT
- Single
Port SMLT
STG
- Spanning
Tree Group
STP
- Spanning
Tree Protocol
SLVAN
- Stacked
VLAN
TBPS
- Terabits
per second
TCG
- Technical
Configuration
Guide
Acronym
Definition
TCI
-
Tag Control
Information
TCO
- Total
Cost
of Ownership
TCP
- Transmission
Control
Protocol
TDR
- Time
Domain
Reflectometer
Telco
- Telephone
Company
TFTP
- Trivial
File Transfer
Protocol
ToS
- Type
of Service
TPID
-
Tag Protocol
Identifier
TPS
- Threat
Protection
System
TTL
- Time
to
Live (used
to determine
the
life
of
an
IP packet)
Acronym
Definition
UBP
-
User Based
Policies
UBR
- unspecified
bit
rate
UDP
-
User Datagram
Protocol
UNI
- User-
to-
Network
Interface
UTC
- Universal
Time,
Coordinated
VBR
- Variable
Bit Route
VCT
- Virtual
Cable
Tester
VID
- VLAN
ID
VLACP
- Virtual
Link Aggregation
Control
Protocol
VLAN
- Virtual
Local
Area Network
Acronym
Definition
VLSM
- Variable
Length
Subnet
Mask
VoIP
- Voice
over Internet
Protocol
VRF
- virtual
router
and forwarder
VRRP
- Virtual
Router
Redundancy
Protocol
WAN
- Wide
Area Network
WAP
- Wireless
Access
Point
WLAN
- Wireless
Local
Area Network
WRED
- weighted
random
early detection
WSM
-
Web Switch
Module
XFP
- 10 Gigabit
Small
Form
Factor
Pluggable
Acronym
Definition