Cisco Systems BC-109 manual Configure Proxy Explorers, Mac-address ieee-address

Page 35

Configure Proxy Explorers

Configure Proxy Explorers

You can use the proxy explorers feature to limit the amount of explorer traffic propagating through the source-bridge network.

To configure proxy explorers, use the following command in interface configuration mode:

Command

Purpose

source-bridge proxy-explorer

Enable the interface to respond to any

 

explorer packets that meet certain

 

conditions necessary for a proxy

 

response to occur.

 

 

The Cisco IOS software does not propagate proxy responses for a station. Instead, the software obtains the RIF path from the RIF cache, changes the explorer to a specific frame, and forwards this frame to the destination. If a response is not received before the validation timer expires, the RIF entry is marked as invalid. The invalid RIF entry is flushed from the cache table when another explorer for this station is received, and an explorer is forwarded to discover a path to this station.

Establish SRB Interoperability with Specific Token Ring Implementations

This section describes how you can establish interoperability between routers and specific Token

Ring implementations. It includes the following sections:

Establish SRB Interoperability with TI MAC Firmware

Report Spurious Frame-Copied Errors

Establish SRB Interoperability with TI MAC Firmware

You can use a workaround to establish interoperability with Texas Instruments MAC firmware.

There is a known defect in earlier versions of the Texas Instruments Token Ring MAC firmware. This implementation is used by Proteon, Apollo, and IBM RTs. A host using a MAC address whose first two bytes are zeros (such as a Cisco router) will not properly communicate with hosts using that version of Texas Instruments firmware.

There are two solutions. The first involves installing a static RIF entry for every faulty node with which the router communicates. If there are many such nodes on the ring, this may not be practical.

You also can set the MAC address of our Token Ring to a value that works around the problem. Resetting the MAC address forces the use of a different MAC address on the specified interface, thereby avoiding the TI MAC firmware problem. However, you must ensure that no other host on the network is using that MAC address.

To reset the MAC address, use the following command in interface configuration mode:

Command

Purpose

mac-address ieee-address

Reset the MAC address of the Token

 

Ring interface to a value that

 

provides a workaround to a problem

 

in Texas Instruments Token Ring

 

MAC firmware.

 

 

Configuring Source-Route Bridging BC-143

Image 35
Contents SRB Configuration Task List Configuring Source-Route BridgingConfigure a Dual-Port Bridge Configure Source-Route BridgingMultiple Dual-Port Bridges Configure a Multiport Bridge Using a Virtual RingNo source-bridge ring-group ring-group Define a Ring Group in SRB ContextSource-bridge ring-group ring-group Source-bridge route-cache cbus Configure SRB over FddiEnable SRB and Assign a Ring Group to an Interface Interface fddi slot/portConfigure SRB over Frame Relay Configure Fast-Switching SRB over FddiEnable the Automatic Spanning-Tree Function Limit the Maximum SRB Hops Enable Use of the RIF Configure Bridging of Routed ProtocolsConfigure the RIF Timeout Interval Configure a Static RIF EntryOverview of SR/TLB Following notes and caveats apply to all uses of SR/TLB No source-bridge transparent ring-group fastswitch Enable Bridging between Transparent Bridging and SRBDisable Fast-Switched SR/TLB Enable Translation Compatibility with IBM 8209 BridgesSource-bridge sap-80d5 dsap Enable Token Ring LLC2-to-Ethernet ConversionEnable 0x80d5 Processing Enable Standard Token Ring LLC2-to-Ethernet LLC2 ConversionConfigure NetBIOS Support Source-bridge proxy-netbios-only Specify Timeout and Enable NetBIOS Name CachingSpecify Dead-Time Intervals for NetBIOS Packets Configure the NetBIOS Cache Name LengthEnable NetBIOS Proxying Create Static Entries in the NetBIOS Name CacheNetbios name-cache recognized-timeout seconds Configure LNM SupportNetbios name-cache query-timeout seconds LNM Linking to a Source-Route Bridge on Each Local Ring LAN Network Manager Monitoring and Translating How a Router Works with LNMDisable LNM Functionality Enable Other LRMs to Change Router Parameters Disable Automatic Report Path Trace FunctionChange Reporting Thresholds Apply a Password to an LNM Reporting LinkEnable LNM Servers Lnm softerr milliseconds Change an LNM Reporting IntervalMonitor LNM Operation Secure the SRB Network Configure NetBIOS Access FiltersConfigure NetBIOS Access Filters Using Station Names Netbios input-access-filter bytes name Configure NetBIOS Access Filters Using a Byte OffsetNetbios access-list host name permit deny pattern Netbios access-list bytes name permit deny offsetFilter Frames by Protocol Type Configure Administrative Filters for Token Ring TrafficNetbios output-access-filter bytes name Filter Destination Addresses Filter Frames by Vendor CodeFilter Source Addresses Access Expression Example Optimize Access Expressions Configure Access ExpressionsTune the SRB Network Alter Access Lists Used in Access ExpressionsEnable or Disable the Source-Route Fast-Switching Cache Optimize Explorer Processing Enable or Disable the SSEEstablish the Connection Timeout Interval Controlling Explorer Storms in Redundant Network Topologies Mac-address ieee-address Configure Proxy ExplorersEstablish SRB Interoperability with TI MAC Firmware Monitor and Maintain the SRB Network Report Spurious Frame-Copied ErrorsSource-bridge tcp-queue-max number SRB Configuration ExamplesBasic SRB with Spanning-Tree Explorers Example Dual-Port Source-Route Bridge ConfigurationSRB-Only Example Optimized Explorer Processing Configuration ExampleMultiport SRB Example SRB and Routing Certain Protocols ExampleSRB with Multiple Virtual Ring Groups Example Configuration for Router aRouter a SRB over Fddi Configuration ExamplesSRB over Fddi Fast-Switching Example Configuration for Router BFrad Using SRB over Frame Relay to Connect to a Cisco Router SRB over Frame Relay Configuration ExampleAdding a Static RIF Cache Entry Example Configuration of Router aConfiguration on Router B Configuration on Router CSR/TLB for a Simple Network Example Adding a Static RIF Cache Entry for a Two-Hop Path ExampleBC-154Bridging and IBM Networking Configuration Guide Example of a Bit-Swapped Address SR/TLB with Access Filtering ExampleSpecifying a Static Entry NetBIOS Support with a Static NetBIOS Cache Entry ExampleLNM for a Simple Network Example Wayfarer# show lnm configLNM for a More Complex Network Example NetBIOS Access Filters Example Filtering Bridged Token Ring Packets to IBM Machines Example Shows a router connecting four Token Rings Following access expression would result Creating Access Filters ExampleFast-Switching Example Access Filters ExampleAutonomous Switching Example