Cisco Systems BC-23 manual Transparent and SRT Bridging Configuration Task List, BC-28

Page 6

Configuring Transparent Bridging

Transparent and SRT Bridging Configuration Task List

bridged network. To tie in existing bridges, you must use source-route translational bridging (SR/TLB) instead. SR/TLB is described in the chapter “Configuring Source-Route Bridging.”

Bridging between Token Ring and other media requires certain packet transformations. In all cases, the MAC addresses are bit-swapped because the bit ordering on Token Ring is different from that on other media. In addition, Token Ring supports one packet format, logical link control (LLC), while Ethernet supports two formats (LLC and Ethernet).

The transformation of LLC frames between media is simple. A length field is either created (when the frame is transmitted to non-Token Ring) or removed (when the frame is transmitted to Token Ring). When an Ethernet format frame is transmitted to Token Ring, the frame is translated into an LLC-1 SNAP packet. The destination service access point (DSAP) value is AA, the source service access point (SSAP) value is AA, and the organizational unique identifier (OUI) value is 0000F8. Likewise, when a packet in LLC-1 format is bridged onto Ethernet media, the packet is translated into Ethernet format.

Caution Bridging between dissimilar media presents several problems that can prevent communication from occurring. These problems include bit order translation (or using MAC addresses as data), maximum transmission unit (MTU) differences, frame status differences, and multicast address usage. Some or all these problems might be present in a multimedia bridged LAN. Because of differences in the way end nodes implement Token Ring, these problems are most prevalent when bridging between Token Ring and Ethernet or between Ethernet and FDDI LANs.

Problems currently occur with the following protocols when bridged between Token Ring and other media: Novell IPX, DECnet Phase IV, AppleTalk, Banyan VINES, Xerox Network Systems (XNS), and IP. Further, problems can occur with the Novell IPX and XNS protocols when bridged between FDDI and other media. We recommend that these protocols be routed whenever possible.

Transparent and SRT Bridging Configuration Task List

To configure transparent bridging or SRT bridging on your router, complete one or more of the tasks in the following sections:

Configuring Transparent Bridging and SRT Bridging, page 29

Transparently Bridged VLANs for ISL, page 30

Routing between ISL VLANs, page 32

Configuring a Subscriber Bridge Group, page 34

Configuring Transparent Bridging over WANs, page 34

Configuring Concurrent Routing and Bridging, page 39

Configuring Integrated Routing and Bridging, page 39

Configuring Transparent Bridging Options, page 42

Filtering Transparently Bridged Packets, page 45

Adjusting Spanning-Tree Parameters, page 52

Configuring Transparent and IRB Bridging on a PA-12E/2FE Ethernet Switch, page 55

Cisco IOS Bridging and IBM Networking Configuration Guide

BC-28

Image 6
Contents Transparent and SRT Bridging BC-23Transparent Bridging Features Integrated Routing and BridgingBC-24 Bridge-Group Virtual Interface BC-25BC-26 Bridge-Group Virtual Interface in the RouterSRT Bridging Features Other ConsiderationsBC-27 Transparent and SRT Bridging Configuration Task List BC-28As Ieee 802.1D standard, DEC or Vlan bridge Configuring Transparent Bridging and SRT BridgingAssigning Each Network Interface to a Bridge Group BC-29Choosing the OUI for Ethernet Type II Frames Command PurposeTransparently Bridged VLANs for ISL BC-30BC-31 Transparently Bridged VLANs on an Fddi BackboneRouting between ISL VLANs BC-32Same bridge group Specifies a subinterfaceSubinterface with the Vlan BC-33Configuring Fast-Switched Transparent Bridging over ATM Configuring a Subscriber Bridge GroupConfiguring Transparent Bridging over WANs BC-34Defining the Protocols to Bridge Configuring Transparent Bridging over DDRCommand Specifying the Bridging ProtocolConfiguring an Interface for Bridging Configuring Transparent Bridging over Frame RelayDetermining Access for Bridging Fast-Switched Transparent BridgingBridging in a Frame Relay Network with Multicasts Configuring Transparent Bridging over Multiprotocol LapbBridging in a Frame Relay Network with No Multicasts BC-37Specifies IP-to-X.121 mapping Configuring Transparent Bridging over SmdsConfiguring Transparent Bridging over BC-38Specifies a protocol to be routed on a bridge group Configuring Concurrent Routing and BridgingConfiguring Integrated Routing and Bridging BC-39Enabling Integrated Routing and Bridging Configuring InterfacesConfiguring the Bridge-Group Virtual Interface BC-40Configuring Protocols for Routing or Bridging BC-41Configuring Transparent Bridging Options Disabling IP RoutingBC-42 Configuring LAT Compression Enabling Autonomous BridgingBC-43 Establishing Multiple Spanning-Tree Domains Establishes a multiple spanning-tree domainBC-44 Forwarding Multicast Addresses Configuring Bridge Table Aging TimeFiltering Transparently Bridged Packets BC-45Setting Filters at the MAC Layer BC-46Ethernet-ordered MAC address Filters particular MAC-layer station addressesFiltering by Vendor Code BC-47Filtering by Protocol Type TypeBC-48 Interface Defining and Applying Extended Access ListsConfiguration mode BC-49BC-50 Filtering LAT Service Announcements Enabling LAT Group Code Service FilteringBC-51 Adjusting Spanning-Tree Parameters BC-52Adjusting Bpdu Intervals Setting the Bridge PrioritySetting an Interface Priority Assigning Path CostsDisabling the Spanning Tree on an Interface Adjusting the Interval between Hello BPDUsDefining the Forward Delay Interval Defining the Maximum Idle IntervalBC-55 Configuring the PA-12E/2FE Port Adapter BC-56Monitoring and Maintaining the PA-12E/2FE Port Adapter BC-57BC-58 BC-59 Configuring Circuit Groups BC-60Distributes base load on the source MAC address only Configuring Constrained Multicast FloodingConfigures a transmission pause interval BC-61BC-62 Basic Bridging Example BC-63Concurrent Routing and Bridging Example BC-64Basic Integrated Routing and Bridging Example BC-65Complex Integrated Routing and Bridging Example BC-66Transparently Bridged VLANs Configuration Example BC-67Router One Router TwoBC-68 Router Three BC-69Routing between VLANs Configuration Example Ethernet-to-FDDI Transparent Bridging ExampleBC-70 Ethernet Bridging Example Router/Bridge in BuildingBC-71 SRT Bridging Example BC-72Multicast or Broadcast Packets Bridging Example Configuration for the New York City RouterConfiguration for the Thule, Greenland Router BC-73Configuration for Bridge Transparent Bridging ExampleBC-74 Frame Relay Transparent Bridging Examples Bridging in a Frame Relay Network with No MulticastsBC-75 Transparent Bridging over Multiprotocol Lapb Example Bridging in a Frame Relay Network with MulticastsBC-76 Transparent Bridging over DDR Examples BC-77Fast-Switched Transparent Bridging over Smds Example Complex Transparent Bridging Network Topology ExampleBC-78 BC-79 Bridged Subnetworks with DomainsConfiguration for Router a BC-80Configuration for Router D Configuration for Router BConfiguration for Router C BC-81Fast Ethernet Subscriber Port, Frame Relay Trunk Example ATM Subscriber Ports, ATM Trunk ExampleBC-82 BC-83 Configuration of IRB for PA-12E/2FE Port Adapter Example BC-84

BC-23 specifications

Cisco Systems has long been a leader in the networking industry, and its BC-23 model exemplifies the company's commitment to innovation and performance. Aimed at enhancing business operations, the BC-23 is tailored for organizations looking for robust solutions that support their digital transformation efforts.

One of the standout features of the Cisco BC-23 is its advanced networking capabilities. It supports high-speed data transmission, enabling seamless communication across networks. With multi-gigabit Ethernet ports, the BC-23 facilitates faster data rates, accommodating the increasing bandwidth demands of modern applications. This feature is particularly beneficial for businesses that rely heavily on cloud services, video conferencing, and data-heavy applications.

Security is a top priority, and the Cisco BC-23 incorporates cutting-edge security measures. Integrated threat detection and prevention systems help safeguard sensitive data from cyber threats. Additionally, the device supports secure access protocols, ensuring that only authorized users can connect to the network. This multi-layered security approach not only protects the network infrastructure but also secures the integrity of the data being transmitted.

Another significant characteristic of the BC-23 is its support for software-defined networking (SDN). This technology allows businesses to manage their networks through centralized software applications, facilitating real-time adjustments and optimizations. The flexibility afforded by SDN is especially advantageous in dynamic environments where network demands can shift rapidly.

The Cisco BC-23 also offers enhanced management features, allowing IT teams to monitor network performance and analytics effectively. This visibility into network operations enables organizations to identify potential issues before they escalate, minimizing downtime and keeping business processes smooth.

Furthermore, the BC-23 is designed for scalability. As organizations grow, their networking needs evolve, and the BC-23 can easily adapt to these changes. Businesses can add additional devices and capabilities without the need for a complete overhaul of their existing infrastructure.

With its combination of speed, security, and scalability, the Cisco Systems BC-23 is an invaluable asset for modern businesses. It stands out not just as a networking device but as a comprehensive solution that meets the demands of today's fast-paced, technology-driven environment. As companies continue to leverage digital tools for growth and efficiency, the BC-23 will undoubtedly play a significant role in their success.