Lab Guide
Lab Guide
Switching
LAB GUIDE
Version: 24.31
Switching Series
© Copyright 2024 Hewlett Packard Enterprise Development LP. The information contained herein is subject to change without notice.
The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements accom-
panying such products and services. Nothing herein should be construed as constituting an additional warranty.
Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.
Notices
The information contained herein is subject to change without notice. The only warranties for Hewlett Packard Enterprise products and
services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be con-
strued as constituting an additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions
contained herein.
Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use, or copying. Consistent with
FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items
are licensed to the U.S. Government under vendor's standard commercial license.
Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard Enterprise has no control over
and is not responsible for information outside the Hewlett Packard Enterprise website.
Acknowledgments
All third-party marks are property of their respective owners.
Contents
Contents
Contents 3
Lab 1: Base configuration - initial lab setup 9
Task 1-1: Factory reset of devices (optional) 9
Task 1-2: Configure the OOBM interface on Access-1 11
Task 1-3: Configure the OOBM for Access-2, Core-1, and Core-2 13
Lab 2: Configuring HPE Aruba Networking Virtual Switching
eXtension (VSX) 17
Task 2-1: Verify the lab starting configuration 18
Task 2-2: Preparing for VSX 19
Task 2-3: VSX basic setup 22
Task 2-4: VSX configuration synchronization 30
Task 2-5: VSX Layer 2—VSX link aggregation (VSX LAG) 37
Task 2-6: VSX Layer 3 active gateway 50
Task 2-7: VSX failover test (optional) 58
Task 2-8: VSX split-brain handling 67
Task 2-9: Finalize the configuration for the upcoming labs 74
Lab 3: Layer 2 optimization and protection features 81
Overview 81
Task 3-1: Verify the lab starting configuration 82
Task 3-2: Examine the LAG load sharing process 82
Task 3-3: Using the LACP fallback feature 91
Task 3-4: Configure an MSTP solution 99
Task 3-5: Understanding edge ports and their operation with spanning tree 105
Task 3-6: Implement BPDU guard 107
Task 3-7: Implement root guard 112
Task 3-8: Implement loop protection 117
Task 3-9: Implement PVLANs (optional) 123
Contents 3
Lab 4.1: OSPF single area—basic OSPF configuration 135
Overview 135
Task 4.1-1: Verify lab starting configuration 136
Task 4.1-2: Basic OSPF setup for the core (area 0) 136
Task 4.1-3: OSPF address advertisements and control 147
Task 4.1-4: OSPF peering using a VSX LAG 152
Lab 4.2: OSPF and multiple areas 157
Overview 157
Task 4.2-1: Assign Access-1 to OSPF area 1 158
Task 4.2-2: Assign Access-2 to OSPF Area 2 167
Task 4.2-3: Route summarization 174
Task 4.2-4: Verify route propagation impact with summarization 181
Task 4.2-5: ABR route filtering 184
Lab 4.3: Managing OSPF external routes 187
Overview 187
Task 4.3-1: Configure the link to Router-A 188
Task 4.3-2: Redistribute static routes into OSPF 189
Task 4.3-3: Control route redistribution and metric types 195
Task 4.3-4: Filter routes with stub and totally stub areas 200
Task 4.3-5: Filter routes with an NSSA 208
Task 4.3-6: Save configuration checkpoints for the upcoming labs 214
Lab 5: Basic BGP peering 217
Overview 217
Task 5-1: Prepare the lab setup 218
Task 5-2: Core-1 eBGP peering to ISP1 218
Task 5-3: Core-1 and Core-2 iBGP peering 225
Task 5-4: Core-2 eBGP peering to ISP2 230
Task 5-5: Announce routes to eBGP peers 236
Lab 6: Additional Layer 3 features 241
Overview 241
Task 6-1: Prepare the lab starting configuration 242
4 Contents
Contents
Task 6-2: Add a new routing VRF 243
Task 6-3: OSPF routing inside a VRF 255
Task 6-4: Implementing DHCP snooping 259
Task 6-5: Implementing Dynamic ARP Inspection 267
Lab 7: IGMP and IGMP snooping 273
Overview 273
Task 7-1: Prepare the lab starting configuration 274
Task 7-2: Set up the multicast sender and receiver 277
Task 7-3: Enable IGMP querier and snooping 280
Task 7-4: Verify the IGMP snooping operation 285
Task 7-5: Verify IGMP snooping fast leave (optional) 291
Lab 8: Multicast routing with PIM sparse mode 295
Overview 295
Task 8-1: Prepare and review the lab setup 295
Task 8-2: Configure PIM sparse mode 298
Task 8-3: Verify multicast forwarding 303
Lab 9: Access control lists 309
Overview 309
Task 9-1: Verify the lab starting configuration 310
Task 9-2: Port ACLs 310
Task 9-3: Using object groups 316
Task 9-4: Resource usage 319
Lab 10: 802.1X authentication and user roles on AOS-CX 323
Task 10-1: Verify the lab starting configuration 324
Task 10-2: RADIUS server setup 324
Task 10-3: Basic 802.1X authentication with a single user 333
Task 10-4: Change of authorization verification 343
Task 10-5: Basic 802.1X authentication with a single user 349
Task 10-6: Unknown role assignment 358
Contents 5
Lab 11: MAC-based authentication and user roles 361
Task 11-1: MAC authentication with a single device on a port 362
Task 11-2: Verify access with two devices connected on same port 366
Task 11-3: Aruba user role-based access 373
Task 11-4: OPTIONAL—client-mode versus device-mode port
authentication 377
Task 11-5: Authentication priority order with combined MAC-auth and
802.1X 380
Task 11-6: Verify 802.1X authentication precedence over MAC-auth 387
Task 11-7: OPTIONAL—device profiles with LLDP 391
Task 11-8: Save checkpoint configuration 398
Lab 12.1: Integration with HPE Aruba Networking ClearPass Policy
Manager Platform downloadable user roles 399
Task 12.1-1: CPPM REST API communication 400
Task 12.1-2: CPPM user role definitions 406
Task 12.1-3: Testing 802.1X DUR with employee and contractor 408
Task 12.1-4: OPTIONAL—ClearPass DUR configuration and
troubleshooting 415
Lab 12.2: Integration with HPE Aruba Networking MC—user-based
tunneling with the MC firewall 423
Task 12.2-1: Prepare the lab devices 424
Task 12.2-2: HPE Aruba Networking MC integration 426
Task 12.2-3: User role configuration on the switch and the MC 432
Task 12.2-4: Test MC integration 434
Task 12.2-5: OPTIONAL—MAC authentication role example for IoT 442
Lab 13: Quality of Service 451
Overview 451
Task 13-1: Prepare the lab start configuration 452
Task 13-2: Port classification – trust configuration 454
Task 13-3: LLDP device profile for QoS trust 463
Task 13-4: QoS classification 467
Task 13-5: Queue configuration 477
Task 13-6: LLDP-MED and voice VLAN configuration 483
6 Contents
Contents
Lab 14: REST API 487
Task 14-1: Enable access to REST API on the AOS-CX switch 489
Task 14-2: REST reference interface 491
Lab 15: HPE Aruba Networking Network Analytics Engine (NAE) 497
Task 15-1: Test the environment 497
Task 15-2: Review the built-in NAE script and agent 499
Task 15-3: Add a new NAE script and agent 510
Task 15-4: OPTIONAL – Connectivity check 516
Task 15-5: Review the NAE agent in the switch configuration file 522
Lab 16: Troubleshooting 525
Task 16-1: Prepare the lab starting configuration 526
Task 16-2: Support ticket troubleshoot 530
Contents 7
[This page intentionally left blank]
8
Lab 1: Base configuration - initial lab setup
Lab diagram
Overview
In this lab activity, all switches will be factory reset and the Out-of-Band Management (OOBM) will be
configured. At the end of the configuration, a configuration checkpoint will be made.
Objectives
n Configure the OOBM network.
n Prepare a basic configuration checkpoint.
Steps
1. Open a console connection to Access-1 (6300A). Log in using admin and no password.
The initial hostname may be different from the output below; this depends on the
remote lab setup.
In case the switch prompts you to change the password at this point, it is already at
factory default, so there is no need to perform the erase all zeroize procedure in
the next step. Move on to the next switch; the password will be set in the next task.
3. Open a console connection to the Access-2 (6300B ). Log in using admin and no password.
4. Clear all configuration files and snapshots (skip this step if the switch prompts you to change the
admin password).
6300# erase all zeroize
This will securely erase all customer data and reset the switch
to factory defaults. This will initiate a reboot and render the
switch unavailable until the zeroization is complete.
This should take several minutes to one hour to complete.
5. Open a console to the Core-1 (8325A ) and repeat the factory reset process.
If the switch shows a new password prompt, the switch is already at factory default,
so you can move on to the next step.
If the switch shows a new password prompt, the switch is already at factory default,
setup
so you can move on to the next step.
Steps
1. Switch to the console connection of Access-1.
2. Log in using admin and no password.
3. Since the switch is at factory default, the software will show a prompt to change the admin pass-
word. Set the admin password to aruba123.
6300 login: admin
Password:
If you entered a different password, the password can be changed with these com-
mands:
6300# configure terminal
6300(config)# user admin password plaintext aruba123
4. Create a checkpoint named icx-factory-default. This checkpoint is not used in the future labs,
but it will allow you to switch back to the factory default state without the erase all zeroize
command and reboot.
6300# copy running-config checkpoint icx-factory-default
5. Enter configuration mode and configure the hostname and OOBM IP address (10.251.1.4).
6300# configure terminal
6300(config)# hostname ICX-Access-1
ICX-Access-1(config)# interface mgmt
ICX-Access-1(config-if-mgmt)# ip static 10.251.1.4/24
ICX-Access-1(config-if-mgmt)# default-gateway 10.251.1.254
ICX-Access-1(config-if-mgmt)# exit
6. Disable all switch ports. Since the remote lab contains several redundant links between all the
switches, all interfaces are disabled initially. You will enable the interfaces as needed in later labs.
ICX-Access-1(config)# interface 1/1/1-1/1/28
ICX-Access-1(config-if-<1/1/1-1/1/28>)# shutdown
ICX-Access-1(config-if-<1/1/1-1/1/28>)# exit
ICX-Access-1(config)# end
7. Verify access on the OOBM network with a ping to the PC1 (10.251.1.91).
ICX-Access-1# ping 10.251.1.91 vrf mgmt
PING 10.251.1.91 (10.251.1.91) 100(128) bytes of data.
108 bytes from 10.251.1.91: icmp_seq=1 ttl=62 time=1.14 ms
108 bytes from 10.251.1.91: icmp_seq=2 ttl=62 time=0.875 ms
108 bytes from 10.251.1.91: icmp_seq=3 ttl=62 time=0.930 ms
108 bytes from 10.251.1.91: icmp_seq=4 ttl=62 time=1.04 ms
108 bytes from 10.251.1.91: icmp_seq=5 ttl=62 time=1.09 ms
8. You have now completed the base configuration and verified connectivity. This configuration will
be saved as the base configuration checkpoint for future labs. List current checkpoints. Only the
icx-factory-default checkpoint should be in the list after the zeroize factory reset.
There may be an automatic snapshot if five minutes have passed since your last con-
figuration change. This is the checkpoint post-configuration feature that is enabled
by default.
10. Verify the checkpoint is now in the list (another checkpoint may have been created by the sys-
setup
ICX-Access-1#
If you made a mistake, you can remove the checkpoint with the erase checkpoint
<NAME> command.
If you need to see the configuration changes between two checkpoints or between a
checkpoint and the running configuration, the checkpoint diff command can be
used. Examples:
ICX-Access-2# checkpoint diff icx-factory-default icx-lab01-base
ICX-Access-2# checkpoint diff icx-lab01-base running-configuration
Sometimes it is handy to copy and paste text directly from the lab guide. If you are
unable to paste directly into your device or PC, pressing Ctrl-Alt-Shift will open a
clipboard in your web browser. Paste the contents into this clipboard, press Ctrl-Alt-
Shift to close the clipboard, and then paste the contents into the device or PC in the
remote lab.
Task 1-3: Configure the OOBM for Access-2, Core-1, and Core-2
Objectives
n Apply the initial configuration to the Access-2, Core-1, and Core-2 switches.
Task 1-3: Configure the OOBM for Access-2, Core-1, and Core-2 13
Steps
Access-2 base configuration
1. Switch to the console connection of Access-2.
2. Log in with admin and no password.
3. Configure the admin password as aruba123.
Please configure the 'admin' user account password.
Enter new password: *********
Confirm new password: *********
14 Task 1-3: Configure the OOBM for Access-2, Core-1, and Core-2
Enter new password: *********
Confirm new password: *********
The system interface-group 1 speed 10g command instructs the switch to handle
the port speed for this group of ports. By default, CX 8325 Series (JL624A and
JL625A) have ports configured for 25 Gbps. In this lab, we are using 1 Gbps and 10
setup
n The HTTPS server is disabled on the in-band network (VRF default) by
default.
n The REST API access is read-only by default.
The following command instructions below will enable HTTPS on the default VRF
(the default global routing table) and allow read-write access to the REST API.
Continue (y/n)? y
ICX-Core-2(config)# end
Notice that group 1 contains ports from 1/1/1 to 1/1/12. The choice between 1/10
Gbps and 25 Gbps is done by a port group, meaning that you are not allowed to mix
1 Gbps and 10 Gbps ports with 25 Gbps ports in the same port group
simultaneously. CX 8325 Series switches have four port groups. To view the port
group information of an AOS-CX switch, use the show system interface-group com-
mand. Sample output:
ICX-Core-1(config)# show system interface-group
------------------------------------------------
Group Speed Member Ports Mismatched Ports
Task 1-3: Configure the OOBM for Access-2, Core-1, and Core-2 15
------------------------------------------------
1 10g 1/1/1-1/1/12
2 25g 1/1/13-1/1/24
3 25g 1/1/25-1/1/36
4 25g 1/1/37-1/1/48
Continue (y/n)? y
ICX-Core-2(config)# end
16 Task 1-3: Configure the OOBM for Access-2, Core-1, and Core-2
Lab 2: Configuring HPE Aruba Networking Virtual
Switching eXtension (VSX)
Lab diagram
Overview
In this lab activity, VSX will be configured between the two core switches in the lab setup. VSX has sim-
ilar benefits as HPE Aruba Networking Virtual Switching Framework (VSF). However, VSX also offers
better high availability—required in core and data center environments—than a virtual switching tech-
nology like VSF. VSX binds two AOS-CX switches, of the same model type, to operate as one device for
Layer 2 for certain processes and operations.
Objectives
n Configure VSX.
n Understand the VSX configuration synchronization feature.
n Configure VSX to peer devices using VSX LAG.
n Understand and configure VSX active gateway (first hop redundancy).
n Configure a DHCP relay.
n Configure and understand split-system protection.
Steps
1. Open a console connection to Access-1. Log in using admin/aruba123.
ICX-Access-1# copy checkpoint icx-lab01-base running-config
Configuration changes will take time to process, please be patient.
ICX-Access-1#
Objectives
n Configure the keepalive link.
n Configure a link aggregation that will be used as the Inter-Switch Link (ISL).
Steps
1. Open a terminal session to Core-1 and enter configuration mode. Create a VRF called KA.
3. Access Core-1. Associate interface 1/1/45 to the VRF KA. Assign an IP address of
192.168.0.0/31 to the interface. Enable the interface.
ICX-Core-1(config)# interface 1/1/45
ICX-Core-1(config-if)# vrf attach KA
ICX-Core-1(config-if)# ip address 192.168.0.0/31
ICX-Core-1(config-if)# no shutdown
ICX-Core-1(config-if)# exit
8. On both Core-1 and Core-2, create LAG 256, enable it, disable IP routing, allow all VLANs for this
trunk, and set the LACP mode to active.
ICX-Core-1(config)# interface lag 256
ICX-Core-1(config-if)# no shutdown
ICX-Core-1(config-if)# no routing
ICX-Core-1(config-if)# vlan trunk allowed all
ICX-Core-1(config-if)# lacp mode active
ICX-Core-1(config-if)# exit
9. On both Core-1 and Core-2, assign interfaces 1/1/46 and 1/1/47 to your new LAG and enable
them.
ICX-Core-1(config)# interface 1/1/46-1/1/47
ICX-Core-1(config-if)# no shutdown
ICX-Core-1(config-if)# lag 256
ICX-Core-1(config-if)# exit
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
11. From Core-1, verify that it can ping Core-2's IP address in VLAN 1 (10.1.1.3). This should be suc-
cessful.
ICX-Core-1(config)# ping 10.1.1.3
PING 10.1.1.3 (10.1.1.3) 100(128) bytes of data.
108 bytes from 10.1.1.3: icmp_seq=1 ttl=64 time=23.5 ms
108 bytes from 10.1.1.3: icmp_seq=2 ttl=64 time=0.175 ms
108 bytes from 10.1.1.3: icmp_seq=3 ttl=64 time=0.174 ms
108 bytes from 10.1.1.3: icmp_seq=4 ttl=64 time=0.181 ms
108 bytes from 10.1.1.3: icmp_seq=5 ttl=64 time=0.175 ms
Objectives
n Prepare a link aggregation that will be used as the ISL.
n Set up the ISL link.
n Reference the keepalive link.
n Configure the VSX roles.
n Verify the status of the VSX cluster.
Steps
Core-1
1. Open a terminal session to Core-1 and enter configuration mode. Take note of the current ver-
sion.
ICX-Core-1(config)# show version
-----------------------------------------------------------------------------
ArubaOS-CX
(c) Copyright 2017-2024 Hewlett Packard Enterprise Development LP
-----------------------------------------------------------------------------
Version : GL.10.13.1000
Build Date : 2024-01-29 21:07:10 UTC
Build ID : ArubaOS-CX:GL.10.13.1000:7720573f9b1b:202401292047
Build SHA : 7720573f9b1b321e9916f3bd11b5fcf426fd5238
Hot Patches :
Active Image : primary
2. Review the LAG 256 connection to Core-2. This LAG was defined in the previous task. Some best
practice guidelines:
n Use the last LAG number supported by the switch—in this case, number 256.
n Allow all the VLANs on the ISL.
3. Enable support for jumbo frames (MTU size of 9198) on the ISL ports. This will be required when
using Dynamic Segmentation later in the course.
ICX-Core-1(config)# interface 1/1/46-1/1/47
ICX-Core-1(config-if-<1/1/46-1/1/47>)# mtu 9198
ICX-Core-1(config-if-<1/1/46-1/1/47>)# exit
4. Review the physical ports of LAG 256 and verify jumbo frame support is enabled.
ICX-Core-1(config)# show run int 1/1/46
interface 1/1/46
no shutdown
Core-2
5. Open a console to Core-2 and enter configuration mode. Check the version; make sure this is the
same version as Core-1. Contact your instructor if it is different.
ICX-Core-2(config)# show version
-----------------------------------------------------------------------------
ArubaOS-CX
(c) Copyright 2017-2024 Hewlett Packard Enterprise Development LP
-----------------------------------------------------------------------------
Version : GL.10.13.1000
Build Date : 2024-01-29 21:07:10 UTC
Build ID : ArubaOS-CX:GL.10.13.1000:7720573f9b1b:202401292047
Build SHA : 7720573f9b1b321e9916f3bd11b5fcf426fd5238
Hot Patches :
Active Image : primary
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
Core-1
1. On Core-1, verify the connectivity to Core-2 for this VRF. This VRF and IP have been defined in
the NetEdit lab activity.
ICX-Core-1(config)# ping 192.168.0.1 vrf KA
Core-2
2. On Core-2, configure the following, defining the role as secondary:
ICX-Core-2(config)# vsx
ICX-Core-2(config-vsx)# inter-switch-link lag 256
ICX-Core-2(config-vsx)# role secondary
ICX-Core-2(config-vsx)# exit
In the previous output, the switch software version may be different from your actual
lab environment. However, both switches must have the same version.
Core-2
ICX-Core-2(config)# show running-config | begin 5 vsx
vsx
system-mac 02:01:00:00:01:00
inter-switch-link lag 256
role secondary
vsx-sync vsx-global
ICX-Core-2(config)#
Notice that Core-2 has received the vsx-sync command automatically, as well as the system-mac
command.
Notice in the previous output that the interface that is used for the ISL will auto-
matically set the native VLAN to the native tagged state. This means that there is
no untagged traffic passing on the ISL. One of the benefits of having the native
VLAN tagged is that any 802.1p CoS value would be preserved on the ISL.
7. Next, review the configuration that is synchronized between the two core switches.
Core-2
ICX-Core-2(config)# show running-config vsx-sync
Current vsx-sync configuration:
!
!Version ArubaOS-CX GL.10.13.1000
!export-password: default
vsx
system-mac 02:01:00:00:01:00
vsx-sync vsx-global
Core-2
2. Set the keepalive link, making sure to invert the source and destination IP.
ICX-Core-2(config)# vsx
ICX-Core-2(config-vsx)# keepalive peer 192.168.0.0 source 192.168.0.1 vrf KA
ICX-Core-2(config-vsx)# exit
The previous output was taken right after enabling the keepalive link, showing the
Keepalive State as Keepalive-Init. A few seconds later, the state will transition to
Keepalive-Established, so you may see that state already in your output.
Core-2
4. Review the same output on the console of Core-2.
ICX-Core-2(config)# show vsx brief
ISL State : In-Sync
Device State : Peer-Established
Keepalive State : Keepalive-Established
Device Role : secondary
Number of Multi-chassis LAG interfaces : 0
6. On Core-1, test this feature again with the show lldp neighbor 1/1/46 command. When the com-
mand is executed using vsx-peer, the output will come from Core-2, so Core-1 will be listed as an
LLDP peer.
ICX-Core-1(config)# show lldp neighbor-info 1/1/46
ICX-Core-1(config)# show lldp neighbor-info 1/1/46 vsx-peer
Keepalive Counters
Keepalive Packets Tx : 385
Keepalive Packets Rx : 255
Keepalive Timeouts : 0
Keepalive Packets Dropped : 0
8. On Core-1, execute the same command for the VSX peer (Core-2). Note the peer device role and
the counters in the two command outputs are those from Core-2's perspective.
ICX-Core-1(config)# show vsx status keepalive vsx-peer
Keepalive State : Keepalive-Established
Last Established : Mon Apr 23 16:16:16 2024
Last Failed :
Peer System Id : 02:01:00:00:01:00
Peer Device Role : primary
Keepalive Counters
Keepalive Packets Tx : 360
Keepalive Packets Rx : 360
Keepalive Timeouts : 0
Keepalive Packets Dropped : 0
Objectives
n Review default configuration synchronization behavior on both VSX switches.
n Enable configuration synchronization.
n Verify VSX operation.
n Review an out-of-sync status.
4. Review the running configuration of the vsx-peer (Core-2). Note that the user demo should not
exist on Core-2.
ICX-Core-1(config)# show running-config vsx-peer | include user
user admin group administrators password ciphertext
ICX-Core-1(config)#
This was an example of a global configuration change where synchronization was not enabled
(which it is not by default).
Context configuration change
Next, you will define a new VLAN on Core-1 and verify the configuration status on Core-2.
Core-1
5. On Core-1, define VLAN 11.
ICX-Core-1(config)# vlan 11
ICX-Core-1(config-vlan-11)# exit
---------------------------------------------------------------------------------
VLAN Name Status Reason Type Interfaces
---------------------------------------------------------------------------------
1 DEFAULT_VLAN_1 up ok default lag256
11 VLAN11 up ok static lag256
---------------------------------------------------------------------------------
VLAN Name Status Reason Type Interfaces
---------------------------------------------------------------------------------
1 DEFAULT_VLAN_1 up ok default lag256
This demonstrates that each switch has a local configuration, and, by default, a configuration
change on Core-1 is not automatically pushed to Core-2.
9. Next, enable some of the VSX sync features. For this lab exercise, the aaa option is required,
since that includes the admin users.
ICX-Core-1(config)# vsx
ICX-Core-1(config-vsx)# vsx-sync aaa bfd-global bgp dhcp-relay mclag-interfaces
ICX-Core-1(config-vsx)# vsx-sync ospf qos-global route-map
11. Run the command again with the vsx-peer option. The configuration of the local Core-1 and
remote Core-2 should be the same now, so the user demo exists in both switch configurations.
ICX-Core-1(config)# show running-config vsx-sync vsx-peer
ICX-Core-1(config)#
13. Verify the configuration change on Core-1 and Core-2. Notice that there is no longer a user
demo on either switch.
ICX-Core-1(config)# show run vsx-sync
Current vsx-sync configuration:
!
!Version ArubaOS-CX GL.10.13.1000
!export-password: default
user admin group administrators password ciphertext
AQBapRmG3aISxIdvh4rq1JlVT9a6zgXnkKfjmK/UNQDF+2lCYgAAAP1kVtbRXI7tkaxSRFI1+ss4nz3wnAb
Knyw2j9VXFxCwJD2sHCDoNAHdC1rjj0svX0M/54jZgIBlB
16P7eEBnmD9HKpMLCVmVjVqdDvantLNESEPFUq6HPJmG0n9zby8Nqed
!
!
!
!
!
vsx
system-mac 02:01:00:00:01:00
vsx-sync aaa bfd-global bgp dhcp-relay mclag-interfaces ospf qos-global route-
map vsx-global
---------------------------------------------------------------------------------
VLAN Name Status Reason Type Interfaces
---------------------------------------------------------------------------------
1 DEFAULT_VLAN_1 up ok default lag256
11 VLAN11 up ok static lag256
16. On Core-1, create VLAN 12 and VLAN 13; these will be used in later labs.
ICX-Core-1(config)# vlan 12,13
ICX-Core-1(config-vlan-<12,13>)# vsx-sync
ICX-Core-1(config-vlan-<12,13>)# exit
---------------------------------------------------------------------------------
VLAN Name Status Reason Type Interfaces
-------------------------------------------------------------------------------
1 DEFAULT_VLAN_1 up ok default lag256
11 VLAN11 up ok static lag256
12 VLAN12 up ok static lag256
13 VLAN13 up ok static lag256
LACP is the recommended method to connect with the peer switches. When it is not
possible to use LACP with the peer device, a static (no protocol) VSX LAG can be cre-
ated using the interface lag <id> multi-chassis static command.
In some scenarios, the peer device may not always support LACP. This may happen
with servers during the boot process (when the server administrator wants to use a
PXE boot for the initial server provisioning). This may also occur when the peer
switch must be deployed with Zero-Touch Provisioning (ZTP), since the peer switch
does not have an LACP configuration at factory default.
For these use cases, it is possible to configure AOS-CX with the LACP fallback fea-
ture. With this feature enabled, the switch will keep one interface in a forwarding
state when no LACP packets are received from the peer device. In the default LACP
mode, both interfaces are blocked, so the peer device is not able to reach the net-
work.
2. Review this default state by reviewing the current configuration for the current context.
ICX-Core-1(config-lag-if)# show running-config current-context
interface lag 1 multi-chassis
no routing
vlan access 1
lacp mode active
ICX-Core-1(config-lag-if)#
3. Make the VSX LAG a VLAN trunk and permit VLANs 1 and 11–13.
ICX-Core-1(config-lag-if)# vlan trunk allowed 1,11-13
Core-2
12. On Core-2, repeat the commands of the previous step for the same interface, interface 1/1/1.
ICX-Core-2(config)# interface 1/1/1
ICX-Core-2(config-if)# description access1
ICX-Core-2(config-if)# lag 1
ICX-Core-2(config-if)# mtu 9100
ICX-Core-2(config-if)# no shutdown
ICX-Core-2(config-if)# exit
16. Assign interfaces 1/1/25 and 1/1/26 to the LAG and define an MTU of 9100 bytes.
ICX-Access-1(config)# interface 1/1/25,1/1/26
ICX-Access-1(config-if-<1/1/25,1/1/26>)# lag 255
ICX-Access-1(config-if-<1/1/25,1/1/26>)# mtu 9100
ICX-Access-1(config-if-<1/1/25,1/1/26>)# no shutdown
ICX-Access-1(config-if-<1/1/25,1/1/26>)# exit
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
Core-1
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
You have now established uplink LAGs to the VSX cluster. From the access switches' per-
spectives, Core-1 and Core-2 look like a single switch (02:01:00:00:01:00).
Access-1
22. View the LLDP neighbor information on Access-1.
ICX-Access-1(config)# show lldp neighbor-info
n Question: What are the MAC addresses and system names that Access-1 is seeing from
the VSX cluster?
n Answer: Access-1 is seeing the true system MAC address and hostnames of each VSX
switch.
n Question: Why is the Chassis-ID different from the LACP System-ID?
n Answer: The VSX core consists of two independent control planes, with their own IP and
MAC addressing. They only share a common System-ID for Layer 2 protocols such as
LACP to make their partners believe they are a single system. LLDP is a discovery protocol
and does not require the use of a common System-ID, so each VSX switch uses its own sys-
tem MAC address and hostname for LLDP.
The mobility controller has been pre-configured in the lab with a LAG on its ports (0/0/1 and
0/0/2) to the core switches.
As an exercise, try configuring the VSX LAG (on Core-1 and Core-2) to the mobility controller on
your own.
Use these settings for the VSX LAG:
n Use LAG ID 5.
n Use interface 1/1/5 on both Core-1 and Core-2 for the VSX LAG.
23. Verify connectivity, that the LACP state is up for 1/1/5, and check that VLANs are allowed on
Core-1 and its VSX peer.
ICX-Core-1(config)# show lacp interfaces
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
24. Optional: Log in to the CLI of the mobility controller/gateway (admin/aruba123). Examine port
channel 1's status (the LAG). (This was pre-configured for you at the start-of-class lab state for
this course.)
(icx-T13-mc1) *[mynode] # show interface port-channel 1
Objectives
n Understand the active gateway principle.
n Configure an active gateway.
n Verify the active gateway configuration.
n Verify the active gateway operation on a client.
n Set up an active gateway in VLAN 1 to the Mobility Controller.
n Configure an IP helper on the VSX core.
Understand the active gateway principle
In a VSX system, an active gateway provides redundant default gateway functionality for the end hosts.
The default gateway of the end host is automatically handled by both of the VSX systems.
This functionality is similar to VRRP, but VRRP only operates in an active/standby mode, using a
keepalive between the active and the standby system to detect the state. To keep the ARP entry of the
default gateway valid in case of a VRRP failover, VRRP uses a common MAC address between the
VRRP hosts. In the case of VRRP, this is based on the VRRP VRID value.
The active gateway feature also uses a virtual MAC address to ensure the ARP entry on the end hosts
is stable (the same in case of a switchover). However, the virtual MAC is set by the administrator in the
VSX setup; it is not controlled by some other ID, as in VRRP. The virtual MAC can be reused over mul-
Steps
Configuration
Active gateway and access policies configurations applied to the interface VLAN will
be synced between the VSX pair. AOS-CX policies will be explained later in the lab.
4. Configure the active gateway IP (10.1.11.1) and virtual MAC address (02:02:00:00:01:00). This
IP address is what end hosts need to have defined as the default gateway address for the VLAN.
ICX-Core-1(config-if-vlan)# active-gateway ip 10.1.11.1 mac 02:02:00:00:01:00
ICX-Core-1(config-if-vlan)# exit
Interface vlan11 is up
Admin state is up
Description:
Hardware: Ethernet, MAC Address: b8:d4:e7:40:6d:00
IPv4 address 10.1.11.2/24
active-gateway L3 source mac b8:d4:e7:40:6d:00
active-gateway ip mac 02:02:00:00:01:00
active-gateway ip 10.1.11.1
L3 Counters: Rx Enabled, Tx Enabled
Statistic RX TX Total
---------------- -------------------- -------------------- --------------------
L3 Packets 0 0 0
L3 Bytes 0 0 0
Core-2: VLAN 11
6. Open a console connection to Core-2 and enter configuration mode.
7. Enter the interface VLAN 11 context, configure the Core-2 switch IP address, and enable L3
counters.
ICX-Core-2(config)# interface vlan 11
ICX-Core-2(config-if-vlan)# ip address 10.1.11.3/24
ICX-Core-2(config-if-vlan)# l3-counters
8. Review the current configuration of the VLAN 11 interface. Verify that vsx-sync has completed
the active gateway configuration synchronization on Core-2.
ICX-Core-2(config-if-vlan)# show run current-context
interface vlan11
vsx-sync active-gateways policies
ip address 10.1.11.3/24
active-gateway ip mac 02:02:00:00:12:00
active-gateway ip 10.1.11.1
l3-counters
Interface vlan11 is up
Admin state is up
Description:
Hardware: Ethernet, MAC Address: b8:d4:e7:40:8e:00
IPv4 address 10.1.11.3/24
active-gateway L3 source mac b8:d4:e7:40:8e:00
active-gateway ip mac 02:02:00:00:01:00
active-gateway ip 10.1.11.1
L3 Counters: Rx Enabled, Tx Enabled
Core-2 has been configured with an IP address already. Adding vsx-sync to the com-
mand will ensure the active gateway configuration is set on Core-2 as well.
19. Open a desktop connection to PC3 (connected to Access-1 port 1/1/3). Enable the LAB NIC –
6300-A Port 1 interface (if it is not already enabled).
TIP: You may also choose to disable and enable the Lab NIC interface in the Network
Connections list.
Select Start > Settings > Network & Internet > Ethernet > Change adapter
options.
Right-click Lab NIC and select Disable.
In the rest of the course labs, this procedure is referred to as "bounce the Lab NIC"
(disable and enable it). The IP address can be shown by right-clicking Lab NIC and
selecting Status > Details.
21. Verify that PC3 received an IP address by executing ipconfig /all from the command prompt
(cmd.exe).
n Question: What are the IP address and MAC address of the Lab NIC?
n Answer: The IP address should begin with 10.1.11 and probably start at 50 for a host
address in the DHCP pool.
23. On the client PC3, verify the system has received an IP address from the VLAN 11 IP range
(10.1.11.0/24). In a command prompt (cmd.exe), enter ipconfig.
C:\Users\student> ipconfig
Windows IP Configuration
<output omitted>
<output omitted>
Trace complete.
28. On PC4 (connected to Access-2 port 1/1/4), renew your IP address. Open a command prompt
(cmd.exe) with administrator privileges, then release and renew the IP address, entering the
ipconfig /release and ipconfig /renew commands or by bouncing the Lab NIC network con-
nection (disable/enable).
C:\Users\student> ipconfig
<output omitted>
If PC4 did not get an IP address in the 10.1.12.0/24 range, review your IP helper and VLAN
configuration.
Lab diagram
Objectives
n Verify L3 inter-VLAN traffic failover in a link falure.
n Manage link failure of a single ISL port, without causing a split-brain.
2. Open a terminal connection to Access-1, clear the interface statistics, and then check the inter-
4. On PC3, check that the ping operation is still successful. It is normal to either have no packet loss
or one missed ping, since the ping is only performed once per second.
5. On Access-1, enable uplink 1, verifying the LACP state is operational again.
ICX-Access-1(config-if)# no shutdown
An example of a link that has not yet completed the LACP negotiation state (this output would
only be seen a few seconds after enabling the interface) is as follows.
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
7. On PC3, check that the ping operation is still successful. It is normal to either have no packet loss
or one missed ping, since the ping is only performed once per second.
8. On Access-1, enable uplink 2, verifying it is operational again (check for the up state in the LACP
output).
ICX-Access-1(config-if)# no shutdown
ICX-Access-1(config-if)# exit
ICX-Access-1(config-if)# show lacp interfaces
You may need to wait a few seconds and repeat the show lacp interfaces command
to see the up state.
In this section, traffic will be forced over the ISL LAG and an ISL member port failure will be tested.
The traffic will be forced over the ISL link by:
n On Access-1, disabling uplink 2 so Access-1 will send all traffic to Core-1.
n On Core-1, disabling port 1/1/5 so the MC will be forced to send all traffic to Core-2.
This way, the traffic will no longer use the local path on each core switch, but it must take the ISL path
to reach the destination.
Once this has been done, one of the ISL member ports will be disabled to verify the ISL LAG failover. Do
not shutdown the entire ISL at this point; that will result in a split-brain scenario, which will be tested in
the following task.
Prepare the setup
1. On Access-1, disable the uplink to Core-2.
ICX-Access-1(config)# interface 1/1/26
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
State abbreviations :
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
This concludes the ISL LAG failover test and the optional task. Continue with the remainder of this lab.
Steps
The keepalive has been configured as part of the basic VSX configuration task; in these steps, the con-
figuration is reviewed.
1. Open a console connection to Core-1. The keepalive is an IP connection between the Core-1 and
Core-2 switches. To make sure this connection is never in conflict or impacted by the normal rout-
ing table, a dedicated VRF is typically used.
2. Review routed port 1/1/45, a dedicated link that was used for the VSX keepalive.
Core-1
ICX-Core-1# show running-config interface 1/1/45
interface 1/1/45
no shutdown
vrf attach KA
ip address 192.168.0.0/31
exit
<output omitted..>
Keepalive Counters
Keepalive Packets Tx : 352151
Keepalive Packets Rx : 352020
Keepalive Timeouts : 0
Keepalive Packets Dropped : 0
Core-2
6. Open a console connection to Core-2, reviewing the VSX keepalive with the same commands.
show running-config interface 1/1/45
show running-config vsx
show vsx configuration keepalive
show vsx status keepalive
Keepalive Counters
Keepalive Packets Tx : 352501
Keepalive Packets Rx : 352370
Keepalive Timeouts : 0
Keepalive Packets Dropped : 0
n Question: Why are there no packets dropped at this point?
n Answer: Only the ISL is down at this point. The keepalive operates just fine, so no
keepalive packets are dropped.
Core-2—split-system detected
Diagram
Keepalive Counters
Keepalive Packets Tx : 352481
Keepalive Packets Rx : 352482
Keepalive Timeouts : 0
Keepalive Packets Dropped : 0
6. Check the log buffer (-r reverse, -n number of lines) and look for lines containing vsx. This will
show an entry that the ISL link is down, but the keepalive has been established. This indicates
the split-system scenario.
Due to this condition, Core-2 has disabled its local VSX LAG interfaces.
ICX-Core-2# show interface brief
---------------------------------------------------------------------------------
Port Native Mode Type Enabled Status Reason
Speed
VLAN
(Mb/s)
---------------------------------------------------------------------------------
1/1/1 1 trunk SFP+DAC1 yes down Disabled by VSX --
1/1/2 1 trunk SFP+DAC1 yes down Disabled by VSX --
1/1/3 -- routed -- no down No XCVR installed --
1/1/4 -- routed SFP-BT no down Administratively down --
1/1/5 1 trunk SFP-BT yes down Disabled by VSX --
1/1/6 -- routed -- no down No XCVR installed --
<output omitted>
It may take up to three minutes before the VSX LAG interfaces are re-enabled. Wait for the inter-
faces to come up before continuing with the lab.
Objectives
In this task, you will complete the IP configuration to reach the ClearPass server. This will be required in
future labs. The ClearPass server is reachable via the Router-A device that is connected to the Core-1
port 1/1/7. In this task, port 1/1/7 will be enabled, an IP address will be assigned, and a static route will
be set for the ClearPass IP subnet. Core-2 will be configured with a static route to the ClearPass server
via Core-1.
You will also configure DNS resolution and NTP on all four switches.
The last step will be to save a new checkpoint, so you can revert to this configuration from later labs.
Core-1
3. Access the console on Core-1 and enter configuration mode.
4. Define the uplink connection to Router-A and configure a static route to reach the 10.254.1.0/24
subnet.
ICX-Core-1(config)# interface 1/1/7
ICX-Core-1(config-if)# ip address 10.255.101.2/24
ICX-Core-1(config-if)# no shutdown
ICX-Core-1(config-if)# exit
ICX-Core-1(config-)# ip route 10.254.1.0/24 10.255.101.11
If this ping is not successful, use the lab diagram to access Router-A's console. Enter
the boot system command, then y to reboot Router-A. Routers A, B, and C are virtual
machines running CX-OVA and may need a reboot at the beginning of this lab. Feel
free to contact your instructor with any questions.
Core-2
7. Access the console on Core-2 and enter configuration mode.
8. Configure a static route for the CPPM subnet to next-hop Core-1.
ICX-Core-2(config)# ip route 10.254.1.0/24 10.1.1.2
9. Verify connectivity to the ClearPass host, sourcing the ping from VLAN 1.
ICX-Core-2(config)# ping 10.254.1.23 source vlan1
PING 10.254.1.23 (10.254.1.23) from 10.1.1.3 : 100(128) bytes of data.
108 bytes from 10.254.1.23: icmp_seq=1 ttl=60 time=3.67 ms
108 bytes from 10.254.1.23: icmp_seq=2 ttl=60 time=3.26 ms
<output omitted>
ICX-Core-2(config)# end
Access-1
10. Access Access-1's console and enter configuration mode.
11. Define an IP address of 10.1.1.4/24 for VLAN 1.
ICX-Access-1(config)# interface vlan1
ICX-Access-1(config-if-vlan)# ip address 10.1.1.4/24
ICX-Access-1(config-if-vlan)# exit
12. Define a static route for 10.254.1.0/24, pointing to Core-1's IP address in VLAN 1.
Access-2
14. Access Access-2's console and enter configuration mode.
15. Define an IP address of 10.1.1.5/24 for VLAN 1.
ICX-Access-2(config)# interface vlan1
16. Define a static route for 10.254.1.0/24, pointing to Core-1's IP address in VLAN 1.
ICX-Access-2(config)# ip route 10.254.1.0/24 10.1.1.2
20. On all four switches, define 10.254.1.21 as an NTP server with iburst mode. Set the VRF to
default. Source NTP requests from VLAN 1, then globally enable NTP.
ICX-switch1-4(config)# ntp server 10.254.1.21 iburst
ICX-switch1-4(config)# ntp vrf default
ICX-switch1-4(config)# ip source-interface ntp interface vlan1
ICX-switch1-4(config)# ntp enable
21. On Core-1, verify your NTP configuration and receipt of NTP packets on all four switches.
ICX-switch1-4(config)# show ntp server
------------------------------------------------------
NTP SERVER KEYID MINPOLL MAXPOLL OPTION VER
------------------------------------------------------
10.254.1.21 -- 6 10 iburst 4
<output omitted>
Note that it may take a while for the time synchronization to drift to the time on the NTP server.
Save configuration checkpoints for the upcoming labs
You have now completed the VSX configuration lab.
This configuration will be the base configuration of several later labs, so a checkpoint
MUST be created to complete the rest of the course lab activities. This is critical, so do not
skip this step!
5. On all four switches, verify that the checkpoint exists in the checkpoint list.
ICX-switch1-4# show checkpoint list | include vsx
icx-lab02-vsx
Lab diagram
Overview
This lab focuses on understanding and implementing Layer 2 (L2) optimization and protection features
that you learned about in Module 3—including STP and protections for STP, like edge ports, BPDU
guard, root guard, loop protection, and private VLANs—give you a better understanding of the load
sharing algorithm used by LAGs and how to tune it.
Objectives
n Describe the LAG load sharing algorithm.
n Configure a load sharing MSTP solution.
n Explain edge ports and their operation with STP.
n Implement BPDU guard.
n Implement root guard.
n Implement loop protection.
n Implement private VLANs (PVLANs).
Objectives
n Load the Lab02 VSX configuration checkpoint.
Steps
1. Open a console connection to the Access-1. Log in using admin/aruba123.
ICX-Access-1# copy checkpoint icx-lab02-vsx running-config
Configuration changes will take time to process, please be patient.
ICX-Access-1#
Objectives
n Tune the LAG hash algorithm.
n Understand and use the LACP fallback feature.
Steps
Access-1
1. Open a terminal session to Access-1. Examine the LAG 255 interface connected to the VSX
protection features
System-ID : 10:4f:58:f6:e3:80
System-priority : 65534
Aggregate lag255 is up
Admin state is up
Description : core
Type : normal
Lacp Fallback : Disabled
MAC Address : 10:4f:58:f6:e3:80
Aggregated-interfaces : 1/1/25 1/1/26
Aggregation-key : 255
Aggregate mode : active
Hash : l3-src-dst
LACP rate : slow
5. Send 100 pings from Access-1's VLAN 1 interface to the active gateway IP address with a size of
1000 bytes.
ICX-Access-1(config)# ping 10.1.1.1 source vlan1 repetitions 100 datagram-size 1000
PING 10.1.1.1 (10.1.1.1) 100(128) bytes of data.
PING 10.1.1.1 (10.1.1.1) from 10.1.1.4 : 1000(1028) bytes of data.
1008 bytes from 10.1.1.1: icmp_seq=1 ttl=64 time=0.212 ms
1008 bytes from 10.1.1.1: icmp_seq=2 ttl=64 time=0.184 ms
<output omitted>
protection features
ICX-Access-1(config)# ping 10.1.1.2 source vlan1 repetitions 100 datagram-size 1000
PING 10.1.1.2 (10.1.1.2) from 10.1.1.4 : 1000(1028) bytes of data.
1008 bytes from 10.1.1.2: icmp_seq=1 ttl=64 time=0.196 ms
1008 bytes from 10.1.1.2: icmp_seq=2 ttl=64 time=0.191 ms
<output omitted>
Aggregate lag255 is up
Admin state is up
Description : core
Type : normal
Lacp Fallback : Disabled
Access-1
14. Reaccess Access-1. Clear the LAG statistics.
ICX-Access-1(config)# clear interface lag255 statistics
15. Access Core-1 and SSH to the IP address of Access-1 in VLAN 1 and log in (admin/aruba123).
ICX-Access-1# ssh admin@10.1.1.2 vrf default
The authenticity of host '10.1.1.1 (10.1.1.1)' can't be established.
ED25519 key fingerprint is SHA256:GUABszgT9d5rwJ+Tjg54B7CC0et3N136Jpi8ryMM4CM.
This key is not known by any other names.
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
Warning: Permanently added '10.1.1.1' (ED25519) to the list of known hosts.
n Question: Which interface did the output of the SSH session traverse?
n Answer: Interface 1/1/25. Most of the output of the show run command was received (RX
Packets) on this interface.
Notice that the hash you configured only affects Access-1 and not what Core-1 or Core-2 will do.
Core-1 and Core-2
18. Mirror the hash algorithm configuration on Core-1 and Core-2's LAG 1.
ICX-Core-1(config)# interface lag 1
ICX-Core-1(config-lag-if)# hash l4-src-dst
ICX-Core-1(config-lag-if)# exit
Access-1
19. Return to Access-1's console. Clear the LAG statistics.
ICX-Access-1(config)# clear interface lag255 statistics
20. Access Core-1 and SSH to the IP address of Access-1 in VLAN 1 and log in (admin/aruba123).
ICX-Access-1# ssh admin@10.1.1.3 vrf default
The authenticity of host '10.1.1.1 (10.1.1.1)' can't be established.
ED25519 key fingerprint is SHA256:GUABszgT9d5rwJ+Tjg54B7CC0et3N136Jpi8ryMM4CM.
This key is not known by any other names.
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
Warning: Permanently added '10.1.1.1' (ED25519) to the list of known hosts.
protection features
* New product announcements
* Special events
Please register your products now at: https://asp.arubanetworks.com
n Question: Which interface did the output of the SSH session traverse?
n Answer: Interface 1/1/25. Most of the output of the show run command was received (RX
Packets) on this interface.
Objectives
n Explain the default behavior of LACP on AOS-CX switches.
n Implement LACP fallback on aggregation or core switches.
Steps
Core-1
1. Verify that the LAG, using LACP to Access-1, is operational.
ICX-Core-1(config)# show lacp interfaces
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
protection features
Partner details of all interfaces:
---------------------------------------------------------------------------------
Intf Aggr Port Port State System-ID System Aggr
Name Id Pri Pri Key
---------------------------------------------------------------------------------
1/1/1 lag1(mc) 27 1 ALFNCD 10:4f:58:f6:e3:80 65534 255
1/1/2 lag2(mc) 27 1 ALFNCD 10:4f:58:fc:b2:40 65534 255
1/1/5 lag5(mc) 3 255 ASFNCD 20:4c:03:b1:d4:2a 32768 2
1/1/46 lag256 47 1 ALFNCD b8:d4:e7:40:6d:00 65534 256
1/1/47 lag256 48 1 ALFNCD b8:d4:e7:40:6d:00 65534 256
Access-1
2. Access Access-1's console. Disable LACP on LAG 255.
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
protection features
1/1/47 lag256 48 1 ALFNCD b8:d4:e7:40:6d:00 65534 256
n Question: Based on the LACP state (the flags), what is the issue?
n Answer: The O indicates out of sync; one possible reason for this is that the LACP neigh-
bor is not responding to LACP messages.
Core-1
5. Let us fix this issue. On Core-1, enable the LACP fallback feature on LAG 1. Note the warning
that is displayed.
ICX-Core-1(config)# interface lag 1
ICX-Core-1(config-lag-if)# lacp fallback
Warning: Enabling LACP fallback may result in a network loop.
ICX-Core-1(config-lag-if)#
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
State abbreviations :
protection features
warning message when enabling the fallback feature—you might be inadvertently creating
an L2 loop in your network when using this feature.
Access-1
8. Ping the active gateway IP address for VLAN 1.
ICX-Access-1(config)# ping 10.1.1.1
PING 10.1.1.1 (10.1.1.1) 100(128) bytes of data.
From 10.1.1.4 icmp_seq=1 Destination Host Unreachable
From 10.1.1.4 icmp_seq=2 Destination Host Unreachable
From 10.1.1.4 icmp_seq=3 Destination Host Unreachable
9. Examine the interface status of 1/1/25 and 1/1/26 on Access-1. As you can see, an L2 loop prob-
ably exists in this situation since both sides are up.
ICX-Access-1(config)# show interface brief
-----------------------------------------------------------------------------------
12. Rebuild the LAG on Access-1, enabling LACP. Assign interfaces 1/1/25 and 1/1/26 to it.
ICX-Access-1(config)# interface lag 255
ICX-Access-1(config-lag-if)# description core
ICX-Access-1(config-lag-if)# no routing
ICX-Access-1(config-lag-if)# vlan trunk allowed all
ICX-Access-1(config-lag-if)# no shut
ICX-Access-1(config-lag-if)# lacp mode active
ICX-Access-1(config-lag-if)# exit
State abbreviations :
Objectives
n Implement MSTP on all four switches.
n Verify the operation of MSTP.
Steps
Core-1, Core-2, Access-1, and Access-2
1. On all four switches, define a matching MSTP configuration. For this lab, all VLANs will belong to
the default instance.
ICX-Core-1(config)# spanning-tree
ICX-Core-1(config)# spanning-tree mode mstp
ICX-Core-1(config)# spanning-tree config-name icx
ICX-Core-1(config)# spanning-tree config-revision 1
ICX-Core-2(config)# spanning-tree
ICX-Core-2(config)# spanning-tree mode mstp
ICX-Core-2(config)# spanning-tree config-name icx
ICX-Core-2(config)# spanning-tree config-revision 1
ICX-Access-1(config)# spanning-tree
ICX-Access-1(config)# spanning-tree mode mstp
ICX-Access-1(config)# spanning-tree config-name icx
ICX-Access-1(config)# spanning-tree config-revision 1
Core-1
2. Define Core-1 as the primary root bridge.
ICX-Core-1(config)# spanning-tree priority 1
Core-2
3. Define Core-2 as the secondary root bridge.
ICX-Core-2(config)# spanning-tree priority 2
Access-1
4. Enable port 1/1/27 on Access-1.
ICX-Access-1(config)# interface 1/1/27
ICX-Access-1(config-if)# no shutdown
ICX-Access-1(config-if)# exit
Access-2
5. Enable port 1/1/27 on Access-2.
ICX-Access-2(config)# interface 1/1/27
ICX-Access-2(config-if)# no shutdown
ICX-Access-2(config-if)# exit
protection features
VLAN (Mb/s)
--------------------------------------------------------------------------------------------------
<output omitted>
1/1/26 1 trunk 10G-DAC1 yes up 10000 --
1/1/27 1 access 10G-DAC1 yes up 10000 --
1/1/28 1 access 10G-DAC1 no down Administratively down -- --
<output omitted>
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
-------------- -------------- ---------- ---------- ---------- ---------- ---------- ---------- -------- -------
lag1 Designated Forwarding 2000 64 P2P 428 8 8 4
lag2 Designated Forwarding 2000 64 P2P 429 6 10 2
lag5 Designated Forwarding 20000 64 P2P 424 0 0 0
lag256 Designated Forwarding 1 64 P2P 432 379 14 2
Notice that all enabled ports on Core-1 (the root) are in a designated/forwarding state.
ICX-Core-2(config)# show spanning-tree mst
#### MST0
Vlans mapped: 1-4040
Bridge Address:02:01:00:00:01:00 priority:8192
Root
Regional Root
Operational Hello time(in seconds): 2 Forward delay(in seconds):15 Max-age(in seconds):20 txHoldCount(in
pps): 6
Configured Hello time(in seconds): 2 Forward delay(in seconds):15 Max-age(in seconds):20 Max-Hops:20
Root Address:02:01:00:00:01:00 Priority:4096
Port:lag256 Path cost:0
Regional Root Address:02:01:00:00:01:00 Priority:4096
Internal cost:1 Rem Hops:19
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
-------------- -------------- ---------- ---------- ---------- ---------- ---------- ---------- -------- -------
lag1 Designated Forwarding 2000 64 P2P 0 0 0 0
lag2 Designated Forwarding 2000 64 P2P 0 0 0 0
lag5 Designated Forwarding 20000 64 P2P 0 0 0 0
lag256 Root Forwarding 1 64 P2P 185 343 2 10
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
-------------- -------------- ---------- ---------- ---------- ---------- ---------- ---------- -------- -------
1/1/1 Disabled Down 20000 128 P2P 69150 0 0 0
1/1/2 Disabled Down 20000 128 P2P 0 0 0 0
1/1/3 Designated Forwarding 20000 128 P2P 158046 0 0 0
1/1/4 Disabled Down 20000 128 P2P 0 0 0 0
1/1/5 Disabled Down 20000 128 P2P 0 0 0 0
1/1/6 Disabled Down 20000 128 P2P 0 0 0 0
1/1/7 Disabled Down 20000 128 P2P 0 0 0 0
1/1/8 Disabled Down 20000 128 P2P 0 0 0 0
1/1/9 Disabled Down 20000 128 P2P 0 0 0 0
1/1/10 Disabled Down 20000 128 P2P 0 0 0 0
1/1/11 Disabled Down 20000 128 P2P 0 0 0 0
1/1/12 Disabled Down 20000 128 P2P 0 0 0 0
1/1/13 Disabled Down 20000 128 P2P 0 0 0 0
1/1/14 Disabled Down 20000 128 P2P 0 0 0 0
1/1/15 Disabled Down 20000 128 P2P 0 0 0 0
1/1/16 Disabled Down 20000 128 P2P 0 0 0 0
1/1/17 Disabled Down 20000 128 P2P 0 0 0 0
1/1/18 Disabled Down 20000 128 P2P 0 0 0 0
1/1/19 Disabled Down 20000 128 P2P 0 0 0 0
1/1/20 Disabled Down 20000 128 P2P 0 0 0 0
1/1/21 Disabled Down 20000 128 P2P 3 69152 2 2
1/1/22 Disabled Down 20000 128 P2P 3 69151 0 2
1/1/23 Disabled Down 20000 128 P2P 0 0 0 0
protection features
lag255 Root Forwarding 2000 64 P2P 510 548 6 8
Notice that the root port on Access-1 is LAG 255, that port 1/1/27 is in a designated/forwarding
state, and that LAG 255 is a root port.
ICX-Access-2(config)# show spanning-tree mst
#### MST0
Vlans mapped: 1-4094
Bridge Address:10:4f:58:fc:b2:40 priority:32768
Operational Hello time(in seconds): 2 Forward delay(in seconds):15 Max-age(in seconds):20 txHoldCount(in
pps): 6
Configured Hello time(in seconds): 2 Forward delay(in seconds):15 Max-age(in seconds):20 Max-Hops:20
Root Address:02:01:00:00:01:00 Priority:4096
Port:lag255 Path cost:0
Regional Root Address:02:01:00:00:01:00 Priority:4096
Internal cost:2000 Rem Hops:19
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
-------------- -------------- ---------- ---------- ---------- ---------- ---------- ---------- -------- -------
1/1/1 Disabled Down 20000 128 P2P 0 0 0 0
Notice that the root port on Access-1 is LAG 255, that port 1/1/27 is in a designated/blocking
state, and that LAG 255 is a root port.
Now that you have a working MSTP configuration, you can proceed with the next tasks.
Objectives
n Explain the difference between an admin-network port and admin-edge port.
Steps
Access-2
protection features
ICX-Access-2(config)# show spanning-tree mst 0 interface 1/1/4
Port 1/1/4
Port Type : admin-network Loop Guard : disable
Link Type : P2P BPDU Filter : disable
Boundary : internal BPDU Guard : disable
Root Guard : disable RPVST Filter : disable
RPVST Guard : disable
Task 3-5: Understanding edge ports and their operation with spanning tree 105
n Question: Are any STP protection methods enabled by default?
n Answer: No.
2. Examine the STP port status of interface 1/1/27.
ICX-Access-2(config)# show spanning-tree mst 0 interface 1/1/27
Port 1/1/27
Port Type : admin-network Loop Guard : disable
Link Type : P2P BPDU Filter : disable
Boundary : internal BPDU Guard : disable
Root Guard : disable RPVST Filter : disable
RPVST Guard : disable
106 Task 3-5: Understanding edge ports and their operation with spanning tree
-------------- -------------- ------------ ---------- ---------- ----------
0 Alternate Blocking 2000 128 1-4094
In the case of admin-network, the port looks for BPDUs for the first three seconds after the link is
up. If no BPDUs are received, the port becomes an edge port and immediately forwards frames. If
BPDUs are detected, the port becomes a non-edge port and participates in normal STP oper-
ation.
5. The admin-edge option does not wait for the receipt of any BPDUs. The port immediately
transitions to the forwarding state on startup. Change the STP port state to admin-edge. Shut
down the port, re-enable the port, and immediately examine the STP port state.
ICX-Access-2(config)# interface 1/1/27
ICX-Access-2(config-if)# spanning-tree port-type admin-edge
ICX-Access-2(config-if)# shutdown
ICX-Access-2(config-if)# no shutdown
protection features
back up, unless you are quick enough, the BPDUs are exchanged and the correct port
states are determined.
6. Change the port state back to admin-network.
ICX-Access-2(config)# interface 1/1/27
ICX-Access-2(config-if)# spanning-tree port-type admin-network
ICX-Access-2(config-if)# exit
Lab diagram
Objectives
n Implement BPDU guard.
n Verify BPDU guard operation.
Steps
Access-1
1. Open a console connection to Access-1. Enable a timeout of 30 seconds for BPDU guard.
ICX-Access-1(config)# spanning-tree bpdu-guard timeout 30
n Question: Upon a violation, what will happen after the 30 seconds expires?
n Answer: The port will automatically be re-enabled. However, if another violation occurs,
the port is logically disabled.
2. Enable the BPDU guard feature on the LAG 255 interface.
ICX-Access-1(config)# interface lag 255
ICX-Access-1(config-if)# spanning-tree bpdu-guard
4. Examine the STP messages (hpe-mstpd process) and look for the one related to the BPDU guard
violation.
ICX-Access-1(config-lag-if)# show events -r -d hpe-mstpd
---------------------------------------------------
Event logs from current boot
---------------------------------------------------
2024-05-08T15:31:54.534013-04:00 ICX-Access-1 hpe-mstpd[3126]: Event|2011|LOG_
INFO|CDTR|1|Topology Change received on port 1/1/27 for CIST from source:
10:4f:58:fc:b2:4e
2024-05-08T15:31:52.853356-04:00 ICX-Access-1 hpe-mstpd[3126]: Event|2011|LOG_
INFO|CDTR|1|Topology Change received on port 1/1/27 for CIST from source:
10:4f:58:fc:b2:4e
2024-05-08T15:31:52.839517-04:00 ICX-Access-1 hpe-mstpd[3126]: Event|2006|LOG_
INFO|CDTR|1|CST - Root changed from 32768: 10:4f:58:f6:e3:80 to 4096:
02:01:00:00:01:00
protection features
INFO|CDTR|1|CST - Root changed from 4096: 02:01:00:00:01:00 to 32768:
10:4f:58:f6:e3:80
2024-05-08T15:31:52.786311-04:00 ICX-Access-1 hpe-mstpd[3126]: Event|2007|LOG_
WARN|CDTR|1|Port lag255 disabled - BPDU received on protected port
5. Examine the STP port inconsistencies and notice the port violation.
CX-Access-1(config-lag-if)# show spanning-tree inconsistent-ports
Instance ID Blocked Port Reason
------------ -------------- ------------
0 lag255 BPDU Guard
6. Wait at least 30 seconds and re-examine the STP events. In the following output, you can see
three violations, which means that between the first and second list of events, more than 60
seconds expired.
ICX-Access-1(config-lag-if)# show events -r -d hpe-mstpd
---------------------------------------------------
As you can see, the port was re-enabled (Topology Change generated on port lag255 going
in to forwarding) and then disabled (Port lag255 disabled - BPDU received on protected
port) because of a recurring violation.
Port : lag255
Admin State : up
BPDU Guard : disabled
BPDU Filter : disabled
RPVST Guard : disabled
RPVST Filter : disabled
Loop Guard : disabled
Root Guard : disabled
TCN Guard : disabled
Admin Edge Port : admin-network
Link Type : Point to Point
BPDU Tx Count : 539
BPDU Rx Count : 2294
8. Verify the STP topology on Access-1. The LAG 255 interface should be a root port and in a for-
warding state.
ICX-Access-1(config-lag-if)# show spanning-tree mst
#### MST0
Vlans mapped: 1-4094
Bridge Address:10:4f:58:f6:e3:80 priority:32768
Operational Hello time(in seconds): 2 Forward delay(in seconds):15 Max-age(in
seconds):20 txHoldCount(in pps): 6
Configured Hello time(in seconds): 2 Forward delay(in seconds):15 Max-age(in
seconds):20 Max-Hops:20
Root Address:02:01:00:00:01:00 Priority:4096
Port:lag255 Path cost:0
Regional Root Address:02:01:00:00:01:00 Priority:4096
Internal cost:2000 Rem Hops:19
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
--------- ------------ ---------- ------- --------- ------ -------- -------- ------- ------
1/1/1 Disabled Down 20000 128 P2P 69150 0 0 0
1/1/2 Disabled Down 20000 128 P2P 0 0 0 0
1/1/3 Designated Forwarding 20000 128 P2P 160028 0 0 0
1/1/4 Disabled Down 20000 128 P2P 0 0 0 0
1/1/5 Disabled Down 20000 128 P2P 0 0 0 0
1/1/6 Disabled Down 20000 128 P2P 0 0 0 0
1/1/7 Disabled Down 20000 128 P2P 0 0 0 0
1/1/8 Disabled Down 20000 128 P2P 0 0 0 0
1/1/9 Disabled Down 20000 128 P2P 0 0 0 0
1/1/10 Disabled Down 20000 128 P2P 0 0 0 0
1/1/11 Disabled Down 20000 128 P2P 0 0 0 0
1/1/12 Disabled Down 20000 128 P2P 0 0 0 0
protection features
1/1/15 Disabled Down 20000 128 P2P 0 0 0 0
1/1/16 Disabled Down 20000 128 P2P 0 0 0 0
1/1/17 Disabled Down 20000 128 P2P 0 0 0 0
1/1/18 Disabled Down 20000 128 P2P 0 0 0 0
1/1/19 Disabled Down 20000 128 P2P 0 0 0 0
1/1/20 Disabled Down 20000 128 P2P 0 0 0 0
1/1/21 Disabled Down 20000 128 P2P 3 69152 2 2
1/1/22 Disabled Down 20000 128 P2P 3 69151 0 2
1/1/23 Disabled Down 20000 128 P2P 0 0 0 0
1/1/24 Disabled Down 20000 128 P2P 0 0 0 0
1/1/27 Designated Forwarding 2000 128 P2P 71055 226 22 4
1/1/28 Disabled Down 20000 128 P2P 69172 3 5 0
lag255 Root Forwarding 2000 64 P2P 544 2321 24 18
Lab diagram
Objectives
n Implement root guard.
n Verify root guard operation.
Steps
Core-1
1. Open a console connection to Core-1 and enter configuration mode.
2. On Core-1, enable VSX group sync for STP.
ICX-Core-1(config)# vsx
ICX-Core-1(config-vsx)# vsx-sync stp-global
ICX-Core-1(config-vsx)# exit
MST0
Root ID Priority : 4096
MAC-Address: 02:01:00:00:01:00
This bridge is the root
Hello time(in seconds):2 Max Age(in seconds):20
Forward Delay(in seconds):15
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
--------- ------------ ---------- ------- --------- ------ -------- -------- ------- ------
lag1 Designated Forwarding 2000 64 P2P 4766 32 22 22
lag2 Designated Forwarding 2000 64 P2P 4959 16 30 12
lag5 Designated Forwarding 20000 64 P2P 4946 0 0 0
lag256 Designated Forwarding 1 64 P2P 4964 421 38 4
protection features
Root ID Priority : 4096
MAC-Address: 02:01:00:00:01:00
This bridge is the root
Hello time(in seconds):2 Max Age(in seconds):20
Forward Delay(in seconds):15
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
--------- ------------ ---------- ------- --------- ------ -------- -------- ------- ------
lag1 Designated Forwarding 2000 64 P2P 0 0 0 0
lag2 Designated Forwarding 2000 64 P2P 0 0 0 0
lag5 Designated Forwarding 20000 64 P2P 0 0 0 0
lag256 Designated Forwarding 1 64 P2P 235 4870 4 34
4. Configure Core-1 with STP root guard on the VSX LAG interfaces towards Access-1 and
Access-2. This will effectively protect the current root bridge and shut down the interface when a
superior BPDU is received on these interfaces.
ICX-Core-1(config)# interface lag 1,2
ICX-Core-1(config-lag-if-<1,2>)# spanning-tree root-guard
ICX-Core-1(config-lag-if-<1,2>)# exit
Access-1
6. Configure Access-1 with a priority multiplier of 0.
ICX-Access-1(config)# spanning-tree priority 0
Core-1
7. On Core-1, verify the local STP status and on the VSX peer. Core-1 and Core-2 are still STP roots,
and the state of LAG 2 is Root-Inc with the role Alternate.
ICX-Core-1(config)# show spanning-tree
Spanning tree status : Enabled Protocol: MSTP
MST0
Root ID Priority : 4096
MAC-Address: 02:01:00:00:01:00
This bridge is the root
Hello time(in seconds):2 Max Age(in seconds):20
Forward Delay(in seconds):15
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
MST0
Root ID Priority : 4096
MAC-Address: 02:01:00:00:01:00
This bridge is the root
Hello time(in seconds):2 Max Age(in seconds):20
Forward Delay(in seconds):15
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
--------- ------------ ---------- ------- --------- ------ -------- -------- ------- ------
lag1 Alternate Root-Inc 2000 64 P2P 0 0 0 0
lag2 Alternate Root-Inc 2000 64 P2P 0 0 0 0
lag5 Designated Forwarding 20000 64 P2P 0 0 0 0
lag256 Designated Forwarding 1 64 P2P 460 5095 4 34
protection features
n Question: Why is LAG 2 in a blocked state?
n Answer: Remember that interface 1/1/27 between the two access switches is enabled,
and thus the core switches will see Access-1 via both LAG interfaces.
8. View the port consistencies of the two LAGs on Core-1 and Core-2. Notice that both LAGs are
blocked by the root guard feature.
ICX-Core-1(config)# show spanning-tree inconsistent-ports
Instance ID Blocked Port Reason
------------ -------------- ------------
0 lag1 Root Guard
0 lag2 Root Guard
Access-1
9. On Access-1, change the priority multiplier back to the default value (8).
ICX-Access-1(config)# spanning-tree priority 8
Core-1
10. Verify that the inconsistencies no longer exist and the two LAGs are operational.
ICX-Core-1(config)# show spanning-tree inconsistent-ports
Instance ID Blocked Port Reason
------------ -------------- ------------
MST0
Root ID Priority : 4096
MAC-Address: 02:01:00:00:01:00
This bridge is the root
Hello time(in seconds):2 Max Age(in seconds):20
Forward Delay(in seconds):15
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
--------- ------------ ---------- ------- --------- ------ -------- -------- ------- ------
lag1 Designated Forwarding 2000 64 P2P 4974 276 24 26
lag2 Designated Forwarding 2000 64 P2P 5167 259 32 14
lag5 Designated Forwarding 20000 64 P2P 5391 0 0 0
lag256 Designated Forwarding 1 64 P2P 5410 866 40 4
MST0
Root ID Priority : 4096
MAC-Address: 02:01:00:00:01:00
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
--------- ------------ ---------- ------- --------- ------ -------- -------- ------- ------
lag1 Designated Forwarding 2000 64 P2P 0 0 0 0
lag2 Designated Forwarding 2000 64 P2P 0 0 0 0
lag5 Designated Forwarding 20000 64 P2P 0 0 0 0
lag256 Designated Forwarding 1 64 P2P 680 5316 4 36
Objectives
n Implement loop protection.
n Verify the implementation of loop protection.
Steps
Access-1
1. Access Access-1's console. Enable interface 1/1/28.
ICX-Access-1(config)# interface 1/1/28
ICX-Access-1(config-if)# no shutdown
ICX-Access-1(config-if)# exit
3. Enable loop protection on interfaces 1/1/27 and 1/1/28. Disable BPDUs on the two interfaces as
well (otherwise, STP will break up the loop, and you want loop protection to deal with the loop).
ICX-Access-1(config)# interface 1/1/27-1/1/28
ICX-Access-1(config-if-<1/1/27-1/1/28>)# loop-protect
ICX-Access-1(config-if-<1/1/27-1/1/28>)# spanning-tree bpdu-filter
[1/1/27] This filter command allows the port to go into a continuous
forwarding mode and spanning tree will not interfere, even if
the port would cause a loop to form in the network topology.
If you suddenly experience high traffic load, shutdown the
port and remove the applicable filter configuration under
Interface 1/1/27
Loop-protect enabled : Yes
Action on loop detection : TX disable
Loop detected count : 0
Loop detected : No
Interface status : up
Interface 1/1/28
Loop-protect enabled : Yes
protection features
Loop detected : No
Interface status : down
Access-2
5. Access Access-2's console. Enable interface 1/1/28.
ICX-Access-2(config)# interface 1/1/28
ICX-Access-2(config-if)# no shutdown
ICX-Access-2(config-if)# exit
Access-1
8. On Access-1, verify that loop protection dealt with the loop issue.
ICX-Access-1(config)# show loop-protect
Interface 1/1/27
Loop-protect enabled : Yes
Action on loop detection : TX disable
Loop detected count : 1
Loop detected : Yes
Detected on VLAN : 1
Detected at : 2024-05-08T17:40:20
Interface status : down
Interface 1/1/28
Loop-protect enabled : Yes
Action on loop detection : TX disable
Loop detected count : 1
Loop detected : Yes
Detected on VLAN : 1
Detected at : 2024-05-08T17:40:20
Interface status : down
Because you defined a timer of 30 seconds, after the violation occurs and 30 seconds has
expired, the interfaces would be re-enabled. However, if the loop condition still exists, the inter-
faces would, logically, be disabled again.
Access-1 and Access-2
9. Disable interfaces 1/1/27 and 1/1/28.
ICX-Access-1(config)# interface 1/1/27-1/1/28
ICX-Access-1(config-if-<1/1/27-1/1/28>)# shutdown
ICX-Access-1(config-if-<1/1/27-1/1/28>)# exit
Access-2
10. Re-enable STP.
protection features
--------- ------------ ---------- ------- --------- ------ -------- -------- ------- ------
1/1/1 Disabled Down 20000 128 P2P 69150 0 0 0
1/1/2 Disabled Down 20000 128 P2P 0 0 0 0
1/1/3 Designated Forwarding 20000 128 P2P 163858 0 0 0
1/1/4 Disabled Down 20000 128 P2P 0 0 0 0
1/1/5 Disabled Down 20000 128 P2P 0 0 0 0
1/1/6 Disabled Down 20000 128 P2P 0 0 0 0
1/1/7 Disabled Down 20000 128 P2P 0 0 0 0
1/1/8 Disabled Down 20000 128 P2P 0 0 0 0
1/1/9 Disabled Down 20000 128 P2P 0 0 0 0
1/1/10 Disabled Down 20000 128 P2P 0 0 0 0
1/1/11 Disabled Down 20000 128 P2P 0 0 0 0
1/1/12 Disabled Down 20000 128 P2P 0 0 0 0
1/1/13 Disabled Down 20000 128 P2P 0 0 0 0
1/1/14 Disabled Down 20000 128 P2P 0 0 0 0
1/1/15 Disabled Down 20000 128 P2P 0 0 0 0
1/1/16 Disabled Down 20000 128 P2P 0 0 0 0
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
--------- ------------ ---------- ------- --------- ------ -------- -------- ------- ------
1/1/1 Disabled Down 20000 128 P2P 0 0 0 0
1/1/2 Disabled Down 20000 128 P2P 0 0 0 0
1/1/3 Disabled Down 20000 128 P2P 0 0 0 0
1/1/4 Designated Forwarding 20000 128 P2P 79 0 0 0
1/1/5 Disabled Down 20000 128 P2P 0 0 0 0
1/1/6 Disabled Down 20000 128 P2P 0 0 0 0
1/1/7 Disabled Down 20000 128 P2P 0 0 0 0
1/1/8 Disabled Down 20000 128 P2P 0 0 0 0
1/1/9 Disabled Down 20000 128 P2P 0 0 0 0
1/1/10 Disabled Down 20000 128 P2P 0 0 0 0
1/1/11 Disabled Down 20000 128 P2P 0 0 0 0
1/1/12 Disabled Down 20000 128 P2P 0 0 0 0
1/1/13 Disabled Down 20000 128 P2P 0 0 0 0
1/1/14 Disabled Down 20000 128 P2P 0 0 0 0
1/1/15 Disabled Down 20000 128 P2P 0 0 0 0
1/1/16 Disabled Down 20000 128 P2P 0 0 0 0
1/1/17 Disabled Down 20000 128 P2P 0 0 0 0
1/1/18 Disabled Down 20000 128 P2P 0 0 0 0
1/1/19 Disabled Down 20000 128 P2P 0 0 0 0
Objectives
n Implement PVLANs.
n Explore the use of isolated, promiscuous, and community ports.
Steps
All four switches
1. Verify the VLAN configuration on all four switches. VLANs 1 and 11–13 should exist on all three
switches.
ICX-Core-1(config)# show vlan
-------------------------------------------------------------------------------
VLAN Name Status Reason Type Interfaces
-------------------------------------------------------------------------------
1 DEFAULT_VLAN_1 up ok default lag1-lag2,lag5,lag256
11 VLAN11 up ok static lag1-lag2,lag5,lag256
12 VLAN12 up ok static lag1-lag2,lag5,lag256
13 VLAN13 up ok static lag1-lag2,lag5,lag256
-------------------------------------------------------------------------------
VLAN Name Status Reason Type Interfaces
-------------------------------------------------------------------------------
-------------------------------------------------------------------------------
VLAN Name Status Reason Type Interfaces
-------------------------------------------------------------------------------
1 DEFAULT_VLAN_1 up ok default 1/1/1-1/1/2,1/1/4-1/1/24,
1/1/27-1/1/28,lag255
11 VLAN11 up ok static 1/1/3,lag255
12 VLAN12 up ok static lag255
13 VLAN13 up ok static lag255
-------------------------------------------------------------------------------
VLAN Name Status Reason Type Interfaces
-------------------------------------------------------------------------------
1 DEFAULT_VLAN_1 up ok default 1/1/1-1/1/3,1/1/5-1/1/24,
1/1/27-1/1/28,lag255
11 VLAN11 up ok static lag255
12 VLAN12 up ok static 1/1/4,lag255
13 VLAN13 up ok static lag255
protection features
ICX-Core-1(config-vlan-11)# private-vlan primary
ICX-Core-1(config-vlan-11)# vsx-sync
ICX-Core-1(config-vlan-11)# exit
3. On the VSX primary, create VLAN 111 and define it as an isolated VLAN for the primary VLAN
11. Synchronize this to the VSX peer.
ICX-Core-1(config)# vlan 111
ICX-Core-1(config-vlan-111)# private-vlan isolated primary-vlan 11
ICX-Core-1(config-vlan-111)# vsx-sync
ICX-Core-1(config-vlan-111)# exit
You do not need to add this configuration to the Core-2 switch since the VSX sync is
enabled or the LAG interfaces in the VSX cluster.
ICX-Access-2(config)# vlan 11
ICX-Access-2(config-vlan-11)# private-vlan primary
ICX-Access-2(config-vlan-11)# exit
ICX-Access-2(config)# vlan 12
ICX-Access-2(config-vlan-12)# private-vlan primary
ICX-Access-2(config-vlan-12)# exit
ICX-Access-2(config)# vlan 111
ICX-Access-2(config-vlan-111)# private-vlan isolated primary-vlan 11
ICX-Access-2(config-vlan-111)# exit
ICX-Access-2(config)# vlan 112
ICX-Access-2(config-vlan-112)# private-vlan community primary-vlan 12
ICX-Access-2(config-vlan-112)# exit
protection features
111 isolated
112 community
-------------------------------------------------------------------------------
VLAN Name Status Reason Type Interfaces
-------------------------------------------------------------------------------
111 VLAN111 up ok static 1/1/3,lag255
Access-2
2. Assign interface 1/1/4 to the isolated VLAN (111) and verify VLAN 111's assignment.
ICX-Access-2(config)# interface 1/1/4
ICX-Access-2(config-if)# no vlan access 12
ICX-Access-2(config-if)# private-vlan port-type secondary
ICX-Access-2(config-if)# vlan access 111
-------------------------------------------------------------------------------
VLAN Name Status Reason Type Interfaces
-------------------------------------------------------------------------------
111 VLAN111 up ok static 1/1/4,lag255
PC3
3. Reacquire an IP address on PC3. Verify that PC3 requires an IP address in the primary VLAN 11.
C:\Users\student> ipconfig /release
Windows IP Configuration
Windows IP Configuration
PC4
protection features
DHCP should work. Verify that PC3 received an IP address.
C:\Users\student> ipconfig /release
Windows IP Configuration
Windows IP Configuration
-------------------------------------------------------------------------------
VLAN Name Status Reason Type Interfaces
-------------------------------------------------------------------------------
112 VLAN112 up ok static 1/1/3,lag255
Access-2
2. Access Access-2's console. Assign interface 1/1/4 to the community VLAN (112). Verify the
VLAN interface associations.
ICX-Access-2(config)# interface 1/1/4
ICX-Access-2(config-if)# no vlan access 111
ICX-Access-2(config-if)# vlan access 112
protection features
ICX-Access-2(config)# show vlan 112
-------------------------------------------------------------------------------
VLAN Name Status Reason Type Interfaces
-------------------------------------------------------------------------------
112 VLAN112 up ok static 1/1/4,lag255
PC3
3. Reacquire an IP address on PC3. Verify that PC3 requires an IP address in the primary VLAN 12.
C:\Users\student> ipconfig /release
PC4
4. Reacquire an IP address on PC4. Verify that PC4 requires an IP address in the primary VLAN 12.
C:\Users\student> ipconfig /release
C:\Users\student> ipconfig /renew
Windows IP Configuration
n Answer: It succeeds because PC3 and PC4 are in the same PVLAN community (112).
6. Test if PC4 can ping the default gateway IP address (this should be successful).
C:\Users\student> ping 10.1.12.1
This lab does not require you to save checkpoints on the switches. This lab is not
protection features
point configuration.
Lab diagram
Overview
In this lab activity, OSPF will be configured using a single backbone area (0.0.0.0) on the devices in the
lab. What you will be doing in this lab is a review of what is in the Campus Access Fundamentals course.
In upcoming lab activities, additional areas will be introduced.
Objectives
n Use loopback interfaces.
n Configure single area OSPF on AOS-CX switches.
n Review OSPF passive interfaces.
Steps
1. Open a console connection to Access-1. Log in using admin/aruba123.
ICX-Access-1# copy checkpoint icx-lab02-vsx running-config
Configuration changes will take time to process, please be patient.
ICX-Access-1#
Objectives
n Use loopback interfaces.
n Define the OSPF single area configuration.
n Set up OSPF in a VSX cluster.
n Implement OSPF point-to-point connections.
n Implement OSPF passive interfaces.
Steps
Core-1
1. Open a terminal connection to Core-1 and enter configuration mode.
2. Define a new IP loopback interface and assign the IP address.
ICX-Core-1(config)# interface loopback 0
ICX-Core-1(config-loopback-if)# ip address 10.1.0.2/32
ICX-Core-1(config-loopback-if)# exit
3. Start a new OSPF process with process ID 1. Assign the same IP address of the loopback inter-
face as the router ID to ensure stability for OSPF.
n The process ID is locally significant.
n By default, the process is linked to the default VRF.
ICX-Core-1(config)# router ospf 1
Lab 4.1: OSPF single area—basic
Task 4.1-2: Basic OSPF setup for the core (area 0) 137
RouterID : 10.1.0.2 OSPFv2 : Enabled
5. Define area 0.
ICX-Core-1(config-ospf-1)# area 0
6. Review the current OSPF LSDB. Since no interfaces have been enabled for OSPF, the database
will not yet contain any LSA information.
ICX-Core-1(config-ospf-1)# show ip ospf lsdb
No OSPF LSAs found on VRF default.
ICX-Core-1(config-ospf-1)# exit
The ip ospf command allows fine control over which interface is assigned to which
OSPF process and in which area.
138 Task 4.1-2: Basic OSPF setup for the core (area 0)
------------------------------------------------
It is best practice to use a /31 subnet for point-to-point links when both sides sup-
port the /31 mask.
ICX-Core-1(config)# vlan 2
ICX-Core-1(config-vlan-2)# vsx-sync
ICX-Core-1(config-vlan-2)# exit
ICX-Core-1(config)# interface vlan 2
ICX-Core-1(config-if-vlan)# ip address 10.1.2.2/31
Core-2
10. Open a terminal connection to Core-2 and enter configuration mode.
11. Define the VLAN 2 interface.
Lab 4.1: OSPF single area—basic
Task 4.1-2: Basic OSPF setup for the core (area 0) 139
108 bytes from 10.1.2.2: icmp_seq=2 ttl=64 time=0.231 ms
<output omitted>
ICX-Core-2(config-if-vlan)# exit
Core-1
13. Enable OSPF on interface VLAN 2 for OSPF process 1 area 0.
ICX-Core-1(config-if-vlan)# ip ospf 1 area 0
It is best practice to use the lowest possible cost for this link. By default, the cost is
calculated based on the interface bandwidth, using 100 Gbps as the reference. This
results in a cost of 100 by default for the VLAN interfaces.
For the VSX transit link, the lowest possible cost will be set, which is a cost of 1.
140 Task 4.1-2: Basic OSPF setup for the core (area 0)
n Question: How was OSPF configured on Core-2?
n Answer: It was configured by VSX synchronization from Lab 2.
ICX-Core-1(config)# show run vsx
vsx
system-mac 02:01:00:00:01:00
inter-switch-link lag 256
role primary
keepalive peer 192.168.0.1 source 192.168.0.0 vrf KA
vsx-sync aaa bfd-global bgp dhcp-relay mclag-interfaces ospf qos-global route-
map vsx-global
interface lag 256
no shutdown
no routing
vlan trunk native 1
vlan trunk allowed all
lacp mode active
interface 1/1/47
no shutdown
lag 256
interface 1/1/46
no shutdown
lag 256
interface lag 1 multi-chassis
description access1
no shutdown
no routing
vlan trunk native 1
Core-2
16. Configure Core-2 for OSPF. First, review the current OSPF configuration.
ICX-Core-2(config)# show running-config ospf
router ospf 1
area 0.0.0.0
interface vlan2
ip ospf 1 area 0.0.0.0
ip ospf cost 1
n Question: Why is there already an OSPF configuration on Core-2?
n Answer: VSX sync is enabled for OSPF, so many OSPF configurations are automatically
synchronized to Core-2.
Lab 4.1: OSPF single area—basic
17. Configure the loopback and set the OSPF router ID.
OSPF configuration
n IP loopback 0: 10.1.0.3/32
n OSPF process 1
Task 4.1-2: Basic OSPF setup for the core (area 0) 141
n Router ID 10.1.0.3/32
n Define area 0
ICX-Core-2(config)# interface loopback 0
ICX-Core-2(config-loopback-if)# ip address 10.1.0.3/32
ICX-Core-2(config-loopback-if)# exit
Changing the OSPF router ID requires the OSPF process to restart. Make sure to con-
firm the restart by answering y.
142 Task 4.1-2: Basic OSPF setup for the core (area 0)
n Question: What does the network LSA represent?
n Answer: A network LSA is representing a multi-access network between two or more
OSPF routers. Since the VLAN 2 Ethernet interface is a broadcast type interface, OSPF will
start the DR/BDR election process by default and the DR will generate the network LSA.
20. Review the current OSPF neighbor list.
ICX-Core-1(config)# show ip ospf neighbors
OSPF Process ID 1 VRF default
==============================
22. Review the configuration changes that were pushed to Core-2 by VSX sync.
ICX-Core-1(config)# show run interface vlan2 vsx-peer
interface vlan2
ip address 10.1.2.3/31
Task 4.1-2: Basic OSPF setup for the core (area 0) 143
ip ospf 1 area 0.0.0.0
ip ospf cost 1
ip ospf network point-to-point
exit
23. On Core-1, review the OSPF LSDB. The network LSA that was previously present for the broad-
cast transit network has now been removed.
ICX-Core-1(config)# show ip ospf lsdb
OSPF Router with ID (10.1.0.2) (Process ID 1 VRF default)
===========================================================
Route verification
24. Verify there is an OSPF route in the routing table for the peer core switch loopback interface
using the show ip route ospf command.
The show ip route command has many filtering options. In real world environments
with many routes, these filter options can help the administrator to reduce the out-
put of the command.
VRF: default
144 Task 4.1-2: Basic OSPF setup for the core (area 0)
25. Verify connectivity between the loopback interfaces with a ping from the local loopback IP
address to the peer switch loopback IP address.
ICX-Core-1(config)# ping 10.1.0.3 source loopback0
PING 10.1.0.3 (10.1.0.3) from 10.1.0.2 : 100(128) bytes of data.
108 bytes from 10.1.0.3: icmp_seq=1 ttl=64 time=0.179 ms
108 bytes from 10.1.0.3: icmp_seq=2 ttl=64 time=0.174 ms
108 bytes from 10.1.0.3: icmp_seq=3 ttl=64 time=0.186 ms
108 bytes from 10.1.0.3: icmp_seq=4 ttl=64 time=0.205 ms
108 bytes from 10.1.0.3: icmp_seq=5 ttl=64 time=0.248 ms
27. Review the OSPF interfaces, noting the state of each interface.
OSPF configuration
Task 4.1-2: Basic OSPF setup for the core (area 0) 145
-----------------------------------------------
146 Task 4.1-2: Basic OSPF setup for the core (area 0)
Task 4.1-3: OSPF address advertisements and control
Lab Diagram
Objectives
n Enable end-host subnet advertisement into OSPF.
n Configure a passive interface.
n Use the passive interface default.
n Review the administrative distance of OSPF.
Steps
Core-1
1. On Core-1, enable the user VLAN 11 for OSPF in area 0.
ICX-Core-1(config)# interface vlan11
ICX-Core-1(config-if-vlan)# ip ospf 1 area 0
ICX-Core-1(config-if-vlan)# exit
2. Review the running configuration of interface VLAN 11 on both the local device and the VSX
peer (Core-2).
ICX-Core-1(config)# show running interface vlan11
interface vlan 11
vsx-sync active-gateways policies
ip address 10.1.11.2/24
active-gateway ip mac 02:02:00:00:01:00
Lab 4.1: OSPF single area—basic
active-gateway ip 10.1.11.1
l3-counters
OSPF configuration
For the VSX OSPF synchronization to work properly, the administrator should use
the same physical uplink interface. For instance, if Core-1 has a routed uplink port
1/1/45, Core-2 should also use interface 1/1/45 as the routed uplink.
5. Verify that only the VLAN 2 transit link is now used for the OSPF peering.
IMPORTANT: This change will impact the current OSPF adjacencies, so it should be
made during a maintenance window in a production network.
9. Verify that the new interfaces, VLAN 1 and 12, are now enabled for OSPF.
Lab 4.1: OSPF single area—basic
10. Review VLAN 11's interface statistics to confirm that no OSPF packets have been transmitted.
ICX-Core-1(config)# show ip ospf statistics interface vlan11 | include Tx
Tx Hello Packets : 0 Rx Hello Packets : 0
Tx Hello Bytes : 0 Rx Hello Bytes : 0
Tx DD Packets : 0 Rx DD Packets : 0
Tx DD Bytes : 0 Rx DD Bytes : 0
Tx LS Request Packets : 0 Rx LS Request Packets : 0
Tx LS Request Bytes : 0 Rx LS Request Bytes : 0
Tx LS Update Packets : 0 Rx LS Update Packets : 0
Tx LS Update Bytes : 0 Rx LS Update Bytes : 0
Tx LS Ack Packets : 0 Rx LS Ack Packets : 0
Tx LS Ack Bytes : 0 Rx LS Ack Bytes : 0
VRF: default
Objectives
n Configure a VSX LAG with OSPF to neighboring routers.
n Understand and configure the VSX active forwarding feature.
Steps
In this task, you will:
n Define a new routed VLAN between access switches and the VSX core.
n Enable OSPF between Access-1 and the VSX core.
The link between Access-2 and the VSX core will be configured in the following lab.
2. For VLAN 101, configure the IP address and enable OSPF on it.
ICX-Core-1(config)# interface vlan 101
ICX-Core-1(config-if-vlan)# description L3-access-1
ICX-Core-1(config-if-vlan)# ip address 10.1.101.2/24
ICX-Core-1(config-if-vlan)# ip ospf 1 area 0
ICX-Core-1(config-if-vlan)# exit
3. VLAN 102 is only prepared with an IP address at this point. It is not enabled for OSPF at this
time, since this will be done in the next lab (4.2).
ICX-Core-1(config)# interface vlan 102
ICX-Core-1(config-if-vlan)# description L3-Access-2
ICX-Core-1(config-if-vlan)# ip address 10.1.102.2/24
ICX-Core-1(config-if-vlan)# exit
Core-2
4. On Core-2, define VLAN 101 and 102 IP addressing (L2 VLAN and OSFP are automatically
enabled via vsx-sync).
Lab 4.1: OSPF single area—basic
Access-1
On Access-1, define the VLAN 101 uplink interface.
5. Access a terminal session on Access-1 and enter configuration mode.
6. Add VLAN 101; define the IP interface.
In the VSX lab activity, LAG 255 was set to allow all VLANs. This is why there is no
step that follows to allow VLAN 101 on the VLAN trunk, since they are automatically
permitted with the existing configuration.
9. Verify OSPF neighbors, where the expectation would be to see Core-1 and Core-2 in the FULL
state.
ICX-Access-1(config)# show ip ospf neighbors
No OSPF neighbor found on VRF default.
n Question: What could be wrong with the configuration?
n Answer: Try to troubleshoot this using these commands on Access-1 and Core-1:
show ip ospf neighbors
show ip ospf interface
show ip ospf statistics interface vlan101
The troubleshooting commands should have shown that there are no receive (Rx) statistics for
the OSPF interface VLAN 101. This is because a passive-interface default was configured on the
VSX core switches, so any new interfaces enabled for OSPF on the VSX core are passive by
Lab 4.1: OSPF single area—basic
default.
OSPF configuration
Core-1
10. On Core-1, enable the new routed VLAN interface for OSPF.
Access-1
11. On Access-1, check the OSPF neighbors again.
ICX-Access-1(config)# show ip ospf neighbors
OSPF Process ID 1 VRF default
==============================
The role (DR/BDR/DROther) may be different in your output, but the state should be
FULL.
Lab diagram
Overview
This lab activity will introduce multiple areas for OSPF. The lab will demonstrate the benefits of using
multiple areas, such as route aggregation and route filtering.
Objectives
n Configure an OSPF Area Border Router (ABR).
n Demonstrate how routes from one area are announced into other areas.
n Explain the need for the backbone area.
n Apply route aggregation and route filtering at the ABR.
Objectives
n Set up an ABR link between Core-1 and Access-1.
n Verify LSA changes.
n Set up ABR link between Core-2 and Access-1.
Steps
On Core-1, define area 1 and assign interface VLAN 101 to area 1. On Access-1, remove area 0 and
define area 1. Assign interface VLAN 101 to area 1. Verify the OSPF adjacency and OSPF operations.
Verify the area 1 setup between Access-1 and Core-2, and verify OSPF operations.
Core-1
1. Open a terminal connection to Core-1 and enter configuration mode.
2. Under the OSPF context, define a new area with an ID of 1.
ICX-Core-1(config)# router ospf 1
ICX-Core-1(config-ospf-1)# area 1
ICX-Core-1(config-ospf-1)# exit
3. Under the VLAN 101 context, assign area 1 for this interface.
ICX-Core-1(config)# interface vlan 101
ICX-Core-1(config-if-vlan)# ip ospf 1 area 1
It may take a minute for the LSDB to update and display the correct information.
Summary does not indicate route summarization. It only indicates that this LSA is not
used for the topology calculation of this area. Only router and network LSAs are used
to build the topology of an area.
You may still notice the Access-1 (10.1.0.4) router LSA in the area 0 LSDB, even
though the link to Access-1 was already assigned to area 1. This is because that
router LSA still needs to age out from the LSDB, so it will disappear automatically
after 3600 seconds.
On Access-1, you will now define some local IP subnets. These subnets simulate client subnets
and will be used to test routing. The Access-1 router will be the only host in these test subnets.
The test subnets for area 1 are assigned in the 10.1.128–191 block, so it will be possible to sum-
marize these in a later task in the lab.
11. Define the test VLANs. Enable them as a VLAN trunk on the port to the client PC. This is only
done to ensure the VLAN is up.
If a VLAN does not contain any port in the up state, the Layer 3 IP interface remains
down as well, and thus OSPF will not advertise its network. As a workaround to bring
these VLANs up, these two VLANs are defined on the port to the PC, which is oper-
ationally up.
13. On Access-1, restart OSPF. This ensures that anything related to OSPF on Core-1 and Core-2 will
be updated correctly.
ICX-Access-1(config)# router ospf 1
ICX-Access-1(config-ospf-1)# disable
ICX-Access-1(config-ospf-1)# enable
ICX-Access-1(config-ospf-1)# exit
14. On Access-1, review the LSDB for area 1, noting the link count for the Router LSA of Access-1.
ICX-Access-1(config)# show ip ospf lsdb area 1
OSPF Router with ID (10.1.0.4) (Process ID 1 VRF default)
===========================================================
Core-1
15. On Core-1, verify that the same information is known in the area 1 LSDB. Core-1 should also
know about the three links of the Access-1 router in the area 1 database.
Remember that an OSPF area LSDB contains the same information on all routers of
that area.
16. The Core-1 area border has converted the routes of this Router LSA from area 1 to summary
routes into area 0. Verify this by reviewing the area 0 database.
ICX-Core-1(config)# show ip ospf lsdb area 0
OSPF Router with ID (10.1.0.2) (Process ID 1 VRF default)
===========================================================
The Core-2 ABR has performed the same action, which is why the 10.1.128.0 and
10.1.129.0 summary LSAs are listed two times.
17. On Core-1, review learned OSPF routes and notice the OSPF route code.
ICX-Core-1(config)# show ip ospf routes
Codes: i - Intra-area route, I - Inter-area route
E1 - External type-1, E2 - External type-2
VRF: default
This concludes the introduction of OSPF area 1 in the lab. Proceed to the next task.
Objectives
n Configure Access-2 in its own area: Area 2.
n Review LSA propagation once Area 2 has been defined.
n Configure the ABR link.
n Verify how the LSA changes when traversing through Area 2, to Area 0, then to Area 1.
Steps
Core-1
1. On Core-1, define Area 2, assigning interface VLAN 102 to Area 2.
ICX-Core-1(config)# router ospf 1
ICX-Core-1(config-ospf-1)# area 2
ICX-Core-1(config-ospf-1)# exit
Access-2
2. Open a terminal connection to Access-2 and enter configuration mode.
3. On Access-2, enable OSPF with the Access-2 router ID and define Area 2.
ICX-Access-2(config)# router ospf 1
ICX-Access-2(config-ospf-1)# router-id 10.1.0.5
4. On Access-2, define VLAN 102 and verify the switch can reach both core switches.
In the VSX lab activity, LAG 255 was set to allow all VLANs. This is why there is no
step to allow VLAN 102 on the VLAN trunk.
8. On Access-2, restart OSPF. This ensures that anything related to OSPF on Core-1 and Core-2 will
be updated correctly.
ICX-Access-2(config)# router ospf 1
ICX-Access-2(config-ospf-1)# disable
ICX-Access-2(config-ospf-1)# enable
ICX-Access-2(config-ospf-1)# exit
9. Verify the OSPF adjacencies have been established with Core-1 and Core-2.
ICX-Access-2(config)# show ip ospf neighbors
OSPF Process ID 1 VRF default
==============================
Verify route propagation and LSA changes from Area 2 to Area 0 to Area 1
In the next steps, the route propagation between the areas will be reviewed. For this example,
route 10.1.192.0/24 will be used. This is the test subnet that was defined on Access-2 in Area 2.
In previous steps, the show ip ospf lsdb command was used to review the LSAs in the LSDB. In
the next steps, the show ip ospf routes command will be used. This command shows the actual
routes that have been calculated by OSPF for both intra-area (router and network LSA) and
inter-area LSAs (summary LSA).
Access-2
10. On Access-2, verify the 10.1.192.0/24 route is known as an intra-area route.
The lowercase "i" is used for intra-area, while the uppercase "I" is used for inter-area.
10.1.0.2/32 (I)
via 10.1.102.2 interface vlan102, cost 100 distance 110
10.1.0.3/32 (I)
via 10.1.102.3 interface vlan102, cost 100 distance 110
10.1.1.0/24 (I)
via 10.1.102.2 interface vlan102, cost 200 distance 110
10.1.1.0/24 (I)
via 10.1.102.3 interface vlan102, cost 200 distance 110
10.1.2.2/31 (I)
via 10.1.102.2 interface vlan102, cost 101 distance 110
10.1.2.2/31 (I)
via 10.1.102.3 interface vlan102, cost 101 distance 110
10.1.11.0/24 (I)
via 10.1.102.2 interface vlan102, cost 200 distance 110
10.1.11.0/24 (I)
via 10.1.102.3 interface vlan102, cost 200 distance 110
10.1.12.0/24 (I)
via 10.1.102.2 interface vlan102, cost 200 distance 110
10.1.12.0/24 (I)
via 10.1.102.3 interface vlan102, cost 200 distance 110
10.1.101.0/24 (I)
via 10.1.102.2 interface vlan102, cost 200 distance 110
10.1.101.0/24 (I)
via 10.1.102.3 interface vlan102, cost 200 distance 110
10.1.102.0/24 (i) area: 0.0.0.2
directly attached to interface vlan102, cost 100 distance 110
10.1.128.0/24 (I)
via 10.1.102.2 interface vlan102, cost 300 distance 110
10.1.128.0/24 (I)
via 10.1.102.3 interface vlan102, cost 300 distance 110
10.1.129.0/24 (I)
via 10.1.102.2 interface vlan102, cost 300 distance 110
10.1.129.0/24 (I)
via 10.1.102.3 interface vlan102, cost 300 distance 110
10.1.192.0/24 (i) area: 0.0.0.2
directly attached to interface vlan192, cost 100 distance 110
10.1.193.0/24 (i) area: 0.0.0.2
directly attached to interface vlan193, cost 100 distance 110
Core-1
11. On Core-1, review the OSPF routing table and look for the 10.1.192.0/24 subnet.
ICX-Core-1(config)# show ip ospf routes
Codes: i - Intra-area route, I - Inter-area route
E1 - External type-1, E2 - External type-2
15. Review the OSPF routes. The route to 10.1.192.0/24 should be listed as an inter-area route.
ICX-Access-1(config)# show ip ospf routes 10.1.192.0/24
Codes: i - Intra-area route, I - Inter-area route
E1 - External type-1, E2 - External type-2
10.1.192.0/24 (I)
via 10.1.101.2 interface vlan101, cost 300 distance 110
10.1.192.0/24 (I)
via 10.1.101.3 interface vlan101, cost 300 distance 110
An ABR will only exchange information between an area and the backbone (0.0.0.0)
area LSDB databases. It will never exchange information directly between two non-
backbone areas—for example, between Area 1 and Area 2 LSDBs directly.
Objectives
n Implement route summarization between the areas.
Steps
To complete this task, you will:
n Summarize routes injected by Area 1 into Area 0 on Core-1.
n Verify the summarization in Area 2; verify the LSA type and cost.
n Summarize Area 2 test subnets.
Summarize the Area 1 test subnets
In Area 1, the test subnets 10.1.128.0/24 and 10.1.129.0/24 can be summarized into a 10.1.128.0/18
prefix on an Area 1 ABR.
IMPORTANT: The route aggregation must be performed on every ABR that is con-
nected to this area to be effective. An ABR that does not have the aggregation route
will still be announcing the more specific routes into the area.
As a result, all traffic to these subnets will go via the most specific match, meaning
the ABR that does not have the aggregate route configured.
In this lab environment, the VSX configuration synchronization is also synchronizing
the OSPF commands, where the area range command is automatically set on the
Core-2 ABR.
4. And since Area 0 only contains the summarized entry, the Area 2 LSDB will also reflect this.
Review summary LSAs in the LSDB for Area 2.
ICX-Core-1(config)# show ip ospf lsdb summary area 2
OSPF Router with ID (10.1.0.2) (Process ID 1 VRF default)
===========================================================
Access-2
5. Access-2 is an OSPF router that only belongs to Area 2. Review the LSDB. Since all the databases
for an area must be the same on all the routers of an area, this Area 2 LSDB will also contain the
summarized summary LSA.
ICX-Access-2(config)# show ip ospf lsdb summary area 2
OSPF Router with ID (10.1.0.5) (Process ID 1 VRF default)
===========================================================
6. Verify the OSPF routing table. It should only contain the summarized entry 10.1.128.0/18, so
the 10.1.128.0/24 and 10.1.129.0/24 subnets should not appear anymore.
ICX-Access-2(config)# show ip ospf routes
Codes: i - Intra-area route, I - Inter-area route
E1 - External type-1, E2 - External type-2
10.1.0.2/32 (I)
via 10.1.102.2 interface vlan102, cost 100 distance 110
VRF: default
8. Therefore, if any traffic were to arrive for the non-existing 10.1.130.0/24 subnet, it would be
rejected since it only matches the reject route.
ICX-Core-1(config)# show ip route 10.1.130.0
VRF: default
While this reject route is listed as a static route, it will not be visible in the running
configuration. OSFP summarized route entries are automatically added to the oper-
ational routing table as a static route with the reject option.
9. Now, attempt to summarize the Area 2 test subnets 10.1.192.0/24 and 10.1.193.0/24 into a
10.1.192.0/18 summary route. Try to apply the commands yourself. If you are not sure, the com-
mands can be found in the next steps.
Access-1
10. Verify on Access-1 (Area 1) that only the summary route is listed (and not the specific routes for
Area 2).
ICX-Access-1(config)# show ip route 10.1.192.0
VRF: default
Solution
11. On Core-1:
Objectives
n Verify an OSPF LSA update propagates over the entire autonomous system (AS) by default.
n Verify LSA propagation can be controlled using summarization.
Steps
Default LSA propagation
In the lab setup, the loopback 0 interface of Access-2 will be disabled. Since this interface has IP
address 10.1.0.5/32, and this does not match the summarization rule, the LSA change will propagate
across the entire AS.
These are the high-level steps:
n Check the OSPF SPF count on Access-1.
n On Access-2, disable the loopback interface to simulate a route change.
n On Access-1, examine the SPF count again; it should have increased since the LSA is propagated
across the entire AS.
Access-1
1. On Access-1, review the OSPF SPF count and routing table.
In each lab, the number of calculations may be different; the following output is just
an example.
area : 0.0.0.1
----------------
area Type : Normal Status : Active
Total Interfaces : 3 Active Interfaces : 3
Passive Interfaces : 0 Loopback Interfaces : 0
SPF Calculation Count : 39
area ranges :
Number of LSAs : 22 Checksum Sum : 737320
Access-2
3. On Access-2, disable the loopback 0 interface for OSPF.
ICX-Access-2(config)# interface loopback 0
ICX-Access-2(config-loopback-if)# ip ospf shutdown
Access-1
4. On Access-1, review the SPF count and the LSDB database summary.
ICX-Access-1(config)# show ip ospf | include SPF
RouterID : 10.1.0.4 OSPFv2 : Enabled
BFD : Disabled SPF Start Interval : 200 ms
SPF Hold Interval : 1000 ms SPF Max Wait Interval : 5000 ms
SPF Calculation Count : 41
<output omitted>
Access-2
5. On Access-2, enable the loopback 0 interface for OSPF again.
ICX-Access-2(config-loopback-if)# no ip ospf shutdown
ICX-Access-2(config-loopback-if)# exit
ICX-Access-2(config)#
This demonstrates that LSA updates are propagated over the entire AS by default.
Verify that LSA propagation can be controlled using summarization
Now, an interface that was summarized will be disabled. This should have no impact on the LSDB
and the SPF count in the other areas. For this example, on Access-2, the interface VLAN 192 will
be disabled. Again, verify the SPF count on Access-1 first, then make the change on Access-2,
and verify the count again on Access-1.
Access-2
7. On Access-2, disable the VLAN 192 interface. This interface was summarized using the
10.1.192.0/18 range command.
ICX-Access-2(config)# interface vlan 192
ICX-Access-2(config-if-vlan)# shutdown
Access-1
8. On Access-1, verify the SPF count has not increased.
ICX-Access-1(config)# show ip ospf | include SPF
RouterID : 10.1.0.4 OSPFv2 : Enabled
BFD : Disabled SPF Start Interval : 200 ms
SPF Hold Interval : 1000 ms SPF Max Wait Interval : 5000 ms
SPF Calculation Count : 42
Objectives
n Explain ABR route filtering.
n Configure ABR route filtering.
Steps
Here is a brief summary of what you will be doing in this task:
n Introduce a new subnet on Access-2 and assign it to Area 2.
n On the ABR, filter the route in the OSPF Area 2 LSDB.
n Verify the result on Access-1, a route in Area 1.
Access-2
1. On Access-2, introduce a new route by adding a secondary IP address on the VLAN 192 inter-
face.
ICX-Access-2(config)# interface vlan 192
ICX-Access-2(config-if-vlan)# ip address 10.1.99.1/24 secondary
Access-1
2. On Access-1, verify the route is visible in the routing table, since no filtering has been applied
yet.
ICX-Access-1(config)# show ip route 10.1.99.0
Core-1
3. On Core-1, review that the 10.1.99.0 summary LSA exists in the Area 0 database.
ICX-Core-1(config)# show ip ospf lsdb summary area 0 | include 99.0
10.1.99.0 10.1.0.2 10 0x80000001 0x0000382f
10.1.99.0 10.1.0.3 9 0x80000001 0x00003234
4. Apply the filter for Area 2 so the 10.1.99.0/24 subnet is not announced anymore.
ICX-Core-1(config)# router ospf 1
ICX-Core-1(config-ospf-1)# area 2 range 10.1.99.0/24 type inter-area no-advertise
ICX-Core-1(config-ospf-1)# exit
5. Verify that the 10.1.99.0/24 summary route is no longer listed in the Area 0 database.
ICX-Core-1(config)# show ip ospf lsdb summary area 0 | include 99.0
ICX-Core-1(config)#
Access-1
7. Verify the result on Access-1.
ICX-Access-1(config)# show ip route 10.1.99.0
Lab diagram
Overview
This lab activity will demonstrate how OSPF can be used to distribute routes to external networks to
other OSPF routers in the OSPF AS. The router that is performing this redistribution is referred to as
the Autonomous System Boundary Router (ASBR). This will be demonstrated using Core-1 in the back-
bone and Access-2 in Area 2.
Once the external routes have been exchanged, the lab will show how a route map can be used to con-
trol the cost and the list of routes that can be redistributed.
The last section of the lab will show how area types can be used to optimize which external and OSPF
routes will be announced into an area.
Objectives
n Learn how to configure an ASBR to redistribute routes.
n Configure a route map to control external cost types, such as metric type 1 and type 2.
Steps
Verify the routed connection from Core-1 (interface 1/1/7) to Router-A.
Core-1
1. On Core-1, enter configuration mode.
2. Review the configuration of interface 1/1/7. This was configured during the VSX lab activity.
The IP scheme for the upstream routers is local for each table, so there is no "x" mark-
ing in these IP addresses.
4. Define a static route to the remote subnet (loopback on Router-A). This represents a business
partner network outside of this organization's OSPF AS.
ICX-Core-1(config)# ip route 198.18.11.0/24 10.255.101.11
5. Test with a ping to 198.18.11.1; this IP is hosted by Router-A using a loopback interface.
ICX-Core-1(config)# ping 198.18.11.1
PING 198.18.11.1 (198.18.11.1) 100(128) bytes of data.
108 bytes from 198.18.11.1: icmp_seq=1 ttl=64 time=2.20 ms
<output omitted>
routes
Type Metric
----------------------------------------------------------------------------------------
10.1.128.0/18 - reject - S [110/0] 18h:41m:38s
10.1.192.0/18 - reject - S [110/0] 18h:30m:24s
10.254.1.0/24 10.255.101.11 1/1/7 - S [1/0] 03d:17h:55m
198.18.11.0/24 10.255.101.11 1/1/7 - S [1/0] 00h:02m:43s
At this point, Core-1 can reach the external network, but the rest of the OSPF AS cannot reach
this 198.18.11.0/24 network. This will be solved with route redistribution in the next task.
Objectives
In this task, the static route that was installed on the Core-1 router will now be distributed to the other
routers using OSPF route redistribution. The router that is inserting external routes into OSPF is known
as the ASBR. The ASBR can be a router in the backbone area or a router in another area. Other area
Steps
n Redistribute static routes into OSPF.
n Verify the OSPF LSA type 5 in the backbone and other areas.
Core-1
1. Open a terminal session to Core-1 and enter configuration mode.
2. Review the current OSPF database summary. There are currently no external routes in the data-
base (the bottom of the output).
ICX-Core-1(config)# show ip ospf lsdb database-summary
<output omitted>
3. Enter the OSPF router context and enable route redistribution of the static routes. This will
instruct the OSPF process to look into the local routing table for routes that match the redis-
tribution condition; in this case, the condition is static routes.
ICX-Core-1(config)# router ospf 1
ICX-Core-1(config-ospf-1)# redistribute static
ICX-Core-1(config-ospf-1)# exit
4. Verify in the LSDB that a new record was created for this external route.
ICX-Core-1(config)# show ip ospf lsdb database-summary
<output omitted>
routes
ICX-Core-1(config)# show ip ospf lsdb external
OSPF Router with ID (10.1.0.2) (Process ID 1 VRF default)
===========================================================
The 10.254.1.0/24 static route was added during the VSX lab on both Core-1 and
Core-2. It provides access to the ClearPass server subnet. Due to the VSX OSPF sync,
Core-2 is now also redistributing its static route to the 10.254.1.0/24 subnet. These
routes can be ignored in this lab.
Core-2
5. Now, check the LSDB on Core-2 and Access-2. Access-2 is connected via Core-2 to Core-1.
Review that the external route has arrived in the LSDB.
ICX-Core-2(config)# show ip ospf lsdb external
OSPF Router with ID (10.1.0.3) (Process ID 1 VRF default)
===========================================================
6. From Core-1, this route is a static route in the routing table. However, now review the IP routing
table on Access-2.
ICX-Access-2(config)# show ip route 198.18.11.0/24
VRF: default
This demonstrates how OSPF can be used to distribute routes in the OSPF AS that were not ori-
ginated by the OSPF routers themselves.
Older AOS-CX versions of code used the blackhole parameter instead of nullroute.
The current version of AOS-CX code has deprecated the blackhole parameter.
9. Define a new loopback interface; this can be used to test access to the 198.18.14.0/24 subnet.
ICX-Access-2(config)# interface loopback 198
ICX-Access-2(config-loopback-if)# ip address 198.18.14.1/32
ICX-Access-2(config-loopback-if)# exit
Core-1
11. Verify in the backbone area that the external route is available.
ICX-Core-1(config)# show ip ospf routes 198.18.14.0/24
Codes: i - Intra-area route, I - Inter-area route
E1 - External type-1, E2 - External type-2
198.18.14.0/24 (E2)
via 10.1.102.5 interface vlan102, cost 25 distance 110
Access-1
Verify in OSPF area 1 that the new external route is available.
12. On Access-1, check the IP routing table for the 198.18.14.0 subnet.
ICX-Access-1(config)# show ip ospf routes 198.18.14.0/24
Codes: i - Intra-area route, I - Inter-area route
E1 - External type-1, E2 - External type-2
198.18.14.0/24 (E2)
via 10.1.101.2 interface vlan101, cost 25 distance 110
198.18.14.0/24 (E2)
via 10.1.101.3 interface vlan101, cost 25 distance 110
n Question: Why are there two paths available for this route?
n Answer: OSPF calculates the best path to reach the ASBR. In this case, there are two equal
cost paths to reach the ASBR (Access-2), so both paths are entered in the routing table.
13. Perform a traceroute to the test IP in the 198.18.14.0/24 subnet. The path should use either
Core-1 or Core-2 to reach the Access-2 router.
ICX-Access-1# traceroute 198.18.14.1
traceroute to 198.18.14.1 (198.18.14.1), 1 hops min, 30 hops max, 3 sec. timeout, 3
probes
1 10.1.101.2 0.202ms 0.099ms 0.504ms
2 198.18.14.1 0.188ms 0.101ms 0.099ms
ICX-Access-1#
routes
tributing ASBR. This is convenient to force the entire network to use a specific ASBR to reach a specific
external network, instead of the closest ASBR. This applies to scenarios where the traffic to the
external network must pass through a firewall (the customer wants to avoid an asynchronous routing
scenario that could cause problems for the traffic).
Route maps
The configuration of the route metric types is done through a route policy (route map). Route policies
can also be used to filter routes that should not be redistributed.
Objectives
n Review the default cost and metric type of OSPF external routes.
n Add a static route on Core-1 that should not be redistributed using OSPF.
n Define a route policy on Core-1 to set the OSPF metric type 2 (E2) and set the initial cost to 100.
Steps
Core-1
1. On Core-1, add a dummy static route. In the current configuration, every static route will be redis-
tributed by OSPF. This route will be filtered by the route policy in the upcoming step.
ICX-Core-1(config)# ip route 198.18.12.0/24 nullroute
routes
198.18.11.0/24 (E2)
via 10.1.102.2 interface vlan102, cost 25 distance 110
198.18.12.0/24 (E2)
via 10.1.102.2 interface vlan102, cost 25 distance 110
n Question: What is the default cost for the external route?
n Answer: The default cost is 25.
Now, a route map will be created on Core-1 to change the external route to metric type E1 for
the 198.18.11.0/24 prefix. This route map will be configured to also prevent route
198.18.12.0/24 from being redistributed.
routes
ICX-Core-1(config-ospf-1)# exit
Access-2
9. Verify the result on the Access-2 router. The 198.18.11.0/24 route should now be listed as E1,
and the cost will reflect the path to reach Core-1 (100) plus the initial cost (25 by default, if not
specified during the redistribution or in the respective route map entry).
ICX-Access-2# show ip ospf routes 198.18.11.0/24
Codes: i - Intra-area route, I - Inter-area route
E1 - External type-1, E2 - External type-2
198.18.11.0/24 (E1)
via 10.1.102.2 interface vlan102, cost 125 distance 110
10. The route to 198.18.12.0/24 should have been removed as well since it does not match the route
policy.
ICX-Access-2# show ip ospf routes 198.18.12.0/24
Codes: i - Intra-area route, I - Inter-area route
E1 - External type-1, E2 - External type-2
Core-1
11. Return to Core-1 and modify the route policy so the initial cost is now 1000.
ICX-Core-1(config)# route-map ospf_from_static permit seq 10
ICX-Core-1(config-route-map-ospf_from_static-10)# set metric 1000
ICX-Core-1(config-route-map-ospf_from_static-10)# exit
198.18.11.0/24 (E1)
via 10.1.102.2 interface vlan102, cost 1100 distance 110
This demonstrates how a route policy can be used to control external routes.
Task 4.3-4: Filter routes with stub and totally stub areas
In this task, the stub and totally stubby (sometimes referred to as a "no-summary" stub) area types will
be configured.
The stub area feature must be configured on every router in the area, including the ABRs.
200 Task 4.3-4: Filter routes with stub and totally stub areas
Stub no-summary
Besides the stub area feature, an administrator can configure the area to be a stub no-summary area.
Since the routers inside the stub area already have the default route 0.0.0.0/0, this default route could
also be used to aggregate all the OSPF inter-area routes (OSPF LSA type 3 summary routes). This
results in the name stub no-summary. This feature is also known as a "totally stubby area".
routes
n Configure and verify a stub area.
n Configure and verify a totally stubby area.
Steps
Diagram: make area 1 an OSPF stub area
Access-1
Review that Access-1 in area 1 sees all the external routes.
1. On Access-1, check the IP routing table. Notice that there is no default route needed at this
point, since all external routes are actually known to the router. Therefore, there is no 0.0.0.0/0
entry at this moment.
ICX-Access-1# show ip route 0.0.0.0
Task 4.3-4: Filter routes with stub and totally stub areas 201
Core-1
2. Make area 1 a stub area. This will summarize all the external routes into the default route
0.0.0.0/0. This action (injecting the default route) is done at the ABR and should be done on each
ABR. In this lab setup, Core-1 and Core-2 are part of a VSX setup, so making area 1 a stub area
on Core-1 will automatically be synchronized to Core-2 due to the VSX OSPF synchronization.
3. Open Core-1 and make area 1 a stub under the OSPF context.
ICX-Core-1(config)# router ospf 1
ICX-Core-1(config-ospf-1)# area 1 stub
4. Verify, using the vsx-peer command, that Core-2 also has area 1 set as stub.
ICX-Core-1(config-ospf-1)# show run ospf vsx-peer
router ospf 1
router-id 10.1.0.3
passive-interface default
redistribute static route-map ospf_from_static
area 0.0.0.0
area 0.0.0.1 stub
area 0.0.0.1 range 10.1.128.0/18 type inter-area
area 0.0.0.2
area 0.0.0.2 range 10.1.99.0/24 type inter-area no-advertise
area 0.0.0.2 range 10.1.192.0/18 type inter-area
interface loopback 0
ip ospf 1 area 0.0.0.0
interface vlan1
ip ospf 1 area 0.0.0.0
<output omitted>
ICX-Core-1(config-ospf-1)# exit
Access-1
5. On the Access-1 router (router inside area 1), examine the IP routing table for OSPF routes.
ICX-Access-1# show ip route ospf
202 Task 4.3-4: Filter routes with stub and totally stub areas
6. Check the OSPF interface statistics. There should be dropped hello packets due to Options mis-
match.
ICX-Access-1# show ip ospf statistics interface vlan101
<output omitted>
routes
Bad or unknown source 8
Area mismatch 0
Self-originated 0
Duplicate router ID 0
Interface standby 0
Total Hello packets dropped 62
Network Mask mismatch 0
Hello interval mismatch 0
Dead interval mismatch 0
Options mismatch 62
MTU mismatch 0
<output omitted>
7. View the OSPF neighbor table. Core-1 and Core-2 should no longer be listed as neighbors.
ICX-Access-1(config)# show ip ospf neighbors
No OSPF neighbor found on VRF default.
10. Review the routing table. The external routes should have been replaced with a default route by
the ABR.
Task 4.3-4: Filter routes with stub and totally stub areas 203
It may take a few moments for the OSPF adjacencies to re-establish. Within about 30
seconds, the OSPF routes should appear.
VRF: default
VRF: default
204 Task 4.3-4: Filter routes with stub and totally stub areas
Core-1
12. On Core-1, review the routing table, looking for the default route 0.0.0.0/0.
ICX-Core-1(config)# show ip route 0.0.0.0
routes
routes with the default route.
The stub feature in area 1 is summarizing all the external routes for this area into the default
route, while it still sees all the detailed OSPF inter-area routes. It is also possible to summarize all
the OSPF inter-area routes into this default route, so all the OSPF summary LSAs (type 3) will be
removed as well. Since the OSPF summary LSA is suppressed by this action, this feature is known
as "stub no-summary".
Access-1
13. First, verify on Access-1 that the OSPF inter-area routes are still visible. Review the IP routing
table, looking for OSPF routes.
ICX-Access-1(config)# show ip route ospf
Task 4.3-4: Filter routes with stub and totally stub areas 205
IA - OSPF internal area, E1 - OSPF external type 1
E2 - OSPF external type 2
Flags: F - FIB-optimized route
VRF: default
Core-1
14. Now make the area a stub no-summary area. This must only be done on the ABR, since that is
the router that will filter the routes. On Core-1, change area 1 to no-summary. This change
should be made on every ABR, but due to the VSX synchronization, this is automatically pushed
to Core-2.
ICX-Core-1(config)# router ospf 1
ICX-Core-1(config-ospf-1)# area 1 stub no-summary
ICX-Core-1(config-ospf-1)# exit
Access-1
15. On Access-1, verify the impact on the routing table. All OSPF external and inter-area routes have
been replaced with the default route.
ICX-Access-1(config)# show ip route ospf
206 Task 4.3-4: Filter routes with stub and totally stub areas
VRF: default
routes
ICX-Access-1(config)# show ip ospf lsdb summary
OSPF Router with ID (10.1.0.4) (Process ID 1 VRF default)
==========================================================
18. Verify Access-1 can still reach the loopback IP on Access-2 (an inter-area route).
ICX-Access-1(config)# ping 10.1.0.5
PING 10.1.0.5 (10.1.0.5) 100(128) bytes of data.
108 bytes from 10.1.0.5: icmp_seq=1 ttl=63 time=0.180 ms
<output omitted>
Task 4.3-4: Filter routes with stub and totally stub areas 207
This demonstrates how Access-1's routing table can benefit from the summarization (smaller
OSPF LSDB and IP routing tables) while Access-1 still maintains full connectivity to the rest of
the network.
Lab diagram
Objectives
n Configure and verify an NSSA area.
Steps
Verify the problem
Access-1
1. On Access-1, introduce a new external network. Since there is no real external network in this lab,
it will be simulated using a nullroute static route and a local loopback interface. This is similar to
the setup on Access-2.
ICX-Access-1(config)# ip route 198.18.13.0/24 nullroute
ICX-Access-1(config)# interface loopback 198
ICX-Access-1(config-loopback-if)# ip address 198.18.13.1/32
ICX-Access-1(config-loopback-if)# exit
routes
LSID ADV Router Age Seq# Checksum Link Count
-------------------------------------------------------------------------------
10.1.0.2 10.1.0.2 166 0x80000006 0x00008a35 1
10.1.0.3 10.1.0.3 2 0x80000009 0x00008237 1
10.1.0.4 10.1.0.4 1 0x8000000d 0x00005943 3
ICX-Access-1(config)#
Remember that Access-1 also has a static route for 10.254.1.0/24 that you con-
figured during Lab 2 on VSX; for this lab, you can ignore this route. However, in a pro-
duction network, you should use an IP prefix list and remote map and only inject the
routes that are necessary.
7. Notice that the NSSA external (LSA type 7) and regular external (LSA type 5) are shown sep-
arately in the LSDB.
ICX-Access-1(config)# show ip ospf lsdb external
No OSPF LSAs found on VRF default.
routes
Core-1
8. On Core-1, change area 1 to an NSSA area type. VSX will synchronize this to Core-2 auto-
matically.
ICX-Core-1(config)# router ospf 1
ICX-Core-1(config-ospf-1)# area 1 nssa
ICX-Core-1(config-ospf-1)# exit
10. Verify that NSSA external LSAs are now appearing in the LSDB of area 1.
ICX-T12-Core-1(config)# show ip ospf lsdb nssa-external area 1
OSPF Router with ID (10.1.0.2) (Process ID 1 VRF default)
===========================================================
Access-2
11. Verify the routes in another area, like area 2. Now switch to Access-2 and verify the routing
table. The route to 198.18.13.0 should now be available.
ICX-Access-2(config)# show ip route 198.18.13.0
VRF: default
This demonstrates how Area 1 still benefits from the route summarization of the stub area fea-
ture, while at the same time it can announce a route to an external network.
12. Review the OSPF LSDB of area 2, looking for the external and nssa-external entries in the
LSDB.
ICX-Access-2# show ip ospf lsdb nssa-external
No OSPF LSAs found on VRF default.
routes
ICX-Core-1(config-ospf-1)# no area 1 nssa
ICX-Core-1(config-ospf-1)# exit
Access-1
14. On Access-1, repeat this step.
ICX-Access-1(config)# router ospf 1
ICX-Access-1(config-ospf-1)# no area 1 nssa
It may take a few moments for the OSPF adjacencies to re-establish. Repeat the com-
mand until the FULL state is shown.
17. Verify that external routes are available again; check, for example, the OSPF route to the
198.18.11.0/24 network.
ICX-Access-1(config)# show ip route 198.18.11.0
VRF: default
Access-2
18. On Access-2, remove the static route redistribution from OSPF.
ICX-Access-2(config)# router ospf 1
ICX-Access-2(config-ospf-1)# no redistribute static
ICX-Access-2(config-ospf-1)# exit
IMPORTANT: This configuration will be the base configuration used in some later labs, so a
checkpoint MUST be created to complete the rest of the course lab activities. This is crit-
ical, so do not skip this step!
214 Task 4.3-6: Save configuration checkpoints for the upcoming labs
Verify the checkpoint creation
5. On all four switches, verify that the checkpoint exists in the checkpoint list.
ICX-switch1-4# show checkpoint | include ospf
icx-lab043-ospf latest User 2024-05-10T17:42:35Z FL.10.13.1000
Task 4.3-6: Save configuration checkpoints for the upcoming labs 215
[This page intentionally left blank]
216 Task 4.3-6: Save configuration checkpoints for the upcoming labs
Lab 5: Basic BGP peering
Lab diagram
Overview
In this lab activity, basic BGP peering will be demonstrated. As you can see in the previous diagram,
there are four autonomous systems. Router-B and Router-C have the correct configuration on them for
BGP. On Router-A, you will have to load a pre-configured BGP checkpoint to load its BGP configuration.
Each of these three BGP routers represents their own AS.
The four physical switches represent AS 64500. The two core switches will be configured to use iBGP
between each other. They will use eBGP to communicate with two different ISPs, one connected to each
core switch. Once the BGP peering has been established, a route advertisement will be configured. The
core switches will also be configured with a route policy so they do not become a transit AS for traffic
between the service providers.
Objectives
n Set up eBGP and iBGP peering.
n Advertise routes using BGP.
n Configure a route policy to control BGP routing updates.
Steps
Access-1
1. Open a console connection to Access-1. Log in using admin/aruba123.
ICX-Access-1# copy checkpoint icx-lab043-ospf running-config
Configuration changes will take time to process, please be patient.
ICX-Access-1#
Access-2
2. Open a console connection to Access-2. Log in using admin/aruba123.
ICX-Access-2# copy checkpoint icx-lab043-ospf running-config
Configuration changes will take time to process, please be patient.
ICX-Access-2#
Core-1
3. Open a console connection to Core-1. Log in using admin/aruba123.
ICX-Core-1# copy checkpoint icx-lab043-ospf running-config
Configuration changes will take time to process, please be patient.
ICX-Core-1#
Core-2
4. Open a console connection to Core-2. Log in using admin/aruba123.
ICX-Core-2# copy checkpoint icx-lab043-ospf running-config
Configuration changes will take time to process, please be patient.
ICX-Core-2#
Steps
Core-1
1. Open a terminal connection to Core-1 and enter configuration mode.
5. Enter the IPv4 address family and enable the peer Router-A for IPv4.
ICX-Core-1(config-bgp)# address-family ipv4 unicast
ICX-Core-1(config-bgp-ipv4-uc)# neighbor 10.255.101.11 activate
ICX-Core-1(config-bgp-ipv4-uc)# exit
ICX-Core-1(config-bgp)# exit
6. Verify the status of the BGP session; it should be established. The state may be Idle initially.
n Question: What are the default keepalive and hold-down times for BGP sessions?
n Answer: By default, they are 60 and 180 seconds, respectively.
Verify the impact of the default BGP keepalive interval (default of 60 seconds)
7. On Core-1, disable the interface that connects to Router-A.
ICX-Core-1(config)# interface 1/1/7
ICX-Core-1(config-if)# shutdown
ICX-Core-1(config-if)# exit
This demonstrates that, by default, it can take several minutes before BGP detects that a peer is
not reachable on a non-direct connection link. In the next section, a BFD solution will be con-
figured to speed up BGP convergence.
11. Enable the interface to Router-A again.
ICX-Core-1(config)# interface 1/1/7
ICX-Core-1(config-if)# no shutdown
ICX-Core-1(config-if)# exit
n Question: Has a BFD session been established to Router-A, and what would be the
reason?
Router-A
16. Access Router-A and globally enable BFD.
ICX-RouterA(config)# bfd
Core-1
17. Access Core-1. Review the state of BFD. The state will transition from admin_down > down >
init > up.
ICX-Core-1(config)# show bfd session 1
19. Check the BGP neighbor state. Within a few seconds, the state should transition to Idle.
This demonstrates how BFD can help with a faster detection of the peer reachability.
For eBGP peers, the switch can also monitor if the link used to reach a directly adja-
cent peer goes down and then reset the BGP session immediately.
This can be enabled under the router bgp context using the bgp fast-external-
fallover command.
n Question: Route 192.0.2.0/24 has AS path 64511. What does this mean?
n Answer: Since the neighbor 10.255.101.11 belongs to AS 64511, this means that route
192.0.2.0/24 is originated by this neighbor AS.
n Question: Which AS originates the route 198.19.102.0/24?
n Answer: The last AS in the AS path indicates the originating AS, so this route is originated
by AS 64513; it traverses AS 64512 and then AS 64511.
n Question: Both 198.19.101.0/24 and 198.19.102.0/24 originate from AS 64513. Why are
they using a different path (different AS path)?
n Answer: BGP allows the administrator to control the routing paths. In this case, appar-
ently, some route policy was defined on Routers A, B, or C so that 198.19.101.0/24 and
198.19.102.0/24 are taking a different path to reach their destination. You only see the
result of that policy here.
Steps
Set up iBGP peering between Core-1 and Core-2
Core-1
1. On Core-1, add a new neighbor for Core-2. Use the same AS, so BGP knows this is iBGP.
ICX-Core-1(config)# router bgp 64500
ICX-Core-1(config-bgp)# neighbor 10.1.0.3 remote-as 64500
2. For iBGP, the peering is typically configured between the loopback IP addresses of the routers
instead of the outgoing interface IP address. Configure the loopback IP address as the source IP
Core-2
4. Switch to Core-2, enter the configuration mode if needed, review the current configuration, and
look for the BGP section.
ICX-Core-2(config)# show run bgp
router bgp 64500
neighbor 10.1.0.3 remote-as 64500
neighbor 10.255.101.11 remote-as 64511
neighbor 10.255.101.11 fall-over bfd
address-family ipv4 unicast
neighbor 10.1.0.3 activate
neighbor 10.255.101.11 activate
exit-address-family
!
In case only minor differences are needed, it is possible to exclude the neighbor con-
figuration synchronization at the neighbor level in the BGP configuration. An
example would be:
example(config)# router bgp 64500
example(config-bgp)# neighbor 10.1.1.1 vsx-sync-exclude
You do not need to apply this command in the lab because the entire BGP syn-
chronization will be disabled.
Core-1
5. On Core-1, disable the VSX synchronization of the BGP feature.
ICX-Core-1(config)# vsx
ICX-Core-1(config-vsx)# no vsx-sync bgp
ICX-Core-1(config-vsx)# exit
Core-2
6. On Core-2, verify the BGP configuration.
ICX-Core-2(config)# show run bgp
router bgp 64500
neighbor 10.1.0.3 remote-as 64500
neighbor 10.255.101.11 remote-as 64511
neighbor 10.255.101.11 fall-over bfd
address-family ipv4 unicast
neighbor 10.1.0.3 activate
neighbor 10.255.101.11 activate
exit-address-family
n Question: Is the BGP configuration still in the running configuration?
n Answer: Yes, it is still there. Only the VSX synchronization was stopped. Now the admin-
istrator can make local changes to Core-2.
7. To clean up, remove the BGP configuration.
ICX-Core-2(config)# no router bgp 64500
This will delete all BGP configurations on this device.
Continue (y/n)? y
Core-2
15. On Core-2, repeat this for the neighbor Core-1.
ICX-Core-2(config-bgp)# address-family ipv4 unicast
ICX-Core-2(config-bgp-ipv4-uc)# neighbor 10.1.0.2 next-hop-self
ICX-Core-2(config-bgp-ipv4-uc)# exit
ICX-Core-2(config-bgp)# exit
18. Review the BGP routing table; the next hop should now be the loopback IP of Core-1. Also notice
that the > best flag is now shown again for the routes.
19. Review the IP routing table. Are the routes visible now?
ICX-Core-2(config)# show ip route 198.19.101.0
VRF: default
Do not attempt to ping the remote hosts. Core-1 and Core-2 are receiving the routes
from the ISP, but they are not announcing any routes themselves, so there is no
return path to make a connection possible (at least at this point in the lab). You will
fix this later in the lab.
If Router-B is not reachable, check the interface configuration again. If the con-
figuration is correct, contact your instructor.
5. Review that routes have been received from this eBGP peer.
ICX-Core-2(config-bgp)# show bgp all paths
Status codes: s suppressed, d damped, h history, * valid, > best, = multipath,
i internal, e external S Stale, R Removed, a additional-paths
VRF : default
Local Router-ID 10.1.0.3
Transit AS problem: Verify the routes that are advertised to the eBGP peer
By default, BGP will advertise all routes that it has received from other BGP peers. The risk for a
customer with BGP peering to two different ISPs is that it becomes a transit AS between these
ISPs. It is best practice to apply a route filter to the eBGP peers to ensure that only locally ori-
ginated routes can be announced to them.
Core-2
6. First, review that Core-2 is indeed advertising routes to Router-B. On Core-2, no configuration
has been performed to announce routes to the eBGP system. Check if any routes are being
advertised to the eBGP peer.
ICX-Core-2(config-bgp)# show bgp ipv4 unicast neighbors 10.255.102.12 advertised-
routes
Status codes: s suppressed, d damped, h history, * valid, > best, = multipath,
i internal, e external S Stale, R Removed
Origin codes: i - IGP, e - EGP, ? - incomplete
VRF : default
Local Router-ID 10.1.0.3
VRF : default
Local Router-ID 10.1.0.2
9. Define a new route map to select routes matching the new AS path list.
ICX-Core-1(config)# route-map bgp-ebgp-out permit
ICX-Core-1(config-route-map-bgp-ebgp-out-10)# match aspath bgp-local
ICX-Core-1(config-route-map-bgp-ebgp-out-10)# exit
ICX-Core-1(config)#
Note that the outbound policy must be defined on each core switch separately.
Core-1
10. On Core-1, apply the policy to the neighbor definition to Router-A.
ICX-Core-1(config)# router bgp 64500
ICX-Core-1(config-bgp)# address-family ipv4 unicast
ICX-Core-1(config-bgp-ipv4-uc)# neighbor 10.255.101.11 route-map bgp-ebgp-out out
ICX-Core-1(config-bgp-ipv4-uc)# exit
Core-2
11. On Core-2, the AS path list and the route map were synchronized by VSX. Verify that the route
map exists in the configuration.
ICX-Core-2(config-bgp)# show run | include aspath
ip aspath-list bgp-local seq 10 permit ^$
match aspath-list bgp-local
Route-map: ospf_from_static
Seq 10, permit,
Match :
ip prefix-list : routerAext
Set :
metric : 1000
metric-type : external_type1
12. On Core-2, apply the policy to the neighbor definition to Router B. The switch should still be in
the router bgp 64500 context.
ICX-Core-2(config)# router bgp 64500
ICX-Core-2(config-bgp)# address-family ipv4 unicast
The update in the policy will be effective after the BGP sessions are restarted.
Core-1
13. Reset the eBGP session on Core-1.
ICX-Core-1(config-bgp)# clear bgp 10.255.101.11
Core-2
14. Reset the eBGP session on Core-2. Alternatively, you could use the clear bgp all * soft in
command.
ICX-Core-2(config-bgp)# clear bgp 10.255.102.12
Core-1
15. Wait a few moments so the eBGP session can be re-established. Now the route policy should be
effective. On Core-1, check the outbound routes.
ICX-Core-1(config-bgp)# show bgp ipv4 unicast neighbors 10.255.101.11 advertised-
routes
VRF : default
Local Router-ID 10.1.0.2
ICX-Core-1(config-bgp)# exit
Core-2
16. Verify this on Core-2 as well.
ICX-Core-2(config-bgp)# show bgp ipv4 unicast neighbors 10.255.102.12 advertised-
routes
VRF : default
Local Router-ID 10.1.0.3
This demonstrates how a route policy can prevent the customer from becoming a transit AS for
other BGP autonomous systems.
Steps
Define the subnet on Core-1 and Core-2 for external use
The Core-1 and Core-2 BGP AS 64500 will be hosting the 100.100.1.0/24 network. Each core switch
will be configured with a loopback interface in this subnet for testing purposes. This loopback will be
included in the OSPF topology so Core-1 and Core-2 can reach each other's 100.100.1.0/24 interface
and also forward data to the peer switch.
Core-1
1. On Core-1, define the new loopback with the public test IP.
ICX-Core-1(config)# interface loopback 101
ICX-Core-1(config-loopback-if)# ip address 100.100.1.2/32
ICX-Core-1(config-loopback-if)# ip ospf 1 area 0
ICX-Core-1(config-loopback-if)# exit
ICX-Core-1(config)#
Core-2
2. On Core-2, define the new loopback IP as well.
ICX-Core-2(config)# interface loopback 101
ICX-Core-2(config-loopback-if)# ip address 100.100.1.3/32
ICX-Core-2(config-loopback-if)# ip ospf 1 area 0
ICX-Core-2(config-loopback-if)# exit
3. On Core-2, verify the new loopback IP on Core-1 can be reached via OSPF, while using the local
loopback as source IP.
ICX-Core-2(config)# ping 100.100.1.2 source 100.100.1.3
PING 100.100.1.2 (100.100.1.2) from 100.100.1.3 : 100(128) bytes of data.
108 bytes from 100.100.1.2: icmp_seq=1 ttl=64 time=0.197 ms
5. Use the network command to inject the 100.100.1.0/24 route into the IPv4 BGP table.
ICX-Core-1(config-bgp-ipv4-uc)# network 100.100.1.0/24
ICX-Core-1(config-bgp-ipv4-uc)# exit
ICX-Core-1(config-bgp)# exit
6. Verify if the new network is part of the IPv4 unicast routing table.
ICX-Core-1(config)# show bgp ipv4 unicast paths
Status codes: s suppressed, d damped, h history, * valid, > best, = multipath,
i internal, e external S Stale, R Removed
VRF : default
Local Router-ID 10.1.0.2
9. Next, verify the route appears in the local BGP routing table.
ICX-Core-1(config)# show bgp ipv4 unicast paths
Status codes: s suppressed, d damped, h history, * valid, > best, = multipath,
i internal, e external S Stale, R Removed
VRF : default
Local Router-ID 10.1.0.2
10. Verify the route passes the outbound route map to Router-A.
ICX-Core-1(config)# show bgp ipv4 unicast neighbors 10.255.101.11 advertised-routes
Status codes: s suppressed, d damped, h history, * valid, > best, = multipath,
i internal, e external S Stale, R Removed
Origin codes: i - IGP, e - EGP, ? - incomplete
VRF : default
Local Router-ID 10.1.0.2
11. Verify connectivity using this IP to Router-C (this router is connected behind Router-A and
Router-B). If this router can be reached using a ping, it means Router-C knows about the
100.100.1.0/24 subnet as well. Router-C has several loopback test IP addresses; one of them is
198.19.101.50.
ICX-Core-1(config)# ping 198.19.101.50 source 100.100.1.2
PING 198.19.101.50 (198.19.101.50) from 100.100.1.2 : 100(128) bytes of data.
108 bytes from 198.19.101.50: icmp_seq=1 ttl=62 time=3.82 ms
108 bytes from 198.19.101.50: icmp_seq=2 ttl=62 time=3.55 ms
<output omitted>
Core-2
12. On Core-2, verify Router-C (198.19.101.50) can be reached when using the local public IP as the
source IP (100.100.1.3). The reply confirms that all the hosts on the 100.100.1.0/24 subnet can
be reached from the ISPs using a path via Core-1.
ICX-Core-2(config)# ping 198.19.101.50 source 100.100.1.3
PING 198.19.101.50 (198.19.101.50) from 100.100.1.3 : 100(128) bytes of data.
VRF: default
It is not necessary to create a checkpoint for the BGP configuration since this will not
be used in later labs.
Lab diagram
Overview
In this lab activity, you will begin by exploring the VRF feature. A new routing table will be defined on
the VSX core switches: for example, customer blue. After defining a new routing context, the lab will
show how L3 interfaces can be attached to a VRF; this will be done with loopback and VLAN interfaces.
The lab will then show how a static route can be defined within the VRF context, how user subnets in
the VRF can be configured, and how a DHCP helper can be enabled. The last section will show how a
routing protocol, such as OSPF, can be enabled and bound to a VRF context.
The last two tasks will have you explore two security features in AOS-CX: DHCP snooping and ARP pro-
tection.
Objectives
n Create a new VRF.
n Associate L3 interfaces to a VRF.
n Define static routing for a VRF.
n Configure OSPF for a VRF context.
Steps (required)
1. Open a console connection to the Access-1. Log in using admin and the password aruba123.
ICX-Access-1# copy checkpoint icx-lab02-vsx running-config
Copying configuration: [Success]
ICX-Access-1#
2. Open a console connection to the Access-2. Log in using admin and the password aruba123.
ICX-Access-2# copy checkpoint icx-lab02-vsx running-config
Copying configuration: [Success]
ICX-Access-2#
3. Open a console connection to the Core-1. Log in using admin and the password aruba123.
ICX-Core-1# copy checkpoint icx-lab02-vsx running-config
Copying configuration: [Success]
ICX-Core-1#
4. Open a console connection to the Core-2. Log in using admin and the password aruba123.
ICX-Core-2# copy checkpoint icx-lab02-vsx running-config
Copying configuration: [Success]
ICX-Core-2#
Objectives
In this task, a new VRF (blue) will be defined for a customer. Next, L3 IP interfaces, such as loopback
and VLAN interfaces, will be attached to this VRF. On the VSX core, a routed VLAN with a VSX active
gateway will be defined to the upstream MC that will be operating as the upstream firewall in this
setup. With this routed connection in place, a static route example will be configured.
The next step will be to define a user subnet in the customer VRF (VLAN 23) and verify the PC has
access to the customer resources.
6. Use the show vrf command to review the interfaces and the VRF assignment.
ICX-Core-1(config-loopback-if)# show vrf
VRF Configuration:
------------------
VRF Name : default
Interfaces Status
-----------------------------
1/1/3 down
<output omitted>
1/1/56 down
loopback20 up
vlan11 up
vlan12 up
VRF Name : KA
Interfaces Status
-----------------------------
1/1/45 up
8. Attach the loopback 20 interface to the VRF blue. This will automatically remove the interface
from the default routing table.
ICX-Core-1(config-loopback-if)# vrf attach blue
VRF: default
VRF: blue
Define a new VLAN for the upstream routed connection to the gateway (MC)
The VSX core already has a VSX LAG (LAG 5) to the gateway, so only an extra VLAN and VLAN
interface is required for this communication. This will be the routed connection between the VSX
core and the gateway. VLAN 23 will be used for this purpose.
Core-1
13. Define VLAN 23 and use the vsx-sync command to have it created on Core-2 as well.
14. Configure the L3 interface and configure the IP settings for the new VLAN.
ICX-Core-1(config)# interface vlan23
ICX-Core-1(config-if-vlan)# vsx-sync active-gateways
ICX-Core-1(config-if-vlan)# vrf attach blue
ICX-Core-1(config-if-vlan)# ip address 10.1.23.2/24
ICX-Core-1(config-if-vlan)# active-gateway ip mac 02:02:00:00:01:00
ICX-Core-1(config-if-vlan)# active-gateway ip 10.1.23.1
ICX-Core-1(config-if-vlan)# exit
17. Define the VLAN 23 SVI interface and verify the VSX active gateway configuration was syn-
chronized.
Core-1
18. On Core-1, verify the connectivity to the upstream gateway in VLAN 23 with a ping from within
the VRF blue context.
---------------------------------------------------------------------------------
10.1.23.6 20:4c:03:5f:a0:c2 vlan23 lag5 reachable blue
A VRF is just like a regular routing table, so it can be configured with static routes and dynamic
routing protocols. In the next steps, a static route will be added and verified in the blue VRF. The
VSX core currently has a direct link to the gateway in VLAN 23. On the gateway, there is an addi-
tional IP subnet 10.1.24.0/24, where the gateway has an IP address of 10.1.24.6. Currently, the
VSX core switches cannot reach the 10.1.24.0/24 subnet (no routing to it in the blue VRF). By
adding a static route to this subnet on the core switches, they will be able to reach 10.1.24.6 in
VRF: blue
22. Add a static route for the 10.1.24.0/24 subnet to the gateway's IP address for the blue VRF.
ICX-Core-1(config)# ip route 10.1.24.0/24 10.1.23.6 vrf blue
VRF: blue
Core-2
24. On Core-2, add the static route as well.
ICX-Core-2(config)# ip route 10.1.24.0/24 10.1.23.6 vrf blue
It is also possible to enable the vsx-sync static-routes command under the VSX
context on Core-1 (the VSX primary). In this situation, the VSX synchronization
would create the static route on Core-2.
25. Verify that the routing table in the VRF blue now lists a route to the 10.1.24.0 subnet.
ICX-Core-2(config)# show ip route 10.1.24.0 vrf blue
VRF: blue
Core-2
27. Verify the ping to 10.1.24.6 on Core-2.
ICX-Core-2(config)# ping 10.1.24.6 vrf blue
PING 10.1.24.6 (10.1.24.6) 100(128) bytes of data.
108 bytes from 10.1.24.6: icmp_seq=1 ttl=64 time=0.468 ms
108 bytes from 10.1.24.6: icmp_seq=2 ttl=64 time=0.373 ms
This demonstrates how a static route can be defined within a VRF context to implement routing.
In these steps, a new user VLAN will be defined in the VRF blue for PC3 connected to Access-1.
The VSX core will be the default gateway for this subnet in the blue VRF; therefore, the active
gateway and DHCP relay features will be configured. The new user VLAN is VLAN 21.
Core-1
28. On Core-1, create the new VLAN.
30. Configure a DHCP relay on the VLAN, using the gateway as the DHCP server.
ICX-Core-1(config-if-vlan)# ip helper-address 10.1.23.6
ICX-Core-1(config-if-vlan)# exit
31. Allow VLAN 21 on LAG 1 connected to Access-1 and verify the configuration.
ICX-Core-1(config)# interface lag 1
ICX-Core-1(config-lag-if)# vlan trunk allowed 21
ICX-Core-1(config-lag-if)# show run current
interface lag 1 multi-chassis
no shutdown
description Access-1
no routing
vlan trunk native 1
vlan trunk allowed 1,11-13,21
lacp mode active
ICX-Core-1(config-lag-if)# exit
ICX-Core-1(config)#
Core-2
On Core-2, several settings have already been synchronized by VSX:
n L2 VLAN
n L2 LAG allowed VLAN list
n L3 VLAN active gateway settings
n L3 IP helper
The only remaining configuration steps are:
n Define the L3 interface
n Attach it to VRF
n Assign the interface an IP address
32. Define the L3 interface, attach it to the VRF blue, and set the IP address.
33. Verify the VSX active gateway settings have been synchronized correctly.
ICX-Core-2(config-if-vlan)# show running-config current-context
interface vlan21
vsx-sync active-gateways
vrf attach blue
ip address 10.1.21.3/24
active-gateway ip mac 02:02:00:00:01:00 active-gateway ip 10.1.21.1 ip
helper-address 10.1.23.6
ICX-Core-2(config-if-vlan)# exit
---------------------------------------------------------------------------------
VLAN Name Status Reason Type Interfaces
---------------------------------------------------------------------------------
21 VLAN21 up ok static lag1,lag5,lag256
Access-1
35. Open a terminal connection on Access-1 and enter configuration mode.
36. Define VLAN 21 and verify it is allowed on the uplink.
ICX-TxAccess-1(config)# vlan 21
ICX-TxAccess-1(config-vlan-21)# exit
ICX-TxAccess-1(config)# show vlan 21
37. Assign the port connected to PC3 (1/1/3) as an access port in VLAN 21.
ICX-TxAccess-1(config)# int 1/1/3
ICX-TxAccess-1(config-if)# vlan access 21
ICX-TxAccess-1(config-if)# exit
38. On PC3, connected to Access-1 port 1/1/3, reset (disable/enable) the Lab NIC interface, and
verify the IP address received IP addressing information. This should be in the 10.1.21.0/24
range.
C:\Users\student> ipconfig
Windows IP Configuration
39. On PC3, ping and traceroute to 10.1.24.6 (the MC) to test the routing and the static route.
C:\Users\student> ping 10.1.24.6
Trace complete.
The PC3 traffic can be hashed to either Core-1 or Core-2, so the first response in the
traceroute could come from either Core-1 (10.1.21.2) or Core-2 (10.1.21.3).
Objectives
In this task, OSPF routing will be configured inside the blue VRF. The only main difference will be to
bind the OSPF process to the VRF. The other steps, such as the configuration of the router ID, areas,
and interfaces, are the same as configuring OSPF for the default routing table (default VRF).
Without the vrf blue command option, the OSPF process would operate in the
default routing table.
2. Configure the loopback IP that was defined in the VRF blue as the router ID.
ICX-Core-1(config-ospf-2)# router-id 10.1.20.2
4. Enable OSPF on the loopback 20 and upstream routed VLAN 23 interfaces. Notice that the ip
ospf command requires the OSPF process number. Typically, that would be 1 for the OSPF pro-
cess that is running in the global routing table. In this example, OSPF process ID 2 was bound to
the blue VRF. This is how the administrator can control which OSPF process the interface is asso-
ciated with.
This is different from the VRF attach command, since a single routing table (VRF)
may contain multiple OSPF processes!
Area : 0.0.0.0
----------------
Area Type : Normal Status : Active
Total Interfaces : 2 Active Interfaces : 2
Passive Interfaces : 0 Loopback Interfaces : 1
SPF Calculation Count : 6
Area ranges :
Number of LSAs : 3 Checksum Sum : 93633
Core-2
7. On Core-2, VSX synchronization should have completed most of the configuration. Review the
OSPF configuration.
ICX-Core-2(config)# show run ospf
router ospf 2 vrf blue
area 0.0.0.0
interface loopback 20
ip ospf 2 area 0.0.0.0
interface vlan23
ip ospf 2 area 0.0.0.0
8. Review the OSPF status and notice the router ID 10.1.20.3 was automatically selected.
ICX-Core-2(config)# show ip ospf vrf blue
VRF : blue Process : 2
----------------------------------------------------
Area : 0.0.0.0
----------------
Area Type : Normal Status : Active
Total Interfaces : 2 Active Interfaces : 2
Passive Interfaces : 0 Loopback Interfaces : 1
SPF Calculation Count : 5
Area ranges :
Number of LSAs : 3 Checksum Sum : 93633
10. Review the IP routing table of the VRF blue. This should show an OSPF route to the loopback IP
of the Core-1 switch.
ICX-Core-2(config)# show ip route vrf blue
VRF: blue
11. Attempt to ping this remote loopback IP, using the Core-2 loopback IP as the source. This should
succeed, since Core-1 should also have a route to the Core-2 loopback IP.
ICX-Core-2(config)# ping 10.1.20.2 source 10.1.20.3 vrf blue
PING 10.1.20.2 (10.1.20.2) from 10.1.20.3 : 100(128) bytes of data.
108 bytes from 10.1.20.2: icmp_seq=1 ttl=64 time=0.233 ms
108 bytes from 10.1.20.2: icmp_seq=2 ttl=64 time=0.195 ms
<output omitted>
This demonstrates how OSPF can be configured to operate within a VRF context.
Objectives
n Implement DHCP snooping.
n Define an authorized DHCP server.
n Verify DHCP snooping.
Steps
Access-1
1. Review the DHCP snooping configuration for the blue VRF.
ICX-Access-1(config)# show dhcpv4-snooping
DHCPv4-Snooping Information
Option 82 Configurations
Volume Name : --
File Name : --
Inactive Since : --
Error : --
Active Storage : --
Port Information
DHCPv4-Snooping Information
Option 82 Configurations
Volume Name : --
Active Storage : --
Port Information
PC3
4. On PC3, try to renew your IPv4 address from the DHCP server (ipconfig /renew).
Please wait for the command to complete its action. It may take up to a minute.
Windows IP Configuration
An error occurred while renewing interface Lab NIC - 6300-A Port 3 : unable to
contact your DHCP server. Request has timed out.
C:\Users\student>
n Question: Why did the DHCP request fail?
n Answer: It failed because all interfaces are untrusted by default, including LAG 255 on the
Access-1 switch, which is its uplink.
Access-1
5. View the DHCP snooping statistics.
ICX-Access-1(config)# show dhcpv4-snooping statistics
6. Define the uplink LAG (255) as a trusted port for DHCP snooping.
ICX-Access-1(config)# interface lag 255
ICX-Access-1(config-lag-if)# dhcpv4-snooping trust
ICX-Access-1(config-lag-if)# exit
PC3
7. On PC3, attempt to renew its IP address again (ipconfig /release and ipconfig /renew). This
should now be successful.
C:\Users\student> ipconfig /release
Windows IP Configuration
Access-1
8. Review the statistics on Access-1.
ICX-Access-1(config)# show dhcpv4-snooping statistics
9. View the DHCP snooping operation. Notice that there is one dynamic binding for interface 1/1/3.
ICX-Access-1(config)# show dhcpv4-snooping
DHCPv4-Snooping Information
Option 82 Configurations
Volume Name : --
File Name : --
Inactive Since : --
Error : --
Active Storage : --
Port Information
10. Examine the DHCP snooping binding table. Notice the entry for PC3.
ICX-Access-1(config)# show dhcpv4-snooping binding
11. Optionally, you can configure DHCPv4 snooping authorized servers to validate when the switch
is receiving DHCP server replies not only to trusted ports but from authorized DHCP server
source IP addresses. On Access-1, configure a DHCPv4 snooping authorized server IP address to
an incorrect one (for example, 10.1.23.99).
ICX-Access-1(config)# dhcpv4-snooping authorized-server 10.1.23.99
DHCPv4-Snooping Information
Option 82 Configurations
Volume Name : --
File Name : --
Inactive Since : --
Error : --
Active Storage : --
Port Information
Please wait for the command to complete its action. It may take up to a minute.
Windows IP Configuration
An error occurred while renewing interface Lab NIC - 6300-A Port 3 : unable to
contact your DHCP server. Request has timed out.
Access-1
14. Remove the incorrect DHCP authorized server entry and put in the correct one (10.23.1.6).
ICX-Access-1(config)# no dhcpv4-snooping authorized-server 10.1.23.99
ICX-Access-1(config)# dhcpv4-snooping authorized-server 10.1.23.6
PC3
16. On PC3, attempt to release and renew its IP address. This should now be successful.
C:\Users\student> ipconfig /release
Objectives
n Implement DAI.
n Verify the operation of DAI.
Steps
PC1
1. Verify that PC1 has an IP address in VLAN 21.
C:\Users\student> ipconfig
Windows IP Configuration
<output omitted>
2. Verify that PC1 can ping its default gateway in VLAN 21.
C:\Users\student> ping 10.1.21.1
3. View the ARP entry for the VLAN 21 default gateway IP address (Core-1/Core-2).
C:\Users\student> arp -a 10.1.21.1
Access-1
4. On Access-1, view the DHCP snooping bindings.
ICX-Access-1(config)# show dhcpv4-snooping binding
7. On PC3, try to ping the default gateway. The ping should fail.
C:\WINDOWS\system32> ping 10.1.21.1
-----------------------------------------------------------------
Interface Trust-State
-----------------------------------------------------------------
1/1/1 Untrusted
1/1/2 Untrusted
1/1/3 Untrusted
<output omitted>
lag255 Untrusted
-----------------------------------------------------------------
-----------------------------------------------------------------
VLAN Name Forwarded Dropped
-----------------------------------------------------------------
21 VLAN21 9 23
-----------------------------------------------------------------
PC3
11. On PC3, confirm it can ping the default gateway and has a record, now, in its local ARP table.
C:\WINDOWS\system32>ping 10.1.21.1
12. View the ARP entry for the VLAN 21 default gateway IP address (Core-1/Core-2).
C:\Users\student> arp -a 10.1.21.1
PC3
14. On PC3, clear the local ARP table and try to ping the default gateway again. The ping will fail
because the switch will drop ARP packets from PC3.
C:\WINDOWS\system32> arp -d *
Access-1
15. Re-enable DHCP snooping for VLAN 21.
PC3
16. Renew your IP address on PC3 and make sure it can ping the default gateway IP address in
VLAN 21.
C:\WINDOWS\system32> ipconfig /release
<output omitted>
The configuration of this lab is not needed in any upcoming labs. Therefore, no checkpoints
need to be created on the switches.
Lab diagram
Overview
In this lab activity, an IGMP querier and IGMP snooping will be configured and demonstrated. The VSX
core will be configured to perform the IGMP querier function, since the core has the IP interface in the
user VLAN. The access switches will be configured with IGMP snooping. This will ensure that the
multicast traffic is only delivered to the ports with active subscribers. PC3, connected to Access-1, will
be transmitting a multicast stream, while PC4, connected to Access-2, will be configured to register and
listen for the multicast stream.
Objectives
n Configure an IGMP querier on the VSX system.
n Configure IGMP snooping on the access switches.
n Understand the need for IGMP configuration.
n Verify the IGMP operation.
Steps (required)
1. Open a console connection to the Access-1. Log in using admin/aruba123.
ICX-Access-1# copy checkpoint icx-lab02-vsx running-config
Copying configuration: [Success]
ICX-Access-1#
Access-1
5. On Access-1, enter configuration mode. Assign port 1/1/3 (connected to PC3) as an access port
to VLAN 11 and enable the port.
ICX-Access-1(config)# interface 1/1/3
ICX-Access-1(config-if)# vlan access 11
ICX-Access-1(config-if)# no shutdown
ICX-Access-1(config-if)# exit
PC3
6. Open a connection to PC3 and reset the Lab NIC (disable/enable).
Windows IP Configuration
<output omitted>
Access-2
8. On Access-2, enter configuration mode, assign port 1/1/4 (connected to PC4) as the access port
to VLAN 11, and enable the port.
ICX-Access-2(config)# interface 1/1/4
ICX-Access-2(config-if)# vlan access 11
ICX-Access-2(config-if)# no shutdown
ICX-Access-2(config-if)# exit
Lab 7: IGMP and IGMP snooping
PC4
9. Open a connection to PC4 and reset the Lab NIC (disable/enable).
<output omitted>
11. Verify that PC4 can ping PC3's IP address in VLAN 11. Replace xx with the actual IP address of
PC3 in VLAN 11.
C:\Users\student> ping 10.1.11.xx
Steps
PC3
1. Open PC3 (connected to Access-1).
2. Start the UDP Multicast test tool from the desktop.
You may also drag and drop your 10.1.11.y IP from the Local interfaces list to the
Local Interface field. See the following screenshot.
Lab 7: IGMP and IGMP snooping
4. The message to the right of the button should now say Sender has started.
PC4
9. Open PC4 (connected to Access-2), start Wireshark, and perform a packet capture on the Lab
NIC for about five seconds. Then, stop/pause the capture.
The ip igmp querier role is default on the Layer 3 VLAN SVI interface, so you are
only required to enable IGMP on the VLAN interface.
4. Repeat this for VLAN 12. (VLAN 12 will be used in the multicast routing lab.)
ICX-Core-1(config)# interface vlan12
ICX-Core-1(config-if-vlan)# ip igmp enable
ICX-Core-1(config-if-vlan)# exit
5. Verify that the IP IGMP querier is now in the Initial Wait state.
ICX-Core-1(config)# show ip igmp interface vlan11
The multicast group 239.255.255.250 may be observed at this point. This depends
on the Windows client that may or may not have used this address already at this
point in the lab—you can ignore this address, if seen at the bottom of the display.
Depending on your lab pace, the switches may already have transitioned from Initial
Wait to Querier or Non-Querier at this point.
Access-2
15. Open a terminal connection to Access-2 and enter configuration mode.
16. Enable IGMP snooping for VLAN 11 and VLAN 12.
ICX-Access-2(config)# vlan 11,12
ICX-Access-2(config-vlan-<11,12>)# ip igmp snooping enable
ICX-Access-2(config-vlan-<11,12>)# exit
Core-1
17. On Core-1, verify the state until Initial Wait has changed to Querier. It may take a few minutes
before Core-1 transitions to the IP querier state. Make sure to wait in the lab until this has
occurred.
ICX-Core-1(config)# show ip igmp interface vlan11
Lab 7: IGMP and IGMP snooping
You might have to disable and re-enable the L3 interface VLAN 11 and VLAN 12
interfaces with one or both core switches to force the IGMP querier election process.
You might need to periodically re-execute the previous command until the correct
state is displayed. You can ignore the 239.255.255.250 address, if it is displayed at
the bottom of the output.
Core-2
18. Repeat this on Core-2 and verify it has transitioned to Non-Querier.
ICX-Core-2(config)# show ip igmp interface vlan 11
Now that the core switch is sending out regular queries for IGMP membership, the access
switches' IGMP snooping should be able to detect the querier port.
Access-1
19. On Access-1, verify that the upstream IGMP querier was detected on LAG 255 (this is the LAG to
the VSX core).
ICX-Access-1(config)# show ip igmp snooping vlan 11
IGMP Snooping Protocol Info
Access-2
20. Repeat this verification on Access-2.
ICX-Access-2(config)# show ip igmp snooping vlan 11
IGMP Snooping Protocol Info
Steps
Verify that multicast traffic is no longer flooded
PC3
1. Open PC3 (connected to Access-1) and start the multicast test traffic again by clicking the Start
Sender button.
Lab 7: IGMP and IGMP snooping
2. You may, optionally, restart the Wireshark packet capture for a few seconds to confirm traffic is
being generated.
Some IGMP traffic may be observed since the core IGMP querier will send regular
membership queries and PC3/PC4 will respond with membership reports.
The local address should be listed in the Local Interfaces list. You may also drag and
drop from this list into the field.
Do not confuse this with the Local Interface Address field.
You may need to scroll down or resize the window to see the Start Receiver button.
TIP: It may be easier to apply display filter ip.addr == 224.0.0.0/4 (not /24!) to see
only the multicast traffic.
The trace should show that at the moment the multicast test client application starts the
receiver, the IGMP JOIN is sent by the PC. Following the JOIN message, the actual multicast
traffic will now be received by this switch port.
11. Next, review the IGMP group tables for VLAN 11.
ICX-Access-2(config)# show ip igmp snooping vlan 11
IGMP Snooping Protocol Info
12. Review the details of group 239.1.1.1 in this VLAN. This will show which port received the
multicast request.
ICX-Access-2(config)# show ip igmp snooping vlan 11 group 239.1.1.1
VLAN ID : 11
VLAN Name : VLAN11
V1 V2 Sources Sources
Port Vers Mode Uptime Expires Timer Timer Forwarded Blocked
--------- ---- ---- --------- --------- --------- --------- --------- --------
1/1/4 3 EXC 5m 58s 4m 4s 0 0
VLAN ID : 11
VLAN Name : VLAN11
VLAN ID : 11
VLAN Name : VLAN11
V1 V2 Sources Sources
Port Vers Mode Uptime Expires Timer Timer Forwarded Blocked
--------- ---- ---- --------- --------- --------- --------- --------- --------
lag2 3 EXC 8m 52s 3m 19s 0 0
Access-1
14. On Access-1, review the IGMP group membership tables for VLAN 11.
ICX-Access-1(config)# show ip igmp snooping vlan 11
IGMP Snooping Protocol Info
Objectives
In this task, the IGMP fast-leave feature will be verified. When a client signals that it no longer needs
the multicast stream using an IGMP leave message, the IGMP querier will check if there are any other
receivers active in the VLAN for that particular multicast group (stream). If no other receivers respond,
the multicast can be filtered immediately. This will be demonstrated using PC4 (connected to Access-
2).
Steps
PC4
1. Open the connection to PC4 (connected to Access-2).
2. Start a new Wireshark packet capture for the Lab NIC and leave it running. You should observe
the incoming multicast to 239.1.1.1.
3. On PC4, in the UDP Multicast Test application, stop the receiver. Lab 7: IGMP and IGMP snooping
The trace should demonstrate that the client is sending an IGMP leave group message to the
224.0.0.22 address (the IGMPv3 multicast address).
Next, the current IGMP querier will check if any other memberships are still active. Since no other
clients respond, the snooping will also terminate the multicast forwarding, so after one to two
additional seconds, there should be no more multicast traffic for the 239.1.1.1 destination.
6. You can easily repeat the tests by restarting the multicast receiver client.
This demonstrates the fast-leave operation.
You have completed Lab 7!
Lab diagram
Overview
In this lab activity, multicast routing will be configured using PIM Sparse Mode (PIM-SM) on the VSX
core. Multicast routing also requires an IGMP querier, which you completed in the previous lab activity
(Lab 7 IGMP and IGMP snooping). In this lab, the end result will be that a multicast that is transmitted
by PC3 in VLAN 11 can be received by PC4 in VLAN 12, which requires multicast routing.
Objectives
n Understand multicast routing.
n Activate PIM-SM globally and at the interface-level configuration.
n Verify the multicast routing table.
PC4
3. Open PC4 (connected to Access-2); renew the IP address by bouncing (disable/enable) the Lab
NIC port.
4. PC4 should now have an IP address from the VLAN 12 range.
C:\Users\student> ipconfig
<output omitted>
5. Verify that PC4 (in VLAN 12) can ping PC3 (in VLAN 11). Replace xx with the actual IP address
of PC3.
C:\Users\student> ping 10.1.11.xx
Core-2
7. Repeat the verification on Core-2.
This can also be done via Core-1 by appending vsx-peer to the commands from
Core-1.
Steps
Core-1: PIM-SM configuration
1. Open a terminal to Core-1 and enter configuration mode.
2. Access the router pim context.
ICX-Core-1(config)# router pim
3. For multicast on a VSX cluster, the best practice is to configure PIM Dual-DR under the PIM
router command. With the active-active command, the proxy DR will also learn the multicast
routes, which will allow a fast recovery time if the actual DR fails.
ICX-Core-1(config-pim)# active-active
In a VSX cluster, the VSX member with the highest IP address will be the forwarder of
the multicast traffic. In this lab setup, Core-2 will become the forwarder. Do not con-
figure PIM-interface-level designated router (DR) priority when active-active is
enabled, since the active-active feature will overrule the manually configured inter-
face priority.
4. Attempt to enable the C-BSR function using the VLAN 1 interface as the source address.
In a typical deployment, a loopback interface would be used for this function. This lab
uses the VLAN 1 IP interface since it is already configured. If a loopback interface is
used, make sure it is routable in the network.
6. Try to enable the C-BSR function again using the loopback interface, and enable the PIM routing
protocol.
ICX-Core-1(config)# router pim
ICX-Core-1(config-pim)#bsr-candidate source-ip-interface vlan1
ICX-Core-1(config-pim)# enable
VRF : default
C-BSR Admin Status : This system is a Candidate-BSR
C-BSR Address : 10.1.1.2
C-BSR Priority : 250
C-BSR Hash Mask Length : 30
C-BSR Message Interval : 60
C-BSR Source IP Interface : vlan1
VRF : default
E-BSR Address : 10.1.1.2
E-BSR Priority : 250
E-BSR Hash Mask Length : 30
E-BSR Up Time : 1 mins 57 secs
Next Bootstrap Message : 13 secs
It may take up to two minutes before Core-2 shows 10.1.1.2 as the E-BSR address.
Core-2
12. On Core-2, review the elected BSR information.
ICX-Core-2(config)#show ip pim bsr elected
VRF : default
E-BSR Address : 10.1.1.2
E-BSR Priority : 250
E-BSR Hash Mask Length : 30
E-BSR Up Time : 2 mins 40 secs
Next Bootstrap Message : 1 mins 40 secs
It may take up to two minutes for the E-BSR to show Core-1's IP address.
Core-2
15. Make Core-2 a candidate RP.
ICX-Core-2(config)# router pim
ICX-Core-2(config-pim)#rp-candidate source-ip-interface vlan1
VRF: default
It may take a minute or so for the Core-2 RP (10.1.1.3) to appear in the list. You do
not need to wait for this entry but can proceed with the lab.
Core-2
18. Repeat this on Core-2.
ICX-Core-2(config-pim)#rp-candidate group-prefix 239.1.0.0/16
ICX-Core-2(config-pim)# exit
VRF : default
C-RP Admin Status : This system is a Candidate-RP
C-RP Address : 10.1.1.3
C-RP Hold Time : 150
C-RP Advertise Period : 60
C-RP Priority : 192
C-RP Source IP Interface : vlan1
VRF: default
Group Address Group Mask RP Address Hold Time Expire Time Priority
--------------- ------------ --------------- --------- ----------- --------
224.0.0.0 240.0.0.0 10.1.1.3 150 146 192
224.0.0.0 240.0.0.0 10.1.1.2 150 146 192
239.1.0.0 255.255.0.0 10.1.1.2 150 146 192
239.1.0.0 255.255.0.0 10.1.1.3 150 146 192
It may take up to a minute before the updated RP set is seen for 10.1.1.2 and
10.1.1.3.
Steps
PC3: Test multicast transmitter and registration
1. On PC3 (connected to Access-1), configure the UDP Multicast Test tool as Sender. (The tool can
be found on the desktop).
n Local Interface Address: 10.1.11.y (Your PC as shown in the Local Interfaces list)
n Destination multicast address: 239.1.1.1
2. Click the Start Sender button at the bottom of the window to make the Multicast Sender active.
It will now start to send traffic to the 239.1.1.1 destination address, using the local interface
10.1.11.y.
Core-1
3. On Core-1, review the brief output of the current multicast routing table. The 239.1.1.1 multicast
should have been learned by the data plane on VLAN 11. This also shows the source address of
the transmitter (10.1.11.y).
ICX-Core-1(config)# show ip mroute brief
---------------------------------------------------------------------------------
VRF : default Total number of entries : 1
---------------------------------------------------------------------------------
Group Address Source Address Neighbor Interface Uptime State
(HH:MM:SS)
------------- --------------- -------- ---------- ----------- -------
239.1.1.1 10.1.11.y vlan11 00:06:09 bridge
---------------------------------------------------------------------------------
4. Review the details of the 239.1.1.1 route. This will show that the multicast was registered with
the PIM-SM protocol.
ICX-Core-1(config)# show ip mroute 239.1.1.1
VRF : default
7. Scroll down and click the Start Receiver button. Verify that the test messages are received in
the tool.
8. Return to Wireshark and stop the trace. Scroll to the top of the trace. The test tool has sent the
IGMP join request. The core switch has received the IGMP join and has initiated the multicast
routing forwarding process.
V1 V2 Sources Sources
Vers Mode Uptime Expires Timer Timer Forwarded Blocked
---- ---- --------- --------- --------- --------- --------- --------
3 EXC 4m 13s 3m 7s
10. On Core-1, review the multicast routing table. Notice the downstream interface; this was initiated
based on the IGMP join. The proxy DR is used by VSX to synchronize the active multicast routes
between the two VSX nodes.
ICX-Core-1(config)# show ip mroute 239.1.1.1
VRF : default
11. Check Core-2 as well. In this example, notice that Core-2 is the PIM DR for VLAN 12.
ICX-Core-1(config)# show ip mroute 239.1.1.1 vsx-peer
VRF : default
Lab diagram
Overview
In this lab activity, Access Control Lists (ACLs) are configured and tested on the switch. First, an ACL is
defined and then access list rules are reviewed. Next, the ACL is applied to a switch port and tested.
Then, the object group feature will be demonstrated. This allows the grouping of multiple IP addresses
or ports in a logical group, so the ACL rules can be simplified. The last part of the lab will review the
resource utilization of the ACLs in the hardware tables.
Objectives
n Create an ACL.
n Understand the ACL rules.
n Remove an ACL rule and re-sequence the rules.
n Activate an ACL on a switch.
n Use object groups for IP addresses and ports.
n Review the hardware resource utilization.
Steps (required)
1. Open a console connection to the Access-1. Log in using admin/aruba123.
ICX-Access-1# copy checkpoint icx-lab02-vsx running-config
Copying configuration: [Success]
ICX-Access-1#
Steps
Access-2
1. Open a terminal connection to Access-2 and enter configuration mode.
2. Move interface 1/1/4 back to VLAN 11 and enable it.
ICX-Access-2(config)# interface 1/1/4
ICX-Access-2(config-if)# vlan access 11
PC4
3. On PC4, disable and re-enable the LAB NIC. Make sure it receives an IP address in VLAN 11.
<output omitted>
6. Allow traffic to the local subnet. The wildcard mask is not using inverse bits but a normal subnet
mask logic, so a binary 1 is used to match and a binary 0 is used to ignore the corresponding bit
in the IP address.
In this example, any destination IP address that has 10 in the first byte and 11 in the third byte
will match the rule (255). The value in the second or fourth byte will be ignored (0). Enable the
log and count functions as well.
ICX-Access-2(config-acl-ip)# permit any any 10.0.11.0/255.0.255.0 log count
7. No further lines will be added. Any traffic that is not matching the ACL entries will be handled by
the implicit deny rule; therefore, it will be dropped.
8. Review the ACL. Notice that each line now has a line number, so the order of the lines is
important. The line numbers can be used to remove an individual line or to insert a new line
between two existing lines.
ICX-Access-2(config-acl-ip)# show running-config current-context
access-list ip pc
10 permit udp any eq dhcp-client any eq dhcp-server
20 permit any any 10.0.11.0/255.0.255.0 log count
n Question: What happened to the port numbers you configured?
n Answer: AOS-CX has predefined names/aliases for common port numbers. In the previous
example, the alias dhcp-client represents port 68 and dhcp-server port 67. You can use
either method for defining a port, assuming an alias exists for the specified port.
9. Add a new line to match destination 10.0.12.0/255.0.255.0.
ICX-Access-2(config-acl-ip)# permit ip any 10.0.12.0/255.0.255.0 log count
10. Next, verify the configuration again. This shows that entering the same source/destination infor-
mation does not overwrite the existing line, but simply adds a line to the access list.
ICX-Access-2(config-acl-ip)# show running-config current-context
access-list ip pc
10 permit udp any eq dhcp-client any eq dhcp-server
20 permit any any 10.0.11.0/255.0.255.0 log count
30 permit any any 10.0.12.0/255.0.255.0 log count
12. The switch supports resequencing the line numbers. This must be done from the global con-
figuration. There is a start number and an increment number.
ICX-Access-2(config-acl-ip)# exit
ICX-Access-2(config)# access-list ip pc resequence 1000 100
13. Review the ACL configuration with the updated line numbers.
ICX-Access-2(config)# show access-list configuration commands
access-list ip pc
ACL applications
IMPORTANT: The next steps are for reference only: no actual configuration should
be performed.
Do not perform the following steps!
n Reference only: ACLs can be applied on switched (non-routed) ports in the inbound and
outbound direction.
ICX-Access-2(config)# interface 1/1/4
ICX-Access-2(config-if)# show run current-context
interface 1/1/4
no shutdown
apply access-list ip pc in
no routing
vlan access 11
exit
ICX-Access-2(config-if)# apply access-list ip pc ?
in Inbound (ingress) traffic
out Outbound (egress) traffic
n Reference only: ACLs can also be applied to routed ports (example only, no actual con-
figuration required).
ICX-Access-2(config)# interface 1/1/2
ICX-Access-2(config-if)# show run cur
interface 1/1/2
shutdown
no routing
vlan access 1
exit
<output omitted>
17. Attempt to ping 10.1.12.1. This should succeed since this is allowed in the ACL.
C:\Users\student> ping 10.1.12.1
18. Attempt to ping to 10.1.11.1. This should fail, due to the ACL implicit deny. Therefore, when
traffic does not match the ACL, it will be rejected.
C:\Users\student> ping 10.1.11.1
19. On Access-2, review the ACL hit counts. In the output example, four packets have matched the
permit rule, and there were 43 matches on the implicit deny statement. You can use the access-
list log-timer 30 command to speed up the log creation from every 300 seconds to 30
seconds.
20. Next, review the log file on the switch using the show logging -r -n 10 command. This shows
the log in reverse order, with 10 as the number of lines to display.
The log should show a match for the ping to 10.1.12.1 (event 10001).
ICX-Access-2(config)# show logging -r -n 10
---------------------------------------------------
Event logs from current boot
---------------------------------------------------
2024-05-12T15:19:40.086455-04:00 ICX-Access-2 ops-switchd[947]: Event|10001|LOG_
INFO|CDTR|1|List pc, seq# 1100 permitted icmp 10.1.11.53 -> 10.1.12.1 type 8 code
0, on vlan 11,
port 1/1/4, direction in
2024-05-12T15:13:51.662073-04:00 ICX-Access-2 ntp-mgrd[4054]: Event|1105|LOG_
INFO|||NTP primary server connection established to 10.254.1.21
2024-05-12T15:11:50.425990-04:00 ICX-Access-2 ntp-mgrd[4054]: Event|1106|LOG_
INFO|||NTP primary server connection lost to 10.254.1.21
2024-05-12T14:51:19.222162-04:00 ICX-Access-2 hpe-mgmdd[3421]: Event|2610|LOG_
INFO|CDTR|1|Received IGMPv2 query from 10.1.12.2 when the device is configured for
IGMPv3.
2024-05-12T14:37:27.378878-04:00 ICX-Access-2 ntp-mgrd[4054]: Event|1105|LOG_
INFO|||NTP primary server connection established to 10.254.1.21
2024-05-12T13:16:51.719282-04:00 ICX-Access-2 hpe-restd[928]: Event|14604|LOG_
INFO|AMM|-|Unable to fetch Aruba Central location from via VRF .
2024-05-12T13:16:51.719072-04:00 ICX-Access-2 hpe-restd[928]: Event|14604|LOG_
INFO|AMM|-|Unable to fetch Aruba Central location from via VRF .
2024-05-12T13:16:01.658843-04:00 ICX-Access-2 hpe-restd[928]: Event|14603|LOG_
INFO|AMM|-|Aruba Central location successfully fetched from via VRF
2024-05-12T13:16:01.658715-04:00 ICX-Access-2 hpe-restd[928]: Event|14603|LOG_
INFO|AMM|-|Aruba Central location successfully fetched from via VRF
2024-05-12T13:01:53.930215-04:00 ICX-Access-2 hpe-mgmdd[3421]: Event|2618|LOG_
INFO|CDTR|1|IGMP snooping is operational on VLAN 12.
Steps
Define group for core switches' IP
Access-2
1. Open the terminal connection to Access-2 and enter configuration mode.
2. Define a new object group named core-switch.
ICX-Access-2(config)# object-group ip address core-switch
Do not add 10.1.12.1: this address will be used in a validation test, and therefore, it
should not belong to the object group.
5. Review the object group, noticing the line numbers that are automatically generated.
ICX-Access-2(config-addrgroup-ip)# show run current
object-group ip address core-switch
10 10.1.12.2
20 10.1.12.3
ICX-Access-2(config-addrgroup-ip)# exit
6. For reference only: Just like the regular ACL, entries in the object group can be re-sequenced.
This step is for reference only: no actual re-sequencing is needed.
ICX-Access-2(config)# object-group ip address core-switch ?
resequence Re-number entries
reset Reset configuration
<cr>
12. Overwrite the current line 1100 with the new line based on the object groups.
ICX-Access-2(config-acl-ip)# 1100 permit tcp any core-switch group switch-ports
Steps
Resource Usage:
Mod Description
Resource Used Reserved Free
------------------------------------------------------------------------------
1/1 Ingress IP Port ACL Lookup
Ingress TCAM Entries 13 2048
Total
Ingress TCAM Entries 13 2048 18432
Egress TCAM Entries 0 0 8192
Ingress Lookups 1 8
Ingress Flex Lookups 0 1
Egress Lookups 0 4
Ingress Policers 0 2047
Egress Policers 0 2047
ICX-Access-2(config)#
For reference only: This is the output of an example of Core-1's configuration (model 8325)
resources. (Obviously, you have not configured an ACL on Core-1, so your output at this point
would be different.)
ICX-Core-1(config)# show resources
Resource Usage:
Access-2
2. Enter the object group IP address of the default gateway address for VLAN 12.
ICX-Access-2(config)# object-group ip address core-switch
ICX-Access-2(config-addrgroup-ip)# 10.1.12.1
Resource Usage:
Mod Description
Resource Used Free
-------------------------------------------------------------------------
1/1 Ingress IP Port ACL Lookup
Ingress TCAM Entries 15 2048
Total
Ingress TCAM Entries 15 2048 18432
Egress TCAM Entries 0 0 8192
Ingress Lookups 1 8
Ingress Flex Lookups 0 1
Egress Lookups 0 4
Ingress Policers 0 2047
Egress Policers 0 2047
Resource Usage:
6. Enter the port object-group and add a port and port range to the group.
ICX-Access-2(config)# object-group port switch-ports
ICX-Access-2(config-portgroup)# eq 22
ICX-Access-2(config-portgroup)# range 1024 2048
ICX-Access-2(config-portgroup)# exit
Resource Usage:
Mod Description
Resource Used Free
-------------------------------------------------------------------------
1/1 Ingress IP Port ACL Lookup
Ingress TCAM Entries 34 2048
Total
Ingress TCAM Entries 34 2048 18432
Egress TCAM Entries 0 0 8192
Ingress Lookups 1 8
Ingress Flex Lookups 0 1
Egress Lookups 0 4
Ingress Policers 0 2047
Egress Policers 0 2047
This shows that the object groups are very convenient for the administrator, but internally, they
are extracted so they still consume the same hardware resources as if individual lines would have
been created in the ACLs (object groups were not referenced in ACL entries).
You have completed Lab 9!
Lab diagram
Overview
In this lab activity, 802.1X will be configured on an access switch. This will require the configuration of
a RADIUS server and will include RADIUS change of authorization (CoA) support.
For the first 802.1X authentication part of the lab, the RADIUS server will provide standard IETF Attrib-
ute Value Pairs (AVP) to assign the user to a VLAN.
Next, the lab will introduce Aruba User-Roles; therefore, the access instructions will be stored in the
switch configuration and the RADIUS server will use the Aruba Vendor-Specific Attribute (VSA) called
Aruba-User-Role.
Steps
Access-1
1. Open a session to Access-1 and enter configuration mode.
In a later lab, the ClearPass Downloadable User Roles will be configured. Since this
feature will require an HTTPS connection between the switch and the ClearPass host,
this HTTPS connection will be validated by the switch. Therefore, the CPPM HTTPS
certification subject name must match with the DNS name.
To prepare for this later activity, the RADIUS server will be defined based on the host-
name and not based on an IP address. If the customer has an entry for the ClearPass
host in the DNS system, that can be used as well.
In this lab setup, the hostname will be locally defined on the switch, similar to the
5. Define a new server group, and add the previously defined CPPM host.
6. Enable RADIUS accounting to this server group, enable interim accounting, and set the interim
accounting to five minutes. This will ensure that the switch updates the RADIUS server about the
connected devices every five minutes and will ensure that ClearPass has a view over the cur-
rently connected devices in the network.
ICX-Access-1(config)# aaa accounting port-access start-stop interim 5 group cppm
7. Enable the CoA processing on the switch. This is also known as RFC 3576 support or dynamic
authorization. This allows the RADIUS server (ClearPass) to send a message to the switch to
request an update in the authorization or a re-authentication. Basically, ClearPass can have a
"triggered" re-authentication based on authentication events.
ICX-Access-1(config)# radius dyn-authorization client cppm.arubatraining.com
secret-key plaintext aruba123 replay-protection disable
ICX-Access-1(config)# radius dyn-authorization enable
Replay Protection disable indicates that the timestamp of the CoA packet will not be
inspected by the switch. In a real deployment, replay protection should be enabled.
The default allowed time difference between the RADIUS host and the switch is 300
seconds. Since in the lab, the time of the switch and CPPM may not be in sync, replay
protection is disabled.
Since ClearPass will send a RADIUS CoA message to the switch, it is important that
the switch is configured to accept these RADIUS messages. Typically, it is the switch
that sends the RADIUS request packets to the RADIUS server, and the RADIUS server
responds to these request packets.
In case of the CoA, it is the RADIUS server that initiates the packet. Thus, it is con-
sidered to be the CoA client, while the switch receives the CoA packet, so it is con-
sidered to be the CoA server.
8. Enable RADIUS tracking credentials. RADIUS tracking is a feature that allows the switch to send
test requests on a regular basis, so it can detect if the RADIUS server is still responding. For this
feature, dedicated credentials and ClearPass service can be configured, so it does not interfere
with any regular production credentials or ClearPass services. The tracking test is performed
every five minutes by default; this can also be changed if needed.
ICX-Access-1(config)# radius-server tracking user-name icx-radius-track password
plaintext aruba123
PC1
11. On PC1, disable and re-enable the LAB NIC. Make sure it receives an IP address in VLAN 11.
If the Lab NIC card's IP address is from a subnet other than 10.1.11.0/24, check if it is
configured to use DHCP for IP addressing. If not, please change the NIC card to use
DHCP.
Remote labs, ClearPass servers are using self-signed certificates, so a warning mes-
sage could be displayed. Click Advanced, add an exception, and confirm the security
exception.
15. Add the NAS IP Address and the Host MAC Address columns to the View and arrange them in
a logical order (see image for an example) and click save.
In some remote lab environments, these column settings may have been applied pre-
viously. If the NAS IP Address and Host MAC Address columns have been configured
already, move to the next step.
Shared-Secret: None
Timeout: 5
Authentication Statistics
-------------------------
Round Trip Time : 0
Pending Requests : 0
Timeouts : 8
Bad Authenticators : 0
Packets Dropped : 0
Access Requests : 10
Access challenge : 0
In case the switch does not receive a RADIUS response from the RADIUS server, the
switch will consider it "unreachable" and it will use another RADIUS server, if defined.
The switch does not need a RADIUS Accept packet for the tracking to be successful.
Any RADIUS response, both Accept and Reject, results in the tracking feature to
mark the RADIUS server as reachable.
Steps
Define group for core switches IP
Access-1
1. Change the hostname of the Access-1 switch to: ICX-T1-Access1-avp.
ICX-Access-1(config)# hostname ICX-T1-Access1-avp
ICX-T1-Access1-avp(config)#
2. Enable 802.1X authentication on the switch, and ensure it is using the previously defined
RADIUS server group.
ICX-T1-Access1-avp(config)# aaa authentication port-access dot1x authenticator
radius server-group cppm
ICX-T1-Access1-avp(config)# aaa authentication port-access dot1x authenticator
enable
3. Assign port 1/1/3 to VLAN 1. In this lab, it is simply used as the base landing VLAN in case the
RADIUS server does not assign a VLAN. There is no DHCP server or other resources in this VLAN
in this example.
ICX-T1-Access1-avp(config)# interface 1/1/3
ICX-T1-Access1-avp(config-if)# vlan access 1
PC3
5. On PC3 (connected to the Access-1 port 1/1/3), ensure that the Windows service "Wired
AutoConfig" is started. This service is not started by default. Open a command prompt with
administrator rights and enter net start dot3svc.
C:\WINDOWS\system32>net start dot3svc
The Wired AutoConfig service is starting.
The Wired AutoConfig service was started successfully.
6. Open Network Connections (Select Start > Settings > Network & Internet > Ethernet >
Change adapter options).
If the Authentication tab is not available, the 'Wired AutoConfig' service has not been
started on the client PC. Check the previous steps to ensure the service is started.
8. Open Settings for the PEAP method and uncheck Verify the server's identity by validating
the certificate.
The labs are using self-signed certificates for simplicity. Therefore, to avoid any trust
problems, we are disabling certificate validation.
In a real-world environment, it is considered a best-practice, and it is strongly recom-
mended to use trusted certificates and "verify the server's identity by validating the
certificate check box marked.
15. Open your authentication entry (make sure to check it has your NAS IP), click Input, and review
the attributes that were sent by the switch in the access request.
The value of 180 seconds was used in the lab environment to demonstrate the re-
authentication. In a real deployment, this value would be controlled by the customer
security policy; this may be several hours.
17. On Access-1, check the authenticated clients. Take note of the MAC address of the authenticated
client.
Authentication Details
----------------------
Status : Authenticated
Type : Pass-Through
EAP-Method : PEAP
Auth Failure reason :
Time Since Last State Change : 62s
Authentication Statistics
-------------------------
Authentication : 1
Authentication Timeout : 0
EAP-Start While Authenticating : 0
EAP-Logoff While Authenticating : 0
Successful Authentication : 1
Failed Authentication : 0
Re-Authentication : 0
Successful Re-Authentication : 0
Failed Re-Authentication : 0
EAP-Start When Authenticated : 0
EAP-Logoff When Authenticated : 0
Re-Auths When Authenticated : 0
Cached Re-Authentication : 0
ICX-T1-Access1-avp(config)#
18. Review the MAC-address table. The client MAC address should have been assigned to VLAN 11
by port-access-security. Remember that the default VLAN of interface 1/1/3 has been set to
VLAN 1.
ICX-T1-Access1-avp(config)# show mac-address-table
MAC age-time : 300 seconds
Number of MAC addresses : 13
19. Review the switch log for entries of the port-accessd process. After a few minutes (180
seconds), the user will be re-authenticated based on the RADIUS session timeout. These are the
options used:
-r show log in reverse order
20. Review the client accounting information. Notice that the session time will never exceed 180
seconds due to the re-authentication interval.
ICX-T1-Access1-avp(config)# show aaa accounting port-access interface all client-
status
Accounting Details
----------------------
Accounting Session ID : 172080532651
Input Packets : 35
Input Octets : 3878
Output Packets : 145
Role Information:
Attributes overridden by RADIUS are prefixed by '*'.
Name : RADIUS_2063809959
Type : radius
----------------------------------------------
Session Timeout : 180 secs
Access VLAN : 11
22. Next, review the authenticated users on the interfaces. Notice the difference with the previous
client-status command:
ICX-T1-Access1-avp(config)# show aaa authentication port-access interface all
client-status
Authentication Details
----------------------
Authorization Details
----------------------
Status : Applied
Steps
Define group for core switches, IP
Access-1
1. First, review the current online time of the 802.1X authenticated user. When the CoA disconnect
message is sent in the next steps, you should see that this timer will be reset since the CoA will
trigger a new authentication.
ICX-T1-Access1-avp(config)# show aaa authentication port-access interface all
client-status
Authentication Details
----------------------
Status : dot1x Authenticated
Auth Precedence : dot1x - Authenticated, mac-auth - Not attempted
Auth History : dot1x - Authenticated, 141s ago
Authorization Details
----------------------
Status : Applied
2. On PC1, navigate to ClearPass, then navigate to Monitoring > Live Monitoring > Access
Tracker.
3. Open the latest authentication event from your own access switch (use the NAS IP to find your
own authentication session).
If the CoA is not successful, you should check the dynamic authorization con-
figuration on the switch. This was done in Task 2.
7. In the Access Tracker list, a new authentication entry should show up a few seconds later.
Authentication Details
----------------------
Status : dot1x Authenticated
Auth Precedence : dot1x - Authenticated, mac-auth - Not attempted
Auth History : dot1x - Authenticated, 98s ago
Authorization Details
----------------------
Status : Applied
IP Address : cppm.arubatraining.com
VRF : default
TLS Enabled : No
Replay Protection : Disabled
Time Window : 300
rfc5176-enforcement-mode : strict
Disconnect Requests : 1
Disconnect ACKs : 1
Disconnect NAKs : 0
CoA Requests : 0
CoA ACKs : 0
CoA NAKs : 0
Shared-Secret :
AQBapQ4rJhVI+hBRTebvvLEVATMhjtFfj0Pd8s36SS/CPa33CAAAAJQbRDn917lm
Steps
Define traffic classes
Each user role will be configured with unique access restrictions to the network. To control network
access, the administrator first needs to describe the traffic classes.
These are global objects that can be used in multiple policies.
Access-1
1. Open a terminal session to Access-1 and enter configuration mode. Define a new class for any
traffic
ICX-T1-Access1-avp(config)# class ip any
ICX-T1-Access1-avp(config-class-ip)# match any any any
ICX-T1-Access1-avp(config-class-ip)# exit
2. Define a new class for servers. This is for lab purposes only, the IP addresses of the core switches
are used to simulate servers.
ICX-T1-Access1-avp(config)# class ip servers
ICX-T1-Access1-avp(config-class-ip)# match any any 10.1.1.2/255.255.255.255
ICX-T1-Access1-avp(config-class-ip)# match any any 10.1.1.3/255.255.255.255
3. The sequencing makes it easy to remove a single line, or to insert a line between two existing
lines. Remove the second line again and verify one server is listed.
ICX-T1-Access1-avp(config-class-ip)# no 20
ICX-T1-Access1-avp(config-class-ip)# show running-config current-context
class ip servers
10 match any any 10.0.1.2
ICX-T1-Access1-avp(config-class-ip)# exit
6. Define the contractor policy. Contractors will not be allowed access to the "servers" class, so this
action is set to drop. Any other traffic is permitted.
ICX-T1-Access1-avp(config)# port-access policy contractor
ICX-T1-Access1-avp(config-pa-policy)# class ip servers action drop
ICX-T1-Access1-avp(config-pa-policy)# class ip any
8. The policy also allows the administrator to add a comment to each line.
ICX-T1-Access1-avp(config-pa-policy)# 10 comment No server access for Contractors
ICX-T1-Access1-avp(config-pa-policy)# show running-config current-context
port-access policy contractor
10 class ip servers action drop
10 comment No server access for Contractors
20 class ip any
ICX-T1-Access1-avp(config-pa-policy)# exit
9. Review the policy that was just created for the contractor.
ICX-T1-Access1-avp(config)# show port-access policy contractor
12. Review the defined objects. Notice that these roles are local roles, while in the previous section,
the radius role was automatically defined based on the RADIUS attributes. In a later lab, role
definitions will be downloaded from ClearPass; these are not local roles, but will be clearpass
roles.
Role Information:
Attributes overridden by RADIUS are prefixed by '*'.
Name : RADIUS_2063809959
Type : radius
----------------------------------------------
Session Timeout : 180 secs
Access VLAN : 11
Name : contractor
Type : local
----------------------------------------------
Access VLAN : 11
Policy : contractor
Name : employee
Type : local
14. On PC3 (connected to Access-1 port 1/1/3), change the 802.1X authentication credentials to:
a. Username: icx-employee
b. Password: aruba123
16. Check the Output tab of the entry and expand the RADIUS Response section. Notice that AOS-
CX is now also using the Aruba RADIUS dictionary, so to push a user role, the Aruba-User-Role
attribute is used, just like the Aruba Mobility Controller (MC).
Authentication Details
----------------------
Status : Authenticated
Type : Pass-Through
EAP-Method : PEAP
Auth Failure reason :
Time Since Last State Change : 442s
Authentication Statistics
-------------------------
Authentication : 1
Authentication Timeout : 0
EAP-Start While Authenticating : 0
EAP-Logoff While Authenticating : 0
Successful Authentication : 1
Failed Authentication : 0
Re-Authentication : 1
Successful Re-Authentication : 1
18. Review the user role authorization; the user should have been assigned the employee role based
on the RADIUS Aruba-User-Role assignment by ClearPass.
ICX-T1-Access1-vsa(config)# show aaa authentication port-access interface all
client-status
Authentication Details
----------------------
Status : dot1x Authenticated
Auth Precedence : dot1x - Authenticated, mac-auth - Not attempted
Auth History : dot1x - Authenticated, 1s ago
Authorization Details
----------------------
Role : employee
Status : Applied
19. On PC3, verify that the employee role can access the "server" host (10.254.1.21). The ping
should be successful.
Optional steps: Test access for user-role contractor
You may test the contractor access. Check with your instructor.
20. On PC3 (connected to Access-1 1/1/3), change the 802.1X credentials to:
a. Username: icx-contractor
b. Password: aruba123
Authentication Statistics
-------------------------
Authentication : 1
Authentication Timeout : 0
EAP-Start While Authenticating : 0
EAP-Logoff While Authenticating : 0
Successful Authentication : 1
Failed Authentication : 0
Re-Authentication : 1
Successful Re-Authentication : 1
Failed Re-Authentication : 0
EAP-Start When Authenticated : 1
EAP-Logoff When Authenticated : 0
Re-Auths When Authenticated : 0
Cached Re-Authentication : 0
Authentication Details
----------------------
Status : dot1x Authenticated
Auth Precedence : dot1x - Authenticated, mac-auth - Not attempted
Auth History : dot1x - Authenticated, 54s ago
Authorization Details
----------------------
Role : contractor
Status : Applied
24. On PC3, verify the contractor role cannot access the "server: host (10.1.1.2 and 101.1.3). The
ping should not be successful.
Steps
Define group for core switches, IP
PC3
1. On PC3, log in with a user that has an incorrect role assignment.
2. On the PC3, change the 802.1X authentication credentials to:
a. Username: icx-badrole
b. Password: aruba123
Authentication Details
----------------------
Status : Authenticated
Type : Pass-Through
EAP-Method : PEAP
Auth Failure reason :
Time Since Last State Change : 12s
Authentication Statistics
-------------------------
Authentication : 1
Authorization Details
----------------------
Role :
Status : Invalid
5. Disable port 1/1/3 so that it does not interfere with the next lab.
ICX-T1-Access1-vsa(config)# interface 1/1/3
ICX-T1-Access1-vsa(config-if)# shutdown
ICX-T1-Access1-vsa(config-if)# exit
Lab diagram
Overview
In this lab activity, the MAC authentication feature will be configured. While MAC authentication is not
a secure authentication method, it will be required in most networks, since there will typically be some
devices that cannot perform 802.1X authentication.
By using MAC authentication, some control can be applied to these devices.
Objectives
n Configure MAC authentication and review single and multiple users on a port.
n Configure user roles with MAC authentication.
n Review the interaction between 802.1X and MAC authentication on the same port.
n Understand client-mode and device-mode authentication.
n Understand the LLDP device profile feature.
Steps
Disconnect the Access-2 switch from the VSX core
1. Open a terminal session to Access-2. This switch will act as an endpoint during the authen-
3. On Access-2, enable the port 1/1/27 that connects to Access-1. This port is still at its default con-
figuration state: it is an access port in VLAN 1.
ICX-Access-2(config)# interface 1/1/27
ICX-Access-2(config-if)# no shutdown
ICX-Access-2(config-if)# exit
6. Enable MAC authentication on the switch and ensure it is using the previously defined RADIUS
server group.
ICX-T1-Access1-avp(config)# aaa authentication port-access mac-auth radius server-
group cppm
ICX-T1-Access1-avp(config)# aaa authentication port-access mac-auth enable
7. Assign port 1/1/27 to VLAN 1. In this lab, it is simply used as the base landing VLAN in case the
RADIUS server does not assign a VLAN. There are no DHCP server or other resources in this
VLAN in this example.
ICX-T1-Access1-avp(config)# interface 1/1/27
ICX-T1-Access1-avp(config-if)# vlan access 1
10. Verify that the MAC address of the Access-2 switch is now authenticated. The ClearPass system
has been configured to assign the MAC OUI range of the switch to VLAN 11.
It make take a few moments for Access-2 to generate some traffic; repeat the fol-
lowing command until the authentication shows up. This should occur within about
30 seconds.
Authentication Details
----------------------
Status : Authenticated
Auth-Method : chap
Auth Failure reason :
Time Since Last State Change : 105s
11. Confirm the MAC address on the port is now dynamically learned on VLAN 11 by reviewing the
mac-address-table.
ICX-T1-Access1-avp(config)# show mac-address-table
MAC age-time : 300 seconds
Number of MAC addresses : 11
12. For this initial MAC authentication lab, ClearPass returns standard RADIUS IETF VLAN assign-
Authentication Details
----------------------
Status : mac-auth Authenticated
Auth Precedence : dot1x - Not attempted, mac-auth - Authenticated
Auth History : mac-auth - Authenticated, 245s ago
Authorization Details
----------------------
Status : Applied
13. Review the role details to discover the assigned RADIUS attributes.
ICX-T1-Access1-avp(config)# show port-access role radius
Role Information:
Attributes overridden by RADIUS are prefixed by '*'.
Name : RADIUS_1453543606
Type : radius
----------------------------------------------
Access VLAN : 11
Task 11-2: Verify access with two devices connected on same port
Objectives
This task is optional and can be done if time permits. Check with your instructor. If you skip this task,
you can move to the next task.
In this task, the PC that is connected to Access-2 will be authenticated as well. This will result in two
untagged devices that are authenticated on the same physical port, but they are still assigned to dif-
ferent VLANs. This is also known as MAC-Based VLAN (MBV), since the switch assigns the traffic to the
correct VLAN based on the authenticated client MAC address.
Initially, two clients (PC4 and Access-2) will be connected to the same port 1/1/27 on Access-1. Only
one of these two clients will be able to come online, since there is a default client limit of one. Next, this
client limit will be increased so both clients can come online at the same time.
366 Task 11-2: Verify access with two devices connected on same port
Lab diagram
Steps
Access-2
1. On the Access-2 switch, enable port 1/1/4 and assign it to VLAN 1. This is the port that connects
PC4
2. Using the remote lab dashboard, connect to PC4.
3. Open Network Connections and look for the Lab NIC.
Make sure you select the Lab NIC and not the DO NOT TOUCH interface.
4. Bounce the Lab NIC interface (disable/enable). This will trigger the DHCP client to send out a
request.
Access-2
Task 11-2: Verify access with two devices connected on same port 367
5. Verify on Access-2 that a MAC address is learned on port 1/1/4. The MAC will probably start
with 00:50:56, which is the range used by VMware to generate MAC addresses for the VMs.
ICX-Access-2(config)# show mac-address-table
MAC age-time : 300 seconds
Number of MAC addresses : 5
Access-1
6. Review the active clients on port 1/1/27.
ICX-T1-Access1-avp(config)# show aaa authentication port-access interface 1/1/27
client-status
Authentication Details
----------------------
Status : mac-auth Authenticated
Auth Precedence : dot1x - Not attempted, mac-auth - Authenticated
Auth History : mac-auth - Authenticated, 1848s ago
Authorization Details
----------------------
Status : Applied
368 Task 11-2: Verify access with two devices connected on same port
b. Answer: Only one client is authenticated, even though two clients (the Access-2 switch
and the client PC4) are connected to the port.
7. Review the MAC-address table on Access-1, using the detail option word. Look for the Denied
column. This reveals that the MAC-address of the client has been seen on the port but is not
allowed to become active.
In the following output, it can be either the PC4 or the Access-2 MAC address that is
"denied" on port 1/1/27. This depends on which MAC address was authenticated on
the port; the other MAC address will be denied.
This is because the switch applies a default client limit of one client on each switch
port.
8. Now, increase the client limit to ensure multiple clients; can be authenticated on the same switch
port.
9. On Access-1, enter the interface 1/1/27 context and increase the client limit to three. Reset the
Task 11-2: Verify access with two devices connected on same port 369
Session Details
---------------
Port : 1/1/27
Session Time : 9s
IPv4 Address :
IPv6 Address :
Device Type :
Authentication Details
----------------------
Status : mac-auth Authenticated
Auth Precedence : dot1x - Not attempted, mac-auth - Authenticated
Auth History : mac-auth - Authenticated, 9s ago
Authorization Details
----------------------
Status : Applied
Authentication Details
----------------------
Status : mac-auth Authenticated
Auth Precedence : dot1x - Not attempted, mac-auth - Authenticated
Auth History : mac-auth - Authenticated, 62s ago
Authorization Details
----------------------
Status : Applied
ICX-T1-Access1-avp(config-if)#
In case Access-2 is not listed as a client, bounce the VLAN 1 Layer 3 interface to trig-
ger some DHCP traffic.
ICX-Access-2(config)# interface vlan 1
ICX-Access-2(config-if)# shutdown
ICX-Access-2(config-if)# no shutdown
ICX-Access-2(config)# exit
370 Task 11-2: Verify access with two devices connected on same port
12. Review the RADIUS attributes that were pushed to the client PC MAC-auth by checking the
radius roles.
ICX-T1-Access1-avp(config-if)# show port-access role radius
Role Information:
Attributes overridden by RADIUS are prefixed by '*'.
Name : RADIUS_1453543606
Type : radius
----------------------------------------------
Access VLAN : 11
Name : RADIUS_1576327855
Type : radius
----------------------------------------------
Access VLAN : 12
13. Review the updated MAC address table on port 1/1/27. Notice how both MAC addresses of
Access-2 and PC4 are now active, but each has been assigned to its own VLAN, based on the
instructions of the RADIUS server.
ICX-T1-Access1-avp(config-if)# show mac-address-table interface 1/1/27
MAC age-time : 300 seconds
Number of MAC addresses : 1
Task 11-2: Verify access with two devices connected on same port 371
15. Open the MAC-auth entry for MAC 005056 (the PC4 VM) and click Input to review the attrib-
utes that are used for MAC authentication.
16. Check the Output tab and click RADIUS Response to see the VLAN that was returned to the
switch. Close Request Details.
17. Open the second MAC authentication entry (for the Access-2 switch) and review the Output set-
tings.
372 Task 11-2: Verify access with two devices connected on same port
Task 11-3: Aruba user role-based access
Objectives
Similar to the 802.1X authentication, MAC authentication also supports the use of user roles that are
defined on the switch. User roles on the switch have the advantage of grouping all the relevant access
settings (VLAN, ACL, QoS, POE priority) into a single logical object. This simplifies the RADIUS server
configuration, since the RADIUS server only needs to assign the role to the switch, while the switch
knows the configuration of that role.
In this lab, the Access-1 switch will be assigned the dev-switch role, while the PC connected to the
Steps
Access-1
1. Open a terminal connection to Access-1 and enter configuration mode.
2. If you did not complete the previous optional task, increase the client limit on port 1/1/27. Other-
wise, move to the next step.
ICX-T1-Access1-avp(config)# interface 1/1/27
ICX-T1-Access1-avp(config-if)# aaa authentication port-access client-limit 3
ICX-T1-Access1-avp(config-if)# exit
You can verify the current interface configuration using show running interface
1/1/27 command and check if the client limit was applied.
3. Define a new port-access user role named "dev-switch." Provide the role a VLAN trunk with
native VLAN 11, and allowed VLANs 11, 12, and 13.
ICX-T1-Access1-avp(config)# port-access role dev-switch
ICX-T1-Access1-avp(config-pa-role)# vlan trunk native 11
ICX-T1-Access1-avp(config-pa-role)# vlan trunk allowed 11,12,13
ICX-T1-Access1-avp(config-pa-role)# exit
You may need to generate some traffic to trigger the MAC-auth on the clients, that is, the
Access-2 switch and the PC connected to it.
Access-2
6. On Access-2, disable and enable the VLAN 1 IP interface; this will send out a DHCP request.
ICX-Access-2(config)# interface vlan 1
ICX-Access-2(config-if-vlan)# shutdown
ICX-Access-2(config-if-vlan)# no shutdown
ICX-Access-2(config-if-vlan)# exit
PC4
7. On PC4, connected to Access-2, disable and enable the Lab NIC.
This is important: since PC4 may be assigned to a different VLAN, it needs to renew
Authentication Details
----------------------
Status : mac-auth Authenticated
Auth Precedence : dot1x - Not attempted, mac-auth - Authenticated
Auth History : mac-auth - Authenticated, 458s ago
Authorization Details
----------------------
Role : dev-switch
Status : Applied
Authentication Details
----------------------
Status : mac-auth Authenticated Auth Precedence : dot1x - Not
attempted, mac-auth - Authenticated
Auth History : mac-auth - Authenticated, 81s ago
Authorization Details
----------------------
Role : employee
Status : Applied
-------------------------------------------------------------------------------
VLAN Name Mode Mapping
-------------------------------------------------------------------------------
11 VLAN11 native-untagged port-access,mbv
12 VLAN12 trunk port-access
13 VLAN13 trunk port-access
Question: What is the listed method for the tagged VLAN — for example, VLAN 12— assign-
ment mapping?
Answer: VLAN 12 is assigned by the port-access module, while a manual VLAN trunk would be
listed as mapped by the 'port' configuration, as can be seen for VLAN 1.
Authentication Details
----------------------
Status : mac-auth Authenticated
Auth Precedence : dot1x - Not attempted, mac-auth - Authenticated
Auth History : mac-auth - Authenticated, 44s ago
Authorization Details
----------------------
Access-2
On Access-2, enable the PC port to verify it passes network access without authentication.
5. Enable port 1/1/4 of the PC again.
ICX-Access-2(config-if)# no shutdown
PC4
6. On the PC4, disable and enable the Lab NICinterface.
Access-1
7. On Access-1, verify the MAC address table shows two MAC addresses on interface 1/1/27, and
the Denied status is "false." This means these MAC addresses have access to the network.
ICX-T1-Access1-vsa(config)# show mac-address-table detail
MAC age-time : 300 seconds
Number of MAC addresses : 13
PC1
Question: How many authentication events are there for the last test?
Access-2
10. On Access-2, disable port 1/1/4 to PC4.
ICX-Access-2(config-if)# shutdown
ICX-Access-2(config-if)# exit
380 Task 11-5: Authentication priority order with combined MAC-auth and 802.1X
Lab diagram
Steps
Disable the 802.1X supplicant on PC3 (connected to port 1/1/3 on Access-1)
1. Open a session to PC3.
Task 11-5: Authentication priority order with combined MAC-auth and 802.1X 381
Enable MAC-auth on Access-1
3. On Access-1, configure port 1/1/3 for MAC-auth.
ICX-T1-Access1-vsa(config)# interface 1/1/3
ICX-T1-Access1-vsa(config-if)# aaa authentication port-access mac-auth enable
Client 00:50:56:b1:2c:b8
========================
Session Details
---------------
Port : 1/1/3
Session Time : 5s
IPv4 Address :
IPv6 Address :
Device Type :
382 Task 11-5: Authentication priority order with combined MAC-auth and 802.1X
Authentication Details
----------------------
Status : Authenticating
Auth Precedence : dot1x - Authenticating, mac-auth - Not attempted
Auth History :
Authorization Details
----------------------
Role :
Status :
With the default timers, it may take several minutes before the 802.1X times out and
performs the MAC-auth. During testing, about three minutes were observed.
Eventually, the switch will consider that 802.1X has failed and it will perform MAC-auth.
The following output is for reference only: you do not need to wait for this timeout in
the lab. You can move to the next step.
Authentication Details
----------------------
Status : mac-auth Authenticated
Auth Precedence : dot1x - Unauthenticated, mac-auth - Authenticated
Auth History : mac-auth - Authenticated, 93s ago
dot1x - Unauthenticated, Supplicant-Timeout, 93s ago
Authorization Details
----------------------
Task 11-5: Authentication priority order with combined MAC-auth and 802.1X 383
Role : employee
Status : Applied
These are the validated timers when the labs were developed. Adjust these timers
based on the requirements of the deployment.
10. Verify the authentication status. It may help to disable/enable the Lab NIC on the client PC3 to
generate some client traffic.
11. On Access-1, repeat the show aaa authentication port-access interface 1/1/3 client-
status command to follow the state transitions.
If you use the repeat command on the switch, the repeat loop can be stopped using
the Ctrl-c key combination.
384 Task 11-5: Authentication priority order with combined MAC-auth and 802.1X
RADIUS overridden user roles are suffixed with '*'
Authentication Details
----------------------
Status : mac-auth Unauthenticated
Auth Precedence : dot1x - Unauthenticated, mac-auth - Unauthenticated
Auth History : mac-auth - Authenticated, 1s ago
dot1x - Unauthenticated, Supplicant-Timeout, 1s ago
Authorization Details
----------------------
Role :
Status :
ICX-T1-Access1-vsa(config-if)# repeat delay 5
Authentication Details
----------------------
Status : Authenticating
Auth Precedence : dot1x - Initialized, mac-auth - Not attempted
Task 11-5: Authentication priority order with combined MAC-auth and 802.1X 385
Client 00:50:56:b1:7a:37
============================
Session Details
---------------
Port : 1/1/3
Session Time : 3s
Authentication Details
----------------------
Status : Authenticating
Auth Precedence : dot1x - Authenticating, mac-auth - Not attempted
Once the 802.1X authentication is considered "failed," it will take about 60 seconds with the con-
figured timers for MAC-auth to be performed.
ICX-Tx-Access1-vsa(config-if)# show aaa authentication port-access interface 1/1/3
client-status
Authentication Details
----------------------
Status : mac-auth Authenticated
Auth Precedence : dot1x - Unauthenticated, mac-auth - Authenticated
Authorization Details
----------------------
Role : employee
Status : Applied
12. If you used the repeat command, enter Ctrl-c to stop the output.
This ensures that any device that is not 802.1X-capable, such as IoT devices, will still be able to
access the network using MAC-auth.
Notice that the current role of the device is "employee": this was assigned by the MAC-auth
authentication process.
386 Task 11-5: Authentication priority order with combined MAC-auth and 802.1X
Task 11-6: Verify 802.1X authentication precedence over MAC-auth
In the next steps, the 802.1X default precedence over MAC-auth will be demonstrated. This means that
in case both MAC-auth and 802.1X succeed, the 802.1X authentication method will control the final
access for the client device.
Diagram
Authentication Details
----------------------
Status : dot1x Authenticated
Auth Precedence : dot1x - Authenticated, mac-auth - Not attempted
Auth History : dot1x - Authenticated, 5s ago
Authorization Details
----------------------
Role : contractor
Status : Applied
Authentication Details
----------------------
Status : mac-auth Authenticated
Auth Precedence : dot1x - Held, mac-auth - Authenticated
Auth History : mac-auth - Authenticated, 2s ago
dot1x - Unauthenticated, Server-Reject, 2s ago
dot1x - Authenticated, 523s ago
Authorization Details
----------------------
Role : employee
Status : Applied
6. Wait a few seconds and repeat the command until the 802.1X authentication has failed.
ICX-T1-Access1-vsa(config-if)# show aaa authentication port-access interface 1/1/3
client-status
Authentication Details
----------------------
Status : mac-auth Authenticated
Auth Precedence : dot1x - Unauthenticated, mac-auth - Authenticated
Auth History : mac-auth - Authenticated, 103s ago
dot1x - Unauthenticated, Server-Reject, 103s ago
dot1x - Authenticated, 624s ago
Objectives
In this task, the AOS-CX device profiles will be demonstrated. This is not a security feature but a con-
venience feature, similar to MAC-auth.
In this case, instead of using the client MAC address for authentication, like MAC-auth, it is possible to
configure a switch port based on the incoming LLDP or CDP messages. Since many network devices
support LLDP or CDP, this means that the switch port of those devices can be easily provisioned based
on the received LLDP communication from these network devices.
LLDP is more difficult to spoof compared to a client MAC address, but it should still be understood that
there is no actual authentication happening; with a more advanced toolset, the LLDP messages can still
be spoofed. This is why the HPE Aruba Networking Device Profiles feature is considered a "con-
venience" feature.
Some examples for real-world deployment:
n Aruba AP is connected to any switch port. The switch assigns a device profile with the correct
VLAN untagged and tagged states.
n Any vendor AP that supports LLDP or CDP is connected to any switch port. The switch assigns a
Steps
Collect information of the peer LLDP device
Access-1
1. Open a terminal session on Access-1 and enter configuration mode.
2. Change the hostname, replacing the "vsa" the hostname with "lldp."
ICX-T1-Access1-vsa(config)# hostname ICX-T1-Access1-lldp
ICX-T1-Access1-lldp(config)#
6. Wait up to 30 seconds, then review the LLDP neighbors. On port 1/1/27, there should be an
LLDP neighbor now.
ICX-T1-Access1-lldp(config)# show lldp neighbor-info
7. Review the details for the neighbor on interface 1/1/27. The device profile can be applied to the
chassis-name and the chassis-description information.
It is also possible to assign the device profile based on a vendor-specific LLDP TLV,
but that feature is less frequently implemented. The HPE Aruba Networking APs,
AOS-S switch, and AOS-CX switches do report a specific vendor OUI, so it is possible
to apply the vendor OUI filter for those devices.
In this lab, the assignment will be done based on the LLDP system description. The
Access-2 switch is a specific switch model, and the AOS-CX switches report their
model code (Jxxxx) in the LLDP system description.
Take note of the Jxxxx code in the system description in this lab guide: it is JL668A
or JL660A (Pod 11).
The lab assumes that the core switches are using a different model number than the
access switches. If your lab is using the same model number, it is possible to use the
system name (access) instead of the model number.
Port : 1/1/27
Neighbor Entries : 1
Neighbor Entries Deleted : 0
Neighbor Entries Dropped : 0
Neighbor Entries Aged-Out : 0
Neighbor System-Name : ICX-Access-2
Neighbor System-Description : Aruba JL668A FL.10.13.1000
Neighbor Chassis-ID : 10:4f:58:fc:b2:40
Neighbor Management-Address : 10.1.1.5
Chassis Capabilities Available : Bridge, Router
8. Define a new role that will be used in this task. The device profile feature also uses the same
port-access roles that are used by the 802.1X and MAC-auth modules. For the purpose of this
lab, a dedicated role will be defined.
For this lab demo, device-mode authentication is enabled. This means that the port
will be "open" for any MAC-address after this device profile has been applied. This
11. Define a new match criteria based on the LLDP neighbor system description.
ICX-T1-Access1-lldp(config-lldp-group)# match sys-desc JL668A
All students should verify the model number of Access-1 and Access-2. For example,
in Pod 13, they are model JL668A.
12. Review the current configuration of the LLDP group and exit the group context.
ICX-T1-Access1-lldp(config-lldp-group)# show running-config current-context
port-access lldp-group demo-switch
seq 10 match sys-desc JL668A
ICX-T1-Access1-lldp(config-lldp-group)# exit
14. Bind the LLDP group and the user role to this device profile and enable it.
ICX-T1-Access1-lldp(config-device-profile)# associate role demo-lldp-switch
ICX-T1-Access1-lldp(config-device-profile)# associate lldp-group demo-switch
ICX-T1-Access1-lldp(config-device-profile)# enable
ICX-T1-Access1-lldp(config-device-profile)# exit
18. Review that no other successful authentication device is online on this port.
ICX-T1-Access1-lldp(config)# show aaa authentication port-access interface 1/1/27
client-status
No aaa clients found.
19. Review that the port VLAN status is now active based on the VLAN settings of the device profile
user role.
ICX-T1-Access1-lldp(config)# show vlan port 1/1/27
-------------------------------------------------------------------------------
VLAN Name Mode Mapping
-------------------------------------------------------------------------------
11 VLAN11 native-untagged port-access
12 VLAN12 trunk port-access
21. Verify that the VLAN configuration of port 1/1/27 has been reverted.
ICX-T1-Access1-lldp(config)# show vlan port 1/1/27
-------------------------------------------------------------------------------
VLAN Name Mode Mapping
-------------------------------------------------------------------------------
1 DEFAULT_VLAN_1 access port
Steps
Access-1
1. On Access-1, change the hostname back to the default lab hostname.
ICX-T1-Access1-lldp(config)# hostname ICX-T1-Access1
Access-2
3. Save checkpoint icx-lab11-mac.
ICX-Access-2(config)# copy running-config checkpoint icx-lab11-mac
Copying configuration: [Success]
Lab 12.1: Integration with HPE Aruba Networking ClearPass Policy Manager Platform downloadable
user roles
Lab diagram
Overview
This lab requires the completion of the 802.1X (Lab 10) and MAC authentication (Lab 11) lab activ-
ities.
This lab activity will demonstrate how ClearPass downloadable user roles can be used to simplify the
deployment of the authentication user roles to the switches. The roles are only defined on the
ClearPass host, and they will be downloaded on the fly, as needed, by the access switches.
This means that the administrator still needs to understand the concept of roles. However, it is no
longer necessary to check that all the switches have the latest configuration/policy version of all these
Lab 12.1: Integration with HPE Aruba Networking ClearPass Policy Manager Platform downloadable user roles 399
user roles in their configuration, since this will be done automatically for the administrator. This will
also reduce the operational configuration file of the access switches, since these roles are not saved in
the configuration file.
The switch will download the definition from ClearPass as part of the authentication process using the
REST API. Therefore, credentials must be configured on the switch to access the ClearPass host to
download the role configuration.
Objectives
n Define secure HTTPS access between the switch and ClearPass by importing the Trust Anchor
(TA) certificate.
n Define the credentials to access the ClearPass REST API.
n Verify the operation of the downloadable user roles.
The AOS-CX switch should be able to verify the validity of the ClearPass server certificate.
This requires a valid time to be set on the switch, and the switch should have a valid cer-
tificate chain (trust anchor) to validate the certificate on the ClearPass server.
Steps
1. On PC3 (connected to Access-1 port 1/1/3), change the 802.1X authentication credentials to:
n Username: icx-employee
n Password: aruba123
The switch time should be accurate and in sync with the American Eastern Standard
time zone.
NTP : Enabled
NTP DHCP : Enabled
NTP Authentication : Disabled
NTP Server Connections : Using the default VRF
Aruba Networking ClearPass Policy
Lab 12.1: Integration with HPE
9. Open the cert file lab 12.1 - clearpass - root - ca.txt and copy the contents.
If you are unable to paste the content to Access-1, pressing Ctrl-Alt-Shift will open a
clipboard. Paste the content into the clipboard, press Ctrl-Alt-Shift to close the clip-
Aruba Networking ClearPass Policy
ICX-T1-Access1(config-ta-cert)#-----BEGIN CERTIFICATE-----
ICX-T1-Access1(config-ta-cert)#
ICX-T1-Access1(config-ta-cert)#MIIEGTCCAwGgAwIBAgIBEjANBgkqhkiG9w0BAQ0FADCBkzELMAkGA1UEBhMCVVMx
ICX-T1-Access1(config-ta-cert)#EzARBgNVBAgMCkNhbGlmb3JuaWExEjAQBgNVBAcMCVN1bm55dmFsZTEYMBYGA1UE
ICX-T1-Access1(config-ta-cert)#CgwPQXJ1YmEgRWR1Y2F0aW9uMQwwCgYDVQQLDANFZHUxEDAOBgNVBAMMB0FDU1Ag
ICX-T1-Access1(config-ta-cert)#Q0ExITAfBgkqhkiG9w0BCQEWEmFjc3AtY2FAYWNzcC5sb2NhbDAeFw0yMDAxMjcx
ICX-T1-Access1(config-ta-cert)#ODE5NDRaFw0zMDAxMjcxODQ5NDRaMIGTMQswCQYDVQQGEwJVUzETMBEGA1UECAwK
11. When the paste is complete, press the CTRL-D key combination. This will instruct the switch to
parse the pasted cert and show the subject name. Now confirm that this cert is okay.
ICX-T1-Access1(config-ta-cert)# crtl + d
The certificate you are importing has the following attributes:
Subject: C = US, ST = California, L = Sunnyvale, O = Aruba Education, OU = Edu, CN
= ACSP CA, emailAddress = acsp-ca@acsp.local
Issuer: C = US, ST = California, L = Sunnyvale, O = Aruba Education, OU = Edu, CN
= ACSP CA, emailAddress = acsp-ca@acsp.local
Serial Number: 0x12
TA certificate import is allowed only once for a TA profile
Do you want to accept this certificate (y/n)? y
12. Exit the context and verify that the TA profile is installed.
ICX-T1-Access1(config-ta-cppm)# exit
ICX-T1-Access1(config)# show crypto pki ta-profile
17. Verify the running configuration for RADIUS server lines; there should be only one RADIUS
server.
ICX-T1-Access1(config)# show running-config | include radius-server
radius-server tracking user-name icx-radius-track password ciphertext
AQBapQigcgGUUVgijVS4PZfzCh60bJRm3oCYmRJ5yptBrq/VCAAAAOBgmFAxlMU6
radius-server host cppm.arubatraining.com key ciphertext
AQBape3Xwfby5RSI9s19du+71MHbiz8xNsFqkjBlk/zX2owYCAAAAHNgsNDp+pSj tracking enable
clearpass-
username duradmin clearpass-password ciphertext
AQBapcTCqknqxO39UgIyhenwnbEIk9IQEX0NLZKEiHtnGzS8CAAAAKOYejX8PiFn
18. You can also review the RADIUS list in a different format.
Aruba Networking ClearPass Policy
Shared-Secret: None
Timeout: 5
Auth-Type: pap
Retries: 1
Initial TLS Connection Timeout: 30
Steps
Access-2
1. Use PC1 to open a session to the ClearPass server.
2. Navigate to Configuration > Enforcement > Profiles.
4. Open icx-aruba-dur-employee. The RADIUS VSA attribute used here is Aruba-CPPM-Role. The
data contains the CLI commands that define the complete user role.
In the enforcement profile, the user-role name is not important; in the example, "dur"
is used. When the profile is downloaded by the switch, the switch will put the
provided configuration under a role name that will be based on the Enforcement
Policy name, which is "icx-aruba-dur-employee" in this example.
Steps
Testing employee access
1. Open a terminal session to Access-1 and enter configuration mode.
2. Change the hostname to include the string "dur." This will ensure the correct ClearPass policy
rules are used for the downloadable user roles.
408 Task 12.1-3: Testing 802.1X DUR with employee and contractor
ICX-T1-Access1(config)# hostname ICX-T1-Access1-dur
ICX-T1-Access1-dur(config)#
3. Review the current configuration of port 1/1/3. This port should have 802.1X enabled (MAC
authentication can also be enabled, but it will not be tested on this port).
ICX-T1-Access1-dur(config)# show run interface 1/1/3
interface 1/1/3
no shutdown
no routing
vlan access 1
aaa authentication port-access dot1x authenticator
eapol-timeout 30
max-eapol-requests 1
max-retries 1
enable
aaa authentication port-access mac-auth
enable
exit
4. On PC3, connected to Access-1 port 1/1/3, enable 802.1X on the Lab NIC, and configure the
employee credentials (refer to the 802.1X lab for instructions on how to do this):
n Username: icx-employee
n Password: aruba123
client-status
Task 12.1-3: Testing 802.1X DUR with employee and contractor 409
======================================
Session Details
---------------
Port : 1/1/3
Session Time : 13845s
IPv4 Address :
IPv6 Address :
Device Type :
Authentication Details
----------------------
Status : dot1x Authenticated
Auth Precedence : dot1x - Authenticated, mac-auth - Not attempted
Auth History : dot1x - Authenticated, 62s ago
dot1x - Unauthenticated, Server-Reject, 164s ago
Authorization Details
----------------------
Role : icx_aruba_dur_employee-3044-7
Status : Applied
6. Next, review the current roles on the switch. Notice how the local, radius, and clearpass (DUR)
roles all coexist on the same switch.
ICX-T1-Access1-dur(config)# show port-access role
Role Information:
Attributes overridden by RADIUS are prefixed by '*'.
Name : contractor
Type : local
----------------------------------------------
Access VLAN : 11
Policy : contractor
Name : demo-lldp-switch
Type : local
----------------------------------------------
Authentication Mode : device-mode
Native VLAN : 11
Allowed Trunk VLANs : 11-12
Name : dev-switch
Type : local
----------------------------------------------
Authentication Mode : client-mode
Native VLAN : 11
Allowed Trunk VLANs : 11-13
410 Task 12.1-3: Testing 802.1X DUR with employee and contractor
Name : employee
Type : local
----------------------------------------------
Access VLAN : 11
Policy : employee
Name : icx_aruba_dur_employee-3044-7
Type : clearpass
Status: Completed
----------------------------------------------
Access VLAN : 11
Policy : employee_icx_aruba_dur_employee-3044-7
Role Information:
Name : icx_aruba_dur_employee-3044-7
Type : clearpass
Status: Completed
----------------------------------------------
Access VLAN : 11
Policy : employee_icx_aruba_dur_employee-3044-7
<output omitted>
Task 12.1-3: Testing 802.1X DUR with employee and contractor 411
Answer: The IP class name begins with "any_icx_aruba_dur_employee."
9. Next, review the IP classes in the system.
ICX-T1-Access1-dur(config)# show class ip
Type Name
Additional Class Parameters
Sequence Comment
Action L3 Protocol
Source IP Address Source L4 Port(s)
Destination IP Address Destination L4 Port(s)
Additional Entry Parameters
-------------------------------------------------------------------------------
IPv4 any
10
match any
any
any
-------------------------------------------------------------------------------
IPv4 any_icx_aruba_dur_employee-3044-7
10
match any
any
any
-------------------------------------------------------------------------------
IPv4 servers
10
match any
any
10.0.1.2
This demonstrates that the downloaded user roles and their member objects are added to the
operational configuration of the switch.
10. Review the running configuration and look for any user roles, policies, or classes with "dur" in the
name.
ICX-T1-Access1-dur(config)# show running-config | include dur
hostname ICX-T1-Access1-dur
radius-server host cppm.arubatraining.com key ciphertext
AQBape3Xwfby5RSI9s19du+71MHbiz8xNsFqkjBlk/zX2owYCAAAAHNgsNDp+pSj tracking enable
clearpass-
username duradmin clearpass-password ciphertext
AQBapcTCqknqxO39UgIyhenwnbEIk9IQEX0NLZKEiHtnGzS8CAAAAKOYejX8PiFn
412 Task 12.1-3: Testing 802.1X DUR with employee and contractor
Answer: No, the ClearPass downloadable user roles are always downloaded on the fly and are
not stored in the switch’s configuration. This demonstrates that the downloaded user roles and
their member objects are added to the switch's operational configuration, but they are not added
to the switch's running or startup configurations.
Verify the contractor DUR
11. On PC3, change the 802.1X credentials to the contractor account:
a. Username: icx-contractor
b. Password: aruba123
12. On the switch, review the authenticated clients on port 1/1/3.
ICX-T1-Access1-dur(config)# show aaa authentication port-access interface 1/1/3
client-status
Authentication Details
----------------------
Status : dot1x Authenticated
Auth Precedence : dot1x - Authenticated, mac-auth - Not attempted
Auth History : dot1x - Authenticated, 18s ago
dot1x - Authenticated, 53s ago
Authorization Details
----------------------
Role : icx_aruba_dur_contractor-3042-8
Status : Applied
Aruba Networking ClearPass Policy
Role Information:
Name : icx_aruba_dur_contractor-3042-8
Type : clearpass
Task 12.1-3: Testing 802.1X DUR with employee and contractor 413
Status: Completed
----------------------------------------------
Access VLAN : 11
Policy : contractor_icx_aruba_dur_contractor-3042-
8
414 Task 12.1-3: Testing 802.1X DUR with employee and contractor
This demonstrates how the complete user-role definition can be downloaded on the fly from the
Policy Manager server.
Objectives
When defining the user role on ClearPass, the administrator should note that:
n The downloadable user role is fully "self-contained." In the role, it can have its own classes,
policies, and captive profile objects.
n The downloadable user role cannot use any classes, policies or captive portal profiles that are loc-
ally defined in the switch. This means that any referenced object in a DUR must be defined within
the ClearPass enforcement profile.
n ClearPass will automatically generate a name for the downloadable user role, which is based on:
l The name of the "Enforcement Profile."
l The ClearPass internal enforcement object ID (3xxx).
l The version number of the "Enforcement Profile". Every time the enforcement profile is
saved on the ClearPass server, the version number will increment with 1.
n In the object names within the downloadable user role, any <space> or hyphen (-) is auto-
matically replaced with an underscore (_).
n It is not allowed to have "comment" lines in the downloadable user role.
n For classes and policies, it is not required to include line numbers. In that case, the line order will
be used.
n It is important to order the objects correctly in the ClearPass Enforcement Profile:
l Classes should be defined before the policy.
l Policy and Captive Portal profiles should be defined before the actual user role.
n The downloadable user role can refer to a "ubt" zone. This is covered in the mobility controller
lab activity.
n The downloadable user role cannot be used to create a ubt zone. That must be done in the
Aruba Networking ClearPass Policy
switch configuration.
Lab 12.1: Integration with HPE
Steps
Detailed operation of downloadable user roles
1. Using PC1, open a session to ClearPass and navigate to Configuration > Enforcement > Pro-
files. Open the "icx-aruba-dur-contractor" profile.
This seems to suggest that the contents of the DUR are sent to the switch as part of the RADIUS
Access-Accept.
3. On Access-1, review the name of the role on port 1/1/3.
ICX-T1-Access1-dur(config)# show aaa authentication port-access interface 1/1/3
client-status
Authentication Details
----------------------
Status : dot1x Authenticated
Auth Precedence : dot1x - Authenticated, mac-auth - Not attempted
Auth History : dot1x - Authenticated, 568s ago
The output demonstrates that the name of the ClearPass enforcement profile is automatically
part of the name of the DUR.
Questions: What other elements exist in the DUR name?
Answer: In this example, the numbers 3042 and 8.
3042: Every enforcement profile in ClearPass has an internal object number; the range starts at
3000. This is the unique identifier of the enforcement profile, while the name makes it easy to
recognize it.
8: This is the version number. Every time an enforcement profile is saved, the version number is
incremented with 1.
The complete DUR consists of:
n Enforcement Profile name
n Enforcement Profile internal object number
n Enforcement Profile version number
When ClearPass receives an authentication request that has an Aruba-CPPM-Role in the result, it
will not send the detailed commands in the RADIUS request, but only a reference name to the cur-
rent enforcement profile.
Example of a RADIUS trace of the Access-Accept sent by ClearPass:
Next, the switch will access the REST API of ClearPass over HTTPS (this required the TA profile
installation) and download the contents of this enforcement profile.
class ip servers
10 match any any 10.255.0.200
4. On the switch, there is also a local "contractor" role, which is also referring to a "servers" class.
Thanks to the appended names, there is no conflict. Review the IP classes on Access-1. Notice
that there are two server classes:
n servers locally defined on the switch during the 802.1X lab activity
n servers_icx_aruba_... part of the downloadable user role
ICX-T1-Access1-dur(config)# show class ip
Type Name
Additional Class Parameters
Sequence Comment
Action L3 Protocol
Source IP Address Source L4 Port(s)
Destination IP Address Destination L4 Port(s)
Additional Entry Parameters
-------------------------------------------------------------------------------
IPv4 any
Aruba Networking ClearPass Policy
Lab 12.1: Integration with HPE
10
match any
any
any
-------------------------------------------------------------------------------
IPv4 any_icx_aruba_dur_contractor-3042-8
10
This demonstrates that objects in DUR roles will not interfere with each other or with locally
defined roles or objects.
Authentication Details
----------------------
Status : dot1x Authenticated
Auth Precedence : dot1x - Authenticated, mac-auth - Not attempted
Auth History : dot1x - Authenticated, 8s ago
dot1x - Authenticated, 277s ago
Authorization Details
----------------------
Lab cleanup
8. Revert the Access-1 switch hostname to the base hostname.
ICX-T1-Access1-dur(config)# hostname ICX-T1-Access1
ICX-T1-Access1(config)#
Aruba Networking ClearPass Policy
Lab 12.1: Integration with HPE
Lab 12.2: Integration with HPE Aruba Networking MC—user-based tunneling with the MC firewall
Lab diagram
Overview
If you just completed Lab 12.1, the switch configurations are valid and you can start with this lab activ-
ity. This lab activity requires at least the completion of Lab 11 MAC-based authentication and user
roles.
In this lab activity, the AOS-CX switch will be integrated with the mobility controller (MC). The con-
troller licensing and firewall user roles will be reviewed.
On the switch, the connection to the controller will be defined using a gateway zone.
Next, the switch user roles will be updated. The user role will now point to the MC as the "gateway
zone," and a firewall user-role instruction will be included. Once the user has authenticated, the user
and session information will be reviewed on the MC.
Lab 12.2: Integration with HPE Aruba Networking MC—user-based tunneling with the MC firewall 423
Objectives
n Define a connection to the MC for the User-Based Tunneling (UBT).
n Define user roles that use the UBT feature.
n Verify the state and operation of the tunnels on the switch.
n Verify the state and operation of the tunnels on the MC.
Steps
1. Open a terminal connection to the MC:
n Username:admin
n Password:aruba123
2. Review that Access Point (AP) and Policy Enforcement Firewall (PEF) licenses have been
installed.
User: admin
Password:
(icx-T13-mc1) [mynode] # show license
License Table
-------------
Key Installed Expires
(Grace period expiry) Flags Service Type
--- --------- ---------
------------------- ----- ------------
nWrEBufn-F4ZwcIi7-x35TArzw-rtsGx0Fx-+xihtiw9-YOg6DlZy-Ifdepg 2020-05-28 10:38:03 Never
E Next Generation Policy Enfor
cement Firewall Module: 16
mMoMyUT5-WP0e7hyT-MwdL/85X-mhpALGVJ-GSUSP29C-pGUz64Q+-+pszjg 2020-05-28 10:37:52 Never
E Access Points: 16
License Entries: 2
Note: Time under 'Installed' for Subscription licenses is the license generation time.
(icx-T13-mc1) [mynode] #
4. Optional step in case the PEF license feature was not enabled:
(ICX-Tx-MC) [mm] # configure terminal
Enter Configuration commands, one per line. End with CNTL/Z
Saving Configuration...
Configuration Saved.
(ICX-Tx-MC) [mm] (License root(/) pool profile) # exit
(ICX-Tx-MC) [mm] (config) # end
5. Enable the Deep Packet Inspection (DPI) and the application visibility.
(ICX-Tx-MC) [mm] # configure terminal
(ICX-Tx-MC) [mm] (config) # firewall
(ICX-Tx-MC) ^[mm] (config-submode)# dpi
Warning: Application visibility/control is enabled, this change would take effect
after reloading the controller(s) in "/mm"
Saving Configuration...
It takes about seven to eight minutes for the controller in the lab to reboot.
Steps
1. Open a terminal connection to the MC and enter configuration mode.
2. At the /mm level, define VLAN 4000, which is used as the transport VLAN between the switch
and the controller.
This is the transport VLAN inside the IP GRE tunnel between the switch and the MC,
so this VLAN does not need to exist on the intermediate network between the switch
and the MC.
User: admin
Password:
(icx-T13-mc1) ^[mynode] # cd /mm
(icx-T13-mc1) ^[mm] # configure terminal
Enter Configuration commands, one per line. End with CNTL/Z
Configuration Saved.
It is not strictly required to define the transport VLAN on the MC, if all authenticated
devices are assigned controller firewall user roles that include a VLAN instruction
(this is the method used in this lab activity).
However, if a device is assigned to a firewall user role without VLAN instruction, then
the device would still be in the assigned transport VLAN.
In this case, the transport VLAN should be defined on the MC, and it should be
allowed on the MC uplink VLAN trunk ports to the upstream switch.
4. Set the IP source interface for UBT packets to this VLAN 1 interface.
ICX-T1-Access1(config)# ip source-interface ubt interface vlan1
5. Define the UBT zone for the MC. In the current release, only one UBT zone is supported. Make
sure to enable the zone.
n Zone name: mc
n Controller IP: 10.1.1.6
ICX-T1-Access1(config)# ubt zone mc vrf default
ICX-T1-Access1(config-ubt-mc)# primary-controller ip 10.1.1.6
ICX-T1-Access1(config-ubt-mc)# enable
ICX-T1-Access1(config-ubt-mc)# exit
Question: What could be a reason for the operational status to be down even though the admin
state shows as up?
Answer: The switch has not yet been configured to use a transport VLAN for the user-tunneled
traffic.
7. Define VLAN 4000 as the UBT transport VLAN.
ICX-T1-Access1(config)# vlan 4000
ICX-T1-Access1(config-vlan-4000)# exit
ICX-T1-Access1(config)# ubt-client-vlan 4000
Zone Name : mc
UBT Mode : local-vlan
Primary Controller : 10.1.1.6
Backup Controller : ---/---
SAC HeartBeat Interval : 1
UAC KeepAlive Interval : 60
VLAN Identifier : 4000
VRF Name : default
Wake-on-LAN Enabled-VLANs: -NA-
Admin State : Enabled
PAPI Security Key : Disabled
Operational State : up
9. On Access-1, verify that the switch has registered with the MC.
ICX-T1-Access1(config)# show ubt state
=====================================================================
Zone mc:
=====================================================================
Name Tunneled Node Mac IP Address Age(d:h:m) Key Tunnel Index SAC IP
Address S-SAC IP Address A-Users S-Users Flags
---- ----------------- ---------- ---------- --- ------------ -------------
- ---------------- ------- ------- -----
ICX-T1-Access1 10:4f:58:f6:e3:80 10.1.1.4 00:00:26 deed tunnel 9 10.1.1.6
0.0.0.0 0 0 AC
11. On the MC, verify the license usage. The output shows that the switch consumes a license on the
controller like an AP.
TOTAL 1 1 0
+----+-------+-----------------------------------------------------+
|SUM/| | | |
|CPU | Addr | Description Value |
+----+-------+-----------------------------------------------------+
| | | |
| G | [000] | Current Entries 9 |
| G | [002] | High Water Mark 9 |
| G | [003] | Maximum Entries 4096 |
| G | [004] | Total Entries 9 |
| G | [007] | Max link length 8 |
+----+-------+-----------------------------------------------------+
Question: Why is there already a tunnel if there are no clients active? Check the "w" flag.
Steps
Access-1: Disable ports 1/1/3 and 1/1/27, remove VLAN 11
1. Open a terminal session to Access-1 and enter configuration mode.
2. Change the hostname. Add "vsa" at the end.
432 Task 12.2-3: User role configuration on the switch and the MC
Aruba Networking MC—user-based
Lab 12.2: Integration with HPE
ICX-T1-Access1(config)# hostname ICX-T1-Access1-vsa
ICX-T1-Access1-vsa(config)#
3. Disable the two ports that currently may have active client authentications. These are the ports
connected to PC3 (802.1X on 1/1/3) and PC4 (MAC-auth via Access-2 on 1/1/27).
ICX-T1-Access1-vsa(config)# interface 1/1/3,1/1/27
ICX-T1-Access1-vsa(config-if-<1/1/3,1/1/27>)# shutdown
ICX-T1-Access1-vsa(config-if-<1/1/3,1/1/27>)# exit
4. Remove VLAN 11. The clients will be transported via VLAN 4000 to the MC, and the MC will
assign them to VLAN 11, so the VLAN 11 does not need to exist on the access switch.
ICX-T1-Access1-vsa(config)# no vlan 11
7. Define a new user role that will be used for employees. This role has full access to the network.
By sending the traffic through the MC firewall, all traffic can still be inspected and traffic analysis
is available.
The user roles on the mobility controller are different from the user roles on the
switches, since they support firewall features. They could have the same name as on
the switch, but in this lab setup, the name is kept different to make it easier to dif-
ferentiate the different roles.
Saving Configuration...
Configuration Saved.
Task 12.2-3: User role configuration on the switch and the MC 433
Access-1 : Update employee to redirect traffic to MC using secondary role
8. On the Access-1 switch, update the employee role so traffic is sent to the gateway-zone "mc"
with the secondary role "mc-employee."
ICX-T1-Access1-vsa(config)# port-access role employee
ICX-T1-Access1-vsa(config-pa-role)# gateway-zone zone mc gateway-role mc-employee
ICX-T1-Access1-vsa(config-pa-role)# exit
Steps
1. On Access-1, enable the port 1/1/3.
ICX-T1-Access1-vsa(config)# interface 1/1/3
ICX-T1-Access1-vsa(config-if)# no shutdown
ICX-T1-Access1-vsa(config-if)# exit
2. On PC3, connected to Access-1 port 1/1/3, configure the 802.1X authentication with these cre-
dentials:
n Username: icx-employee
n Password: aruba123
Verification of the status on the switch
3. Verify that the user authentication and role are successfully applied.
ICX-T1-Access1-vsa(config)# show aaa authentication port-access interface 1/1/3
client-status
Authentication Details
Authorization Details
----------------------
Role : employee
Status : Applied
4. Review all the UBT users. This shows the MAC address and secondary role (mc-employee) that
will be send to the MC via the PAPI protocol.
ICX-T1-Access1-vsa(config)# show ubt users all
=====================================================================
Displaying All UBT Users for Zone: mc
=====================================================================
Downloaded user roles are preceded by *
Port Mac-Address Tunnel Status Gateway-Role
Failure Reason
-----------------------------------------------------------------------------------
-----------
1/1/3 00:50:56:b1:2c:b8 activated mc-employee ---
/---
=====================================================================
Zone mc:
=====================================================================
The bucket map is used in an AOS cluster to distribute clients over the cluster con-
trollers. Each client MAC address is hashed and mapped to a bucket ID based on this
hash.
u - Untagged VLAN
Tunnel Id Tunneled Node BCMC TO UCast Key MTU Curr Users VLANs
--------- ------------- ------------- ---- ---- ---------- -----
tunnel 10 10.1.1.4 1 3 1500 1 11
User Tunneled User Mac Tunneled Node Mac Vlan UAC IP Address Key Tunnel
Index Flags
---- ----------------- ----------------- ---- -------------- --- ---------
--- -----
icx-employee 00:50:56:b1:2c:b8 10:4f:58:f6:e3:80 4000(11) 10.1.1.6 3 tunnel 10
UAC
+----+-------+-----------------------------------------------------+
|SUM/| | | |
|CPU | Addr | Description Value |
+----+-------+-----------------------------------------------------+
| | [001] | Tunnel FIB Egress Not Unicast 23 |
| | [004] | Tunnel FIB stale 1 |
+----+-------+-----------------------------------------------------+
| | | |
| G | [000] | Current Entries 10 |
| G | [002] | High Water Mark 10 |
| G | [003] | Maximum Entries 4096 |
| G | [004] | Total Entries 10 |
| G | [007] | Max link length 8 |
| G | [008] | Current Tunnel FIB 1 |
| G | [009] | Tunnel FIB recompute 1 |
+----+-------+-----------------------------------------------------+
Users
-----
IP MAC Name Role Age(d:h:m) Auth
VPN link AP name Roaming Essid/Bssid/Phy
Profile Forward mode Type Host Name User Type
---------- ------------ ------ ---- ---------- ----
-------- ------- ------- ---------------
------- ------------ ---- --------- ---------
10.1.11.51 00:50:56:b1:2c:b8 icx-employee mc-employee 00:00:05 Tunneled-User-802.1X
10.1.1.4 Tunneled tunnel 10/10:4f:58:f6:e3:8
0/1/1/3 default-tunneled-user tunnel TUNNELED USER
16. On the MC, more information about the clients can be shown by enabling additional columns.
This example shows the output with the MAC address, OS, Authentication, and Port enabled:
Source IP or MAC Destination IP Prot SPort DPort Cntr Prio ToS Age Destination TAge
Packets Bytes Flags CPU ID
----------------- --------------- ---- ----- ----- -------- ---- --- --- ----------- ---- --
-------- ---------- --------------- -------
10.1.1.6 10.1.11.51 6 4343 2876 0/0 0 0 1 tunnel 10 a 12
3270 2
10.1.11.51 10.1.1.1 1 1051 2048 0/0 0 0 1 tunnel 10 14 1
60 FCI 2
10.1.11.51 10.254.1.23 6 2851 443 0/0 0 0 1 tunnel 10 15 8
This demonstrates how the MC can be used to get deep visibility into the traffic of the wired
devices.
Objectives
In this task, an IoT use case example will be shown. This assumes that a customer wants to assign mul-
tiple types of IoT devices to the same VLAN. Since these IoT devices may come from different vendors,
the customer is concerned about the security between these IoT devices and would like to apply micro-
segmentation. This means that all the traffic, even the intra-VLAN traffic, needs to be firewalled and
controlled.
In this lab setup, PC3 and Access-2 will be assigned to the MC in the same VLAN. Initially, they will be
able to reach each other.
After the MC firewall user role is updated, the intra-VLAN traffic will be blocked by the firewall.
To simulate IoT devices, this activity will use MAC-auth.
Steps
1. On PC3, connected to Access-1 port 1/1/3, disable 802.1X on the Lab NIC interface.
Access-2
6. Access Access-2's terminal and enter configuration mode.
7. Disable the port to PC4 to prevent unnecessary authentications.
ICX-Access-2(config)# interface 1/1/4
ICX-Access-2(config-if)# shutdown
ICX-Access-2(config-if)# exit
9. Bounce the uplink port 1/1/27 to trigger VLAN 1 to request a DHCP address.
ICX-Access-2(config)# interface 1/1/27
ICX-Access-2(config-if)# shutdown
ICX-Access-2(config-if)# no shutdown
ICX-Access-2(config-if)# exit
10. After about 30 seconds, Access-2 should have received a DHCP address on its VLAN 1 interface.
The assigned IP address may be different in your setup. Verify VLAN 1 IP address.
ICX-Access-2(config)# show ip interface brief
Interface IP Address Interface Status
link/admin
1/1/2 No Address down/down
Verify MAC-auth
Access-1
12. Verify the authentication status of port 1/1/27 (to Access-2). The ClearPass RADIUS server
returns the Aruba VSA dev-switch user role for the MAC authentication for the switch.
ICX-T1-Access1-vsa(config)# show aaa authentication port-access interface 1/1/27
client-status
Authentication Details
----------------------
Status : mac-auth Authenticated
Auth Precedence : dot1x - Not attempted, mac-auth - Authenticated
Auth History : mac-auth - Authenticated, 189s ago
Authorization Details
----------------------
Role : dev-switch
Status : Applied
Authentication Details
----------------------
Status : mac-auth Authenticated
Auth Precedence : dot1x - Unauthenticated, mac-auth - Authenticated
Auth History : mac-auth - Authenticated, 289s ago
dot1x - Unauthenticated, Supplicant-Timeout, 289s ago
Authorization Details
----------------------
Role : employee
Status : Applied
Both user roles have been configured to redirect traffic to the MC using the same
"mc-employee" gateway role, so they are using the same firewall policy.
MC
14. On the MC, review the active users and their IP addresses.
Although both clients are using MAC-auth at this moment, the MC may still report
the original 802.1X client as "Tunneled-User-802.1X" at this point.
Users
-----
IP MAC Name Role Age(d:h:m) Auth VPN
15. On PC3, attempt to ping to this IP. This should succeed, since the mc-employee firewall role has
an "allowall" policy.
Microsoft Windows [Version 10.0.17134.441]
(c) 2018 Microsoft Corporation. All rights reserved.
C:\Users\student>ping 10.1.11.55
17. Review the current mc-employee role. The "allowall" access-list is currently in position 3.
(icx-T13-mc1) ^[mm] (config) #show rights mc-employee
<Output omitted>
access-list List
<Output omitted>
Make sure to use position 3 in the command; it will insert the access-list before the
"allowall".
Saving Configuration...
Configuration Saved.
20. Review the updated mc-employee role. The "no-iot-intravlan" access-list is now in position 3.
(icx-T13-mc1) [mm] (config) # show rights mc-employee
<Output omitted>
access-list List
----------------
Position Name Type Location
-------- ---- ---- --------
1 global-sacl session
2 apprf-mc-employee-sacl session
3 no-iot-intravlan session
4 allowall session
<Output omitted>
21. On the client PC3, the ping will no longer be possible to Access-2.
C:\Users\student>ping 10.1.11.55
This demonstrates how the HPE Aruba Networking Dynamic Segmentation solution can offer
complete network control, even for intra-VLAN traffic.
You have completed Lab 12!
Lab diagram
Overview
In this lab activity, the QoS trust and policy configuration will be explained. The first part of the lab will
cover the port and global trust options. Next, the LLDP device profile-based trust will be demonstrated.
The second part of the lab will explain how classifiers, policies, and actions can be used to mark and pri-
oritize specific traffic.
Objectives
n Configure and understand QoS trust modes on the switch.
n Understand device profiles.
n Configure QoS classifiers.
n Understand queue configuration options.
n Apply a voice VLAN configuration for LLDP-MED.
Objectives
n Adjust topology for QoS.
n Force traffic from PC4 and Access-2 over Access-1.
Steps (required)
1. Open a console connection to Access-1. Log in using admin/aruba123.
ICX-Access-1# copy checkpoint icx-lab02-vsx running-config
Copying configuration: [Success]
ICX-Access-1#
Access-2
7. Open a terminal to Access-2 and enter configuration mode.
8. Disable the uplinks to VSX Core-1 and Core-2.
ICX-Access-2(config)# interface 1/1/25,1/1/26
ICX-Access-2(config-if-<1/1/25,1/1/26>)# shutdown
ICX-Access-2(config-if-<1/1/25,1/1/26>)# exit
9. Enable the peer link to Access-1 and configure it as the VLAN trunk. Define an IP address on the
voice VLAN 12.
ICX-Access-2(config)# interface 1/1/27
ICX-Access-2(config-if)# vlan trunk native 11
ICX-Access-2(config-if)# vlan trunk allowed 11,12
ICX-Access-2(config-if)# no shutdown
ICX-Access-2(config-if)# exit
10. Define IP address 10.1.12.100 on VLAN 12 and set the default route.
ICX-Access-2(config)# interface vlan 12
ICX-Access-2(config-if-vlan)# ip address 10.1.12.100/24
ICX-Access-2(config-if-vlan)# exit
ICX-Access-2(config)# ip route 0.0.0.0/0 10.1.12.1
11. Verify the IP address and default route with a ping to a VLAN 11 IP address.
ICX-Access-2(config)# ping 10.1.12.1
PING 10.1.12.1 (10.1.12.1) 100(128) bytes of data.
108 bytes from 10.1.12.1: icmp_seq=1 ttl=64 time=0.197 ms
108 bytes from 10.1.12.1: icmp_seq=2 ttl=64 time=0.387 ms
108 bytes from 10.1.12.1: icmp_seq=3 ttl=64 time=0.206 ms
108 bytes from 10.1.12.1: icmp_seq=4 ttl=64 time=0.202 ms
108 bytes from 10.1.12.1: icmp_seq=5 ttl=64 time=0.213 ms
12. Enable the port to PC4 connected on Access-2. Make it a member of VLAN 11 so that PC4 sim-
ulates a PC connected to a phone (simulated by Access-2) (untagged VLAN 11 PC traffic passing
Access-2 to Access-1).
ICX-Access-2(config)# interface 1/1/4
ICX-Access-2(config-if)# vlan access 11
ICX-Access-2(config-if)# no shutdown
ICX-Access-2(config-if)# exit
Objectives
n Review the default QoS trust mode on Access-1.
n Adjust the default global trust mode and verify the result.
Core-1
2. On Core-1, enter the configuration mode and clear the interface statistics.
ICX-Core-1(config)# clear interface statistics
Core-2
3. Repeat this on Core-2.
ICX-Core-2(config)# clear interface statistics
Access-1
4. Review the current queue statistics on port 1/1/3; this is the port connected to PC3. Most queues
should have statistics that are close to 0.
ICX-Access-1(config)# show interface 1/1/3 queues
Interface 1/1/3 is up
Admin state is up
Tx Bytes Tx Packets Tx Drops
Q0 0 0 0
Q1 0 0 0
Q2 0 0 0
Q3 0 0 0
Q4 0 0 0
Q5 0 0 0
Q6 0 0 0
Q7 615 5 0
If the statistics are not close to 0, you should repeat the clear interface
statistics command and verify the queue counters again.
Clearing the queue statistics makes it easier to troubleshoot and understand what
traffic is sent via which queue. Feel free to repeat the clear statistics command in
case tests need to be repeated.
The switch will automatically send L2 control protocols via Q7; normal user frames
will be sent on Q1 by default.
Access-2
11. On Access-2, perform a ping to PC3 on Access-1. Access-2 has an IP address in VLAN 12, so this
ping will be routed via the core VSX. The ping should be successful. Replace xx with the current
IP address from PC3.
ICX-Access-2(config)# ping 10.1.11.xx datagram-size 14000 repetitions 10
Any ping is fine for this lab. In the above ping, using 10 requests of size 14,000 gen-
erates about 100 outbound packets (due to fragmentation), so it is easy to recognize
these test packets in the statistics.
If your pings fail to PC3, disable all three Windows Defender firewalls on PC3.
13. Click the packet with the Access-2 source IP (10.1.12.100) and open the Internet Protocol and
Differentiated Services Codepoint sections. Check the DSCP value. Since no configuration was
done, this should be Default (0) at this point.
The PC may be generating some other traffic, so the statistics will typically have
some variation.
15. On PC3 (connected to Access-1), start the Wireshark trace. Click Continue without Saving to
start the trace.
On an AOS-CX switch, the administrator can enter the TOS value that should be used
for the outgoing ICMP packets.
The binary value for DSCP 46 is 101110.
The IP TOS field has two extra bits at the end, so the complete value is 10111000.
Converted into decimals, this results in value 184.
17. On the receiving PC, verify the received marked traffic. In Wireshark, stop the trace and verify the
incoming DSCP value of the ICMP request (make sure to select a request, not the reply).
18. On Access-1, review statistics on the queues. It should still be normal traffic, even when marked
with the DSCP value for voice.
21. On Access-2, repeat the ping (use the up arrow to get the previous command).
ICX-Access-2(config)# ping 10.1.11.xx datagram-size 17000 repetitions 8 tos 184
22. Once the ping has completed, review the queue statistics on the Access-1 switch.
ICX-Access-1(config)# show interface 1/1/3 queues
Interface 1/1/3 is up
Admin state is up
Tx Bytes Tx Packets Tx Drops
Q0 0 0 0
Q1 913 8 0
Q2 0 0 0
Q3 0 0 0
Q4 0 0 0
Q5 140096 96 0
Q6 0 0 0
Q7 9711 77 0
The DSCP marking of the traffic did not change, but now the switch is using this mark
in the incoming packet to assign it to the correct local priority, which is assigned to
queue 5.
Access-2
25. On Access-2, repeat the ping (use the up arrow to get the previous command).
Core-1
26. Review the LAG 1 (LAG to Access-1) queue statistics. You should see that some traffic was sent
into queue 5.
ICX-Core-1(config)# show interface lag1 queues
Aggregate-name lag1
Aggregated-interfaces :
1/1/1
Speed 10000 Mb/s
Tx Bytes Tx Packets Tx Drops Tx Byte Depth Recent Peak Depth
Q0 0 0 0 0 0
Q1 626742 1146 0 1792 0
Q2 0 0 0 0 0
Q3 0 0 0 0 0
Q4 0 0 0 0 0
Q5 140096 96 0 1792 1792
Q6 0 0 0 1024 0
Q7 27818 157 0 512 0
In case there are no traffic statistics in queue 5, check the command for the peer VSX system,
since the link aggregation on Access-1 may have sent the traffic to Core-2. Use the show
interface lag1 queues vsx-peer command.
Steps
Configure a device profile with LLDP trust settings.
2. Clear statistics and verify incoming marked DSCP traffic is not trusted anymore. A ping test from
Access-2 should arrive in the normal queue (queue 1) again.
ICX-Access-1(config)# clear interface statistics
Access-1
4. Verify on Access-1 that the traffic is handled in the normal queue again.
ICX-Access-1(config)# show interface 1/1/27 queues
Interface 1/1/27 is up
Admin state is up
Tx Bytes Tx Packets Tx Drops
Q0 0 0 0
Q1 143671 139 0
Q2 0 0 0
Q3 0 0 0
Q4 0 0 0
Q5 0 0 0
Q6 0 0 0
Q7 11518 91 0
Interface 1/1/27 is up
Admin state is up
Link state: up for 17 hours (since Wed Jul 17 17:57:10 EDT 2024)
Link transitions: 21
Description:
Persona:
Hardware: Ethernet, MAC Address: 10:4f:58:f6:e3:8e
MTU 1500
Type 10G-DAC1 / 10G SFP+ 1m DAC
Full-duplex
qos trust none
Speed 10000 Mb/s
Auto-negotiation is off
Flow-control: off
<Output omitted>
7. Configure the LLDP device profile with an LLDP group for AOS-CX switches. In a real deploy-
ment, this would be an HPE Aruba Networking AP, but the Access-2 switch is used to simulate
the behavior.
You should verify the model number of Access-1 and Access-2 using the show lldp
neighbor-info 1/1/27 command from each switch. For example, in Pod 13, it is
model JL668A.
Interface 1/1/27 is up
Admin state is up
Link state: up for 19 hours (since Wed Jul 17 17:57:10 EDT 2024)
Link transitions: 21
Description:
Persona:
Hardware: Ethernet, MAC Address: 10:4f:58:f6:e3:8e
MTU 1500
Type 10G-DAC1 / 10G SFP+ 1m DAC
Full-duplex
Access-2
10. Repeat the test ping on Access-2.
ICX-Access-2(config)# ping 10.1.11.51 datagram-size 17000 repetitions 8 tos 184
Access-1
This demonstrates how the AOS-CX switch can dynamically enable QoS DSCP trust based on the
LLDP neighbor, such as an HPE Aruba Networking AP.
12. Lab cleanup: Disable the LLDP profile.
ICX-Access-1(config)# port-access device-profile dev-apscx-switch
ICX-Access-1(config-device-profile)# disable
ICX-Access-1(config-device-profile)# exit
Steps
To use the classifier-based QoS, the administrator should complete these steps:
n Define the classes.
n Assign the classes into a policy and set actions.
n Bind the policy to an interface or VLAN.
2. Define a new class for the voice-to-any traffic with the count option.
ICX-Access-1(config)# class ip voice-dst-any
ICX-Access-1(config-class-ip)# 10 match any any any vlan 12 count
ICX-Access-1(config-class-ip)# exit
20
voice-dst-any ipv4
dscp AF41
-------------------------------------------------------------------------------
PC3
7. On PC3, restart the packet capture. When prompted click Continue without Saving.
Access-1
9. On Access-1, verify that the traffic has matched the policy by checking the hit counts of the
policy. The number 100 in this output example is the number of packets that have matched the
class in the policy.
ICX-Access-1(config)# show policy hitcounts access
Statistics for Policy access:
10. On PC3, stop the Wireshark trace and check the inbound DSCP value (source 10.1.12.100). This
should be AF41.
Question: Why is the traffic sent out in the "normal" queue (Q1), instead of Q4 (the expected
queue for AF41 traffic)?
Answer: Check the global QoS trust option.
12. Review the global trust option.
ICX-Access-1(config)# show qos trust
qos trust none
Access-2
17. On Access-2, ping the voice default gateway (10.1.12.1) without marking the traffic.
ICX-Access-2(config)# ping 10.1.12.1 datagram-size 17000 repetitions 8
Access-1
18. On Access-1, verify the traffic matched by checking the hitcounts of the policy.
ICX-Access-1(config)# show policy hitcounts access
Statistics for Policy access:
19. Now, verify that the traffic was assigned to the correct queue on the uplink interface.
ICX-Access-1(config)# show interface lag255 queues
Aggregate-name lag255
Aggregated-interfaces :
1/1/25 1/1/26
Speed 20000 Mb/s
Tx Bytes Tx Packets Tx Drops
Q0 0 0 0
Q1 145543 159 0
Q2 0 0 0
This also applied to the previous section. If the uplink LAG 255 statistics would have
been checked, it would have shown that the traffic was sent in the normal queue,
even with qos trust dscp enabled.
To summarize:
Any match on an entry in a policy overrules the trust, so the administrator should assign a local
priority as well.
22. Review the updated configuration. Make sure there are only two rules in the policy.
ICX-Access-1(config-policy)# show running-config current-context
policy access
10 class ip voice-dst-voice action local-priority 5 action dscp EF
20 class ip voice-dst-any action local-priority 4 action dscp AF41
ICX-Access-1(config-policy)# exit
If you added additional lines, these can be remove using no plus the line number.
Example:
ICX-Access-1(config-policy)# no 30
The DSCP and CoS to local priority (LP) could be managed either by using policies or
the DSCP-to-LP or CoS-to-LP maps. As a best practice, those maps should be con-
sistent throughout the entire network to ensure the proper treatment and pri-
oritization of traffic.
Access-1
26. Press Ctrl-c to stop the repeat.
27. On Access-1, check the LAG 255 queue statistics. Traffic should pass over Q5 now.
***************************************
Iteration : 10 Command : show interface lag255 queues
Question: What is the local priority that would be assigned to traffic marked with DSCP 46 (EF),
typically used for voice?
Answer: DSCP 46 will be mapped to local-priority 5.
Question: What is the local priority that would be assigned to traffic without a DSCP mark (0)?
Answer: DSCP CS0 will be mapped to local-priority 1.
The DSCP map also shows the drop precedence level option as a color code
(green/yellow). However, this is beyond the scope of this course.
2. Review the default CoS to local-priority map. This map would be used for ports that have the qos
trust cos command applied. Most deployments will opt for the DSCP trust instead.
ICX-Access-1(config)# show qos cos-map
code_point local_priority color name
---------- -------------- ------- ----
0 1 green Best_Effort
1 0 green Background
Question: What is the local priority that would be assigned to traffic without the CoS mark (0)?
Answer: CoS 0 will be mapped to local-priority 1.
Review the queue configuration
3. Review the available queue profiles. Only one queue profile can be applied on the switch; this is a
switch global option.
ICX-Access-1(config)# show qos queue-profile
profile_status profile_name
-------------- ------------
applied factory-default
Queue Weight
0 1
1 39
2 10
3 10
4 10
5 10
6 10
7 10
This means:
If there is guest traffic (assuming this is assigned to queue 0) with weight 1, and normal traffic
with weight 39, the guest would get 1 out of 40 (39+1), so 2.5%.
7. Define the new profile and assign each queue a value.
ICX-Access-1(config)# qos schedule-profile icx
ICX-Access-1(config-schedule)# dwrr queue 0 weight 1
ICX-Access-1(config-schedule)# dwrr queue 1 weight 39
ICX-Access-1(config-schedule)# dwrr queue 2 weight 10
ICX-Access-1(config-schedule)# dwrr queue 3 weight 10
ICX-Access-1(config-schedule)# dwrr queue 4 weight 10
ICX-Access-1(config-schedule)# dwrr queue 5 weight 10
ICX-Access-1(config-schedule)# dwrr queue 6 weight 10
ICX-Access-1(config-schedule)# dwrr queue 7 weight 10
Steps
Configure a voice VLAN
Access-1
1. On Access-1, configure VLAN 12 as the voice VLAN.
ICX-Access-1(config)# vlan 12
ICX-Access-1(config-vlan-12)# voice
ICX-Access-1(config-vlan-12)# exit
------------------------------------------------------------------------------------------
VLAN Name Status Reason Type Interfaces
------------------------------------------------------------------------------------------
12 VLAN12 up ok static 1/1/27,lag255
No further configuration is required. The LLDP-MED TLVs are automatically enabled on all inter-
faces. When an LLDP-MED capable device comes online, the switch will announce VLAN ID 12 as
the voice VLAN.
Review the advertised TLV information
3. Review the advertised TLVs.
ICX-Access-1(config)# show lldp tlv
TLVs Advertised
===============
Management Address
Port Description
Port VLAN-ID
System Capabilities
System Description
Access-2
4. On Access-2, review the details of the LLDP neighbor on port 1/1/27 (Access-1).
You should verify the model number of Access-1 and Access-2. For example, in Pod
13 they are model JL668A.
Port : 1/1/27
Neighbor Entries : 1
Neighbor Entries Deleted : 0
Neighbor Entries Dropped : 0
Neighbor Entries Aged-Out : 0
Neighbor System-Name : ICX-Access-1
Neighbor System-Description : Aruba JL668A FL.10.13.1000
Neighbor Chassis-ID : 10:4f:58:f6:e3:80
Neighbor Management-Address : 10.251.1.4
Chassis Capabilities Available : Bridge, Router
Chassis Capabilities Enabled : Bridge, Router
Neighbor Port-ID : 1/1/27
Neighbor Port-Desc : 1/1/27
Neighbor Port VLAN ID : 11
Neighbor Port VLAN Name : VLAN11,VLAN12
Neighbor Port MFS : 1500
Link aggregation supported : Yes
Link aggregation enabled : No
Aggregation port ID : 0
TTL : 120
Access-2
6. Wait up to 30 seconds, then check the LLDP neighbors again on Access-2.
ICX-Access-2(config)# show lldp neighbor-info 1/1/27
Port : 1/1/27
Neighbor Entries : 1
Neighbor Entries Deleted : 0
Neighbor Entries Dropped : 0
Neighbor Entries Aged-Out : 0
Neighbor System-Name : ICX-Access-1
Neighbor System-Description :
Neighbor Chassis-ID : 10:4f:58:f6:e3:80
Neighbor Management-Address :
Chassis Capabilities Available : Bridge, Router
Chassis Capabilities Enabled : Bridge, Router
Neighbor Port-ID : 1/1/27
Neighbor Port-Desc : 1/1/27
Neighbor Port VLAN ID : 11
Neighbor Port VLAN Name : VLAN11,VLAN12
Neighbor Port MFS : 1500
Link aggregation supported : Yes
Link aggregation enabled : No
Aggregation port ID : 0
TTL : 120
Objectives
In this lab, you will perform the following tasks:
n Perform the necessary configuration to use the RESP API.
n Use the REST reference interface to test different API functions.
Lab diagram
In this lab, you will focus on Access-1, which will be used for our tests.
488
o Postman is an open-source program for creating and scripting REST requests. It lets
you use a more intuitive interface to generate REST requests, rather than, for
example, curl, which is a command line utility.
l Python and Ansible are two popular scripting language tools developers often use to auto-
mate IT configurations. You will work with Python in the next lab.
Steps
Prepare the environment
1. Open a console connection to Access-1. Log in using admin/aruba123.
ICX-Access-1# copy checkpoint icx-lab02-vsx running-config
Copying configuration: [Success]
ICX-Access-1#
Note the HTTPS server was enabled already. In production environments, remember
to activate the HTTPS server at the desired VRF.
Task 14-1: Enable access to REST API on the AOS-CX switch 489
7. Although you have set up the admin account with the password, you will create another admin
account named "restapi." The reason for creating this account is to be able to differentiate when
you review accounting logs.
ICX-Access-1(config)# user restapi group administrators password
Enter password: Aruba123
Confirm password: Aruba123
By default, the REST API is set to read-only mode, meaning only GET calls are avail-
able. Enabling the read/write mode on the REST API allows POST, PUT, and DELETE
operations to be called on all configurable elements in the switch database.
The REST API in read/write mode is intended for advanced users who understand
the switch database's system schema and data relationships.
CAUTION: Because the REST API is in read/write mode, it can access every con-
figurable element in the database. It is powerful, so you must use it with extreme cau-
tion. No semantic validation is performed on the data you write to the database; any
input you make will be written in the database.
10. Enable port 1/1/1 and configure it as an access port for VLAN 11.
ICX-Access-1(config)# interface 1/1/1
ICX-Access-1(config-if)# no shutdown
ICX-Access-1(config-if)# vlan access 11
ICX-Access-1(config-if)# exit
490 Task 14-1: Enable access to REST API on the AOS-CX switch
Task 14-2: REST reference interface
Objectives
In this task, you will learn to use the AOS-CX REST reference interface, which is based on the Swagger
interface. The Swagger UI is a web-based graphical representation of the API. It sits live on the switch,
and you can interact with the AOS-CX switch via this interface.
Steps
1. Using the remote lab dashboard, connect to PC1.
2. Open a browser (Google Chrome or Firefox), and navigate to Access-1 (https://10.1.1.4).
3. Accept the unknown certificate and continue to open the page. The switch web UI login page
should be displayed.
4. Log in using the following credentials:
n Username: admin
n Password: aruba123
Notice that the previous versions of the REST APIs are available for compatibility.
7. Before placing REST API calls, it is necessary to authenticate the session and obtain a session
cookie. To do so, scroll down to the Login section and expand it.
8. Select POST under Login. The Login post section will be expanded. Click Try it out.
9. Scroll down, enter the following credentials, and click Execute.
n Username: restapi
n Password: Aruba123
The response codes inform if the switch accepted the request or if an error has
10. Scroll down and check some of the possible responses for this request.
Lab debrief
In this lab, you learned how to use the REST reference interface of AOS-CX switches. Remember that
even though you have used the GET method—which is similar to a show command—during the lab,
methods such as POST, PUT, PATCH, and DELETE will actively modify the switch configuration.
The Swagger interface aims to give network administrators knowledge of the available APIs and a ref-
erence code and URI that can be used to integrate switches with other platforms.
Objectives
In this lab, you will perform the following tasks:
n Upload and install a new NAE script.
n Configure NAE agents using the installed scripts to monitor switch hardware and configuration.
Lab diagram
In this lab, you will focus on Access-1, which will be used for our tests.
Lab 15: HPE Aruba Networking Network Analytics Engine (NAE) 497
Steps
1. Using the remote lab dashboard, connect to the Access-1 console.
Once logged in, you will verify the switch time settings are configured for NAE to work properly.
2. Verify that the switch has the NTP server configuration:
ICX-Access-1(config)# show running-config | include ntp
ntp server 10.254.1.21 iburst
ntp server pool.ntp.org minpoll 4 maxpoll 4 iburst
ntp enable
ip source-interface ntp interface vlan1
NTP : Enabled
NTP DHCP : Enabled
NTP Authentication : Disabled
NTP Server Connections : Using the default VRF
4. Verify the switch time. It should be in sync with USA Eastern Time.
ICX-Access-1(config)# show clock
Fri Jul 19 09:24:53 EDT 2024
System is configured for timezone : US/Eastern
5. Compare the switch time with the PC1 time; they should match.
The NAE UI displays data based on the browser time. NAE relies on accurate time.
Time drift might cause unexpected query results and chart rendering errors.
Task 15-2: Review the built-in NAE script and agent 499
n Get experience implementing an NAE script and agent.
n Review the built-in System Monitor NAE agent.
n Understand the meaning of parameters for an agent.
n Review the alerts and alert actions generated by an agent.
Steps
1. Open a session to PC1.
2. On PC1, open a web browser to the Access-1 IP (https://10.1.1.4).
3. Log into the web interface with admin/aruba123 credentials.
The Overview page will be displayed.
a. Navigate to the Analytics page by selecting Analytics in the left navigation pane. This will
display the Agents and the Scripts panes.
500 Task 15-2: Review the built-in NAE script and agent
Scripts are the actual code that can be executed by NAE, while an agent is an instance of
the script. A script that is installed on the switch does not do anything by itself. An agent
must be created based on the script to start the actual monitoring.
One script may be instantiated multiple times, which would depend on the script:
n Some scripts may monitor all interfaces of the switch, so only one instance (agent)
would make sense
n Another script may only monitor one interface, where the interface that needs to be
monitored would need to be entered by the administrator. This interface name
would be a parameter on an agent. When the administrator wants to monitor two
interfaces, two agents would be created based on this script—one agent with inter-
face 1, the other agent with interface 2.
4. Click the Scripts link.
5. There is one built-in script, called the "system_resource_monitor." This is system-created and
therefore cannot be deleted.
Task 15-2: Review the built-in NAE script and agent 501
Example of script details
6. Click the name of the script (system_resource_monitor) to see the details of the script. A script
on the switch can also be downloaded to an administrator PC from this screen. The download is
optional; it is not required in this lab activity.
The window layout may appear different, based on your local computer’s screen res-
olution.
The development of the scripts themselves is beyond the scope of this training.
Please check the Configuring Network Automation Solutions course or consult the
product documentation to learn more about the scripts and the syntax.
502 Task 15-2: Review the built-in NAE script and agent
8. Click the Agents link to open the Agents window.
9. This will list the default agent that is running on the switch. The agents are the actual running
instances of a script. In this case, there is a default agent that will be monitoring the system
resources. This happens out of the box.
Task 15-2: Review the built-in NAE script and agent 503
Graph management
12. The switch has a local database that can store historical data for the agent. In the graph, the
administrator can check the history of the agent. Click the 1h, 1d, and Live links to explore the
differences.
Your actual graph will be different; the images in the lab guide were made on a sys-
tem that has been running for some time.
13. The admin can also apply a custom zoom by selecting a time range with the mouse (click and
drag).
504 Task 15-2: Review the built-in NAE script and agent
14. The administrator can choose to disable certain lines on the graph by clicking them at the bot-
tom.
Task 15-2: Review the built-in NAE script and agent 505
Under these settings, it is possible to enable or disable the agent. It is also possible to review or
update the agent parameters.
16. Update these parameters for the Average CPU / Memory utilization, expressed as a percentage:
n medium_term_high_threshold: 2
n medium_term_normal_threshold: 1
By setting the high_threshold for the average CPU/Memory to an extremely low num-
ber, the NAE system monitor agent will go into an Alert state.
17. Click SAVE to save the settings. Click CLOSE to close the pop-up window.
506 Task 15-2: Review the built-in NAE script and agent
18. In about 60 seconds, a minor alert should be generated. The alert will be displayed at the top of
the screen in the top right corner, in the agent details' Status pane to the right of the Agent
Details pane, and in the graph bar (make sure Live is selected in the graph), displayed as an
orange line with an orange triangle. (Note that the color of the alert in the graph corresponds to
the alert level; in this example, since the alert is categorized as minor, the color is orange.)
Task 15-2: Review the built-in NAE script and agent 507
20. In Alert Details, the administrator can see detailed information about the monitor that has
triggered the alert; in this case, either high memory or high CPU utilization will be indicated. In
this script, an alert will also capture CLI information from the switch, where this output is saved
as part of the alert. This is very convenient, since it allows the administrator to see additional
information about the state of the switch at that point in time.
21. Click the various Output links to see the details; this example shows the "show copp-policy
statistics" output (click Back to return to the Alert Details window).
508 Task 15-2: Review the built-in NAE script and agent
22. Close the CLI details and the alert.
23. Click the pencil icon for Agent Details again, and assign high custom values so the alert can be
cleared again. Then click SAVE and CLOSE to confirm.
n medium_term_high_threshold: 91
n medium_term_normal_threshold: 81
Task 15-2: Review the built-in NAE script and agent 509
It may take a few minutes for the alert to clear again (where the status returns to a
normal state). There is no need to wait for this.
Steps
Install the new script
1. Using PC1, in the switch web UI, navigate to Analytics > Scripts.
2. Click the UPLOAD link to install a new script.
12. Return to the switch Analytics Dashboard. The triangle will indicate the moment the alert was
17. Verify that the agent state is back to normal in the Analytics Dashboard. The Status pane should
show a green icon and display "Normal." In the Alerts section, you should see an event listed that
the link is now up ("Link Came UP"). In the graph, you should see a green arrow indicating the
interface status change. Also, the graph will display a bright blue line indicating that the status is
up (examine the graph key for the interfaces at the bottom of the graph).
18. In the Agent Details pane, select the pencil icon to edit the agent. Move the slider to the off state
to disable the agent. Click SAVE to save the settings; click CLOSE for the confirmation.
Steps
Add IP-SLA on Access-1
1. On the Access-1 terminal, enter configuration mode.
2. Configure a new IP-SLA to send an ICMP echo to the IP of Core-1 every five seconds. Then start
the test.
ICX-Access-1(config)# ip-sla ping-core-1
ICX-Access-1(config-ip-sla-ping-core-1)# vrf default
ICX-Access-1(config-ip-sla-ping-core-1)# icmp-echo 10.255.101.2 probe-interval 5
ICX-Access-1(config-ip-sla-ping-core-1)# start-test
ICX-Access-1(config-ip-sla-ping-core-1)# exit
3. Wait about 10 seconds, then check the results of the IP-SLA test. The latest probe results should
show that one packet was received; this is the ICMP response from Core-1.
ICX-Access-1(config)# show ip-sla all
SLA Name : ping-core-1
Status : running
SLA Type : icmp-echo
Minimum RTT(ms) : 0
Maximum RTT(ms) : 0
Average RTT(ms) : 0
DNS RTT(ms) :
------------------------------------------------------------------------------
The IP-SLA session name must match with the IP-SLA object name that was created
in the previous step, which is "ping-core-1" in this lab guide.
8. Click CREATE to submit the new agent settings, and click CLOSE for the confirmation.
9. Once the agent has been created, select the agent to see the details. It should appear as Normal
(green).
11. Switch to the web UI of Access-1. Access Analytics in the left navigation pane. After one to two
minutes, the connectivity-ping-core-1 agent under the Agents pane should show a minor alarm
and then a critical alarm. Click connectivity-ping-core-1 to access the Agent Details screen.
12. In the Alerts window, select the most recent alert for the IP-SLA event and then click DETAILS.
Check the CLI output by clicking the Output hyperlink. The output should be familiar from when
you executed the show command previously after configuring and verifying SLA from the CLI.
NAE captures the IP-SLA state at the time of the alert.
15. Reaccess the Analytics Dashboard in the web UI. After about one minute, the alert should be
cleared. Notice that the Status pane will show a green icon and "Normal." The graph will indicate
a green arrow for when the condition was recovered.
Steps
Review the running configuration
NAE script and agent information is stored in the switch’s configuration file. This ensures that a
backup/restore of the switch configuration will also maintain the configured monitoring solution.
1. On the Access-1 terminal, enter configuration mode and review the installed scripts.
The listed scripts may be different in your output based on the completion of the pre-
vious, optional task. This can be ignored.
The listed agents may be different in your output based on the completion of the pre-
vious, optional task. This can be ignored.
3. Review the running configuration for lines that include the string "nae." The script and the agent
parameters are Base64 encoded in the configuration file.
ICX-Access-1(config)# show running-config | include nae
nae-script connectivity_monitor false ...
nae-script interface_link_state_monitor false ...
nae-agent connectivity_monitor connectivity-ping-core-1 false ipsla_session_
name:cGluZy1jb3JlLTE=
522 Task 15-5: Review the NAE agent in the switch configuration file
nae-agent interface_link_state_monitor iface-link-state-mon true
nae-agent system_resource_monitor system_resource_monitor.default false medium_
term_high_threshold:OTE= medium_term_normal_threshold:ODE=
Task 15-5: Review the NAE agent in the switch configuration file 523
[This page intentionally left blank]
524 Task 15-5: Review the NAE agent in the switch configuration file
Lab 16: Troubleshooting
Objectives
In this lab, you will perform the following tasks:
n Use a structured troubleshooting methodology.
n Apply the troubleshooting methodology to identify and fix a trouble ticket.
This lab emphasizes a structured troubleshooting methodology over specific tools, com-
mands, and management tools.
Steps (required)
1. Using the remote lab dashboard, connect to PC1.
2. Open the ICX-Files folder located on the PC1 desktop and navigate to the Troubleshooting lab
folder.
3. Using WordPad, open the access-1.cfg file and copy the file content.
6. Paste the configuration you copied from PC1 (right-clicking the CLI screen will automatically
paste the clipboard content).
7. Repeat steps 4 to 6 to copy and paste the new configuration files to Access-2, Core-1, and Core-
2.
PC3
8. Open a connection to PC3 and reset the Lab NIC (disable/enable).
Steps
1- Identify
In this step, you focus on identifying the issue and narrowing it down as close as possible to the
affected devices, isolating the problem. You will start determining if the issue affects all users or a spe-
cific group.
PC3
1. Using the remote lab dashboard, connect to PC3.
2. Open a web browser and try to navigate to the ISS server (10.254.1.21). Navigation should be
successful.
This validates that PC3 has access to the data center servers.
3. Open a command prompt and verify the IP address assigned to PC3.
Lab 16: Troubleshooting
8. Test a ping to the ClearPass server (10.254.1.23). The ping should fail.
You now know that PC4 is not able to reach the servers or Router-A.
9. Verify PC4 IP addressing.
Lab 16: Troubleshooting
2- Analyze
In this step, you will focus on analyzing the problem, affected devices, switch configurations, logs,
and change history.
You now know that not all users were affected by the issue. It is time to analyze the problem and
the data, trying to narrow down the scope and possible causes.
10. Using the remote lab dashboard, connect to PC4.
11. As you noticed in the previous step, PC4 does not have an IP address on the Lab NIC card. Issue
an ipconfig /renew command to try to obtain an IP address.
12. As you have noticed, the PC is failing to obtain an IP address. It could be a connectivity problem.
Connect to the Access-2 console and check interface 1/1/4 status.
ICX-Access-2(config)# show interface 1/1/4 brief
--------------------------------------------------------------------------------------------------------
Port Native Mode Type Enabled Status Reason Speed Description
VLAN (Mb/s)
--------------------------------------------------------------------------------------------------------
1/1/4 12 access 1GbT yes up 1000 --
Notice that the interface is enabled and active (UP). Also, notice that it is assigned to VLAN 12.
13. Verify VLAN 12 assignments on Access-2.
-----------------------------------------------------------------------------------------
VLAN Name Status Reason Type Interfaces
-----------------------------------------------------------------------------------------
12 VLAN12 up ok static 1/1/4,lag255
Notice that VLAN 12 is assigned to port 1/1/4 (connected to PC4) and LAG 255 (connected to
core switches).
14. Verify LAG 255 status.
ICX-Access-2(config)# show lacp interfaces
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
Notice that the flags indicates that the link aggregation is working properly.
15. Using the remote lab dashboard, connect to Core-1.
16. Verify VLAN 12 on Core-1.
ICX-Core-1(config)# show vlan 12
-----------------------------------------------------------------------------------
Lab 16: Troubleshooting
-----
VLAN Name Status Reason Type Interfaces
-----------------------------------------------------------------------------------
-----
12 VLAN12 up ok static lag1-lag2,lag5,lag256
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
18. Verify LAG 2 status on Core-2 by using the vsx-peer option on Core-1.
ICX-Core-1(config)# show lacp interfaces vsx-peer
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
19. Since the VLAN configuration looks appropriate and the LAGs and physical links are ok, check
the VLAN 12 configuration.
ICX-Core-1(config)# show running-config interface vlan 12
interface vlan 12
vsx-sync active-gateways policies
ip address 10.1.12.2/24
active-gateway ip mac 02:02:00:00:01:00
active-gateway ip 10.1.12.1
l3-counters
ip helper-address 10.1.1.7
exit
20. Verify interface VLAN 11 configuration, as you have noticed that PC3, which is connected to
VLAN 11, is working properly.
ICX-Core-1(config)# show running-config interface vlan 11
interface vlan 11
vsx-sync active-gateways policies
ip address 10.1.11.2/24
active-gateway ip mac 02:02:00:00:01:00
active-gateway ip 10.1.11.1
l3-counters
ip helper-address 10.1.1.6
exit
Lab 16: Troubleshooting
3- Hypothesis
In this step, you formulate a hypothesis based on the data gathered during the first and second
steps.
24. Open a command prompt and test a ping to the AD server (10.254.1.21). The ping should suc-
ceed.
6- Verify
In this step, you will verify whether the applied solution has solved the issue.
29. Connect to PC4 and configure it to use DHCP for the Lab NIC.
31. Ping the ClearPass (10.254.1.23) server to test connectivity to the data center. The ping should
succeed.
You have verified that PC4 is now able to receive an IP address using DHCP, and it is able to
access the data center.
You have completed Lab 16!
Lab 16: Troubleshooting