Download as pdf or txt
Download as pdf or txt
You are on page 1of 44

ExtremeXOS

ExtremeXOS
22.1.1  Release  Overview
October  2016.
21.1.1 Release Overview
March 2016

©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


Disclaimer

§ This  presentation  contains  information  about  Extreme  Networks  


products,  solutions  and  roadmap  that  cannot  be  shared  without  prior  
permission  and  without  NDA.

§ All  product  releases  will  be  on  a  when-­and-­if  available  basis.  

§ Actual  feature  development  and  timing  of  releases  will  be  at  the  sole  
discretion  of  Extreme  Networks.  

§ Not  all  features  are  supported  on  all  platforms.  

§ Presentation  of  the  product  roadmap  does  not  create  a  commitment  by  
Extreme  Networks  to  deliver  a  specific  feature.  

§ Contents  of  this  roadmap  are  subject  to  change  without  notice.
2 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l
ExtremeXOS® 22.1.1  Highlights  

Enables  path  towards  certification  of  


“Common  Criteria”

Enhance  Single  Pane  of  Management  


Capability  &  Scalability

Strengthen  Enterprise  “Software  Defined  


Datacenter”  Solution  

Enhance  Ease  of  Use  &  Serviceability  


Functionality  

3 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


ExtremeXOS® Releases  Update  

EXOS  16.1 EXOS  16.2 EXOS  16.X

EXOS  Release  Train  for  BD  Chassis,  Summit  G1  &  Select  Summit  G2  Series

EXOS  21.1 EXOS  22.X

EXOS  Release  Train  for  Summit  G2  &  Future  Switch  Series
4 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l
ExtremeXOS® Releases  – Why  Change?  

5 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


ExtremeXOS® Releases  Update  

• Frequent  (4  months)  product/feature  release  cadence


• Minimize  number  of  sustaining  releases  for  customers
EXOS  
21.1.1  ( GA)
EXOS  2 1.1.1  S ustaining  Releases  (continues  with  p ast  release  g uidelines)

EXOS  22.1.1 EXOS  22.2.1 EXOS  22.3.1 EXOS  22.4.1 EXOS  22.n.2 EXOS  22.n.3
~4months ~4months ~4months ………..

EXOS  2 2.X  P roduct/Feature  Releases Sustaining  Releases  (every  6  months  for  2  y ears)

EXOS  2 3.x  release  train

New  EXOS  Release  Convention  1=Product,  2+=Sustaining  f or  t hird  dotted  decimal


6 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l
ExtremeXOS® – 22.1.1  Overview

Enterprise Datacenter Ease   of  Use


• Enhanced  Policy  (UPM  support,   • Virtualized  Datacenters  – NSX-­ • Switch  Defaults  (BPDU  
RFC  5176  CoA  etc.) MH  Controller  Integration  (Not   Forwarding  when  STP  disabled)
ExtremeXOS 22.1.1  Release

• New  MIB  support  – VLAN   Certified) • Change  of  LAG  without  disable  
Management • Small  Datacenter  Design  – of  MLAG
MVRP  with  MLAG,  VRID  scale • Serviceability  (Cache  of  CLI  
• ECMP  Hashing  Enhancement   commands)
(IPv4/IPv6)

Common   /  Infrastructure
• Common   Criteria • Cloud  Certification
• ExtremeSwitching X460-­G2  default   license  change • OSPFv3  stack  upgrade
• Linux  Kernel  Upgrade

7 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


ExtremeXOS®   – 22.1.1
Common  Criteria

8 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


Common  Criteria  (CC)  Certification
§ Globally  recognized  and  adopted  security  certification
– ISO/IEC  15408  
– Recently  reorganized  to  better  align  to  end  user  needs
§ Actual  testing  versus  internal  policy.
§ Product  capable  of  running  22.1.1  at  release  will  be  tested
– Network  Device  Collaborative  Protection  Profile  (NDcPP)
§ Requirements   these  products  will  meet
– Incorporates  FIPS  140-­2  Compliance  (not  certified)
– Protection  profile  developed  in  conjunction  with  vendors  and  the  
National  Security  Agency  (NSA)

9 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


Common  Criteria  (CC)  Certification  

§ Who  would  be  interested?


– Foreign  Government  
§ Civilian  &  Defense
– US  Government
§ Intelligence  community  requirement
§ Limited  requirement   in  Civilian  Agency
§ U.S.  slow  to  adopt   do  to  competing  certifications.
– Healthcare  and  Financial  Industries

10 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


Common  Criteria  (CC)  Certification

§ Models  we  intend  to  certify:


– X770
– X620
– X440-­G2
– X450-­G2
– X460-­G2
– X670-­G2

11 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


Common  Criteria  (CC)  Feature  List
§ Cryptographic  Improvements:
– Admin  disable  unapproved  Crypto
§ Unapproved  algorithms  now  c an  be  disabled  at  a  switch  level.    This  prevents  “ accidental”  enablement  and  use  in  
the  product.
– CSP  Zeroization Read  Verify  
§ Support  for  z eroization methodology  with  mandatory  r ead-­verify.  Per  s tandard  this  has  to  be  implemented  for  
flash  memory,  SSH  private  k eys,  and  SSH  s ession  k eys  ( volatile  memory)  that  c an  be  s tored  in  s witch.  
§ This  ensures  data  at  r est  is  secured  in  the  event  FIPS  140-­2  mode  is  disabled  or  the  switch  is  Factory  Reset
– RSA  and  EDCSA  DH  
§ Support  for  host  k ey  algorithms  DH-­14  only  and  ability  to  avoid  using  weaker  algorithm  i.e.  DH-­1
– OpenSSL  &  O penSSH Upgrade  
§ Upgrade  of  open  source  “ OpenSSL”  and  “ OpenSSH”  library  that  is  c ompliant  to  Common  Criteria,  implementing  
the  FIPS  140-­2  c ryptographic  c ore.
§ Implemented  FIPS  140-­2  Self-­test  from  the  OpenSSL  FIPS  Cryptographic  s upport  to  ensure  proper  
cryptographic  operations  in  the  product  at  s tartup.
– Random  Number  Entropy  
§ Enhance  Random  Number  Bit  in  accordance  with  ISO/IEC  18031:2011  using  [selection:  Hash_DRBG (any),  
HMAC_DRBG  ( any),  CTR_DRBG  ( AES)].

12 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


Common  Criteria  (CC)  Feature  List
§ EMS  Features
– Secure  S yslog  &  E MS  E vents
§ Syslog  n ow  supports  a  secure  connection  methodology  that  creates  a n  e ncrypted  connection  to  the  server.    When  the  
connection  is  lost  the  e ntries  a re  b uffered  u ntil  wither  the  storage  limit  is  e xceeded  o r  the  connection  is  reestablished.      
§ Supporting  the  reconciliation  o f  log  e vents  with  remote  syslog  servers  to  p rotect  the  integrity  o f  the  log  in  the  case  o f  a n  
outage.
§ Supporting  the  logging  o f  certain  conditions  that  a re  o f  p articular  importance  to  the  integrity  o f  the  system.
– User  Roles  
§ Supporting  the  a bility  to  change  the  role  o f  a  A AA  local  a ccount  b etween  a dministrative  (i.e.  “admin”  with  write  p ermission)  
and  n on-­administrative  (i.e.  “user”  with  read-­only  p ermission).
§ Users  will  be  logged  o ut  a nd  forced  to  log  b ack  in  when  a  role  is  changed
– X509v3  Certificate  based  Auth
§ Support  for  n ew  X 509v3  certificate  b ased  a uthentication  for  “SSH”,  “SYSLOG”,  “LDAP”  &  “RADIUS.”
§ SSH  n ow  supports  two  factor  a uthentication  with  x509v3  certificate  o n  the  p roduct.      This  a llows  for  g reater  a uthentication  
security  for  a dministrators.
– Reconcile  logging  with  s yslog  s ervers
§ Syslog  server  target  to  maintain  security  settings  to  indicate  that  a  secure  connection  is  to  b e  e stablished.

13 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


ExtremeXOS®   – 22.1.1
Enterprise  Features

14 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


Role  Based  Policy  Rule  Capacity  Enhancements
Solution  Overview
• Expanding   current  capability   by  increasing  IPv4  rule  capacity  to  allow   for  smoother  B/C  
series  migrations  
• User  Selectable   Policy  Resource  Profiles  
• Increase  IPv4  capacity  at  expense  of  IPv6  rules  and/or  ACL  use  
• Note: B/C  do  not  allow  ACL’s  when  Policy  is  in  use

• Supported   on  X450-­G2,  X460-­G2,  X670-­G2  and  X770  series


Solution  Details
• User  Selectable   Policy  “Resource-­ Profiles”
• “less-­acl more-­ipv4”: Profile  very  closely  matches  the  B5  capabilities  when  using  IPv6  rules.  EXOS  
ACL's  are  not  supported  in  this  mode

• “less-­acl more-­ipv4-­no-­ipv6”: Profile  very  closely  matches  the  B5  capabilities  when  not  using  IPv6  
rules.    EXOS  ACL's  are  not  supported  in  this  mode
• “more-­ipv4-­no-­ipv6”:   Profile re-­allocates  all  IPv6  Policy  resources  to  IPv4  rules  while  still  allowing  the  
use  of  EXOS  ACLs

• “more-­mac-­no-­ipv6”: Profile  re-­allocates  all  IPv6  Policy  resources  to  MAC  rules  while  still  allowing  the  
use  of  EXOS  ACLs

15 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


EXOS   22.1  Role  Based  Policy   – Resource  Profiles
X440-­G2 X670-­G2
“less-­acl more-­ipv4” X620
X450-­G2 X460-­G2
X770
MAC  Rules N/A 256 256 256

IPv6  Rules N/A 256 256 256

IPv4  Rules 256 (256)  768 (256)  768 256

L2  Rules 184 184 184 184

X440-­G2 X670-­G2
“less-­acl more-­ipv4-­no-­ipv6” X620
X450-­G2 X460-­G2
X770
MAC  Rules N/A 256 256 256

IPv6  Rules N/A (256)  0 (256)  0 (256)  0

IPv4  Rules 256 (256)  1024 (256)  1024 (256)  512

L2  Rules 184 184 184 184

©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


EXOS   22.1  Role  Based  Policy   – Resource  Profiles
X440-­G2 X670-­G2
“more-­ipv4-­no-­ipv6” X620
X450-­G2 X460-­G2
X770
MAC  Rules N/A 256 256 256

IPv6  Rules N/A (256)  0 (256)  0 (256)  0

IPv4  Rules 256 (256)  512 (256)  512 (256)  512

L2  Rules 184 184 184 184

X440-­G2 X670-­G2
“more-­mac-­no-­ipv6” X620
X450-­G2 X460-­G2
X770
MAC  Rules N/A (256)  512 (256)  512 (256)  512

IPv6  Rules N/A (256)  0 (256)  0 (256)  0

IPv4  Rules 256 256 256 256

L2  Rules 184 184 184 184

©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


Change  of  Authorization  (CoA)    -­ RFC  5176
§ Solution  Overview
• Enhancing  AAA  solution  allowing  a  Users  
Network  Posture  to  be  modified  without  
requiring  session  to  be  dropped  or  re-­
CoA authenticated.  
RADIUS
Policy
• Solutions  Empowered   by  CoA
• Captive  Portal  Solutions
Authentication • Assessment  Solutions    

§ Value  Proposition
• Configuration   Simplification,  
Automation

Use  Case:  Captive  Portal  or  Assessment  Solutions  


18 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l
Role  Based  Policy  – UPM  Support  

§ Solution  Overview
• Support  for  Vendor  Specific  Attribute  (VSA)  
to  invoke  UPM  profile/script  with  Policy
RADIUS
Policy

§ Value  Proposition
UPM  S cript  E xecution   • Brings  the  strength  of  EXOS  scripting  
and  Policy  feature  together  
• Configuration   Flexibility ,  Automation

Use  Case:  Dynamically  configure  POE  attributes  


19 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l
VLAN  Management  – MIB  Enhancements  

Solution  Overview
• ExtremeXOS 15.7.1  Added   support  for
- PVLAN   MIB:  New  MIB  tables  for  GET/SET   operations  to  view  and  
configure  PVLAN   objects
- BRIDGE-­MIB   &  QBRIDGE-­MIB:  Assist  to  retrieve  VLAN  specific  
information
- ENTITY-­MIB:   Mechanism  to  retrieve  device  specific  information
• ExtremeXOS 22.1  enhancements
- Enhanced   QBRIDGE-­MIB   (“dot1qStaticVlanTable”)   to  support  R/W

Value  Proposition
• Enhance EXOS  MIB  to  manage   (view  &  configure)  VLAN

20 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


ExtremeXOS®   – 22.1.1
Datacenter  Features

©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


Enterprise  SDDC  Solutions  and  Partners  
1 2 3

Controller-­less,
Controller-­less, Controller  Based,
Community   Driven
Simplicity, Scalable,
Simplicity,
Visibility NFV
Visibility
Target: Customers  need  Hyper   Target: Customers  with  large  
Target: Existing  customers   Visor  flexibility  &  open  to   hybrid  (virtual  &  physical)  
with  VMWare  virtualization community  driven  solution environments

22 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


Enterprise  SDDC  – VMWare  NSX-­MH  
Provides
§ Faithful  Reproduction  of  Network  &  Security  Services  in  Software

Switching Routing Firewalling Load VPN Connectivity


Balancing to  Physical
23 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l
Enterprise  SDDC  – VMWare  NSX-­MH  

OVSDB  Management  Protocol  ( JSON-­RPC)


OVSDB  Schema  
OVSDB  Server
Agent

OVSDB  S erver
Hardware   VTEP   Gateway Event  Mgr Config Mgr
OVSDB
Data

Overlay  
FDB
Tunnel  Mgr

24 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


MVRP  support  with  MLAG

§ Solution  Overview
• Expanding   the  use  of  Dynamic  VLAN  
VLAN  added   propagation   via  MVRP  to  commonly  used  
MLAG  deployments
• Characteristics  of  MVRP
ISC
• Lower  bandwidth  utilization  compared  to  
GVRP  in  large  networks  
VLAN  added   VLAN  added   • Localized  topology  changes  resulting  in  a  
more  rapid  healing  of  network  failures  
without  interrupting  services  to  unaffected  
LAG VLANs.  Allowing  topology  changes  to  be  
scoped  to  a  particular  VLAN  rather  than  an  
entire  MST  Region  compared  to  GVRP  

§ Value  Proposition
• Configuration  Simplification  ,  Automation
• Increased resiliency

25 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


Small  Datacenter  – Simplicity/Scale  Journey

§ ExtremeXOS 21.1  Features


• VRRP  Active-­Active
• Fabric  Routing  w/  Host  Mobility

§ ExtremeXOS 22.1  Features


• MVRP  with  MLAG
• Max  VRRP  VRID  limit  increased  t o  “256”  
(  from  recent  limit  of  31) L3  Network
L2  Network

§ Value  Proposition
• Deployment  Simplification,  Scale  &  
Automation

26 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


ECMP  Hashing  Enhancement  -­ Custom  Hash

§ Solution  Overview
– Provide  more  control  on  traffic  distribution  of  IP  packets  among  ECMP  routes.
– ECMP  hash  can  be  configured  dynamically  and  independently  from  hash  algorithm  for  port  
load  sharing  (LAG)
§ Default  Hash  Method
– Hash  Algorithm  options
§ crc [  lower  |  upper  ]
– IPv4  Forwarding  Sharing  options  
§ L3  |  L3-­and-­L4
– IPv6  Forwarding  Sharing  options
§ L3-­and-­L4

§ Custom  Hash  Method


– Hash  Algorithm  options
§ [  xor |  crc-­16  |  crc-­32  [  lower  |  upper  ]  ]
– IPv4  Forwarding  Sharing  options
§ L3-­and-­L4 |  source-­only  | destination-­only  |  source-­and-­destination
– IPv6  Forwarding  Sharing  options  
§ L3-­and-­L4  with  Flow  Label  value  included  in  hash  calculations

§ Platforms  Supported
– X450-­G2,  X460-­G2,  X670-­G2,  X770,  or  a  Stack  with  supported  platforms.
©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l
ExtremeXOS®   – 22.1.1
Ease  of  Use  /  Simplification

28
©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l
Add/Del  Ports  to  LAG,  while  in  MLAG
§ Change  Overview
• Ability  to  add  port  to  LAG  group  when  MLAG  is  enabled   on  the  LAG  port
• Ability  to  delete  port  to  LAG  group  when  MLAG  is  eanbled on  the  LAG  port

Core1 Core2

ISC
1:4 2:4 1:4 2:4
1:7

1,2,5,6
3

L2Switch

©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


Add/Del  Ports  to  LAG,  while  in  MLAG
Before  E XOS  2 2.1 IN  E XOS  2 2.1
Core1.1 # show ver
Core1.1 # show config vsm
Chassis : 804030-00- 07 08195-0049 7 Rev 7.0
#
Slot-1 : 800263-00- 04 1123G-0083 4 Rev 4.0 BootROM:
# Module vsm configura ti on .
1.0.1.3 IMG: 16.1.3.1
#
configure mlag ports convergen ce - co nt ro l fast
Core1.2 # show config vsm
create mlag peer "Core2"
#
configure mlag peer "Core2" ipaddress 172.16.255 .2 vr VR-
# Module vsm configura ti on .
Default
#
configure mlag peer "Core2" interval 10000
configure mlag ports convergen ce - co nt ro l fast
enable mlag port 1:4 peer "Core2" id 25
create mlag peer "Core2"
configure mlag peer "Core2" ipaddress 172.16.255 .2 vr VR-
Core1.2 # show sharing
Default
Load Sharing Monitor
configure mlag peer "Core2" interval 10000
Config Current Agg Min Ld Share Ld Share
enable mlag port 1:4 peer "Core2" id 25
Master Master Control Active Algorithm Group
========== = == == == == == = == == == == == = == == == == == = == == == == == = == =
Core1.3 # show shar
1:4 1:4 LACP 1 L3_L4 1:4
Load Sharing Monitor
L3_L4 2:4
Config Current Agg Min Ld Share Ld Share
========== = == == == == == = == == == == == = == == == == == = == == == == == = == =
Master Master Control Active Algorithm Group
========== = == == == == == = == == == == == = == == == == == = == == == == == = == =
Core1.3 # config shar 1:4 add port 1:7
1:4 1:4 LACP 1 L3_L4 1:4
Core1.4 #sh sharing
L3_L4 2:4
Load Sharing Monitor
========== = == == == == == = == == == == == = == == == == == = == == == == == = == =
Config Current Agg Min Ld Share Ld Share
Master Master Control Active Algorithm Group
Core1.4 # config shar 1:4 add port 1:7
========== = == == == == == = == == == == == = == == == == == = == == == == == =
Error: Sharing configura ti on on MLAG ports 1:4 cannot be
1:4 2:4 LACP 1 L3_L4 1:4
modified.
L3_L4 1:7
Use "disable mlag port" to remove port from MLAG first
Configurat i on failed on backup MSM, command execution aborted! L3_L4 2:4

§ Value  Proposition
• Configuration   simplification   (No  un-­config &  re-­config)
©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l
PIM  SSM  Reconfig,  w/o  disable  PIM
Before  E XOS  2 2.1 IN  E XOS  2 2.1
Core1.1 # show config pim Core1.1 # show version
# Switch : 800534-00- 04 1413G-0007 0 Rev 4.0 BootROM:
# Module pim configura ti on . 2.0.2.1 IMG: 22.2.0.16
# PSU-1 : Internal PSU-1 800462-00- 04 1428W-8058 2
configure pim ssm range default PSU-2 : Internal PSU-2
configure pim add vlan "v1" sparse
enable pim ssm vlan "v1" Image : ExtremeXO S version 22.2.0.16 by release-ma na g er
enable pim on Thu Sep 29 15:31:13 EDT 2016
BootROM : 2.0.2.1
Core1.2 # unconfigu re pim ssm range Diagnostic s : 6.4
Error: PIM must be disabled globally before changing SSM range. Core1.2 # show config pim
#
Core1.3 # disable pim ssm vlan v1 # Module pim configura ti on .
Error: PIM must be disabled globally before changing SSM mode #
configure pim ssm range default
configure pim add vlan "v1" sparse
Core1.4 # disable pim enable pim ssm vlan "v1"
Core1.5 # enable pim ssm vlan ”v2" enable pim
Core1.6 # enable pim
Core1.7 # sh config pim Core1.3 # unconfig pim ssm range
# Core1.4 # sh config pim
# Module pim configura ti on . configure pim add vlan "v1" sparse
# enable pim ssm vlan "v1"
configure pim ssm range default enable pim
configure pim add vlan ”v2" sparse Core1.5 # disable pim ssm vlan v1
enable pim ssm vlan ”v2" Core1.6 # show config pim
enable pim configure pim add vlan "v1" sparse
enable pim

§ Value  Proposition
• Configuration   simplification   (No  un-­config &  re-­config)
31 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l
Preserving  CLI  History  across  reboot/crash

§ Change  Overview
• Utilize  NVRAM  (CF)  to  preserve  CLI  across  reboot/crash
• Feature  introduces  new  file  system  under  “/scratch/”  
• Preserve  all  command   type  (show,  debug,   etc.)
• Also  records  timestamp,   user  &  type  of  session  (SSH,  telnet   etc.)

§ Value  Proposition
• Traceability
• Better  Troubleshoot

32 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


Port  Link  Flap  Detection

§ Solution  Overview
• Dynamically  detect  physical  link  flapping  and  respond  with  configurable  actions  
• Disable  port(s)  in  question
• SNMP  Trap  notification
• Generate  SYSLOG  entry  

§ Value  Proposition
• Reduced   Network  Downtime  
• Increased Resiliency

33 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


Port  Link  Flap  Detection  -­ Configuration
Configuration  Commands:
Turn  link-­flap  detection   feature  on  or  off:
configure   ports  [<port_list>  |  all]  link-­flap-­detection   [on  |  off]
ex.  c onfigure  ports  1-­15  link-­flap-­detection  on

Configuring  the  link-­flap  detection   interval,  threshold  and  disable  time  parameters:
configure   ports  [<port_list>  |  all]  link-­flap-­detection   [{interval  [<interval>  |  indefinitely]}  
{threshold  <threshold>}  {disable-­time   [<disable_time>   |  until-­cleared]}]
ex.  c onfigure  ports  1-­15  link-­flap-­detection  threshold  20  disable-­time  200

Add/Delete  Actions  taken  when  excessive   Link-­flapping   occurs:


configure   ports  [<port_list>  |  all]  link-­flap-­detection   action  [add  |  delete]   [{{disable-­ port}  {log}  
{trap}}  |  all-­actions]
ex.  c onfigure  ports  1-­15  link-­flap-­detection  action  add  all-­actions

Manually   Enable  Ports  that  have  been  disabled:


clear  ports  [<port_list>  |  all]  link-­flap-­detection   status
ex.  c lear  ports  all  link-­flap-­detection  s tatus

34 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


Port  Link  Flap  Detection  – Show  Commands

show  ports  all  link-­flap-­detection  configuration

show  ports  all  link-­flap-­detection  counters

show  ports  all  link-­flap-­detection  disabled-­ports


35 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l
Spanning  Tree  “disabled”  forwarding  behavior  

§ Solution  Overview
• Allow  for  configurable  handling  of  Spanning  Tree  Protocol  BPDU’s  with  STP  disabled  
• Forward  received  BPDU  by  default  
• Configurable   drop  received  BPDU

§ Value  Proposition
• Flexibility  of  Spanning   Tree  Protocol  forwarding    

Configuration  Command:
configure  stpd bpdu-­forwarding  [on  |  off]“
36 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l
ExtremeXOS®   – 22.1.1
Infrastructure  Features

37 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


ExtremeSwitching X460-­G2  Default  License

§ Change  Overview
• Starting   from  ExtremeXOS 22.1.1,   X460-­
G2  series  platforms   default  license  is  
upgraded   to  “Advance  Edge”  from  “Edge”  
license
• No back  port  to  prior  releases  
• Caution in  deployment   scenario  involving  
heterogeneous   stacking  of  X460-­
G2/X440-­G2  with  “Edge”  license  on  stack-­
master  &  back  up

§ Value  Proposition
• Consistency:   Align  higher-­end   product  in  
each  series  with  one-­step  license  upgrade  
to  “Core”

38 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


ExtremeXOS 22.1.1  – Other  Infrastructure  Changes
Configuration  and  Network  Management:  HTTP,  CLI,  SNMP,  XML,  UPM

Software  Management  
Infrastructure:
L2  Protocols L3  Protocols
Process  Manager, STP,  LACP,   MPLS OSPF,  BGP,
Device  Manager EAPS,  etc. PIM,  RIP,  etc
Node  Manager
Event  Logging
NETWORK  SERVICES:  Route  Manager,  FDB  Manager,  VLAN  Manager,  net  t ools

Hardware  Abstraction  Layer


Linux Kernel 3.18
Slow-­path  packet  handling,  device  drivers,  System  services
Hardware  Dependent  Layer

HARDWARE:  Switching  ASICS,  Non-­Volatile  Storage,  Console,  Management  Ethernet,  etc.

Linux  Kernel  upgraded   to  3.18


39 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l
ExtremeXOS 22.1.1  – Other  Infrastructure  Changes

§ Change  Overview
• OSPFv3  VRF  support  – ExtremeXOS 22.1.1  supports  OSPFv3  in  a  
VRF.  Enables  to  support  multiple   instance  of  protocol  in  different   VRFs  
at  the  same  time.
• Value  Proposition: Allow  m ore  scalable  &  flexible  OSPFv3  deployments

• Remove  SNMPv3  default   users

40 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


ExtremeSwitching Stacking  Debug  Trace  Tools
Following   five  trace  facilities  have  been  added   to  monitor   and  capture  various  aspects  of  
inter-­node   communications
1. CPU  Queue  Stats  Trace
Will  tell  if  there  was  any  packet  loss  (i.e.  dropped  packets)  on  any  of  the  HiGig ports  or  CPU  port
2. BCM  RPC  Trace  key
Will  tell  the  flow  of  configuration  events  between  the  master  node  and  the  other  slots.  
3. Node  Manager  Time  Stamp  Trace
Will  show  the  arrival  and  departure  rate  of  node  manager  messages  (master  node  has  a  6  second  
timeout  for  each  node)  info  messages.  
4. Operational  Control  Path  Conduit  Trace
Will  track  the  TCP/UDP  message  exchange  between  the  master  node  and  other  slots  in  the  stack.  
Specifically,  it  is  used  to  detect  loss  on  the  conduits  between  nodes.  
5. Stack  Topology  Manager  PDU  Trace
Will  show  a  time  stamped  snap-­shot  of  the  split  horizon  PDUs  passing  between  adjacent  nodes  in  the  
stack.

Each  trace  facility  is  designed  to  continuously  c apture  ( circular  buffer)  information  until  the  designated  trigger  occurs  for
dumping  into  a  log  file.

41 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


ExtremeSwitching Stacking  Debug  Trace  Tools
CLI  Commands   to  control  trace  facilities
• debug  hal config trace
• [cpu-­stats  |  bcm-­rpc-­key  |  nm-­timestamp   |  stm-­pdu |  conduit]  
• debug  hal enable trace
• [cpu-­stats  |  bcm-­rpc-­key  |  nm-­timestamp   |  stm-­pdu |  conduit  |  all]
• debug  hal disable trace
• [cpu-­stats  |  bcm-­rpc-­key  |  nm-­timestamp   |  stm-­pdu |  conduit  |  all]
• debug  hal show trace
• [cpu-­stats  |  bcm-­rpc-­key  |  nm-­timestamp   |  stm-­pdu |  conduit  |  all]
• debug  hal clear trace
• [cpu-­stats  |  bcm-­rpc-­key  |  nm-­timestamp   |  stm-­pdu |  conduit  |  all]

Trigger  CLIs  are  as  follows:


• debug  hal config trigger  <trigger-­name> [<trace_name>   |  all]
• debug  hal enable  trigger  <trigger-­name>
• debug  hal disable  trigger  trigger-­name>  {capture}
• debug  hal show  trigger  <trigger-­name>

42 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


ExtremeSwitching Stacking  Debug  Trace  Tools

Trace  Log  Collection

When  the  event  trigger  fires  there  are  numerous  logs  created  
on  the  file  system  of  each  node.  In  the  initial  release  the  five  
trace  facilities  create  below  shown  eight  files  per  stack  node  in  
“/usr/local/tmp”  directory.  
• conduit_VR0_slotN.pcap0
• conduit_VR0_slotN.pcap0_backup
• conduit_VR0_slotN.pcap1
• conduit_VR0_slotN.pcap1_backup
• conduit_VR1_slotN.pcap0
• conduit_VR1_slotN.pcap0_backup
• conduit_VR1_slotN.pcap1
• conduit_VR1_slotN.pcap1_backup

43 ©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l


Thank  You

WWW.EXTREMENETWORKS.COM

©2016   Extreme   Networks,   Inc.    All   rights   reserved.   Extreme   Confidentia l

You might also like