In this section we will list some of the more common types of violations we see at AMS-IX and give some arguments as to why it is considered unwanted. This is your best chance of not leaking MAC addresses or STP traffic and it greatly increases the stability of the network.Īny traffic other than the types mentioned in the previous section is deemed to be illegal traffic. The most preferred way of connecting to AMS-IX is directly through a 元 device (router), see the diagram below. No connected device should bridge frames from other devices onto AMS-IX, or talk STP on its AMS-IX interface. In short, an intermediate L2 device may only bridge frames from the member's router to the AMS-IX port (so we see only one MAC address) and should otherwise be completely invisible. By enforcing the one-MAC-address-per-port rule, we effectively prevent forwarding loops and STP traffic from intermediate L2 devices. Forwarding loops and spanning tree topology changes are good examples of this. Extended L2 networks are not under the control of AMS-IX, but instabilities in a L2 network behind the AMS-IX switches can and typically do have a negative impact on the whole exchange. We allow only one MAC address because we allow no additional devices behind the AMS-IX ports. This means that you have to be extremely careful when connecting a device that can act as a L2 device. The AMS-IX rules dictate that only one MAC address is allowed behind a port. MTU settings must be configured accordingly.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |