beautypg.com

Amf network guidelines, Retention and use of the ‘manager’ username, Loop-free data plane – Allied Telesis AlliedWare Plus Operating System Version 5.4.4C (x310-26FT,x310-26FP,x310-50FT,x310-50FP) User Manual

Page 1552: Aggregators, Vcstacks, Amf tunneling (virtual links)

background image

AMF Introduction and Configuration

Software Reference for x310 Series Switches

59.8

AlliedWare Plus

TM

Operating System - Version 5.4.4C

C613-50046-01 REV A

AMF network guidelines

Retention and use of the ‘manager’ username

The default username for an Alliedware Plus login is manager, with a documented default
password. Users should change this password on all their nodes to provide login security.
In order to centrally manage nodes undergoing automated node recovery, or to expand
the network by adding a new unconfigured node, it will be necessary to login with the
default manager username.

It is possible to add new usernames and passwords to nodes, but to retain the ability to
centrally manage the network, usernames should be uniformly configured across all AMF
nodes within the AMF network.

Loop-free data plane

The current version of AMF does not control the data plane, so it is a requirement that the
network is configured such that the data plane (i.e. the paths defined by the data VLANs) is
kept loop free.

Aggregators

Dynamic Aggregators (LACP) cannot be used on ports configured as AMF links or cross-
links. Therefore any aggregated links in an AMF network need to be configured as static
aggregators.

VCStacks

If any VCStacks are included as AMF nodes it is a requirement that the VCS virtual MAC
feature is enabled to ensure correct operation of the AMF network. If the VCStack is
running as an AMF master node it is also a requirement that removable external storage
media is installed in both stack members.

AMF Tunneling (virtual links)

AMF Tunneling enables you to extend your local uplinks and downlinks across a wide area
network. The tunneled data is then wrapped in a layer three IP packet for transmission
across a wide area IP network. A simple AMF tunnel is shown in

“AMF Virtual Link” on

page 59.9

. Switches 1 and 2 encapsulate the layer two AMF uplink and downlink data and

wrap this inside a layer 3 IP packet to enable it to traverse an IP Network. Routers 1 and 2
(and any other routers within the cloud) perform a conventional routing function, reading
the IP addresses of the tunneled packets and forwarding them to their destination.

Once connected through the tunnel, the remote AMF members will have the same AMF
capabilities as a directly connected AMF member.

Note

Currently AMF does not support the use of STP on links between AMF nodes.
Using STP with redundant network links has the potential to block AMF control
connections, and also could lead to periods of traffic leakage during the start of
automatic node recovery. Hence, if there are physical loops in any of the data
VLANs in the network, then EPSR must be used as the protection mechanism for
those loops.