Configuration Task Summary
After the basic TRILL functions are configured, a TRILL network can be constructed. If other TRILL functions are required, configure them according to reference sections.
In large-mac-table mode, the device does not support the TRILL function.
Scenario |
Description |
Task |
---|---|---|
Configuring basic TRILL functions |
The following functions can be configured only when the basic TRILL functions are enabled.
NOTE:
On the current CX11x&CX31x&CX710&CX91x Series switch modules, Layer 3 route forwarding cannot be performed after TRILL packets are terminated. |
Configuring Basic TRILL Functions |
Adjusting TRILL route selection |
After the basic TRILL functions are configured, each node in the network can communicate with each other using TRILL. The unicast and multicast forwarding tables are generated through TRILL based on the LSDBs to guide the unicast and multicast traffic forwarding. However, on a large network, only the protocol mechanism cannot meet the network planning and traffic management requirements. As TRILL uses the SPF algorithm to calculate unicast and multicast routing tables, some links may be set idle due to high costs. Meanwhile, some links with low costs are too busy to load traffic and load balancing cannot be performed. This results in the network resource waste and affects the network transmission quality. Therefore, to optimize TRILL networks, route selection must be adjusted for accurate network control. |
Adjusting TRILL Route Selection |
Adjusting the TRILL network convergence speed |
The network convergence speed determines the network quality. Although TRILL supports fast convergence, it always applies to large data center networks. A complex network slows down the convergence speed. In this situation, the network convergence speed can be manually increased. |
Adjusting the TRILL Network Convergence Speed |
Configuring the association between STP and TRILL |
You are advised to configure the association between STP/RSTP/MSTP and TRILL on edge devices connecting TRILL networks to STP/RSTP/MSTP networks. |
Configuring the Association Between STP/RSTP/MSTP and TRILL |
Configuring TRILL network dual-homing through an E-Trunk NOTICE:
To deploy the TRILL network dual-homing through an E-Trunk, ensure that all devices on the TRILL networks run the software version of DCV100R003C00 or a later version. |
In a dual-homing access scenario, if the VLAN appointed forwarder (AF) or MSTP is associated with TRILL to eliminate loops, servers must connect to the TRILL network through Layer 2 access switches. This access mode also requires link redundancy backup, causing a waste of bandwidth. You can configure servers to be dual-homed to the TRILL network through E-Trunk. The servers then forward traffic simultaneously. This access mode ensures reliability and fully utilizes network bandwidth. |
Configuring TRILL Network Dual-Homing Through an Eth-Trunk |
Improving TRILL network security |
With development of the Internet, more and more data, voice, and video information is exchanged over networks, and most of these services require high security. TRILL authentication is an encryption method based on network security requirements. It encrypts TRILL packets by adding the authentication field to the packets. When the local RB receives TRILL packets sent from a remote RB, if the authentication passwords are different from the local configuration, the local RB discards the packets to implement self-protection. TRILL supports the following authentication modes:
|
Improving TRILL Network Security |