![]() The most preferred way of connecting to AMS-IX is directly through a 元 device (router), see the diagram below. ![]() No connected device should bridge frames from other devices onto AMS-IX, or talk STP on its AMS-IX interface. In short, an intermediate L2 device may only bridge frames from the member's router to the AMS-IX port (so we see only one MAC address) and should otherwise be completely invisible. By enforcing the one-MAC-address-per-port rule, we effectively prevent forwarding loops and STP traffic from intermediate L2 devices. Forwarding loops and spanning tree topology changes are good examples of this. Extended L2 networks are not under the control of AMS-IX, but instabilities in a L2 network behind the AMS-IX switches can and typically do have a negative impact on the whole exchange. We allow only one MAC address because we allow no additional devices behind the AMS-IX ports. This means that you have to be extremely careful when connecting a device that can act as a L2 device. The AMS-IX rules dictate that only one MAC address is allowed behind a port. MTU settings must be configured accordingly. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |