Extreme Networks 200 Series Switch User Manual


 
Overview of the EAPS Protocol
Summit 200 Series Switch Installation and User Guide 145
Optimizing Interoperability
You may either configure a Summit 200 series switch as the EAPS master or you may configure another
switch from Extreme Networks as the EAPS master. If you configure a switch other than the Summit
200 as the EAPS master, enter the following command to allow interoperability between the platforms:
configure eaps <name> failtime expiry-action open-secondary port
Fault Detection and Recovery
EAPS fault detection on a ring is based on a single control VLAN per EAPS domain. This EAPS domain
provides protection to one or more data-carrying VLANs called protected VLANs.
The control VLAN is used only to send and receive EAPS messages; the protected VLANs carry the
actual data traffic. As long as the ring is complete, the EAPS master node blocks the protected VLANs
from accessing its secondary port.
NOTE
The control VLAN is not blocked. Messages sent on the control VLAN must be allowed into the switch
for the master node to determine whether the ring is complete.
Figure 27: EAPS fault detection and protection switching
A master node detects a ring fault in either of two ways:
Polling response
Trap message sent by a transit node
EW_07
2
S3 sends "link down"
message to
master node
Master
node
Break
in ring
Master node opens secondary po
rt
to allow traffic to pass
S4 sends "link down"
message to master node
S 4
S 5
S 6
S 3
S 2
S 1
PS