Riverstone Networks RS 32000 Switch Router Getting Started Guide 2-5
Introduction Software Overview
• DVMRP
• GARP/GVRP
The RS 32000 does not use a specific IP multicast routing protocol by default. When you configure an interface for IP
multicast, you also specify the routing protocol you want the interface to use.
IPX Routing
The RS 32000 supports the following IPX routing protocols:
IPX RIP – a version of the Routing Information Protocol (RIP) tailored for IPX
IPX SAP – the Service Advertisement Protocol, which allows hosts attached to an IPX network to reach printers, file
servers, and other services
By default, IPX routing is enabled on the RS when an IPX interface is created.
2.3.4 Layer-4 Switching
In addition to layer-2 bridging and layer-3 routing, the RS 32000 performs layer-4 switching. Layer-4 switching is
based on applications and flows.
Layer-4 Applications – The RS 32000 understands the application for which an IP or IPX packet contains data and
therefore enables you to manage and control traffic on an application basis. For IP traffic, the RS 32000 looks at the
packet’s TCP or UDP port number to determine the application. For IPX packets, the RS 32000 looks at the destination
socket to determine the application.
Layer-4 Flows – The RS 32000 can store layer-4 flows on each line card. A layer-4 flow consists of the source and
destination addresses in the IP or IPX packet combined with the TCP or UDP source and destination port number (for
IP) or the source and destination socket (for IPX). You can therefore manage and control individual flows between
hosts on an individual application basis.
A single host can have many individual layer-4 entries in the RS 32000. For example, an IP host might have separate
layer-4 application entries for email, FTP, HTTP, and so on, or separate layer-4 flow entries for specific email
destinations and for specific FTP and Web connections.
2.3.5 Security
The bridging, routing, and application (layer-2, layer-3, and layer-4) support described in previous sections enables
you to implement security strategies that meet specific needs. For layer-2, a wide range of bridging filters are available.
Additionally, all layers can be protected using Access Control List (ACL) filtering. You can implement the following
types of filters and ACLs to secure traffic on the RS 32000:
• Layer-2 source filters (block bridge traffic based on source MAC address)
• Layer-2 destination filters (block bridge traffic based on destination MAC address)
• Layer-2 flow filters (block bridge traffic based on specific source-destination pairs)
• Layer-3 source ACLs (block IP or IPX traffic based on source IP or IPX address)
• Layer-3 destination ACLs (block IP or IPX traffic based on destination IP or IPX address)
• Layer-3 flow ACLs (block IP or IPX traffic based on specific source-destination address pairs)
• Layer-4 flow ACLs (block traffic based on application flows)
Comentarios a estos manuales