UDP-Forwarding
Summit 200 Series Switch Installation and User Guide 191
Configuring UDP-Forwarding
To configure UDP-forwarding, the first thing you must do is create a UDP-forward destination profile.
The profile describes the types of UDP packets (by port number) that are used, and where they are to be
forwarded. You must give the profile a unique name, in the same manner as a VLAN, protocol filter, or
Spanning Tree Domain.
Next, configure a VLAN to make use of the UDP-forwarding profile. As a result, all incoming traffic
from the VLAN that matches the UDP profile is handled as specified in the UDP-forwarding profile.
A maximum of ten UDP-forwarding profiles can be defined. Each named profile may contain a
maximum of eight “rules” defining the UDP port, and destination IP address or VLAN. A VLAN can
make use of a single UDP-forwarding profile. UDP packets directed toward a VLAN use an all-ones
broadcast on that VLAN.
UDP-Forwarding Example
In this example, the VLAN Marketing and the VLAN Operations are pointed toward a specific backbone
DHCP server (with IP address 10.1.1.1) and a backup server (with IP address 10.1.1.2). Additionally, the
VLAN LabUser is configured to use any responding DHCP server on a separate VLAN called LabSvrs.
The commands for this configuration are as follows:
create udp-profile backbonedhcp
create udp-profile labdhcp
config backbonedhcp add 67 ipaddress 10.1.1.1
config backbonedhcp add 67 ipaddress 10.1.1.2
config labdhcp add 67 vlan labsvrs
config marketing udp-profile backbonedhcp
config operations udp-profile backbonedhcp
config labuser udp-profile labdhcp
ICMP Packet Processing
As ICMP packets are routed or generated, you can take various actions to control distribution. For
ICMP packets typically generated or observed as part of the routing function, you can assert control on
a per-type, per-VLAN basis. You would alter the default settings for security reasons: to restrict the
success of tools that can be used to find an important application, host, or topology information. The
controls include the disabling of transmitting ICMP messages associated with unreachables,
port-unreachables, time-exceeded, parameter-problems, redirects, time-stamp, and address-mask
requests.
For ICMP packets that are typically routed, you can apply access lists to restrict forwarding behavior.
Access lists are described in Chapter 9.