RE: DLSw+ ring-list, port-list and bgroup-list/proxy explorer

From: Mosley, Arthur (Arthur.Mosley@xxxxxxxx)
Date: Sun Feb 20 2000 - 20:46:17 GMT-3


   

I forgot:

Filtering to reduce unwanted traffic/explorer packets with:

dmac-output-list - mac address filter
host-netbios-out - netbios filter

-----Original Message-----
From: Mosley, Arthur
To: 'zhencai '; Mosley, Arthur; 'ccielab@groupstudy.com '
Sent: 2/20/00 6:33 PM
Subject: RE: DLSw+ ring-list, port-list and bgroup-list/proxy explorer

Thanks for your quick response. What phrases would lead to choose one
over the other. For example:

ICANREACH/ICANNOTREACH would be for a specific mac, netbios, sap
address.

border peers if you cannot fully mesh-similar to router reflectors in
BGP

port-list - if from a serial or token interface

ring-list/bgroup - from a logical grouping

proxy explorer - when multiple connections to a single host exist.

Is ring-list perferred over port-list?

Thanks,

Art
-----Original Message-----
From: zhencai
To: Mosley, Arthur; ccielab@groupstudy.com
Sent: 2/20/00 6:09 PM
Subject: RE: DLSw+ ring-list, port-list and bgroup-list/proxy explorer

Art,

There are a lot of ways to control the explorer frames, like static
path,
ICANREACH, ICANNOTREACH, border peers, ring-list, bgroup-list etc.
Ring-list
is for tokenring interface, Bgroup-list is for ethernet. From CCO,
port-list
is for tokenring and serial ports, but I noticed it's a valid command in
ethernet. Anyone can confirm this?
Regards,

Zhen Cai

-----Original Message-----
From: nobody@groupstudy.com [mailto:nobody@groupstudy.com]On Behalf Of
Mosley, Arthur
Sent: Sunday, February 20, 2000 2:24 PM
To: 'ccielab@groupstudy.com '
Subject: DLSw+ ring-list, port-list and bgroup-list/proxy explorer

If asked to control the flooding of explorer frames the ring-list,
port-list
and bgroup-list seem to accomplish this task.

bgroup-list applies to Ethernet. Does ring-list and port-list apply to
both
Ethernet and Token ring?

What are the pros and cons of each or how would I determine which one to
use?

Finally, how does the proxy-explorer command fit into the picture.

Thanks,

Art



This archive was generated by hypermail 2.1.4 : Thu Jun 13 2002 - 08:22:54 GMT-3