alan@cunixc.columbia.edu (Alan Crosswell) (01/06/88)
[Please no "I told you so's" and "you should have bought gateways" from the peanut gallery. I am aware of the arguments pro and con. Irrespective of those arguments, we have a number of LAN Bridges as I'm sure many readers have and this article is addressed to them.] We just got our first VMS system (condolences gratefully accepted:-) partially to run RBMS. After running RBMS for about an hour now, I can make the following observations: + The manual and program aren't all so bad as a recent posting to this group indicated. If you are already used to dealing with DEC software like NCP for DECNET then the commands will soon roll right off your finger tips. + You can group all your bridges together and do neat commands like: USE KNOWN BRIDGES SHOW COUNTERS TO "filename" EVERY 5 MINUTES This will poll all your bridges every 5 minutes and dump their counters to a file. (You can poll every second if you like.) - You have to know the addresses of all your lanbridges before you can start querying them. Seems to me that, since they all talk to each other with this wonderful multicast protocol in order to establish the spanning tree for the network, RBMS should be able to listen for a few minutes and figure out what bridges are out there. I know -- I should have written down the bridge addresses when I installed them (ha!). Fix: use netwatch on a PC and get the bridge addresses. (Figuring out which bridge is which after you find their addresses is left as an exercise for the reader.) - RBMS (or more specifically, the lanbridge) uses a unique method of network management security: a combination of an unpublished management protocol and financial disincentives. (How many bad guys are going to spend the money to license RBMS just to turn off someone else's lanbridge across campus?). Clearly, they assume that the so-called "extended LAN" is in the "typical" corporate data center environment and not in a decentralized university environment where j-random departments could run RBMS and do all kinds of damage to every bridge put theire owne (purely unintentionally -- it is easy to apply the same command to the set of all known bridges). - So you say, what about DIP switches 3 & 4 (enable/disable RBMS access via port A/B)? Well, picture the typical backbone hierarchy where some central support organization runs a backbone which departments are connected to: ===+=====================+=== campus backbone | | +-----+ +-----+ (RBMS enabled on port A) | X | | Y | +-----+ +-----+ | | (RBMS disabled on port B) ===+=== ===+=== Dept. X LAN Dept. Y LAN In this scenario, Dept. X can't clobber lanbridge X because RBMS access to bridge X's B port is disabled. However, Dept. X can clobber bridge Y since his packets arrive at bridge Y's A port! Possible workaround (not yet tried): configure each bridge to drop packets destined for the set of all other bridges. This won't break anything since the only time a bridge's physical ethernet address is used is for the management protocol. At all other times, it looks transparent and assumes the address of the original packet's sender. The RBMS command is something like: SET FORWARDING PHYSICAL ADDRESS 12-34-56-78-9A-BC DESTINATION NONE This leads to my next item: ? How come I get an error message back when I make a change to the forwarding table as in the above example which says the change was made (and it has indeed taken effect) but could not be saved in non-volatile RAM? Is this some sort of old revision level problem that I should call field service about? The bridges all show firmware version 1.0 (and they are all under service contracts). Comments, corrections, and Ultrix, 4BSD, or PC implementations of the protocol gratefully accepted. We would even pay for it. Alan Crosswell User Services, Center for Computing Activities Columbia University