Ruckus Enterprise Campus Network
Ruckus Enterprise Campus Network
Jan 2018
LEGAL DISCLAIMER
Product features, functionality and specifications may change or be discontinued without notice. Nothing
in this document shall be deemed to create a warranty of any kind, either express or implied, statutory or
otherwise, including but not limited to, any implied warranties of merchantability, fitness for a particular
purpose, non-infringement of third-party rights or availability with respect to any products and services.
Refer to www.ruckuswireless.com for the latest version of this document. Notice: This document is for
informational purposes only and does not set forth any warranty, expressed or implied, concerning any
equipment, equipment feature, or service offered or to be offered by Ruckus. Ruckus reserves the right
to make changes to this document at any time, without notice, and assumes no responsibility for its use.
This informational document describes features that may not be currently available. Contact a Ruckus
sales office for information on feature and product availability. Export of technical data contained in this
document may require an export license from the United States government.
Copyright © 2017, Ruckus Wireless, Inc. All rights reserved. Ruckus Wireless and Ruckus Wireless design are registered in the U.S.
Patent and Trademark Office. Ruckus Wireless, the Ruckus Wireless logo, BeamFlex, ZoneFlex, MediaFlex, FlexMaster, ZoneDirector,
SpeedFlex, SmartCast, SmartCell, ChannelFly and Dynamic PSK are trademarks of Ruckus Wireless, Inc. in the United States and
other countries. All other trademarks mentioned in this document or website are the property of their respective owners. 17-8-B
Ruckus Wireless, Inc. | 350 West Java Drive | Sunnyvale, CA 94089 USA | T: (650) 265-4200 | F: (408) 738-2065
ruckuswireless.com
1
Ruckus Networks
Cisco CLI comparison
Jan 2018
Contents
LEGAL DISCLAIMER ............................................................................................................................ 1
Introduction ............................................................................................................................................ 4
Managing Access .................................................................................................................................. 4
Telnet Server........................................................................................................................................ 4
Password Encryption ............................................................................................................................. 4
SSH ..................................................................................................................................................... 4
SNMP .................................................................................................................................................. 4
File System........................................................................................................................................... 4
TFTP Backup......................................................................................................................................... 5
Configuration Files ................................................................................................................................ 5
Saving Configuration Files ...................................................................................................................... 5
Delayed Reload .................................................................................................................................... 5
VLAN ..................................................................................................................................................... 5
Membership Wrappers ......................................................................................................................... 6
VLAN Management (Access, Trunk, and Native VLAN) ............................................................................... 8
VoIP Support with Voice VLAN: PC Connected to Phone and Phone to ICX Switch ...................................... 10
Cisco VoIP devices .............................................................................................................................. 11
Management VLAN ............................................................................................................................. 11
Spanning Tree Protocol (STP) ............................................................................................................. 12
Spanning Tree Configuration ................................................................................................................ 12
RPVST/RPVST+ and Spanning Tree Port Fast .......................................................................................... 13
MSTP ................................................................................................................................................ 14
BPDU Guard ....................................................................................................................................... 15
Root Guard ........................................................................................................................................ 15
Discovery Protocols LLDP, CDP, and FDP .......................................................................................... 15
Cisco Discovery Protocol (CDP) ............................................................................................................. 15
Link Layer Discovery Protocol (LLDP) ..................................................................................................... 16
Foundry Discovery Protocol (FDP) ......................................................................................................... 16
Link Aggregation: LACP and LAG ........................................................................................................ 17
Power over Ethernet (PoE) .................................................................................................................. 18
Quality of Service (QoS) ...................................................................................................................... 18
2
Ruckus Networks
Cisco CLI comparison
Jan 2018
3
Ruckus Networks
Cisco CLI comparison
Jan 2018
Introduction
This guide explains the terminology and concepts associated with integrating or migrating from Cisco to Ruckus
campus solutions. It also discusses the compatibility between Ruckus and Cisco product portfolios from a
configuration and management perspective. This guide compares the Ruckus CLI with the Cisco CLI for the ICX
7150, ICX 7250, ICX 7450, and ICX 7750 switches running FastIron 8.0.70 software. Some of the data in this
document have been collected from previous Cisco cli comparison documents.
Managing Access
Telnet Server
On both Ruckus switch and router the Telnet server is enabled by default. Like the system password, there is no
default value. On Cisco devices the Telnet server must be enabled through a VTY line.
Ruckus devices have no default password. The password may be configured with the enable telnet password
<password> command. On Cisco devices Telnet is disabled by default and requires the configuration of VTY lines
and enable password.
Password Encryption
Ruckus layer 3 switches password, are all encrypted in the running-config and startup-config files by default.
Encryption can be disabled with no service password-encryption command. On Cisco devices, all passwords are
encrypted by default.
SSH
Secure Shell (SSH v2) access is available, but disabled by default on both Ruckus and Cisco switches and routers.
SNMP
By default, Ruckus switches and routers support SNMP v1/v2c read-only access with community string of “public.”
Read-write access is only permitted when an RW community string is manually configured. Ruckus supports SNMP
version 1, 2c and 3. The status of SNMP access on Cisco devices is platform specific. SNMP read-only access is
enabled by default, the RO community string is “cisco”.
File System
Ruckus devices do not contain a FAT file system for managing files. The flash on Ruckus switch/router is divided
in primarily into 4 locations:
• Primary image location – This is the default image location for booting the switch
• Secondary image location – This is the default image location for booting the switch
• Boot image location – This area of flash is where the bootstrap code is located
4
Ruckus Networks
Cisco CLI comparison
Jan 2018
• Startup-config – Similar to Cisco, this is where the operational configuration of the switch/router is saved so
configuration can be restored after reboot.
Cisco layer 3 switches use IOS File System (IFS), a DOS-type file system for managing files.
TFTP Backup
The commands for transferring file to/from an external TFTP server are very similar between Ruckus and Cisco.
The difference is based on the fact that there is not FAT file system on Ruckus switches and routers.
Configuration Files
Both Ruckus and Cisco use the startup-config and running-config operation. The startup-config is the file
referenced when the system boots. The running-config contains the current operation parameters of the
switch/router. In order to maintain the current configuration across reboots, the contents of the running-config
must be copied to the startup-config file.
Delayed Reload
Both Ruckus and Cisco support the ability delay a switch reload. Ruckus accomplishes this with the reload after
<dd: hh: mm> command. On a Cisco switch you can delay a reload with the reload at <hh:mm> [month day]
command.
VLAN
This section compares the commands that are used to configure VLANs.
5
Ruckus Networks
Cisco CLI comparison
Jan 2018
Membership Wrappers
In a Cisco configuration, the VLANs follow the interface hierarchy in the parser chain and preprocessing
configuration. In a Ruckus configuration, the interface follows the VLAN hierarchy for port-based VLANs. Thus, the
Ruckus device must create the VLAN configuration first, and tie it to interfaces for Layer 2 and Layer 3 processing.
On all Ruckus devices, you can configure port-based VLANs. A port-based VLAN is a subset of ports on a Ruckus
device that constitutes a Layer 2 broadcast domain. By default, all the ports on a Ruckus device are members of
the default VLAN. Thus, all the ports on the device constitute a single Layer 2 broadcast domain. When you
configure a port-based VLAN, the device automatically removes the ports from the default VLAN and adds them
to the VLAN. You can configure multiple port-based VLANs. You can configure up to 4094 port-based VLANs on a
Layer 2 switch or Layer 3 switch. On both device types, valid VLAN IDs are 1 through 4095. You can configure up
to the maximum number of VLANs within that ID range. VLAN membership configuration can be created easily
using wrappers and interface range commands on the Cisco switch. The Ruckus switch also supports VLAN
wrappers, multi-range VLANs, and the interface range command.
• Single command support to move an untagged port from one VLAN to another VLAN
• Single command support to selectively add and delete VLANs at FastIron 08.0.70 and beyond
Note: Multi-range VLANs allow users to use a single command to create and configure
multiple VLANs. These VLANs can be continuous, for example, from 2 to 7, or discontinuous,
for example, 2 4 7.
6
Ruckus Networks
Cisco CLI comparison
Jan 2018
7
Ruckus Networks
Cisco CLI comparison
Jan 2018
8
Ruckus Networks
Cisco CLI comparison
Jan 2018
Cisco(config-if)# switchport mode trunk NOTE: Dual mode specifies a native VLAN for
Cisco(config-if)# switchport nonegotiate untagged 802.1Q frames.
Cisco(config-if)# switchport trunk native NOTE: The dual-mode command without a VLAN
vlan 200 specifies the default VLAN ID.
NOTE: Native VLAN 200 specifies a native
VLAN for untagged 802.1Q frames.
Cisco# show interfaces gigabitEthernet 1/0/6 Ruckus(config-if-e1000-1/1/6)# show vlan 200
switchport Total PORT-VLAN entries: 3
Name: Gi1/0/19 Maximum PORT-VLAN entries: 64
Switchport: Enabled Legend: [Stk=Stack-Id, S=Slot]
Administrative Mode: trunk PORT-VLAN 200, Name [None], Priority level0,
Operational Mode: down Spanning tree Off
Administrative Trunking Encapsulation: dot1q Untagged Ports: None
Negotiation of Trunking: On Tagged Ports: None
Access Mode VLAN: 1 (default) Uplink Ports: None
Trunking Native Mode VLAN: 200 (VLAN0200) DualMode Ports: (U1/M1) 6
Administrative Native VLAN tagging: enabled Mac-Vlan Ports: None
Voice VLAN: none Monitoring: Disabled1/1/2
Administrative private-vlan host-
association: none Ruckus# show interfaces ethernet 1/1/6
Administrative private-vlan mapping: none GigabitEthernet1/1/6 is down, line protocol
Administrative private-vlan trunk native is
VLAN: none down
Administrative private-vlan trunk Native Port down for 14 minute(s) 1 second(s)
VLAN Hardware is GigabitEthernet, address is
tagging: enabled 609c.
Administrative private-vlan trunk 9fab.cd5d (bia 609c.9fab.cd5d)
encapsulation: Configured speed auto, actual unknown,
dot1q configured duplex fdx, actual unknown
Administrative private-vlan trunk normal Configured mdi mode AUTO, actual unknown
VLANs: none EEE Feature Disabled
Administrative private-vlan trunk Member of 2 L2 VLANs, port is dual mode in
associations: none Vlan
Administrative private-vlan trunk mappings: 200, port state is BLOCKING
none BPDU guard is Disabled, ROOT protect is
Operational private-vlan: none Disabled, Designated protect is Disabled
Trunking VLANs Enabled: 220 Link Error Dampening is Disabled
Pruning VLANs Enabled: 2-1001 STP configured to ON, priority is level0,
Capture Mode Disabled maclearning
Capture VLANs Allowed: ALL is enabled
Protected: false Openflow is Disabled, Openflow Hybrid mode
Unknown unicast blocked: disabled is
Unknown multicast blocked: Disabled, Flow Control is config enabled,
oper
enabled, negotiation disabled
Mirror disabled, Monitor disabled
Mac-notification is disabled
Not member of any active trunks
Not member of any configured trunks
No port name
IPG MII 0 bits-time, IPG GMII 0 bits-time
MTU 1500 bytes, encapsulation ethernet
300 second input rate: 0 bits/sec, 0
packets/
sec, 0.00% utilization
300 second output rate: 0 bits/sec, 0
packets/
sec, 0.00% utilization
0 packets input, 0 bytes, 0 no buffer
9
Ruckus Networks
Cisco CLI comparison
Jan 2018
VoIP Support with Voice VLAN: PC Connected to Phone and Phone to ICX Switch
When an IP phone connects to the switch, the access port (PC-to-telephone jack) of the IP phone can connect to
a PC. Packets to and from the PC and to or from the IP phone share the same physical link to the switch and the
same switch port. ATTENTION Voice VLAN is different between Cisco and Ruckus. On the Cisco switch, the
switchport voice vlan xx command causes the switch to communicate with the phone via CDP/LLDP and ensures
packets from the IP phone are put onto the voice VLAN. The VLAN ID configures the phone to forward all voice
traffic through the specified VLAN. In Ruckus voice VLAN, the voice-vlan xx command is only for CDP. The switch
10
Ruckus Networks
Cisco CLI comparison
Jan 2018
communicates with the phone via CDP and ensures packets from the IP phone are put onto the voice VLAN. The
VLAN ID configures the phone to forward all voice traffic through the specified VLAN. LLDP MED commands cause
the LLDP-MED to advertise VLAN 10 in its Network Policy TLV to LLDP only on the IP phone.
Management VLAN
A management VLAN allows remote devices to access the switch by way of SSH, SNMP, SSL, and syslog to manage
the switch with proper access credentials. Any VLAN can be leveraged or designated to be a management VLAN.
By default, the Ruckus management IP address that is configured on a Layer 2 switch applies globally to all ports
on the device. This configuration can be modified to apply on a specific VLAN and from a specific port. On Ruckus
Layer 2 switches, the management IP address is configured globally and is accessible from any configured VLAN
by way of any in-band and out-of-band port by default. If you want to restrict the IP management address to a
specific port-based VLAN, you can make that VLAN the designated management VLAN for the device. When you
configure a VLAN to be the designated management VLAN, the management IP address you configure on the
device is associated only with the ports and the management port in the designated VLAN. To establish a
11
Ruckus Networks
Cisco CLI comparison
Jan 2018
Telnet/SSH management session with the device, a user must access the device through one of the ports in the
designated management VLAN. The default gateway is under this VLAN. On Cisco Layer 2 switches, IP addresses
can be configured on any configured VLAN and are only accessible from the assigned VLAN. Additionally, Cisco
Layer 2 switches can have IP addresses assigned on all configured VLANs, but can only have one globally assigned
default gateway for routed management connectivity. On the Cisco device, you configure a VLAN for management
access and apply an IP address. The default gateway is applied globally.
12
Ruckus Networks
Cisco CLI comparison
Jan 2018
NOTE:
The following command declares the port to
be an operational edge for all VLANs
Ruckus(config-if-e1000-1/1/1)# spanning-tree
802-1w
admin-edge-port
NOTE:
The following command declares the port to
be on a point-to-point link for all VLANs
Ruckus(config-if-e10000-1/2/1)# spanning-
tree 8
admin-pt2pt-mac
NOTE:
The following command changes the priority
on a per VLAN or per port basis
13
Ruckus Networks
Cisco CLI comparison
Jan 2018
MSTP
The Multiple spanning tree protocol (MSTP) provides both simple and full connectivity assigned to any given VLAN
through a bridged LAN network. MSTP enables grouping and mapping VLANs into different spanning tree
instances. This section compares the commands that are used to enable a single instance of STP to manage
multiple VLANS in the system.
NOTE:
The mstp admin-edge-port x/x/x command
defines this port to be an edge port
Cisco(config)# interface g1/0/10 Ruckus(config)# mstp admin-pt2pt-mac
Cisco(config-if)# spanning-tree link-type ethernet 1/1/10
point-to-point
NOTE:
The mstp admin-pt2pt-mac x/x/x command
defines this port to be a point-to-point
link
! !
spanning-tree mode mst mstp scope all
14
Ruckus Networks
Cisco CLI comparison
Jan 2018
BPDU Guard
This section compares the commands that are used to filter BPDU frames received on user ports connected to the
switches.
Root Guard
This section compares the commands that are used to prevent a user device connected to a switch from becoming
a root port in STP to avoid sub-optimal packet forwarding.
15
Ruckus Networks
Cisco CLI comparison
Jan 2018
By default, Ruckus devices forward CDP packets without examining their contents. You can configure a Ruckus
device to intercept and display the contents of CDP packets. This feature is useful for learning device and interface
information for Cisco devices in the network. Ruckus devices support intercepting and interpreting CDP version 1
and version 2 packets.
• Link Layer Discovery Protocol (LLDP). The Layer 2 network discovery protocol described in the IEEE
802.1AB standard, Station and Media Access Control Connectivity Discovery. This protocol enables a
station to advertise its capabilities to and to discover other LLDP-enabled stations in the same 802 LAN
segments.
• LLDP media endpoint devices (LLDP-MED). The Layer 2 network discovery protocol extension described in
the ANSI/TIA-1057 standard, LLDP for Media Endpoint Devices. This protocol enables a switch to configure
and manage connected Media Endpoint devices that need to send media streams across the network (for
example, IP telephones and security cameras).
• LLDP enables network discovery between network connectivity devices (such as switches), whereas LLDP-
MED enables network discovery at the edge of the network, between network connectivity devices and
media end-point devices (such as IP phones).
16
Ruckus Networks
Cisco CLI comparison
Jan 2018
17
Ruckus Networks
Cisco CLI comparison
Jan 2018
PoE+ is defined in the IEEE 802.3at-2009 standard and supplies up to 30W of DC power to each device. This
configuration covers PoE and PoE+ capable devices.
Packets on Ruckus devices are classified in up to eight traffic classes with values from 0 to 7. Packets with higher
priority classifications are given a precedence for forwarding.
• Configuring QOS
o Classifying (trust the port)
▪ FastIron(config)# interface e 0/1/17 to 0/1/20
▪ FastIron (config-if-0/1/17) # trust dscp (When trust dscp is enabled, the interface honors the Layer
3 DSCP value. By default, the interface honors the Layer 2 CoS value)
o Marking (If needed, we can remark DSCP) (Disabled by Default)
▪ FastIron(config)#qos-tos map dscp-priority 46 to 7
▪ FastIron(config)#ip rebind-ACL all
o Scheduling (WRR by default)
▪ FastIron(config)#qos mechanism strict (To change the method back to weighted round robin, enter
the following command)
18
Ruckus Networks
Cisco CLI comparison
Jan 2018
One major difference between the configurations is that Brocade does not have the option of allocating
bandwidth based on DSCP values. As a result, we create a scheduler-profile that allows us to choose the bandwidth
associated with each queue. Creating an access-list that matches and remarks the inbound traffics dscp value,
allows us to choose what queue it will be placed. Ultimately, aligning DSCP values in one of three queues with a
certain bandwidth allocated; just as in Cisco.
19
Ruckus Networks
Cisco CLI comparison
Jan 2018
20
Ruckus Networks
Cisco CLI comparison
Jan 2018
Traffic Policing
Ruckus devices use traffic policies for the following:
The above commands configure a fixed rate limiting policy that allows port e5 to receive a maximum traffic rate
of 100 kbps. If the port receives additional bits during a given one-second interval, the port drops the additional
inbound packets that are received within that one-second interval.
21
Ruckus Networks
Cisco CLI comparison
Jan 2018
Syntax: [no] traffic-policy <TPD name> rate-limit fixed <cir value> exceed-action <action>
[count]
Syntax: access-list <num> permit | deny.... traffic policy <TPD name>
Syntax: [no] ip access-group <num> in
The above commands configure an adaptive rate limiting policy that enforces a guaranteed committed rate of
10000 kbps on port e7 and allows bursts of up to 1600 bytes. It also enforces a peak rate of 20000 kbps and allows
bursts of 4000 bytes above the PIR limit. If the port receives additional bits during a given one-second interval,
the port drops all packets on the port until the next one-second interval starts.
Syntax: [no] traffic-policy <TPD name> rate-limit adaptive cir <cir value> cbs <cbs value>
pir <pir value> pbs <pbs value> exceed-action <action> [count]
Syntax: access-list <num> permit | deny.... traffic policy <TPD name>
Syntax: [no] ip access-group <num> in
ACL
Ruckus layer 3 switches have the ability to specify IP addresses for stations allowed to access Telnet, HTTP and
SNMP services. Additionally, administrators have the ability to use Access Control Lists (ACLs) to limit accessibility
to these services. Cisco layer 3 switches have separate areas in the running-config for VTY, auxiliary and console
lines, as well as HTTP. Additionally, administrators have the ability to use Access Control List (ACLs) to limit
accessibility to these services.
Ruckus and Cisco both have the ability to use ACLs to control access to IP-related services. Ruckus uses the access-
group command to apply an ACL for Telnet/SSH and HTTP access. Cisco uses the access-class command to apply
an ACL for VTY, SSH and HTTP access.
22
Ruckus Networks
Cisco CLI comparison
Jan 2018
Rate Limiting
Each Ruckus device supports line-rate rate limiting in hardware. The device creates entries in Content Addressable
Memory (CAM) for the rate limiting policies. The CAM entries enable the device to perform the rate limiting in
hardware instead of sending the traffic to the CPU. The device sends the first packet in a given traffic flow to the
CPU, which creates a CAM entry for the traffic flow. A CAM entry consists of the source and destination addresses
of the traffic. The device uses the CAM entry for rate limiting all the traffic within the same flow. A rate limiting
CAM entry remains in the CAM for two minutes before aging out.
To enable broadcast limiting on a group of ports by counting the number of packets received, enter commands
such as the following.
23
Ruckus Networks
Cisco CLI comparison
Jan 2018
To include multicasts limiting, enter the following command after enabling broadcast limiting.
Ruckus ICX
Ruckus(config) #interface ethernet 1/1/1 to
1/1/8
Ruckus(config-mif-e1000-1/1/1-1/1/8)
#broadcast limit 65536
Note:
Ruckus(config-mif-e1000-1-8) #multicast
limit
Syntax: [no] broadcast limit <num>
Syntax: [no] multicast limit
Syntax: [no] unknown-unicast limit
Security
Flexible Authentication
This section shows the configuration required to enable Dot1X, MAC Authentication, and RADIUS to make user
devices securely connect to the network. This comparison shows side-by-side Cisco and Ruckus CLI differences.
24
Ruckus Networks
Cisco CLI comparison
Jan 2018
25
Ruckus Networks
Cisco CLI comparison
Jan 2018
! dot1x enable
radius-server dead-criteria time 5 tries 3 dot1x enable ethe 1/1/47
! dot1x timeout tx-period 10
aaa group server radius ise-group mac-authentication enable
server name ise mac-authentication enable ethe 1/1/47
! auth-timeout-action critical-vlan voice
aaa authentication dot1x default group ise- voice-vlan
group !
aaa authorization network default group ise- aaa authentication dot1x default radius
group aaa authorization coa enable
aaa accounting dot1x default start-stop aaa accounting dot1x default start-stop
group ise-group radius
aaa accounting mac-auth default start-stop
! radius
aaa accounting update periodic 5 !
! radius-client coa host 10.1.100.21 key
aaa server radius dynamic-author networknode
client 10.1.100.21 server-key networknode radius-client coa port 1700
server-key networknode radius-server host 10.1.100.21 auth-port
! 1812
ip radius source-interface vlan 100 acct-port 1813 default key networknode dot1x
! mac-auth web-auth
system-auth-control radius-server retransmit 3
!
interface range g1/0/7-48 radius-server timeout 5
description ISE dot1x Port radius-server test test-user
switchport access vlan 70 radius-server accounting interim-updates
switchport mode access radius-server accounting interim-interval 5
authentication event fail action next- radius-server dead-time 2
method !
authentication event server dead action interface ethernet 1/1/47
authorize voice dot1x port-control auto
authentication timer reauthenticate server !
authentication timer inactivity server
authentication host-mode multi-auth
authentication order dot1x mab
authentication port-control auto
authentication periodic
mab
dot1x pae authenticator
dot1x timeout tx-period 10
!
Conclusion
In this detailed comparison of Ruckus IP product features and capabilities versus the Cisco IP product portfolio, it
is clear that the Ruckus approach is superior and allows customers to build and scale their networks based on
open standards—enabling a best-of-breed strategy and avoiding vendor lock-in. In addition, as shown in this
paper, the migration to Ruckus is made straight forward by the many similarities between the Ruckus and Cisco
CLIs and Ruckus’ comprehensive and integrated network management.
26