Extreme Networks ExtremeWare Enterprise Manager Guía de usuario

Busca en linea o descarga Guía de usuario para Software Extreme Networks ExtremeWare Enterprise Manager. Extreme Networks ExtremeWare Enterprise Manager User guide Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 432
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente

Indice de contenidos

Pagina 1 - User Guide

Extreme Networks, Inc.3585 Monroe StreetSanta Clara, California 95051(888) 257-3000http://www.extremenetworks.comExtremeWare Software User GuideSoftwa

Pagina 2

XESRP Host Attach 10-9ESRP Domains 10-10ESRP Groups 10-11Linking ESRP Switches 10-12Configuring ESRP and Multinetting 10-12ESRP and Spanning Tree 10-1

Pagina 3 - Contents

5-12 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSSUMMIT SWITCH PORT-MIRRORING EXAMPLEThe following example selects port 3 as the mir

Pagina 4 - 3MANAGING THE SWITCH

EXTREMEWARE SOFTWARE USER GUIDE5-13SMART REDUNDANCYSMART REDUNDANCYSmart redundancy defines the behavior of switches equipped with redundancy Gigabit

Pagina 5 - AND PORTS

5-14 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSIf smart redundancy is disabled, both the primary and redundant ports are dual-home

Pagina 6 - 6VIRTUAL LANS (VLANS)

EXTREMEWARE SOFTWARE USER GUIDE6-16Virtual LANs (VLANs)This chapter covers the following topics:• Overview of Virtual LANs on page 6-1• Types of VLANs

Pagina 7 - 7FORWARDING DATABASE (FDB)

6-2 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)BENEFITSImplementing VLANs on your networks has the following advantages:• VLANs help to contro

Pagina 8 - 9QUALITY OF SERVICE (QOS)

EXTREMEWARE SOFTWARE USER GUIDE6-3TYPES OF VLANS Figure 6-1: Example of a port-based VLAN on the Summit7i switchFor the members of the different IP VL

Pagina 9

6-4 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)Figure 6-2: Single port-based VLAN spanning two switches To create multiple VLANs that span two

Pagina 10 - 11 IP UNICAST ROUTING

EXTREMEWARE SOFTWARE USER GUIDE6-5TYPES OF VLANSFigure 6-3: Two port-based VLANs spanning two BlackDiamond switchesVLAN Accounting spans System 1 and

Pagina 11

6-6 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)TAGGED VLANSTa g g i n g is a process that inserts a marker (called a tag) into the Ethernet f

Pagina 12 - 14 IP MULTICAST ROUTING

EXTREMEWARE SOFTWARE USER GUIDE6-7TYPES OF VLANSFigure 6-4 illustrates the physical view of a network that uses tagged and untagged traffic.Figure 6-4

Pagina 13 - 16 ACCESS POLICIES

XIConfiguring DHCP/BOOTP Relay 11-16Verifying the DHCP/BOOTP Relay Configuration 11-16UDP-Forwarding 11-16Configuring UDP-Forwarding 11-17UPD-Forwardi

Pagina 14

6-8 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)Figure 6-5 shows a logical diagram of the same network.Figure 6-5: Logical diagram of tagged an

Pagina 15 - ERVER LOAD BALANCING (SLB)

EXTREMEWARE SOFTWARE USER GUIDE6-9TYPES OF VLANSMIXING PORT-BASED AND TAGGED VLANSYou can configure the switch using a combination of port-based and t

Pagina 16 - 19 USING EXTREMEWARE VISTA

6-10 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)Figure 6-6: Protocol-based VLANs PREDEFINED PROTOCOL FILTERSThe following protocol filters are

Pagina 17 - BTROUBLESHOOTING

EXTREMEWARE SOFTWARE USER GUIDE6-11TYPES OF VLANSDEFINING PROTOCOL FILTERSIf necessary, you can define a customized protocol filter based on EtherType

Pagina 18 - INDEX OF COMMANDS

6-12 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)DELETING A PROTOCOL FILTERIf a protocol filter is deleted from a VLAN, the VLAN is assigned a

Pagina 19 - NTRODUCTION

EXTREMEWARE SOFTWARE USER GUIDE6-13CONFIGURING VLANS ON THE SWITCHRENAMING A VLANTo rename an existing VLAN, use the following command:config vlan <

Pagina 20 - ONVENTIONS

6-14 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)VLAN CONFIGURATION COMMANDSTab le 6-1 describes the commands used to configure a VLAN.Table 6-

Pagina 21 - UBLICATIONS

EXTREMEWARE SOFTWARE USER GUIDE6-15CONFIGURING VLANS ON THE SWITCHVLAN CONFIGURATION EXAMPLESThe following BlackDiamond switch example creates a port-

Pagina 22

6-16 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)The following Summit switch example creates a VLAN named sales, with the VLANid 120. The VLAN

Pagina 23 - ExtremeWare Overview

EXTREMEWARE SOFTWARE USER GUIDE6-17GENERIC VLAN REGISTRATION PROTOCOL• IPX address (if configured)• STPD information• Protocol information• QoS profil

Pagina 24

XIIRIP Configuration Example 12-17Displaying RIP Settings 12-19Resetting and Disabling RIP 12-20Configuring OSPF 12-21OSPF Configuration Example 12-25

Pagina 25

6-18 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)Figure 6-7: Network example using GVRPIn Figure 6-7, Switch A is a member of VLAN Red. VLAN Re

Pagina 26

EXTREMEWARE SOFTWARE USER GUIDE6-19GENERIC VLAN REGISTRATION PROTOCOLVLANs that are automatically created using GVRP are given names in the formatgvrp

Pagina 27 - IFFERENCES

6-20 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)MAC-BASED VLANSMAC-Based VLANs allow physical ports to be mapped to a VLAN based on the source

Pagina 28 - ULL L3 FUNCTIONALITY

EXTREMEWARE SOFTWARE USER GUIDE6-21MAC-BASED VLANSMAC-BASED VLAN GUIDELINESWhen using the MAC-to-VLAN mapping, consider the following guidelines:• A p

Pagina 29 - ICENSING

6-22 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)• A MAC address cannot be configured to associate with more than 1 VLAN. If this is attempted,

Pagina 30 - BTAINING

EXTREMEWARE SOFTWARE USER GUIDE6-23MAC-BASED VLANSenable mac-vlan mac-group any ports 10-15enable mac-vlan mac-group 10 ports 16-17enable mac-vlan mac

Pagina 31 - MacVLanDiscover

6-24 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)The following example shows an incremental configuration file for MAC-based VLAN information t

Pagina 32

EXTREMEWARE SOFTWARE USER GUIDE7-17Forwarding Database (FDB)This chapter describes the following topics:• Overview of the FDB on page 7-1• Configuring

Pagina 33 - Accessing the Switch

7-2 EXTREMEWARE SOFTWARE USER GUIDEFORWARDING DATABASE (FDB)FDB ENTRY TYPESThe following are four types of entries in the FDB:• Dynamic entries — Init

Pagina 34 - BBREVIATED SYNTAX

EXTREMEWARE SOFTWARE USER GUIDE7-3CONFIGURING FDB ENTRIESHOW FDB ENTRIES GET ADDEDEntries are added into the FDB in the following two ways:• The switc

Pagina 35 - NDERSTANDING

XIIIPIM-DM Configuration Example 14-10Configuration for IR1 14-11Configuration for ABR1 14-13Displaying IP Multicast Routing Settings 14-13Deleting an

Pagina 36 - CCESSING

7-4 EXTREMEWARE SOFTWARE USER GUIDEFORWARDING DATABASE (FDB)FDB CONFIGURATION EXAMPLESThe following example adds a permanent entry to the FDB:create f

Pagina 37 - Table 2- 2: Line-Editing Keys

EXTREMEWARE SOFTWARE USER GUIDE7-5DISPLAYING FDB ENTRIES• Slot number for this device is 3.• Port number for this device is 4.This example associates

Pagina 38

7-6 EXTREMEWARE SOFTWARE USER GUIDEFORWARDING DATABASE (FDB)

Pagina 39 - is +/- minutes from

EXTREMEWARE SOFTWARE USER GUIDE8-18Spanning Tree Protocol (STP)This chapter covers the following topic:• Overview of the Spanning Tree Protocol on pag

Pagina 40

8-2 EXTREMEWARE SOFTWARE USER GUIDESPANNING TREE PROTOCOL (STP)SPANNING TREE DOMAINSThe switch can be partitioned into multiple virtual bridges. Each

Pagina 41 - ANAGEMENT

EXTREMEWARE SOFTWARE USER GUIDE8-3STP CONFIGURATIONSFor more information on GVRP, refer to Chapter 6.DEFAULTSThe default device configuration contains

Pagina 42 - DMINISTRATOR

8-4 EXTREMEWARE SOFTWARE USER GUIDESPANNING TREE PROTOCOL (STP)Figure 8-1: Multiple Spanning Tree DomainsWhen the switches in this configuration start

Pagina 43 - HANGING THE DEFAULT PASSWORD

EXTREMEWARE SOFTWARE USER GUIDE8-5STP CONFIGURATIONSFigure 8-2: Tag-based STP configurationThe tag-based network in Figure 8-2 has the following confi

Pagina 44 - IEWING ACCOUNTS

8-6 EXTREMEWARE SOFTWARE USER GUIDESPANNING TREE PROTOCOL (STP)CONFIGURING STP ON THE SWITCHTo configure STP you must perform the following actions:•

Pagina 45

EXTREMEWARE SOFTWARE USER GUIDE8-7CONFIGURING STP ON THE SWITCHTab le 8-1 shows the commands used to configure STP.Table 8- 1: STP Configuration Comma

Pagina 46

XIVAccess Lists for ICMP 16-5Verifying Access List Configurations 16-6Access List Commands 16-6IP Access List Examples 16-11Using the Permit-Establish

Pagina 47 - RACEROUTE

8-8 EXTREMEWARE SOFTWARE USER GUIDESPANNING TREE PROTOCOL (STP)STP CONFIGURATION EXAMPLEThe following BlackDiamond switch example creates and enables

Pagina 48

EXTREMEWARE SOFTWARE USER GUIDE8-9DISABLING AND RESETTING STPThis command displays the following information:• STPD name• Bridge ID• STPD configuratio

Pagina 49 - Managing the Switch

8-10 EXTREMEWARE SOFTWARE USER GUIDESPANNING TREE PROTOCOL (STP)

Pagina 50 - 10/100 UTP M

EXTREMEWARE SOFTWARE USER GUIDE9-19Quality of Service (QoS)This chapter covers the following topics:• Overview of Policy-Based Quality of Service on p

Pagina 51

9-2 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)OVERVIEW OF POLICY-BASED QUALITY OF SERVICEPolicy-Based QoS allows you to protect bandwidth

Pagina 52

EXTREMEWARE SOFTWARE USER GUIDE9-3APPLICATIONS AND TYPES OF QOSAPPLICATIONS AND TYPES OF QOSDifferent applications have different QoS requirements. Th

Pagina 53

9-4 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)CRITICAL DATABASE APPLICATIONSDatabase applications, such as those associated with ERP, typ

Pagina 54

EXTREMEWARE SOFTWARE USER GUIDE9-5ASSIGNING QOS ATTRIBUTESASSIGNING QOS ATTRIBUTES Assigning QoS attributes is a three-step process which consists of

Pagina 55 - 2 (SSH2)

9-6 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)QOS PROFILESA QoS profile defines a class of service by specifying traffic behavior attribu

Pagina 56 - <tcp_port_number>}

EXTREMEWARE SOFTWARE USER GUIDE9-7QOS PROFILESFour or eight default QoS profiles are provided, depending on the chipset used in the switch. The defaul

Pagina 57 - ONTROLLING

XV17 SERVER LOAD BALANCING (SLB)Overview 17-2SLB Components 17-2Nodes 17-3Pools 17-3Virtual Servers 17-3Using Standard or Wildcard Virtual Servers 17-

Pagina 58

9-8 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)CONFIGURING A QOS PROFILETab le 9-4 lists the commands used to configure QoS.TRAFFIC GROUPI

Pagina 59

EXTREMEWARE SOFTWARE USER GUIDE9-9TRAFFIC GROUPINGS AND CREATING A QOS POLICYTraffic groupings are separated into the following categories for discuss

Pagina 60

9-10 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)IP-BASED TRAFFIC GROUPINGSIP-based traffic groupings are based on any combination of:• IP

Pagina 61 - RADIUS C

EXTREMEWARE SOFTWARE USER GUIDE9-11TRAFFIC GROUPINGS AND CREATING A QOS POLICYDYNAMIC MAC ADDRESSESDynamic MAC addresses can be assigned a QoS profile

Pagina 62 - ONFIGURING RADIUS CLIENT

9-12 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)VERIFYING MAC-BASED QOS SETTINGSTo verify any of the MAC-based QoS settings, use either th

Pagina 63 - Table 3- 2: RADIUS Commands

EXTREMEWARE SOFTWARE USER GUIDE9-13TRAFFIC GROUPINGS AND CREATING A QOS POLICYFigure 9-1: Ethernet packet encapsulationOBSERVING 802.1P INFORMATIONWhe

Pagina 64

9-14 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)802.1P COMMANDSTab le 9-7 shows the commands used to configure 802.1p priority. Two are ex

Pagina 65

EXTREMEWARE SOFTWARE USER GUIDE9-15TRAFFIC GROUPINGS AND CREATING A QOS POLICY802.1p priority information is replaced according to the hardware queue

Pagina 66

9-16 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)Figure 9-2: IP packet header encapsulationTab le 9-9 lists the commands used to configure

Pagina 67 - UTHENTICATING

EXTREMEWARE SOFTWARE USER GUIDE9-17TRAFFIC GROUPINGS AND CREATING A QOS POLICYOBSERVING DIFFSERV INFORMATIONWhen a packet arrives at the switch on an

Pagina 68 - TACACS+

XVISample Active-Active Configuration 17-29Using Manual Fail-Back 17-313DNS Support 17-32Advanced SLB Commands 17-32Web Cache Redirection 17-38Flow Re

Pagina 69

9-18 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)You can change the QoS profile assignment for all 64 code points using the following comma

Pagina 70

EXTREMEWARE SOFTWARE USER GUIDE9-19TRAFFIC GROUPINGS AND CREATING A QOS POLICYYou then change the 802.1p priority to DiffServ code point mapping to an

Pagina 71

9-20 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)3 To enable the switch to overwrite the DiffServ code point:enable dot1p replacementenable

Pagina 72

EXTREMEWARE SOFTWARE USER GUIDE9-21VERIFYING CONFIGURATION AND PERFORMANCEFor example, all devices on VLAN servnet require use of the QoS profile qp4.

Pagina 73

9-22 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)REAL-TIME PERFORMANCE MONITORINGThe real-time display scrolls through the given portlist t

Pagina 74

EXTREMEWARE SOFTWARE USER GUIDE9-23MODIFYING A QOS POLICYDISPLAYING QOS PROFILE INFORMATIONThe QoS monitor can also be used to verify the QoS configur

Pagina 75 - Alpine Switch Slots and Ports

9-24 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)INTRA-SUBNET QOSIntra-Subnet QoS™ (ISQ) is used only on Extreme switches that do not use t

Pagina 76

EXTREMEWARE SOFTWARE USER GUIDE9-25DYNAMIC LINK CONTEXT SYSTEMDYNAMIC LINK CONTEXT SYSTEMThe Dynamic Link Context System (DLCS) is a feature that snoo

Pagina 77

9-26 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)DLCS LIMITATIONSConsider the following limitations concerning data received from WINS snoo

Pagina 78

EXTREMEWARE SOFTWARE USER GUIDE9-27DYNAMIC LINK CONTEXT SYSTEMconfig isq-server <wins-servers-listname> delete mac <mac-address-of-next-hop&g

Pagina 79

XVIITask Frame 19-4Content Frame 19-4Browser Controls 19-5Status Messages 19-5Standalone Buttons 19-5Saving Changes 19-6Filtering Information 19-6Do a

Pagina 80

9-28 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)

Pagina 81

EXTREMEWARE SOFTWARE USER GUIDE10-110Extreme Standby Router ProtocolThis chapter covers the following topics:• Overview on page 10-1• ESRP Basics on p

Pagina 82

10-2 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLnetwork system design, ESRP can provide better resiliency than using the Spanning T

Pagina 83 - 2-port groups x x x x

EXTREMEWARE SOFTWARE USER GUIDE10-3DETERMINING THE ESRP MASTERIf you configure OSPF and ESRP, you must manually configure an OSPF router identifier (I

Pagina 84

10-4 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLIf any of the configured tracking mechanisms fail, the master ESRP switch relinquis

Pagina 85

EXTREMEWARE SOFTWARE USER GUIDE10-5DETERMINING THE ESRP MASTERautomatically relinquishes master status and remains in standby mode if a ping keepalive

Pagina 86

10-6 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLSTANDBY SWITCH BEHAVIORIf a switch is in standby mode, it exchanges ESRP packets wi

Pagina 87 - ISCOVERY

EXTREMEWARE SOFTWARE USER GUIDE10-7GROUPING BLOCKS OF 10/100 PORTSGROUPING BLOCKS OF 10/100 PORTSRestrictions on port groupings apply only to switches

Pagina 88

10-8 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLFigure 10-2: Summit24 switch ESRP port blocksFigure 10-3: Summit4 switch ESRP port

Pagina 89

EXTREMEWARE SOFTWARE USER GUIDE10-9ESRP OPTIONSFigure 10-5: Summit48 switch ESRP port blocksFor switches that do not use the “i” chipset, all VLANs us

Pagina 90

XVIIITOP Command B-8Contacting Extreme Technical Support B-8INDEXINDEX OF COMMANDS

Pagina 91

10-10 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLThe ESRP HA option is useful if you are using dual-homed network interface cards (

Pagina 92

EXTREMEWARE SOFTWARE USER GUIDE10-11ESRP OPTIONSESRP GROUPSExtremeWare supports running multiple instances of ESRP within the same VLAN or broadcast d

Pagina 93

10-12 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLLINKING ESRP SWITCHESWhen considering system design using ESRP, direct links betwe

Pagina 94

EXTREMEWARE SOFTWARE USER GUIDE10-13ESRP AND VLAN AGGREGATIONESRP AND VLAN AGGREGATIONESRP can be used to provide redundant default router protection

Pagina 95

10-14 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLESRP COMMANDSTable 10-1 describes the commands used to configure ESRP.Table 10-1:

Pagina 96

EXTREMEWARE SOFTWARE USER GUIDE10-15ESRP COMMANDSconfig vlan <name> esrp election-algorithm [ports_track_priority_mac | track_ports_priority_mac

Pagina 97

10-16 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLESRP EXAMPLESThis section provides examples of ESRP configurations.SINGLE VLAN USI

Pagina 98 - IRRORING

EXTREMEWARE SOFTWARE USER GUIDE10-17ESRP COMMANDSFigure 10-8: ESRP example using layer 2 and layer 3 redundancyThe BlackDiamond switch, acting as mast

Pagina 99

10-18 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLflush FDB entries associated with the uplinks to the ESRP-enabled BlackDiamond swi

Pagina 100 - ONFIGURING

EXTREMEWARE SOFTWARE USER GUIDE10-19ESRP COMMANDSFigure 10-9: ESRP example using layer 2 redundancyThis example builds on the previous example, but el

Pagina 101 - Failover linksPrimary links

EXTREMEWARE SOFTWARE USER GUIDE XIXPrefaceThis Preface provides an overview of this guide, describes guide conventions, and lists other publications t

Pagina 102

10-20 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLIn this example, the BlackDiamond switches are configured for ESRP such that the V

Pagina 103 - Virtual LANs (VLANs)

EXTREMEWARE SOFTWARE USER GUIDE11-111IP Unicast RoutingThis chapter describes the following topics:• Overview of IP Unicast Routing on page 11-2• Prox

Pagina 104

11-2 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGFor more information on interior gateway protocols, refer to Chapter 12. For information on exte

Pagina 105 - Marketing

EXTREMEWARE SOFTWARE USER GUIDE11-3OVERVIEW OF IP UNICAST ROUTINGFigure 11-1: Routing between VLANsPOPULATING THE ROUTING TABLE The switch maintains a

Pagina 106 - System 2

11-4 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGDYNAMIC ROUTESDynamic routes are typically learned by way of RIP or OSPF. Routers that use RIP o

Pagina 107 - Engineering

EXTREMEWARE SOFTWARE USER GUIDE11-5PROXY ARPYou can also configure blackhole routes — traffic to these destinations is silently dropped.IP ROUTE SHARI

Pagina 108 - SSIGNING A VLAN TAG

11-6 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTING• The proxy ARP table entry indicates that the system should always answer this ARP Request, reg

Pagina 109

EXTREMEWARE SOFTWARE USER GUIDE11-7IP MULTINETTINGTo change the relative route priority, use the following command:config iproute priority [rip | boot

Pagina 110

11-8 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTING• The FDB aging timer is automatically set to 3,000 seconds (50 minutes).• If you are using a UD

Pagina 111

EXTREMEWARE SOFTWARE USER GUIDE11-9IP MULTINETTING10 Enable IP multinetting, by using the following command:enable multinetting11 If you are using RIP

Pagina 112 - = All other traffic

II©2000 Extreme Networks, Inc. All rights reserved. Extreme Networks and BlackDiamond are registered trademarks of Extreme Networks, Inc. in the Unite

Pagina 113

XXEXTREMEWARE SOFTWARE USER GUIDEPREFACE• Internet Packet Exchange (IPX) concepts• Server Load Balancing (SLB) concepts• Simple Network Management Pro

Pagina 114

11-10 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGcreate vlan net35create vlan net37config net34 ipaddress 192.67.34.1config net35 ipaddress 192.

Pagina 115

EXTREMEWARE SOFTWARE USER GUIDE11-11VLAN AGGREGATION3 Configure a default route, using the following command:config iproute add default <gateway>

Pagina 116 - ONFIGURATION

11-12 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGAs a result, sub-VLANs can be quite small, but allow for growth without re-defining subnet boun

Pagina 117

EXTREMEWARE SOFTWARE USER GUIDE11-13VLAN AGGREGATIONVLAN AGGREGATION PROPERTIESVLAN aggregation is a very specific application, and the following prop

Pagina 118 - ISPLAYING

11-14 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGISOLATION OPTION FOR COMMUNICATION BETWEEN SUB-VLANSTo facilitate communication between sub-VLA

Pagina 119 - EGISTRATION

EXTREMEWARE SOFTWARE USER GUIDE11-15VLAN AGGREGATIONVLAN AGGREGATION EXAMPLEThe follow example illustrates how to configure VLAN aggregation. The VLAN

Pagina 120 - Untagged

11-16 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGCONFIGURING DHCP/BOOTP RELAYOnce IP unicast routing is configured, you can configure the switch

Pagina 121

EXTREMEWARE SOFTWARE USER GUIDE11-17UDP-FORWARDING• If the UDP profile includes other types of traffic, these packets have the IP destination address

Pagina 122

11-18 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGICMP PACKET PROCESSINGAs ICMP packets are routed or generated, you can take various actions to

Pagina 123 - IMITATIONS

EXTREMEWARE SOFTWARE USER GUIDE11-19IP COMMANDSIP COMMANDSTab le 11-4 describes the commands used to configure basic IP settings.create udp-profile &

Pagina 124

EXTREMEWARE SOFTWARE USER GUIDE XXIRELATED PUBLICATIONSRELATED PUBLICATIONSThe following is a list of related publications:• ExtremeWare Quick Referen

Pagina 125

11-20 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGconfig iparp add proxy <ipaddress> {<mask>} {<mac_address>} {always}Configure

Pagina 126

EXTREMEWARE SOFTWARE USER GUIDE11-21IP COMMANDSTab le 11-5 describes the commands used to configure the IP route table.enable bootprelay Enables the

Pagina 127 - Forwarding Database (FDB)

11-22 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGTab le 11-6 describes the commands used to configure IP options and the ICMP protocol.config ip

Pagina 128 - ORWARDING

EXTREMEWARE SOFTWARE USER GUIDE11-23IP COMMANDSconfig irdp <mininterval> <maxinterval> <lifetime> <preference>Configures the r

Pagina 129

11-24 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGenable icmp port-unreachables {vlan <name>} Enables the generation of ICMP port unreachab

Pagina 130

EXTREMEWARE SOFTWARE USER GUIDE11-25ROUTING CONFIGURATION EXAMPLEROUTING CONFIGURATION EXAMPLEFigure 11-3 illustrates a BlackDiamond switch that has t

Pagina 131

11-26 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGFigure 11-3: Unicast routing configuration exampleThe stations connected to the system generate

Pagina 132

EXTREMEWARE SOFTWARE USER GUIDE11-27DISPLAYING ROUTER SETTINGSconfig Finance protocol ipconfig Personnel protocol ipconfig Finance add port 1:*,3:*con

Pagina 133 - Spanning Tree Protocol (STP)

11-28 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGRESETTING AND DISABLING ROUTER SETTINGSTo return router settings to their defaults and disable

Pagina 134

EXTREMEWARE SOFTWARE USER GUIDE11-29RESETTING AND DISABLING ROUTER SETTINGSdisable icmp redirects {vlan <name>} Disables the generation of ICMP

Pagina 135 - ONFIGURATIONS

XXIIEXTREMEWARE SOFTWARE USER GUIDEPREFACE

Pagina 136 - Sales, Personnel, Marketing

11-30 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTING

Pagina 137 - Sales & Engineering

EXTREMEWARE SOFTWARE USER GUIDE12-112Interior Gateway Routing ProtocolsThis chapter describes the following topics:• Overview on page 12-2• Overview o

Pagina 138

12-2 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLS• Interconnections: Bridges and Routers by Radia PerlmanISBN 0-201-56332-0Publis

Pagina 139

EXTREMEWARE SOFTWARE USER GUIDE12-3OVER VIEW OF RIPRIP has a number of limitations that can cause problems in large networks, including the following:

Pagina 140

12-4 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLS• IP address of the next router• Timer that tracks the amount of time since the

Pagina 141 - ESETTING

EXTREMEWARE SOFTWARE USER GUIDE12-5OVERVIEW OF OSPFRIP VERSION 1 VERSUS RIP VERSION 2A new version of RIP, called RIP version 2, expands the functiona

Pagina 142

12-6 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSAREASOSPF allows parts of a network to be grouped together into areas. The topol

Pagina 143 - Quality of Service (QoS)

EXTREMEWARE SOFTWARE USER GUIDE12-7OVERVIEW OF OSPFThe backbone allows summary information to be exchanged between ABRs. Every ABR hears the area summ

Pagina 144

12-8 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSperform translation (as indicated in the NSSA specification). The option should

Pagina 145 - PPLICATIONS

EXTREMEWARE SOFTWARE USER GUIDE12-9OVERVIEW OF OSPFFigure 12-1: Virtual link using Area 1 as a transit areaVirtual links are also used to repair a dis

Pagina 146

EXTREMEWARE SOFTWARE USER GUIDE1-11ExtremeWare OverviewThis chapter covers the following topics:• Summary of Features on page 1-1• “i” Chipset Product

Pagina 147 - TTRIBUTES

12-10 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSFigure 12-2: Virtual link providing redundancyROUTE RE-DISTRIBUTIONBoth RIP and

Pagina 148

EXTREMEWARE SOFTWARE USER GUIDE12-11ROUTE RE-DISTRIBUTIONFigure 12-3: Route re-distributionCONFIGURING ROUTE RE-DISTRIBUTIONExporting routes from OSPF

Pagina 149

12-12 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSRE-DISTRIBUTING ROUTES INTO OSPFEnable or disable the exporting of RIP, static,

Pagina 150

EXTREMEWARE SOFTWARE USER GUIDE12-13ROUTE RE-DISTRIBUTIONIn versions of ExtremeWare prior to release 6.0, direct routes corresponding to the interface

Pagina 151

12-14 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSCONFIGURING RIPTable 12-2 describes the commands used to configure RIP.Table 12

Pagina 152 - ERMANENT MAC ADDRESSES

EXTREMEWARE SOFTWARE USER GUIDE12-15CONFIGURING RIPconfig rip txmode [none | v1only | v1comp | v2only] {vlan <name>}Changes the RIP transmission

Pagina 153 - LACKHOLE

12-16 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSenable rip export [static | direct | ospf | ospf-intra | ospf-inter | ospf-exte

Pagina 154 - ONFIGURING 802.1P PRIORITY

EXTREMEWARE SOFTWARE USER GUIDE12-17RIP CONFIGURATION EXAMPLERIP CONFIGURATION EXAMPLEFigure 12-4 illustrates a BlackDiamond switch that has three VLA

Pagina 155 - NFORMATION

12-18 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSFigure 12-4: RIP configuration exampleThe stations connected to the system gene

Pagina 156

EXTREMEWARE SOFTWARE USER GUIDE12-19DISPLAYING RIP SETTINGSThe example in Figure 12-4 is configured as follows:create vlan Financecreate vlan Personne

Pagina 157

1-2 EXTREMEWARE SOFTWARE USER GUIDEEXTREMEWARE OVER VIEW• Extreme Standby Router Protocol (ESRP)• Routing Information Protocol (RIP) version 1 and RIP

Pagina 158

12-20 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSRESETTING AND DISABLING RIPTo return RIP settings to their defaults, or to disa

Pagina 159

EXTREMEWARE SOFTWARE USER GUIDE12-21CONFIGURING OSPFCONFIGURING OSPFEach switch that is configured to run OSPF must have a unique router ID. It is rec

Pagina 160 - EPLACING

12-22 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSconfig ospf [vlan <name> | area <areaid> | virtual-link <routeri

Pagina 161 - point instead of repeating

EXTREMEWARE SOFTWARE USER GUIDE12-23CONFIGURING OSPFconfig ospf area <areaid> nssa [summary | nosummary] stub-default-cost <cost> {transla

Pagina 162 - ROUPINGS

12-24 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSconfig ospf spf-hold-time {<seconds>} Configures the minimum number of se

Pagina 163 - ERFORMANCE

EXTREMEWARE SOFTWARE USER GUIDE12-25OSPF CONFIGURATION EXAMPLEOSPF CONFIGURATION EXAMPLEFigure 12-5 shows an example of an autonomous system using OSP

Pagina 164

12-26 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSArea 0 is the backbone area. It is located at the headquarters and has the foll

Pagina 165 - ODIFYING

EXTREMEWARE SOFTWARE USER GUIDE12-27OSPF CONFIGURATION EXAMPLECONFIGURATION FOR ABR1The following is the configuration for the router labeled ABR1:cre

Pagina 166

12-28 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSDISPLAYING OSPF SETTINGSTo display settings for OSPF, use the commands listed i

Pagina 167

EXTREMEWARE SOFTWARE USER GUIDE12-29RESETTING AND DISABLING OSPF SETTINGSdisable ospf export direct Disables exporting of local interface (direct) rou

Pagina 168

EXTREMEWARE SOFTWARE USER GUIDE1-3SUMMARY OF FEATURESVIRTUAL LANS (VLANS)ExtremeWare has a VLAN feature that enables you to construct your broadcast d

Pagina 169

12-30 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLS

Pagina 170

EXTREMEWARE SOFTWARE USER GUIDE13-113Exterior Gateway Routing ProtocolsThis chapter covers the following topics:• Overview on page 13-2• BGP Attribute

Pagina 171

13-2 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSOVERVIEWBGP is an exterior routing protocol that was developed for use in TCP/IP

Pagina 172

EXTREMEWARE SOFTWARE USER GUIDE13-3BGP COMMUNITIES• Community – Identifies a group of destinations that share one or more common attributes.• Cluster_

Pagina 173 - ETERMINING

13-4 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSFigure 13-1: Route reflectorsROUTE CONFEDERATIONSBGP requires networks to use a

Pagina 174

EXTREMEWARE SOFTWARE USER GUIDE13-5BGP FEATURESFigure 13-2: Routing confederationIn this example, AS 200 has five BGP speakers. Without a confederatio

Pagina 175 - LGORITHMS

13-6 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSenable ipforwarding vlan ac config ospf add vlan ac area 0.0.0.0 disable bgpco

Pagina 176

EXTREMEWARE SOFTWARE USER GUIDE13-7BGP FEATURESTo configure Router C, use the following commands:create vlan caconfig vlan ca add port 1config vlan c

Pagina 177 - BD_F32T8

13-8 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLScreate bgp neighbor 192.1.1.9 as-number remote-AS-number 65001create bgp neighbo

Pagina 178 - SUG_4FX8

EXTREMEWARE SOFTWARE USER GUIDE13-9BGP FEATURESIGP SYNCHRONIZATIONYou can configure an AS to be a transit AS, so that it can pass traffic through from

Pagina 179 - SUG_48f8

1-4 EXTREMEWARE SOFTWARE USER GUIDEEXTREMEWARE OVER VIEWFor more information on Quality of Service, refer to Chapter 9.UNICAST ROUTINGThe switch can r

Pagina 180 - OSPF/BGP4

13-10 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSCONFIGURING BGPTable 13-1 describes the commands used to configure BGP.Table 13

Pagina 181

EXTREMEWARE SOFTWARE USER GUIDE13-11CONFIGURING BGPconfig bgp add dampening <halflife> <reuse> <suppress> <max_suppression> bg

Pagina 182

13-12 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSconfig bgp dampening <halflife> <reuse> <suppress> <max_su

Pagina 183 - AGGREGATION

EXTREMEWARE SOFTWARE USER GUIDE13-13CONFIGURING BGPconfig bgp neighbor [<ipaddress> | all] [route-reflector-client | no-route-reflector-client]C

Pagina 184 - Table 10-1: ESRP Commands

13-14 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSconfig bgp neighbor [<ipaddress> | all] weight <weight>Assigns a lo

Pagina 185

EXTREMEWARE SOFTWARE USER GUIDE13-15DISPLAYING BGP SETTINGSDISPLAYING BGP SETTINGSTo display settings for BGP, use the commands listed in Table 13-2.R

Pagina 186

13-16 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLS

Pagina 187 - OSPF or RIP

EXTREMEWARE SOFTWARE USER GUIDE14-114IP Multicast RoutingThis chapter covers the following topics:• Overview on page 14-2• Configuring IP Multicasting

Pagina 188

14-2 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGOVERVIEWIP multicast routing is a function that allows a single IP host to send a packet to a

Pagina 189

EXTREMEWARE SOFTWARE USER GUIDE14-3OVERVIEWPIM DENSE MODEProtocol Independent Multicast- Dense Mode (PIM-DM) is a multicast routing protocol that is s

Pagina 190

EXTREMEWARE SOFTWARE USER GUIDE1-5“I” CHIPSET PRODUCTSFor information on load sharing, refer to Chapter 4 and Chapter 5.“i” CHIPSET PRODUCTSSummit swi

Pagina 191 - IP Unicast Routing

14-4 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGIGMP is enabled by default on the switch. However, the switch can be configured to disable the

Pagina 192 - NTERFACES

EXTREMEWARE SOFTWARE USER GUIDE14-5CONFIGURING IP MULTICASTING ROUTING4 Enable DVMRP or PIM on the router, using one of the following commands:enable

Pagina 193 - OPULATING

14-6 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGconfig dvmrp vlan <name> timer <probe_interval> <neighbor_timeout_interval>C

Pagina 194 - ULTIPLE ROUTES

EXTREMEWARE SOFTWARE USER GUIDE14-7CONFIGURING IP MULTICASTING ROUTINGTable 14-2 describes the commands used to configure the Internet Gateway Message

Pagina 195 - NCAPABLE

14-8 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGTable 14-2: IGMP Configuration CommandsCommand Descriptionconfig igmp <query_interval> &

Pagina 196 - RIORITIES

EXTREMEWARE SOFTWARE USER GUIDE14-9CONFIGURATION EXAMPLESCONFIGURATION EXAMPLESFigure 14-1 and Figure 13-2 are used in Chapter 12 to describe the OSPF

Pagina 197 - ULTINETTING

14-10 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGPIM-DM CONFIGURATION EXAMPLEFigure 14-1: IP multicast routing using PIM-DM configuration exam

Pagina 198 - PERATION

EXTREMEWARE SOFTWARE USER GUIDE14-11CONFIGURATION EXAMPLESCONFIGURATION FOR IR1The following is the configuration for the router labeled IR1:config vl

Pagina 199

14-12 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGFigure 14-2: IP multicast routing using PIM-SM configuration exampleArea 010.0.1.1HQ_10_0_110

Pagina 200

EXTREMEWARE SOFTWARE USER GUIDE14-13DISPLAYING IP MULTICAST ROUTING SETTINGSCONFIGURATION FOR ABR1The following is the configuration for the router la

Pagina 201 - GGREGATION

1-6 EXTREMEWARE SOFTWARE USER GUIDEEXTREMEWARE OVER VIEWSOFTWARE LICENSINGSome Extreme Networks products have capabilities that are enabled by using a

Pagina 202 - 1234AB5678

14-14 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGDELETING AND RESETTING IP MULTICAST SETTINGSTo return IP multicast routing settings to their

Pagina 203 - ROPERTIES

EXTREMEWARE SOFTWARE USER GUIDE15-115IPX RoutingThis chapter describes the following topics:• Overview of IPX on page 15-1• IPX/RIP Routing on page 15

Pagina 204

15-2 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGAs you create VLANs with different IPX NetIDs the switch automatically routes between them. Both the VL

Pagina 205

EXTREMEWARE SOFTWARE USER GUIDE15-3OVERVIEW OF IPXTraffic within each VLAN is switched using the Ethernet MAC address. Traffic between Exec and Suppor

Pagina 206 - DHCP/BOOTP R

15-4 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGPOPULATING THE ROUTING TABLE The switch builds and maintains an IPX routing table. As in the case of IP

Pagina 207

EXTREMEWARE SOFTWARE USER GUIDE15-5IPX/RIP ROUTINGIPX/RIP is automatically enabled when a NetID is assigned to the VLAN. To remove the advertisement o

Pagina 208 - ROCESSING

15-6 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGCONFIGURING IPXThis section describes the commands associated with configuring IPX, IPX/RIP, and IPX/SA

Pagina 209 - Table 11-4: Basic IP Commands

EXTREMEWARE SOFTWARE USER GUIDE15-7IPX COMMANDSPROTOCOL-BASED VLANS FOR IPXWhen combining IPX VLANs with other VLANs on the same physical port, it may

Pagina 210

15-8 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGconfig ipxroute add [<dest_netid> | default] <next_hop_id> <next_hop_node_addr> <h

Pagina 211

EXTREMEWARE SOFTWARE USER GUIDE15-9IPX COMMANDSTable 15-4 describes the commands used to configure the IPX route table.config vlan <name> xnetid

Pagina 212

EXTREMEWARE SOFTWARE USER GUIDE1-7SOFTWARE LICENSINGPRODUCT SUPPORTExtremeWare version 6.0 and above supports router licensing on the Summit24 switch,

Pagina 213

15-10 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGTable 15-5 describes the commands used to configure IPX/SAP.config ipxrip vlan [<name> | all] up

Pagina 214

EXTREMEWARE SOFTWARE USER GUIDE15-11IPX CONFIGURATION EXAMPLEIPX CONFIGURATION EXAMPLEFigure 15-2 builds on the example showing the IP/RIP configurati

Pagina 215

15-12 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGFigure 15-2: IPX routing configuration exampleThe stations connected to the system generate a combinat

Pagina 216 - = NetBIOS traffic

EXTREMEWARE SOFTWARE USER GUIDE15-13DISPLAYING IPX SETTINGSThe IPX configuration shown in example in Figure 15-2 is as follows:create vlan Execcreate

Pagina 217

15-14 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGRESETTING AND DISABLING IPXTo return IPX settings to their defaults and disable IPX functions, use the

Pagina 218

EXTREMEWARE SOFTWARE USER GUIDE16-116Access PoliciesThis chapter describes the following topics:• Overview of Access Policies on page 16-1• Using IP A

Pagina 219

16-2 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESIP ACCESS LISTSIP access lists consist of IP access rules, and are used to perform packet filtering

Pagina 220

EXTREMEWARE SOFTWARE USER GUIDE16-3USING IP ACCESS LISTS• Physical source port• Precedence number (optional)HOW IP ACCESS LISTS WORKWhen a packet arri

Pagina 221 - Protocols

16-4 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESThe access-list example, below, performs packet filtering in the following sequence, as determined

Pagina 222 - ROTOCOLS

EXTREMEWARE SOFTWARE USER GUIDE16-5USING IP ACCESS LISTSMAXIMUM ENTRIESA maximum of 255 entries with an assigned precedence can be used. In addition t

Pagina 223 - VER VIEW

IIIContentsPREFACEIntroduction xixTerminology xxConventions xxRelated Publications xxi1EXTREMEWARE OVERVIEWSummary of Features 1-1Virtual LANs (VLANs)

Pagina 224

1-8 EXTREMEWARE SOFTWARE USER GUIDEEXTREMEWARE OVER VIEWOBTAINING A SECURITY LICENSETo obtain information on enabling features that require export res

Pagina 225

16-6 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESVERIFYING ACCESS LIST CONFIGURATIONSTo verify access list settings you can view the access list con

Pagina 226

EXTREMEWARE SOFTWARE USER GUIDE16-7USING IP ACCESS LISTSTable 16-1: Access List Configuration CommandsCommand Descriptioncreate access-list <name&g

Pagina 227

16-8 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIEScreate access-list <name> tcp destination [<dst_ipaddress>/<dst_mask> | any] ip-p

Pagina 228

EXTREMEWARE SOFTWARE USER GUIDE16-9USING IP ACCESS LISTScreate access-list <name> udp destination [<dst_ipaddress>/<dst_mask> | any]

Pagina 229 - Area 2 Area 1 Area 0

16-10 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIEScreate access-list icmp destination [<dest_ipaddress>/<mask> | any] source [<src_ip

Pagina 230 - Area 1 Area 0 Area 3

EXTREMEWARE SOFTWARE USER GUIDE16-11USING IP ACCESS LISTSIP ACCESS LIST EXAMPLESThis section presents two IP access list examples:• Using the permit-e

Pagina 231 - ASBR ASBR

16-12 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESThe following command creates the access-list:create access-list denyall ip destination any source

Pagina 232

EXTREMEWARE SOFTWARE USER GUIDE16-13USING IP ACCESS LISTSFigure 16-3: Access list allows TCP trafficStep 3 - Permit-Established Access List. When a T

Pagina 233 - ISTRIBUTING

16-14 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESThe exact command line entry for this example is as follows:create access-list telnet-allow tcp de

Pagina 234

EXTREMEWARE SOFTWARE USER GUIDE16-15USING ROUTING ACCESS POLICIESFigure 16-6: ICMP packets are filtered outUSING ROUTING ACCESS POLICIESTo use routing

Pagina 235

EXTREMEWARE SOFTWARE USER GUIDE1-9SOFTWARE FACTORY DEFAULTSFor default settings of individual ExtremeWare features, refer to individual chapters in th

Pagina 236 - Triggered update

16-16 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESCREATING AN ACCESS PROFILEThe first thing to do when using routing access policies is to create an

Pagina 237

EXTREMEWARE SOFTWARE USER GUIDE16-17USING ROUTING ACCESS POLICIESTo configure the access profile mode, use the following command:config access-profile

Pagina 238

16-18 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESPERMIT AND DENY ENTRIESIf you have configured the access profile mode to be none, you must specify

Pagina 239

EXTREMEWARE SOFTWARE USER GUIDE16-19USING ROUTING ACCESS POLICIESROUTING ACCESS POLICIES FOR RIPIf you are using the RIP protocol, the switch can be c

Pagina 240

16-20 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESFigure 16-7: RIP access policy exampleAssuming the backbone VLAN interconnects all the routers in

Pagina 241

EXTREMEWARE SOFTWARE USER GUIDE16-21USING ROUTING ACCESS POLICIESIn addition, if the administrator wants to restrict any user belonging to the VLAN En

Pagina 242

16-22 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESfor the switch as a whole. To configure a direct filter policy, use the following command:config o

Pagina 243

EXTREMEWARE SOFTWARE USER GUIDE16-23USING ROUTING ACCESS POLICIESTo configure the switch labeled Internet, the commands would be as follows:create acc

Pagina 244

16-24 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESTo configure the switch labeled Engsvrs, use the following commands:create access-profile nointern

Pagina 245

EXTREMEWARE SOFTWARE USER GUIDE16-25MAKING CHANGES TO A ROUTING ACCESS POLICYTo configure the switch labeled Engsvrs, the commands would be as follows

Pagina 246

1-10 EXTREMEWARE SOFTWARE USER GUIDEEXTREMEWARE OVER VIEW

Pagina 247

16-26 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESon the ingress or egress side, depending on the change. For soft resets to be applied on the ingre

Pagina 248

EXTREMEWARE SOFTWARE USER GUIDE16-27ROUTING ACCESS POLICY COMMANDSTable 16-3: Routing Access Policy Configuration CommandsCommand Descriptionconfig ac

Pagina 249

16-28 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESconfig access-profile <access_profile> mode [permit | deny | none]Configures the access prof

Pagina 250

EXTREMEWARE SOFTWARE USER GUIDE16-29USING ROUTE MAPSUSING ROUTE MAPSRoute maps are a mechanism that can be used to conditionally control the redistrib

Pagina 251 - Exterior Gateway Routing

16-30 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESTo create a route map, do the following:1 Create a route map.2 Add entries to the route map.3 Add

Pagina 252

EXTREMEWARE SOFTWARE USER GUIDE16-31USING ROUTE MAPSconfig route-map <route-map> <sequence number> add set [as-path <as_num> | commu

Pagina 253 - OMMUNITIES

16-32 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESROUTE MAP OPERATIONThe entries in the route map are processed in the ascending order of the sequen

Pagina 254 - OUTE CONFEDERATION EXAMPLE

EXTREMEWARE SOFTWARE USER GUIDE16-33USING ROUTE MAPSFigure 16-9: Route mapsThe following points apply to this example:• RTA is a member of in AS 1111

Pagina 255

16-34 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESconfig bgp-out add 20 permitconfig bgp neighbor 10.0.0.2 route-map-filter out bgp-outconfig bgp ne

Pagina 256

EXTREMEWARE SOFTWARE USER GUIDE16-35USING ROUTE MAPSROUTE MAP COMMANDSTable 16-6 describes route map commands.Table 16-6: Route Map CommandsCommand De

Pagina 257

EXTREMEWARE SOFTWARE USER GUIDE2-12Accessing the SwitchThis chapter covers the following topics:• Understanding the Command Syntax on page 2-1• Line-E

Pagina 258

16-36 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESconfig route-map <route-map> <sequence number> delete match [nlri-list <access_prof

Pagina 259

EXTREMEWARE SOFTWARE USER GUIDE17-117Server Load Balancing (SLB)This chapter describes the following topics:• Overview on page 17-2• SLB Components on

Pagina 260

17-2 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)OVERVIEWServer Load Balancing (SLB) is a feature of the switch that divides many client

Pagina 261

EXTREMEWARE SOFTWARE USER GUIDE17-3SLB COMPONENTSNODESA node is an individual service on a physical server that consists of an IP addresses and a port

Pagina 262

17-4 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)Once you know which virtual server options are useful in your network, you can:• Define

Pagina 263

EXTREMEWARE SOFTWARE USER GUIDE17-5FORWARDING MODESFORWARDING MODESThe switch supports the following SLB forwarding modes:• Tran sp arent• Tran sl at

Pagina 264

17-6 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)To configure transparent mode, use the following command:create slb vip <vipname>

Pagina 265

EXTREMEWARE SOFTWARE USER GUIDE17-7FORWARDING MODES• The service is configured to use the appropriate address and port, as specified in the switch con

Pagina 266

17-8 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)The following commands enable SLB, configure the server VLAN to act as the server side,

Pagina 267 - IP Multicast Routing

EXTREMEWARE SOFTWARE USER GUIDE17-9FORWARDING MODESFigure 17-3: Translational modeIn Figure 17-3, the switch is configured to respond to requests for

Pagina 268 - ULTICAST

2-2 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCH3 The value part of the command specifies how you want the parameter to be set. Values include

Pagina 269 - PARSE MODE (PIM-SM)

17-10 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)config client add port 1-4enable ipforwardingThe following commands create a round-rob

Pagina 270 - ULTICASTING

EXTREMEWARE SOFTWARE USER GUIDE17-11FORWARDING MODESTo configure port translation mode, use the following command:create slb vip <vipname> pool

Pagina 271

17-12 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)The servers are configured as follows:• All servers have the same MAC address.• All se

Pagina 272

EXTREMEWARE SOFTWARE USER GUIDE17-13BALANCING METHODSprotocol is enabled, the subnet containing the VIPs is propagated through the network.BALANCING M

Pagina 273 - Protocol (IGMP)

17-14 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)where the number of connections that each machine receives over time is proportionate

Pagina 274

EXTREMEWARE SOFTWARE USER GUIDE17-15BASIC SLB COMMANDSThe switch will distribute traffic in round-robin fashion among the pools active nodes with the

Pagina 275

17-16 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)create slb pool <poolname> {slb-method [round-robin | ratio | priority | least-c

Pagina 276 - PIM-DM C

EXTREMEWARE SOFTWARE USER GUIDE17-17BASIC SLB COMMANDSdisable slb vip <vipname> {close-connections-now} Disables a VIP group. When disabled, no

Pagina 277

17-18 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)ADVANCED SLB APPLICATION EXAMPLEThis example builds upon the Introductory SLB Applicat

Pagina 278

EXTREMEWARE SOFTWARE USER GUIDE17-19ADVANCED SLB APPLICATION EXAMPLEFigure 17-5: Advanced SLB configurationThe commands used to configure are describe

Pagina 279

EXTREMEWARE SOFTWARE USER GUIDE2-3UNDERSTANDING THE COMMAND SYNTAXOnce you have created the VLAN with a unique name, you can then eliminate the keywor

Pagina 280

17-20 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)To create is the virtual IP VLAN, use the following commands: create vlan sitesconfig

Pagina 281 - IPX Routing

EXTREMEWARE SOFTWARE USER GUIDE17-21ADVANCED SLB APPLICATION EXAMPLEcreate slb pool site2webconfig slb site2web add 192.168.200.5:80config slb site2we

Pagina 282 - 192.207.36.0

17-22 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)enable slb vip ftpc service-checkconfig slb vip ftpc service-check ftp user test passw

Pagina 283 - NCAPSULATION

EXTREMEWARE SOFTWARE USER GUIDE17-23HEALTH CHECKINGPING-CHECKPing-check is Layer 3 based pinging of the physical node. The default ping frequency is o

Pagina 284 - TATIC ROUTES

17-24 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)SERVICE-CHECKService-check is Layer 7 based application-dependent checking defined on

Pagina 285 - DVERTISEMENTS

EXTREMEWARE SOFTWARE USER GUIDE17-25HEALTH CHECKINGFor SMTP, service-check identifies the identity of the switch by providing the specified DNS domain

Pagina 286

17-26 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)PERSISTENCEUsing persistence, you can ensure that traffic flows do not span multiple s

Pagina 287

EXTREMEWARE SOFTWARE USER GUIDE17-27USING HIGH AVAILABILITY SYSTEM FEATURESYou can only activate sticky persistence on wildcard virtual servers.To con

Pagina 288

17-28 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)The switches in a redundant SLB configuration should have identical SLB configurations

Pagina 289

EXTREMEWARE SOFTWARE USER GUIDE17-29USING HIGH AVAILABILITY SYSTEM FEATURESTo assign a VIP to a unit, use the following command:config slb vip <vip

Pagina 290

2-4 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCHSUMMIT SWITCH NUMERICAL RANGESCommands that require you to enter one or more port numbers on a

Pagina 291

17-30 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)create vlan insidecreate vlan serverconfig vlan inside ipaddress 1.10.0.2 /16config vl

Pagina 292

EXTREMEWARE SOFTWARE USER GUIDE17-31USING HIGH AVAILABILITY SYSTEM FEATUREScreate slb pool testpoolconfig slb pool testpool add 1.206.1.1:80config slb

Pagina 293

17-32 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)3DNS SUPPORTWhen you enable SLB, the switch reports health status to 3DNS using the iQ

Pagina 294

EXTREMEWARE SOFTWARE USER GUIDE17-33ADVANCED SLB COMMANDSconfig slb failover unit [1 | 2] remote-ip <ipaddress> local-ip <ipaddress>:<L

Pagina 295 - Access Policies

17-34 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)config slb global [ping-check | tcp-port-check | service-check] frequency <seconds&

Pagina 296

EXTREMEWARE SOFTWARE USER GUIDE17-35ADVANCED SLB COMMANDSconfig slb global telnet userid <userid> password {encrypted} {<password>}Configu

Pagina 297

17-36 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)config slb vip <vipname> unit {1 | 2} Configures a unit number of a VIP name for

Pagina 298 - ESTABLISHED

EXTREMEWARE SOFTWARE USER GUIDE17-37ADVANCED SLB COMMANDSenable slb node <ipaddress> ping-check Enables L3 pinging to the node address. Ping-che

Pagina 299

17-38 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)WEB CACHE REDIRECTIONWeb cache redirection uses the TCP or UDP port number to redirect

Pagina 300

EXTREMEWARE SOFTWARE USER GUIDE17-39WEB CACHE REDIRECTIONFLOW REDIRECTION COMMANDSTo configure flow redirection, use the commands listed in Table 17-5

Pagina 301

EXTREMEWARE SOFTWARE USER GUIDE2-5LINE-EDITING KEYSLINE-EDITING KEYSTab le 2-2 describes the line-editing keys available using the CLI.vertical bar |

Pagina 302

17-40 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)Figure 17-7: Flow-redirection exampleThe following commands are used to configure the

Pagina 303

EXTREMEWARE SOFTWARE USER GUIDE18-118Status Monitoring and StatisticsThis chapter describes the following topics:• Status Monitoring on page 18-1• Slo

Pagina 304

18-2 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICSFor more information about show commands for a specific ExtremeWare feature, refer

Pagina 305 - 10.10.20.1

EXTREMEWARE SOFTWARE USER GUIDE18-3SLOT DIAGNOSTICSSLOT DIAGNOSTICSThe BlackDiamond switch provides a facility for running normal or extended diagnost

Pagina 306 - NET20 VLANNET10 VLAN

18-4 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICS•extended — Takes the switch fabric and ports offline, and performs extensive ASIC

Pagina 307

EXTREMEWARE SOFTWARE USER GUIDE18-5PORT ERRORS• Received Broadcast (RX Bcast) — The total number of frames received by the port that are addressed to

Pagina 308 - XAMPLE 2: FILTER ICMP PACKETS

18-6 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICSThe following port receive error information is collected by the switch:• Receive

Pagina 309

EXTREMEWARE SOFTWARE USER GUIDE18-7SETTING THE SYSTEM RECOVERY LEVELSETTING THE SYSTEM RECOVERY LEVELYou can configure the system to automatically reb

Pagina 310

18-8 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICSBy default, log entries that are assigned a critical or warning level remain in th

Pagina 311 - EQUENCE NUMBERING

EXTREMEWARE SOFTWARE USER GUIDE18-9LOGGINGLOCAL LOGGINGThe switch maintains 1,000 messages in its internal log. You can display a snapshot of the log

Pagina 312

2-6 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCHCOMMAND HISTORYExtremeWare “remembers” the last 49 commands you entered. You can display a list

Pagina 313

18-10 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICS• Configure remote logging by using the following command:config syslog {add} <

Pagina 314 - Engsvrs Sales

EXTREMEWARE SOFTWARE USER GUIDE18-11LOGGINGLOGGING COMMANDSThe commands described in Table 18-5 allow you to configure logging options, reset logging

Pagina 315

18-12 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICSRMONUsing the Remote Monitoring (RMON) capabilities of the switch allows network

Pagina 316

EXTREMEWARE SOFTWARE USER GUIDE18-13RMON• Management workstation — Communicates with the RMON probe and collects the statistics from it. The workstati

Pagina 317

18-14 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICSAlarms inform you of a network performance problem and can trigger automated acti

Pagina 318

EXTREMEWARE SOFTWARE USER GUIDE18-15RMONEVENT ACTIONSThe actions that you can define for each alarm are shown in Tab le 18 -6.To be notified of events

Pagina 319

18-16 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICS

Pagina 320

EXTREMEWARE SOFTWARE USER GUIDE19-119Using ExtremeWare VistaThis chapter covers the following topics:• Enabling and Disabling Web Access on page 19-2•

Pagina 321

19-2 EXTREMEWARE SOFTWARE USER GUIDEUSING EXTREMEWARE VISTAENABLING AND DISABLING WEB ACCESSBy default, Web access is enabled on the switch. Use of Ex

Pagina 322

EXTREMEWARE SOFTWARE USER GUIDE19-3ACCESSING EXTREMEWARE VISTA• Check for newer versions of stored pages. Every visit to the page should be selected a

Pagina 323

EXTREMEWARE SOFTWARE USER GUIDE2-7COMMON COMMANDSconfig slot <slot> module [f32t | f32f | f48t | g4x | g6x | g8x | g12x]Configures a slot for a

Pagina 324

19-4 EXTREMEWARE SOFTWARE USER GUIDEUSING EXTREMEWARE VISTATo correct this situation, log out of the switch and log in again.NAVIGATING EXTREMEWARE VI

Pagina 325

EXTREMEWARE SOFTWARE USER GUIDE19-5NAVIGATING EXTREMEWARE VISTABROWSER CONTROLSBrowser controls include drop-down list boxes, check boxes, and multi-s

Pagina 326 - OUTE MAP EXAMPLE

19-6 EXTREMEWARE SOFTWARE USER GUIDEUSING EXTREMEWARE VISTASAVING CHANGESThere are two ways to save your changes to non-volatile storage using Extreme

Pagina 327

EXTREMEWARE SOFTWARE USER GUIDE19-7DO A GET WHEN CONFIGURING A VLANDO A GET WHEN CONFIGURING A VLANWhen configuring a VLAN using ExtremeWare Vista, pr

Pagina 328

19-8 EXTREMEWARE SOFTWARE USER GUIDEUSING EXTREMEWARE VISTA

Pagina 329

EXTREMEWARE SOFTWARE USER GUIDE20-120Software Upgrade and Boot OptionsThis chapter describes the following topics:• Downloading a New Image on page 20

Pagina 330

20-2 EXTREMEWARE SOFTWARE USER GUIDESOFTWARE UPGRADE AND BOOT OPTIONS• Download the new image to the switch using the commanddownload image [<ipadd

Pagina 331 - Server Load Balancing (SLB)

EXTREMEWARE SOFTWARE USER GUIDE20-3SAVING CONFIGURATION CHANGESSAVING CONFIGURATION CHANGESThe configuration is the customized set of parameters that

Pagina 332 - OMPONENTS

20-4 EXTREMEWARE SOFTWARE USER GUIDESOFTWARE UPGRADE AND BOOT OPTIONSUSING TFTP TO UPLOAD THE CONFIGURATIONYou can upload the current configuration to

Pagina 333

EXTREMEWARE SOFTWARE USER GUIDE20-5USING TFTP TO DOWNLOAD THE CONFIGURATIONUSING TFTP TO DOWNLOAD THE CONFIGURATIONYou can download ASCII files that c

Pagina 334 - ALANCING

IVSecurity Features Under License Control 1-8Software Factory Defaults 1-82ACCESSING THE SWITCHUnderstanding the Command Syntax 2-1Syntax Helper 2-2Co

Pagina 335

2-8 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCHdelete vlan <name> Deletes a VLAN.disable bootp vlan [<name> | all] Disables BOOTP

Pagina 336

20-6 EXTREMEWARE SOFTWARE USER GUIDESOFTWARE UPGRADE AND BOOT OPTIONSTo download an incremental configuration, use the following command:download conf

Pagina 337

EXTREMEWARE SOFTWARE USER GUIDE20-7SYNCHRONIZING MSMSSYNCHRONIZING MSMS On the BlackDiamond switch, you can take the master MSM configurations and ima

Pagina 338 - RANSLATIONAL

20-8 EXTREMEWARE SOFTWARE USER GUIDESOFTWARE UPGRADE AND BOOT OPTIONSAs soon as you see the BootROM-> prompt, release the spacebar. You can see a

Pagina 339

EXTREMEWARE SOFTWARE USER GUIDE20-9BOOT OPTION COMMANDSdownload configuration <hostname | ipaddress> <filename> {incremental}Downloads a c

Pagina 340 - RANSLATION

20-10 EXTREMEWARE SOFTWARE USER GUIDESOFTWARE UPGRADE AND BOOT OPTIONSuse configuration [primary | secondary] Configures the switch to use a particula

Pagina 341 - Clients Servers

EXTREMEWARE SOFTWARE USER GUIDEA-1ASupported StandardsThe following is a list of software standards supported by ExtremeWare.Standards and ProtocolsRF

Pagina 342 - DVERTISEMENT

A-2 EXTREMEWARE SOFTWARE USER GUIDESUPPORTED STANDARDSManagement and SecurityRFC 1157 SNMP v1/v2cRFC 1213 MIB IIRFC 1354 IP forwarding table MIBRFC 14

Pagina 343

EXTREMEWARE SOFTWARE USER GUIDEB-1BTroubleshootingIf you encounter problems when using the switch, this appendix may be helpful. If you have a problem

Pagina 344 - ONNECTIONS

B-2 EXTREMEWARE SOFTWARE USER GUIDETROUBLESHOOTING• Both ends of the Gigabit link are set to the same autonegotiation state.Both sides if the Gigabit

Pagina 345

EXTREMEWARE SOFTWARE USER GUIDEB-3USING THE COMMAND-LINE INTERFACEIf this does not work, try using a different power source (different power strip/out

Pagina 346

EXTREMEWARE SOFTWARE USER GUIDE2-9CONFIGURING MANAGEMENT ACCESSCONFIGURING MANAGEMENT ACCESSExtremeWare supports the following two levels of managemen

Pagina 347

B-4 EXTREMEWARE SOFTWARE USER GUIDETROUBLESHOOTINGThe SNMP Network Manager or Telnet workstation can no longer access the device:Check that Telnet acc

Pagina 348 - PPLICATION

EXTREMEWARE SOFTWARE USER GUIDEB-5USING THE COMMAND-LINE INTERFACEIn the case where no one knows a password for an administrator level user, contact y

Pagina 349 - Server pools

B-6 EXTREMEWARE SOFTWARE USER GUIDETROUBLESHOOTINGEnsure that you are using multi-mode fiber (MMF) when using a 1000BASE-SX GBIC, and single mode fibe

Pagina 350

EXTREMEWARE SOFTWARE USER GUIDEB-7USING THE COMMAND-LINE INTERFACE802.1Q links do not work correctly:Remember that VLAN names are only locally signifi

Pagina 351

B-8 EXTREMEWARE SOFTWARE USER GUIDETROUBLESHOOTINGDEBUG TRACINGExtremeWare includes a debug-tracing facility for the switch. The show debug-tracing co

Pagina 352

IndexNumerics3DNS 17-32802.1p configuration commands (table) 9-14Aaccess levels 2-9access listsBlackDiamond switch maximum entries 16-5configuration c

Pagina 353

II - INDEXport configuration 4-2port-mirroring, virtual port 4-11slot configuration 4-1verifying load sharing 4-11blackhole entries, FDB 7-2boot optio

Pagina 354

INDEX - IIIhost attach 10-9linking switches 10-12masterbehavior 10-5definition 10-2determining 10-3electing 10-6election algorithms 10-5port blocks 10

Pagina 355 - ERVICE-CHECK COMMANDS

IV - INDEXresetting 14-14settings, displaying 14-13show commands (table) 14-13IP multinettingdescription 11-7example 11-9primary VLAN interface 11-7se

Pagina 356 - ERSISTENCE

INDEX - Vverifying the configuration on Summit switch 5-10local logging 18-9log display 18-9loggingand Telnet 18-9commands (table) 18-11configuration

Pagina 357 - VAILABILITY

2-10 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCHUSER ACCOUNTA user-level account has viewing access to all manageable parameters, with the exc

Pagina 358 - SLB switch

VI - INDEXport-mirroringBlackDiamond switch configuration commands (table) 4-12BlackDiamond switch example 4-12description on BlackDiamond switch 4-11

Pagina 359

INDEX - VIIconfiguration commands (table) 16-35creating 16-30description 16-2, 16-29example 16-32goto entries 16-31match entries 16-31match operation

Pagina 360

VIII - INDEXusing 3-10SNTPconfiguration commands (table) 3-25configuring 3-22Daylight Savings Time 3-22description 3-21example 3-25Greenwich Mean Time

Pagina 361 - SING MANUAL FAIL-BACK

INDEX - IXVirtual LANs. See VLANsvirtual link, OSPF 12-8virtual port on Summit switch 5-11VLAN aggregationcommands (table) 11-14description 11-11limit

Pagina 362

X - INDEX

Pagina 363

Index of CommandsCclear counters 18-11clear dlcs 9-26clear fdb 7-3, 9-11clear igmp snooping 14-14clear iparp 11-19, 11-28clear ipfdb 11-19, 11-2

Pagina 364

ii - Index of Commands16-28config esrp port-mode 10-14config fdb agingtime 7-3config flow redirection add next-hop 17-39config flow-redirection del

Pagina 365

Index of Commands - iiiconfig rip vlan import-filter 16-19, 16-29config rip vlan trusted-gateway 16-19, 16-29config route-map add 16-30, 16-36confi

Pagina 366

iv - Index of Commandscreate access-list udp destination 16-9create access-profile 16-29create account 2-7, 2-12create bgp neighbor 13-14create fd

Pagina 367

Index of Commands - vdisable radius-accounting 3-16disable red ports 9-8disable rip 12-20disable rip aggregation 12-20disable rip export 11-4, 12

Pagina 368 - EDIRECTION

EXTREMEWARE SOFTWARE USER GUIDE2-11CONFIGURING MANAGEMENT ACCESSDEFAULT ACCOUNTSBy default, the switch is configured with two accounts, as shown in Ta

Pagina 369

vi - Index of Commandsenable license 2-8enable license security 3-7enable log display 18-9, 18-12enable loopback-mode vlan 11-21enable mac-vlan 6

Pagina 370 - Cache VLAN

Index of Commands - viishow dlcs 9-27show dns-client 2-13show dot1p 9-14show dvmrp 14-13show edp 4-13, 5-12show esrp 10-5, 10-13, 10-16, 10-20sh

Pagina 371 - ONITORING

viii - Index of Commandsunconfig vlan xnetid 15-14upload configuration 2-13, 20-4, 20-9upload configuration cancel 20-4, 20-9use configuration 20-

Pagina 372 - Table 18-1 describes

2-12 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCH5 Re-enter the new password at the prompt.If you forget your password while logged out of the

Pagina 373 - IAGNOSTICS

EXTREMEWARE SOFTWARE USER GUIDE2-13DOMAIN NAME SERVICE CLIENT SERVICESDOMAIN NAME SERVICE CLIENT SERVICESThe Domain Name Service (DNS) client in Extre

Pagina 374 - TATISTICS

2-14 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCHPINGThe ping command enables you to send Internet Control Message Protocol (ICMP) echo message

Pagina 375

EXTREMEWARE SOFTWARE USER GUIDE2-15CHECKING BASIC CONNECTIVITYTRACEROUTEThe traceroute command enables you to trace the routed path between the switch

Pagina 376

2-16 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCH

Pagina 377

EXTREMEWARE SOFTWARE USER GUIDE3-13Managing the SwitchThis chapter covers the following topics:• Overview on page 3-1• Using the Console Interface on

Pagina 378

VUsing a BOOTP Server 3-4Manually Configuring the IP Settings 3-4Disconnecting a Telnet Session 3-6Controlling Telnet Access 3-6Using Secure Shell 2 (

Pagina 379 - EAL-TIME DISPLAY

3-2 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCH— ExtremeWare Vista Web access using a standard Web browser— SNMP access using ExtremeWare Enter

Pagina 380

EXTREMEWARE SOFTWARE USER GUIDE3-3USING TELNETYou can configure the IP address, subnet mask, and default router for the VLAN mgmt, using the following

Pagina 381 - Table 18-5: Logging Commands

3-4 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHUSING A BOOTP SERVERIf you are using IP and you have a Bootstrap Protocol (BOOTP) server set up

Pagina 382

EXTREMEWARE SOFTWARE USER GUIDE3-5USING TELNETmust be assigned an IP address and subnet mask. IP addresses are always assigned to a VLAN. The switch c

Pagina 383

3-6 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCH6 Configure the default route for the switch using the following command:config iproute add defa

Pagina 384

EXTREMEWARE SOFTWARE USER GUIDE3-7USING SECURE SHELL 2 (SSH2)To display the status of Telnet, use the following command:show managementYou can choose

Pagina 385 - Table 18-6: Event Actions

3-8 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHTo enable SSH2, use the following command:enable ssh2 {access-profile [<access_profile> |

Pagina 386

EXTREMEWARE SOFTWARE USER GUIDE3-9USING EXTREMEWARE VISTAFor more information on assigning an IP address, refer to the section, “Configuring Switch IP

Pagina 387 - Using ExtremeWare Vista

3-10 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHUSING SNMPAny Network Manager running the Simple Network Management Protocol (SNMP) can manage

Pagina 388

EXTREMEWARE SOFTWARE USER GUIDE3-11USING SNMPTo configure SNMP read access to use an access profile, use the command:config snmp access-profile readon

Pagina 389

VILoad-Sharing Algorithms 4-8Configuring BlackDiamond and Alpine Switch Load Sharing 4-9Load-Sharing Example 4-11Verifying the Load-Sharing Configurat

Pagina 390 - AVIGATING

3-12 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHconfig snmp add trapreceiver <ipaddress> community <string>Adds the IP address of a

Pagina 391 - ROWSER CONTROLS

EXTREMEWARE SOFTWARE USER GUIDE3-13AUTHENTICATING USERSDISPLAYING SNMP SETTINGSTo display the SNMP settings configured on the switch, use the followin

Pagina 392 - ILTERING

3-14 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHThe privileges assigned to the user (admin versus non-admin) at the RADIUS server take preceden

Pagina 393

EXTREMEWARE SOFTWARE USER GUIDE3-15AUTHENTICATING USERSTable 3- 2: RADIUS CommandsCommand Descriptionconfig radius [primary | secondary] server [<i

Pagina 394

3-16 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHRADIUS RFC 2138 ATTRIBUTESThe RADIUS RFC 2138 optional attributes supported are as follows:• Us

Pagina 395 - Software Upgrade and Boot

EXTREMEWARE SOFTWARE USER GUIDE3-17AUTHENTICATING USERSfiles. The client configuration file (ClientCfg.txt) defines the authorized source machine, sou

Pagina 396 - EBOOTING

3-18 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHcompiled format for Solaris™ or Linux™ operating systems, as well as in source code format. For

Pagina 397

EXTREMEWARE SOFTWARE USER GUIDE3-19AUTHENTICATING USERSuser Password = ""Filter-Id = "unlim"admin Password = "", Service

Pagina 398

3-20 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHCONFIGURING TACACS+Terminal Access Controller Access Control System Plus (TACACS+) is a mechani

Pagina 399

EXTREMEWARE SOFTWARE USER GUIDE3-21USING THE SIMPLE NETWORK TIME PROTOCOLUSING THE SIMPLE NETWORK TIME PROTOCOLExtremeWare supports the client portion

Pagina 400

VIIAssigning a VLAN Tag 6-6Mixing Port-Based and Tagged VLANs 6-9Protocol-Based VLANs 6-9Predefined Protocol Filters 6-10Defining Protocol Filters 6-1

Pagina 401 - YNCHRONIZING

3-22 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHCONFIGURING AND USING SNTPTo use SNTP, follow these steps:1 Identify the host(s) that are confi

Pagina 402

EXTREMEWARE SOFTWARE USER GUIDE3-23USING THE SIMPLE NETWORK TIME PROTOCOLThis command provides configuration and statistics associated with SNTP and i

Pagina 403

3-24 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCH-12:00 -720 IDLW - International Date Line West+1:00 +60 CET - Central European FWT - French Wi

Pagina 404

EXTREMEWARE SOFTWARE USER GUIDE3-25USING THE SIMPLE NETWORK TIME PROTOCOLSNTP CONFIGURATION COMMANDSTab le 3-5 describes SNTP configuration commands.S

Pagina 405 - Supported Standards

3-26 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCH

Pagina 406 - TANDARDS

EXTREMEWARE SOFTWARE USER GUIDE4-14Configuring BlackDiamond and Alpine Switch Slots and PortsThis chapter covers the following topics: • Configuring a

Pagina 407 - Troubleshooting

4-2 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTSYou can configure the BlackDiamond or Alpine switch with

Pagina 408 - ROUBLESHOOTING

EXTREMEWARE SOFTWARE USER GUIDE4-3BLACKDIAMOND AND ALPINE SWITCH PORT CONFIGURATIONFor example, if a G4X I/O module (having a total of four ports) is

Pagina 409 - NTERFACE

4-4 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTS10BASE-T and 100BASE-TX ports can connect to either 10BAS

Pagina 410

EXTREMEWARE SOFTWARE USER GUIDE4-5BLACKDIAMOND AND ALPINE SWITCH PORT CONFIGURATIONconfig ports <portlist> auto off {speed [10 | 100 | 1000]} du

Pagina 411

VIII8SPANNING TREE PROTOCOL (STP)Overview of the Spanning Tree Protocol 8-1Spanning Tree Domains 8-2STPD Status for GVRP-Added Ports 8-2Defaults 8-3ST

Pagina 412

4-6 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTSenable sharing <port> grouping <portlist> {po

Pagina 413

EXTREMEWARE SOFTWARE USER GUIDE4-7JUMBO FRAMESJUMBO FRAMESJumbo frames are Ethernet frames that are larger than 1523 bytes, including four bytes used

Pagina 414

4-8 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTSFor example, VLANs see the load-sharing group as a single

Pagina 415 - Numerics

EXTREMEWARE SOFTWARE USER GUIDE4-9LOAD SHARING ON THE BLACKDIAMOND AND ALPINE SWITCHThe address-based and round-robin load-sharing algorithms are supp

Pagina 416

4-10 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTSBlackDiamond switch modules that use the “i” chipset do

Pagina 417

EXTREMEWARE SOFTWARE USER GUIDE4-11BLACKDIAMOND AND ALPINE SWITCH PORT-MIRRORINGLOAD-SHARING EXAMPLEThe following example defines a load-sharing group

Pagina 418

4-12 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTSUp to eight mirroring filters and one monitor port can b

Pagina 419

EXTREMEWARE SOFTWARE USER GUIDE4-13BLACKDIAMOND AND ALPINE SWITCH PORT-MIRRORINGEXTREME DISCOVERY PROTOCOLThe Extreme Discovery Protocol (EDP) is used

Pagina 420

4-14 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTS

Pagina 421

EXTREMEWARE SOFTWARE USER GUIDE5-15Configuring Summit Switch PortsThis chapter covers the following topics:• Enabling and Disabling Summit Switch Port

Pagina 422 - (table) 3-23

IXConfiguring DiffServ 9-15Observing DiffServ Information 9-17Changing DiffServ Code point assignments in the Q0S Profile 9-17Replacing DiffServ Code

Pagina 423

5-2 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSFor example, to disable ports 3, 5, and 12 through 15 on the Summit switch, enter th

Pagina 424

EXTREMEWARE SOFTWARE USER GUIDE5-3SUMMIT SWITCH PORT COMMANDSTURNING OFF AUTONEGOTIATION FOR A GIGABIT ETHERNET PORTIn certain interoperability situat

Pagina 425 - Index of Commands

5-4 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSdisable learning ports <portlist> Disables MAC address learning on one or more

Pagina 426

EXTREMEWARE SOFTWARE USER GUIDE5-5JUMBO FRAMESJUMBO FRAMESJumbo frames are Ethernet frames that are larger than 1523 bytes, including four bytes used

Pagina 427 - Index of Commands - iii

5-6 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSThe jumbo_frame_mtu range is 1523 to 9216. The value describes the maximum size “on

Pagina 428

EXTREMEWARE SOFTWARE USER GUIDE5-7LOAD SHARING ON THE SUMMIT SWITCHLOAD SHARING ALGORITHMSLoad sharing algorithms allow you to select the distribution

Pagina 429 - Index of Commands - v

5-8 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSOn switches that do not have the “i” chipset, the following additional rules apply:•

Pagina 430

EXTREMEWARE SOFTWARE USER GUIDE5-9LOAD SHARING ON THE SUMMIT SWITCHOn all other Summit switch models, the following rules apply:• A group can contain

Pagina 431 - replacement ports 9-17

5-10 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSTo define a load-sharing group, you assign a group of ports to a single, logical po

Pagina 432

EXTREMEWARE SOFTWARE USER GUIDE5-11SUMMIT SWITCH PORT-MIRRORINGThe traffic filter can be defined based on one of the following criteria:• Physical por

Comentarios a estos manuales

Sin comentarios