Extreme Networks ExtremeWare Enterprise Manager Guia do Utilizador

Consulte online ou descarregue Guia do Utilizador para Software Extreme Networks ExtremeWare Enterprise Manager. Extreme Networks ExtremeWare Enterprise Manager User guide Manual do Utilizador

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir

Resumo do Conteúdo

Página 1 - User Guide

Extreme Networks, Inc.3585 Monroe StreetSanta Clara, California 95051(888) 257-3000http://www.extremenetworks.comExtremeWare Software User GuideSoftwa

Página 2

XESRP Host Attach 10-9ESRP Domains 10-10ESRP Groups 10-11Linking ESRP Switches 10-12Configuring ESRP and Multinetting 10-12ESRP and Spanning Tree 10-1

Página 3 - Contents

5-12 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSSUMMIT SWITCH PORT-MIRRORING EXAMPLEThe following example selects port 3 as the mir

Página 4 - 3MANAGING THE SWITCH

EXTREMEWARE SOFTWARE USER GUIDE5-13SMART REDUNDANCYSMART REDUNDANCYSmart redundancy defines the behavior of switches equipped with redundancy Gigabit

Página 5 - AND PORTS

5-14 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSIf smart redundancy is disabled, both the primary and redundant ports are dual-home

Página 6 - 6VIRTUAL LANS (VLANS)

EXTREMEWARE SOFTWARE USER GUIDE6-16Virtual LANs (VLANs)This chapter covers the following topics:• Overview of Virtual LANs on page 6-1• Types of VLANs

Página 7 - 7FORWARDING DATABASE (FDB)

6-2 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)BENEFITSImplementing VLANs on your networks has the following advantages:• VLANs help to contro

Página 8 - 9QUALITY OF SERVICE (QOS)

EXTREMEWARE SOFTWARE USER GUIDE6-3TYPES OF VLANS Figure 6-1: Example of a port-based VLAN on the Summit7i switchFor the members of the different IP VL

Página 9

6-4 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)Figure 6-2: Single port-based VLAN spanning two switches To create multiple VLANs that span two

Página 10 - 11 IP UNICAST ROUTING

EXTREMEWARE SOFTWARE USER GUIDE6-5TYPES OF VLANSFigure 6-3: Two port-based VLANs spanning two BlackDiamond switchesVLAN Accounting spans System 1 and

Página 11

6-6 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)TAGGED VLANSTa g g i n g is a process that inserts a marker (called a tag) into the Ethernet f

Página 12 - 14 IP MULTICAST ROUTING

EXTREMEWARE SOFTWARE USER GUIDE6-7TYPES OF VLANSFigure 6-4 illustrates the physical view of a network that uses tagged and untagged traffic.Figure 6-4

Página 13 - 16 ACCESS POLICIES

XIConfiguring DHCP/BOOTP Relay 11-16Verifying the DHCP/BOOTP Relay Configuration 11-16UDP-Forwarding 11-16Configuring UDP-Forwarding 11-17UPD-Forwardi

Página 14

6-8 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)Figure 6-5 shows a logical diagram of the same network.Figure 6-5: Logical diagram of tagged an

Página 15 - ERVER LOAD BALANCING (SLB)

EXTREMEWARE SOFTWARE USER GUIDE6-9TYPES OF VLANSMIXING PORT-BASED AND TAGGED VLANSYou can configure the switch using a combination of port-based and t

Página 16 - 19 USING EXTREMEWARE VISTA

6-10 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)Figure 6-6: Protocol-based VLANs PREDEFINED PROTOCOL FILTERSThe following protocol filters are

Página 17 - BTROUBLESHOOTING

EXTREMEWARE SOFTWARE USER GUIDE6-11TYPES OF VLANSDEFINING PROTOCOL FILTERSIf necessary, you can define a customized protocol filter based on EtherType

Página 18 - INDEX OF COMMANDS

6-12 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)DELETING A PROTOCOL FILTERIf a protocol filter is deleted from a VLAN, the VLAN is assigned a

Página 19 - NTRODUCTION

EXTREMEWARE SOFTWARE USER GUIDE6-13CONFIGURING VLANS ON THE SWITCHRENAMING A VLANTo rename an existing VLAN, use the following command:config vlan <

Página 20 - ONVENTIONS

6-14 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)VLAN CONFIGURATION COMMANDSTab le 6-1 describes the commands used to configure a VLAN.Table 6-

Página 21 - UBLICATIONS

EXTREMEWARE SOFTWARE USER GUIDE6-15CONFIGURING VLANS ON THE SWITCHVLAN CONFIGURATION EXAMPLESThe following BlackDiamond switch example creates a port-

Página 22

6-16 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)The following Summit switch example creates a VLAN named sales, with the VLANid 120. The VLAN

Página 23 - ExtremeWare Overview

EXTREMEWARE SOFTWARE USER GUIDE6-17GENERIC VLAN REGISTRATION PROTOCOL• IPX address (if configured)• STPD information• Protocol information• QoS profil

Página 24

XIIRIP Configuration Example 12-17Displaying RIP Settings 12-19Resetting and Disabling RIP 12-20Configuring OSPF 12-21OSPF Configuration Example 12-25

Página 25

6-18 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)Figure 6-7: Network example using GVRPIn Figure 6-7, Switch A is a member of VLAN Red. VLAN Re

Página 26

EXTREMEWARE SOFTWARE USER GUIDE6-19GENERIC VLAN REGISTRATION PROTOCOLVLANs that are automatically created using GVRP are given names in the formatgvrp

Página 27 - IFFERENCES

6-20 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)MAC-BASED VLANSMAC-Based VLANs allow physical ports to be mapped to a VLAN based on the source

Página 28 - ULL L3 FUNCTIONALITY

EXTREMEWARE SOFTWARE USER GUIDE6-21MAC-BASED VLANSMAC-BASED VLAN GUIDELINESWhen using the MAC-to-VLAN mapping, consider the following guidelines:• A p

Página 29 - ICENSING

6-22 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)• A MAC address cannot be configured to associate with more than 1 VLAN. If this is attempted,

Página 30 - BTAINING

EXTREMEWARE SOFTWARE USER GUIDE6-23MAC-BASED VLANSenable mac-vlan mac-group any ports 10-15enable mac-vlan mac-group 10 ports 16-17enable mac-vlan mac

Página 31 - MacVLanDiscover

6-24 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)The following example shows an incremental configuration file for MAC-based VLAN information t

Página 32

EXTREMEWARE SOFTWARE USER GUIDE7-17Forwarding Database (FDB)This chapter describes the following topics:• Overview of the FDB on page 7-1• Configuring

Página 33 - Accessing the Switch

7-2 EXTREMEWARE SOFTWARE USER GUIDEFORWARDING DATABASE (FDB)FDB ENTRY TYPESThe following are four types of entries in the FDB:• Dynamic entries — Init

Página 34 - BBREVIATED SYNTAX

EXTREMEWARE SOFTWARE USER GUIDE7-3CONFIGURING FDB ENTRIESHOW FDB ENTRIES GET ADDEDEntries are added into the FDB in the following two ways:• The switc

Página 35 - NDERSTANDING

XIIIPIM-DM Configuration Example 14-10Configuration for IR1 14-11Configuration for ABR1 14-13Displaying IP Multicast Routing Settings 14-13Deleting an

Página 36 - CCESSING

7-4 EXTREMEWARE SOFTWARE USER GUIDEFORWARDING DATABASE (FDB)FDB CONFIGURATION EXAMPLESThe following example adds a permanent entry to the FDB:create f

Página 37 - Table 2- 2: Line-Editing Keys

EXTREMEWARE SOFTWARE USER GUIDE7-5DISPLAYING FDB ENTRIES• Slot number for this device is 3.• Port number for this device is 4.This example associates

Página 38

7-6 EXTREMEWARE SOFTWARE USER GUIDEFORWARDING DATABASE (FDB)

Página 39 - is +/- minutes from

EXTREMEWARE SOFTWARE USER GUIDE8-18Spanning Tree Protocol (STP)This chapter covers the following topic:• Overview of the Spanning Tree Protocol on pag

Página 40

8-2 EXTREMEWARE SOFTWARE USER GUIDESPANNING TREE PROTOCOL (STP)SPANNING TREE DOMAINSThe switch can be partitioned into multiple virtual bridges. Each

Página 41 - ANAGEMENT

EXTREMEWARE SOFTWARE USER GUIDE8-3STP CONFIGURATIONSFor more information on GVRP, refer to Chapter 6.DEFAULTSThe default device configuration contains

Página 42 - DMINISTRATOR

8-4 EXTREMEWARE SOFTWARE USER GUIDESPANNING TREE PROTOCOL (STP)Figure 8-1: Multiple Spanning Tree DomainsWhen the switches in this configuration start

Página 43 - HANGING THE DEFAULT PASSWORD

EXTREMEWARE SOFTWARE USER GUIDE8-5STP CONFIGURATIONSFigure 8-2: Tag-based STP configurationThe tag-based network in Figure 8-2 has the following confi

Página 44 - IEWING ACCOUNTS

8-6 EXTREMEWARE SOFTWARE USER GUIDESPANNING TREE PROTOCOL (STP)CONFIGURING STP ON THE SWITCHTo configure STP you must perform the following actions:•

Página 45

EXTREMEWARE SOFTWARE USER GUIDE8-7CONFIGURING STP ON THE SWITCHTab le 8-1 shows the commands used to configure STP.Table 8- 1: STP Configuration Comma

Página 46

XIVAccess Lists for ICMP 16-5Verifying Access List Configurations 16-6Access List Commands 16-6IP Access List Examples 16-11Using the Permit-Establish

Página 47 - RACEROUTE

8-8 EXTREMEWARE SOFTWARE USER GUIDESPANNING TREE PROTOCOL (STP)STP CONFIGURATION EXAMPLEThe following BlackDiamond switch example creates and enables

Página 48

EXTREMEWARE SOFTWARE USER GUIDE8-9DISABLING AND RESETTING STPThis command displays the following information:• STPD name• Bridge ID• STPD configuratio

Página 49 - Managing the Switch

8-10 EXTREMEWARE SOFTWARE USER GUIDESPANNING TREE PROTOCOL (STP)

Página 50 - 10/100 UTP M

EXTREMEWARE SOFTWARE USER GUIDE9-19Quality of Service (QoS)This chapter covers the following topics:• Overview of Policy-Based Quality of Service on p

Página 51

9-2 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)OVERVIEW OF POLICY-BASED QUALITY OF SERVICEPolicy-Based QoS allows you to protect bandwidth

Página 52

EXTREMEWARE SOFTWARE USER GUIDE9-3APPLICATIONS AND TYPES OF QOSAPPLICATIONS AND TYPES OF QOSDifferent applications have different QoS requirements. Th

Página 53

9-4 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)CRITICAL DATABASE APPLICATIONSDatabase applications, such as those associated with ERP, typ

Página 54

EXTREMEWARE SOFTWARE USER GUIDE9-5ASSIGNING QOS ATTRIBUTESASSIGNING QOS ATTRIBUTES Assigning QoS attributes is a three-step process which consists of

Página 55 - 2 (SSH2)

9-6 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)QOS PROFILESA QoS profile defines a class of service by specifying traffic behavior attribu

Página 56 - <tcp_port_number>}

EXTREMEWARE SOFTWARE USER GUIDE9-7QOS PROFILESFour or eight default QoS profiles are provided, depending on the chipset used in the switch. The defaul

Página 57 - ONTROLLING

XV17 SERVER LOAD BALANCING (SLB)Overview 17-2SLB Components 17-2Nodes 17-3Pools 17-3Virtual Servers 17-3Using Standard or Wildcard Virtual Servers 17-

Página 58

9-8 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)CONFIGURING A QOS PROFILETab le 9-4 lists the commands used to configure QoS.TRAFFIC GROUPI

Página 59

EXTREMEWARE SOFTWARE USER GUIDE9-9TRAFFIC GROUPINGS AND CREATING A QOS POLICYTraffic groupings are separated into the following categories for discuss

Página 60

9-10 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)IP-BASED TRAFFIC GROUPINGSIP-based traffic groupings are based on any combination of:• IP

Página 61 - RADIUS C

EXTREMEWARE SOFTWARE USER GUIDE9-11TRAFFIC GROUPINGS AND CREATING A QOS POLICYDYNAMIC MAC ADDRESSESDynamic MAC addresses can be assigned a QoS profile

Página 62 - ONFIGURING RADIUS CLIENT

9-12 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)VERIFYING MAC-BASED QOS SETTINGSTo verify any of the MAC-based QoS settings, use either th

Página 63 - Table 3- 2: RADIUS Commands

EXTREMEWARE SOFTWARE USER GUIDE9-13TRAFFIC GROUPINGS AND CREATING A QOS POLICYFigure 9-1: Ethernet packet encapsulationOBSERVING 802.1P INFORMATIONWhe

Página 64

9-14 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)802.1P COMMANDSTab le 9-7 shows the commands used to configure 802.1p priority. Two are ex

Página 65

EXTREMEWARE SOFTWARE USER GUIDE9-15TRAFFIC GROUPINGS AND CREATING A QOS POLICY802.1p priority information is replaced according to the hardware queue

Página 66

9-16 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)Figure 9-2: IP packet header encapsulationTab le 9-9 lists the commands used to configure

Página 67 - UTHENTICATING

EXTREMEWARE SOFTWARE USER GUIDE9-17TRAFFIC GROUPINGS AND CREATING A QOS POLICYOBSERVING DIFFSERV INFORMATIONWhen a packet arrives at the switch on an

Página 68 - TACACS+

XVISample Active-Active Configuration 17-29Using Manual Fail-Back 17-313DNS Support 17-32Advanced SLB Commands 17-32Web Cache Redirection 17-38Flow Re

Página 69

9-18 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)You can change the QoS profile assignment for all 64 code points using the following comma

Página 70

EXTREMEWARE SOFTWARE USER GUIDE9-19TRAFFIC GROUPINGS AND CREATING A QOS POLICYYou then change the 802.1p priority to DiffServ code point mapping to an

Página 71

9-20 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)3 To enable the switch to overwrite the DiffServ code point:enable dot1p replacementenable

Página 72

EXTREMEWARE SOFTWARE USER GUIDE9-21VERIFYING CONFIGURATION AND PERFORMANCEFor example, all devices on VLAN servnet require use of the QoS profile qp4.

Página 73

9-22 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)REAL-TIME PERFORMANCE MONITORINGThe real-time display scrolls through the given portlist t

Página 74

EXTREMEWARE SOFTWARE USER GUIDE9-23MODIFYING A QOS POLICYDISPLAYING QOS PROFILE INFORMATIONThe QoS monitor can also be used to verify the QoS configur

Página 75 - Alpine Switch Slots and Ports

9-24 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)INTRA-SUBNET QOSIntra-Subnet QoS™ (ISQ) is used only on Extreme switches that do not use t

Página 76

EXTREMEWARE SOFTWARE USER GUIDE9-25DYNAMIC LINK CONTEXT SYSTEMDYNAMIC LINK CONTEXT SYSTEMThe Dynamic Link Context System (DLCS) is a feature that snoo

Página 77

9-26 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)DLCS LIMITATIONSConsider the following limitations concerning data received from WINS snoo

Página 78

EXTREMEWARE SOFTWARE USER GUIDE9-27DYNAMIC LINK CONTEXT SYSTEMconfig isq-server <wins-servers-listname> delete mac <mac-address-of-next-hop&g

Página 79

XVIITask Frame 19-4Content Frame 19-4Browser Controls 19-5Status Messages 19-5Standalone Buttons 19-5Saving Changes 19-6Filtering Information 19-6Do a

Página 80

9-28 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)

Página 81

EXTREMEWARE SOFTWARE USER GUIDE10-110Extreme Standby Router ProtocolThis chapter covers the following topics:• Overview on page 10-1• ESRP Basics on p

Página 82

10-2 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLnetwork system design, ESRP can provide better resiliency than using the Spanning T

Página 83 - 2-port groups x x x x

EXTREMEWARE SOFTWARE USER GUIDE10-3DETERMINING THE ESRP MASTERIf you configure OSPF and ESRP, you must manually configure an OSPF router identifier (I

Página 84

10-4 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLIf any of the configured tracking mechanisms fail, the master ESRP switch relinquis

Página 85

EXTREMEWARE SOFTWARE USER GUIDE10-5DETERMINING THE ESRP MASTERautomatically relinquishes master status and remains in standby mode if a ping keepalive

Página 86

10-6 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLSTANDBY SWITCH BEHAVIORIf a switch is in standby mode, it exchanges ESRP packets wi

Página 87 - ISCOVERY

EXTREMEWARE SOFTWARE USER GUIDE10-7GROUPING BLOCKS OF 10/100 PORTSGROUPING BLOCKS OF 10/100 PORTSRestrictions on port groupings apply only to switches

Página 88

10-8 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLFigure 10-2: Summit24 switch ESRP port blocksFigure 10-3: Summit4 switch ESRP port

Página 89

EXTREMEWARE SOFTWARE USER GUIDE10-9ESRP OPTIONSFigure 10-5: Summit48 switch ESRP port blocksFor switches that do not use the “i” chipset, all VLANs us

Página 90

XVIIITOP Command B-8Contacting Extreme Technical Support B-8INDEXINDEX OF COMMANDS

Página 91

10-10 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLThe ESRP HA option is useful if you are using dual-homed network interface cards (

Página 92

EXTREMEWARE SOFTWARE USER GUIDE10-11ESRP OPTIONSESRP GROUPSExtremeWare supports running multiple instances of ESRP within the same VLAN or broadcast d

Página 93

10-12 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLLINKING ESRP SWITCHESWhen considering system design using ESRP, direct links betwe

Página 94

EXTREMEWARE SOFTWARE USER GUIDE10-13ESRP AND VLAN AGGREGATIONESRP AND VLAN AGGREGATIONESRP can be used to provide redundant default router protection

Página 95

10-14 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLESRP COMMANDSTable 10-1 describes the commands used to configure ESRP.Table 10-1:

Página 96

EXTREMEWARE SOFTWARE USER GUIDE10-15ESRP COMMANDSconfig vlan <name> esrp election-algorithm [ports_track_priority_mac | track_ports_priority_mac

Página 97

10-16 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLESRP EXAMPLESThis section provides examples of ESRP configurations.SINGLE VLAN USI

Página 98 - IRRORING

EXTREMEWARE SOFTWARE USER GUIDE10-17ESRP COMMANDSFigure 10-8: ESRP example using layer 2 and layer 3 redundancyThe BlackDiamond switch, acting as mast

Página 99

10-18 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLflush FDB entries associated with the uplinks to the ESRP-enabled BlackDiamond swi

Página 100 - ONFIGURING

EXTREMEWARE SOFTWARE USER GUIDE10-19ESRP COMMANDSFigure 10-9: ESRP example using layer 2 redundancyThis example builds on the previous example, but el

Página 101 - Failover linksPrimary links

EXTREMEWARE SOFTWARE USER GUIDE XIXPrefaceThis Preface provides an overview of this guide, describes guide conventions, and lists other publications t

Página 102

10-20 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLIn this example, the BlackDiamond switches are configured for ESRP such that the V

Página 103 - Virtual LANs (VLANs)

EXTREMEWARE SOFTWARE USER GUIDE11-111IP Unicast RoutingThis chapter describes the following topics:• Overview of IP Unicast Routing on page 11-2• Prox

Página 104

11-2 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGFor more information on interior gateway protocols, refer to Chapter 12. For information on exte

Página 105 - Marketing

EXTREMEWARE SOFTWARE USER GUIDE11-3OVERVIEW OF IP UNICAST ROUTINGFigure 11-1: Routing between VLANsPOPULATING THE ROUTING TABLE The switch maintains a

Página 106 - System 2

11-4 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGDYNAMIC ROUTESDynamic routes are typically learned by way of RIP or OSPF. Routers that use RIP o

Página 107 - Engineering

EXTREMEWARE SOFTWARE USER GUIDE11-5PROXY ARPYou can also configure blackhole routes — traffic to these destinations is silently dropped.IP ROUTE SHARI

Página 108 - SSIGNING A VLAN TAG

11-6 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTING• The proxy ARP table entry indicates that the system should always answer this ARP Request, reg

Página 109

EXTREMEWARE SOFTWARE USER GUIDE11-7IP MULTINETTINGTo change the relative route priority, use the following command:config iproute priority [rip | boot

Página 110

11-8 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTING• The FDB aging timer is automatically set to 3,000 seconds (50 minutes).• If you are using a UD

Página 111

EXTREMEWARE SOFTWARE USER GUIDE11-9IP MULTINETTING10 Enable IP multinetting, by using the following command:enable multinetting11 If you are using RIP

Página 112 - = All other traffic

II©2000 Extreme Networks, Inc. All rights reserved. Extreme Networks and BlackDiamond are registered trademarks of Extreme Networks, Inc. in the Unite

Página 113

XXEXTREMEWARE SOFTWARE USER GUIDEPREFACE• Internet Packet Exchange (IPX) concepts• Server Load Balancing (SLB) concepts• Simple Network Management Pro

Página 114

11-10 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGcreate vlan net35create vlan net37config net34 ipaddress 192.67.34.1config net35 ipaddress 192.

Página 115

EXTREMEWARE SOFTWARE USER GUIDE11-11VLAN AGGREGATION3 Configure a default route, using the following command:config iproute add default <gateway>

Página 116 - ONFIGURATION

11-12 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGAs a result, sub-VLANs can be quite small, but allow for growth without re-defining subnet boun

Página 117

EXTREMEWARE SOFTWARE USER GUIDE11-13VLAN AGGREGATIONVLAN AGGREGATION PROPERTIESVLAN aggregation is a very specific application, and the following prop

Página 118 - ISPLAYING

11-14 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGISOLATION OPTION FOR COMMUNICATION BETWEEN SUB-VLANSTo facilitate communication between sub-VLA

Página 119 - EGISTRATION

EXTREMEWARE SOFTWARE USER GUIDE11-15VLAN AGGREGATIONVLAN AGGREGATION EXAMPLEThe follow example illustrates how to configure VLAN aggregation. The VLAN

Página 120 - Untagged

11-16 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGCONFIGURING DHCP/BOOTP RELAYOnce IP unicast routing is configured, you can configure the switch

Página 121

EXTREMEWARE SOFTWARE USER GUIDE11-17UDP-FORWARDING• If the UDP profile includes other types of traffic, these packets have the IP destination address

Página 122

11-18 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGICMP PACKET PROCESSINGAs ICMP packets are routed or generated, you can take various actions to

Página 123 - IMITATIONS

EXTREMEWARE SOFTWARE USER GUIDE11-19IP COMMANDSIP COMMANDSTab le 11-4 describes the commands used to configure basic IP settings.create udp-profile &

Página 124

EXTREMEWARE SOFTWARE USER GUIDE XXIRELATED PUBLICATIONSRELATED PUBLICATIONSThe following is a list of related publications:• ExtremeWare Quick Referen

Página 125

11-20 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGconfig iparp add proxy <ipaddress> {<mask>} {<mac_address>} {always}Configure

Página 126

EXTREMEWARE SOFTWARE USER GUIDE11-21IP COMMANDSTab le 11-5 describes the commands used to configure the IP route table.enable bootprelay Enables the

Página 127 - Forwarding Database (FDB)

11-22 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGTab le 11-6 describes the commands used to configure IP options and the ICMP protocol.config ip

Página 128 - ORWARDING

EXTREMEWARE SOFTWARE USER GUIDE11-23IP COMMANDSconfig irdp <mininterval> <maxinterval> <lifetime> <preference>Configures the r

Página 129

11-24 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGenable icmp port-unreachables {vlan <name>} Enables the generation of ICMP port unreachab

Página 130

EXTREMEWARE SOFTWARE USER GUIDE11-25ROUTING CONFIGURATION EXAMPLEROUTING CONFIGURATION EXAMPLEFigure 11-3 illustrates a BlackDiamond switch that has t

Página 131

11-26 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGFigure 11-3: Unicast routing configuration exampleThe stations connected to the system generate

Página 132

EXTREMEWARE SOFTWARE USER GUIDE11-27DISPLAYING ROUTER SETTINGSconfig Finance protocol ipconfig Personnel protocol ipconfig Finance add port 1:*,3:*con

Página 133 - Spanning Tree Protocol (STP)

11-28 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGRESETTING AND DISABLING ROUTER SETTINGSTo return router settings to their defaults and disable

Página 134

EXTREMEWARE SOFTWARE USER GUIDE11-29RESETTING AND DISABLING ROUTER SETTINGSdisable icmp redirects {vlan <name>} Disables the generation of ICMP

Página 135 - ONFIGURATIONS

XXIIEXTREMEWARE SOFTWARE USER GUIDEPREFACE

Página 136 - Sales, Personnel, Marketing

11-30 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTING

Página 137 - Sales & Engineering

EXTREMEWARE SOFTWARE USER GUIDE12-112Interior Gateway Routing ProtocolsThis chapter describes the following topics:• Overview on page 12-2• Overview o

Página 138

12-2 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLS• Interconnections: Bridges and Routers by Radia PerlmanISBN 0-201-56332-0Publis

Página 139

EXTREMEWARE SOFTWARE USER GUIDE12-3OVER VIEW OF RIPRIP has a number of limitations that can cause problems in large networks, including the following:

Página 140

12-4 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLS• IP address of the next router• Timer that tracks the amount of time since the

Página 141 - ESETTING

EXTREMEWARE SOFTWARE USER GUIDE12-5OVERVIEW OF OSPFRIP VERSION 1 VERSUS RIP VERSION 2A new version of RIP, called RIP version 2, expands the functiona

Página 142

12-6 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSAREASOSPF allows parts of a network to be grouped together into areas. The topol

Página 143 - Quality of Service (QoS)

EXTREMEWARE SOFTWARE USER GUIDE12-7OVERVIEW OF OSPFThe backbone allows summary information to be exchanged between ABRs. Every ABR hears the area summ

Página 144

12-8 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSperform translation (as indicated in the NSSA specification). The option should

Página 145 - PPLICATIONS

EXTREMEWARE SOFTWARE USER GUIDE12-9OVERVIEW OF OSPFFigure 12-1: Virtual link using Area 1 as a transit areaVirtual links are also used to repair a dis

Página 146

EXTREMEWARE SOFTWARE USER GUIDE1-11ExtremeWare OverviewThis chapter covers the following topics:• Summary of Features on page 1-1• “i” Chipset Product

Página 147 - TTRIBUTES

12-10 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSFigure 12-2: Virtual link providing redundancyROUTE RE-DISTRIBUTIONBoth RIP and

Página 148

EXTREMEWARE SOFTWARE USER GUIDE12-11ROUTE RE-DISTRIBUTIONFigure 12-3: Route re-distributionCONFIGURING ROUTE RE-DISTRIBUTIONExporting routes from OSPF

Página 149

12-12 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSRE-DISTRIBUTING ROUTES INTO OSPFEnable or disable the exporting of RIP, static,

Página 150

EXTREMEWARE SOFTWARE USER GUIDE12-13ROUTE RE-DISTRIBUTIONIn versions of ExtremeWare prior to release 6.0, direct routes corresponding to the interface

Página 151

12-14 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSCONFIGURING RIPTable 12-2 describes the commands used to configure RIP.Table 12

Página 152 - ERMANENT MAC ADDRESSES

EXTREMEWARE SOFTWARE USER GUIDE12-15CONFIGURING RIPconfig rip txmode [none | v1only | v1comp | v2only] {vlan <name>}Changes the RIP transmission

Página 153 - LACKHOLE

12-16 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSenable rip export [static | direct | ospf | ospf-intra | ospf-inter | ospf-exte

Página 154 - ONFIGURING 802.1P PRIORITY

EXTREMEWARE SOFTWARE USER GUIDE12-17RIP CONFIGURATION EXAMPLERIP CONFIGURATION EXAMPLEFigure 12-4 illustrates a BlackDiamond switch that has three VLA

Página 155 - NFORMATION

12-18 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSFigure 12-4: RIP configuration exampleThe stations connected to the system gene

Página 156

EXTREMEWARE SOFTWARE USER GUIDE12-19DISPLAYING RIP SETTINGSThe example in Figure 12-4 is configured as follows:create vlan Financecreate vlan Personne

Página 157

1-2 EXTREMEWARE SOFTWARE USER GUIDEEXTREMEWARE OVER VIEW• Extreme Standby Router Protocol (ESRP)• Routing Information Protocol (RIP) version 1 and RIP

Página 158

12-20 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSRESETTING AND DISABLING RIPTo return RIP settings to their defaults, or to disa

Página 159

EXTREMEWARE SOFTWARE USER GUIDE12-21CONFIGURING OSPFCONFIGURING OSPFEach switch that is configured to run OSPF must have a unique router ID. It is rec

Página 160 - EPLACING

12-22 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSconfig ospf [vlan <name> | area <areaid> | virtual-link <routeri

Página 161 - point instead of repeating

EXTREMEWARE SOFTWARE USER GUIDE12-23CONFIGURING OSPFconfig ospf area <areaid> nssa [summary | nosummary] stub-default-cost <cost> {transla

Página 162 - ROUPINGS

12-24 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSconfig ospf spf-hold-time {<seconds>} Configures the minimum number of se

Página 163 - ERFORMANCE

EXTREMEWARE SOFTWARE USER GUIDE12-25OSPF CONFIGURATION EXAMPLEOSPF CONFIGURATION EXAMPLEFigure 12-5 shows an example of an autonomous system using OSP

Página 164

12-26 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSArea 0 is the backbone area. It is located at the headquarters and has the foll

Página 165 - ODIFYING

EXTREMEWARE SOFTWARE USER GUIDE12-27OSPF CONFIGURATION EXAMPLECONFIGURATION FOR ABR1The following is the configuration for the router labeled ABR1:cre

Página 166

12-28 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSDISPLAYING OSPF SETTINGSTo display settings for OSPF, use the commands listed i

Página 167

EXTREMEWARE SOFTWARE USER GUIDE12-29RESETTING AND DISABLING OSPF SETTINGSdisable ospf export direct Disables exporting of local interface (direct) rou

Página 168

EXTREMEWARE SOFTWARE USER GUIDE1-3SUMMARY OF FEATURESVIRTUAL LANS (VLANS)ExtremeWare has a VLAN feature that enables you to construct your broadcast d

Página 169

12-30 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLS

Página 170

EXTREMEWARE SOFTWARE USER GUIDE13-113Exterior Gateway Routing ProtocolsThis chapter covers the following topics:• Overview on page 13-2• BGP Attribute

Página 171

13-2 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSOVERVIEWBGP is an exterior routing protocol that was developed for use in TCP/IP

Página 172

EXTREMEWARE SOFTWARE USER GUIDE13-3BGP COMMUNITIES• Community – Identifies a group of destinations that share one or more common attributes.• Cluster_

Página 173 - ETERMINING

13-4 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSFigure 13-1: Route reflectorsROUTE CONFEDERATIONSBGP requires networks to use a

Página 174

EXTREMEWARE SOFTWARE USER GUIDE13-5BGP FEATURESFigure 13-2: Routing confederationIn this example, AS 200 has five BGP speakers. Without a confederatio

Página 175 - LGORITHMS

13-6 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSenable ipforwarding vlan ac config ospf add vlan ac area 0.0.0.0 disable bgpco

Página 176

EXTREMEWARE SOFTWARE USER GUIDE13-7BGP FEATURESTo configure Router C, use the following commands:create vlan caconfig vlan ca add port 1config vlan c

Página 177 - BD_F32T8

13-8 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLScreate bgp neighbor 192.1.1.9 as-number remote-AS-number 65001create bgp neighbo

Página 178 - SUG_4FX8

EXTREMEWARE SOFTWARE USER GUIDE13-9BGP FEATURESIGP SYNCHRONIZATIONYou can configure an AS to be a transit AS, so that it can pass traffic through from

Página 179 - SUG_48f8

1-4 EXTREMEWARE SOFTWARE USER GUIDEEXTREMEWARE OVER VIEWFor more information on Quality of Service, refer to Chapter 9.UNICAST ROUTINGThe switch can r

Página 180 - OSPF/BGP4

13-10 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSCONFIGURING BGPTable 13-1 describes the commands used to configure BGP.Table 13

Página 181

EXTREMEWARE SOFTWARE USER GUIDE13-11CONFIGURING BGPconfig bgp add dampening <halflife> <reuse> <suppress> <max_suppression> bg

Página 182

13-12 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSconfig bgp dampening <halflife> <reuse> <suppress> <max_su

Página 183 - AGGREGATION

EXTREMEWARE SOFTWARE USER GUIDE13-13CONFIGURING BGPconfig bgp neighbor [<ipaddress> | all] [route-reflector-client | no-route-reflector-client]C

Página 184 - Table 10-1: ESRP Commands

13-14 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSconfig bgp neighbor [<ipaddress> | all] weight <weight>Assigns a lo

Página 185

EXTREMEWARE SOFTWARE USER GUIDE13-15DISPLAYING BGP SETTINGSDISPLAYING BGP SETTINGSTo display settings for BGP, use the commands listed in Table 13-2.R

Página 186

13-16 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLS

Página 187 - OSPF or RIP

EXTREMEWARE SOFTWARE USER GUIDE14-114IP Multicast RoutingThis chapter covers the following topics:• Overview on page 14-2• Configuring IP Multicasting

Página 188

14-2 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGOVERVIEWIP multicast routing is a function that allows a single IP host to send a packet to a

Página 189

EXTREMEWARE SOFTWARE USER GUIDE14-3OVERVIEWPIM DENSE MODEProtocol Independent Multicast- Dense Mode (PIM-DM) is a multicast routing protocol that is s

Página 190

EXTREMEWARE SOFTWARE USER GUIDE1-5“I” CHIPSET PRODUCTSFor information on load sharing, refer to Chapter 4 and Chapter 5.“i” CHIPSET PRODUCTSSummit swi

Página 191 - IP Unicast Routing

14-4 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGIGMP is enabled by default on the switch. However, the switch can be configured to disable the

Página 192 - NTERFACES

EXTREMEWARE SOFTWARE USER GUIDE14-5CONFIGURING IP MULTICASTING ROUTING4 Enable DVMRP or PIM on the router, using one of the following commands:enable

Página 193 - OPULATING

14-6 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGconfig dvmrp vlan <name> timer <probe_interval> <neighbor_timeout_interval>C

Página 194 - ULTIPLE ROUTES

EXTREMEWARE SOFTWARE USER GUIDE14-7CONFIGURING IP MULTICASTING ROUTINGTable 14-2 describes the commands used to configure the Internet Gateway Message

Página 195 - NCAPABLE

14-8 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGTable 14-2: IGMP Configuration CommandsCommand Descriptionconfig igmp <query_interval> &

Página 196 - RIORITIES

EXTREMEWARE SOFTWARE USER GUIDE14-9CONFIGURATION EXAMPLESCONFIGURATION EXAMPLESFigure 14-1 and Figure 13-2 are used in Chapter 12 to describe the OSPF

Página 197 - ULTINETTING

14-10 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGPIM-DM CONFIGURATION EXAMPLEFigure 14-1: IP multicast routing using PIM-DM configuration exam

Página 198 - PERATION

EXTREMEWARE SOFTWARE USER GUIDE14-11CONFIGURATION EXAMPLESCONFIGURATION FOR IR1The following is the configuration for the router labeled IR1:config vl

Página 199

14-12 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGFigure 14-2: IP multicast routing using PIM-SM configuration exampleArea 010.0.1.1HQ_10_0_110

Página 200

EXTREMEWARE SOFTWARE USER GUIDE14-13DISPLAYING IP MULTICAST ROUTING SETTINGSCONFIGURATION FOR ABR1The following is the configuration for the router la

Página 201 - GGREGATION

1-6 EXTREMEWARE SOFTWARE USER GUIDEEXTREMEWARE OVER VIEWSOFTWARE LICENSINGSome Extreme Networks products have capabilities that are enabled by using a

Página 202 - 1234AB5678

14-14 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGDELETING AND RESETTING IP MULTICAST SETTINGSTo return IP multicast routing settings to their

Página 203 - ROPERTIES

EXTREMEWARE SOFTWARE USER GUIDE15-115IPX RoutingThis chapter describes the following topics:• Overview of IPX on page 15-1• IPX/RIP Routing on page 15

Página 204

15-2 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGAs you create VLANs with different IPX NetIDs the switch automatically routes between them. Both the VL

Página 205

EXTREMEWARE SOFTWARE USER GUIDE15-3OVERVIEW OF IPXTraffic within each VLAN is switched using the Ethernet MAC address. Traffic between Exec and Suppor

Página 206 - DHCP/BOOTP R

15-4 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGPOPULATING THE ROUTING TABLE The switch builds and maintains an IPX routing table. As in the case of IP

Página 207

EXTREMEWARE SOFTWARE USER GUIDE15-5IPX/RIP ROUTINGIPX/RIP is automatically enabled when a NetID is assigned to the VLAN. To remove the advertisement o

Página 208 - ROCESSING

15-6 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGCONFIGURING IPXThis section describes the commands associated with configuring IPX, IPX/RIP, and IPX/SA

Página 209 - Table 11-4: Basic IP Commands

EXTREMEWARE SOFTWARE USER GUIDE15-7IPX COMMANDSPROTOCOL-BASED VLANS FOR IPXWhen combining IPX VLANs with other VLANs on the same physical port, it may

Página 210

15-8 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGconfig ipxroute add [<dest_netid> | default] <next_hop_id> <next_hop_node_addr> <h

Página 211

EXTREMEWARE SOFTWARE USER GUIDE15-9IPX COMMANDSTable 15-4 describes the commands used to configure the IPX route table.config vlan <name> xnetid

Página 212

EXTREMEWARE SOFTWARE USER GUIDE1-7SOFTWARE LICENSINGPRODUCT SUPPORTExtremeWare version 6.0 and above supports router licensing on the Summit24 switch,

Página 213

15-10 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGTable 15-5 describes the commands used to configure IPX/SAP.config ipxrip vlan [<name> | all] up

Página 214

EXTREMEWARE SOFTWARE USER GUIDE15-11IPX CONFIGURATION EXAMPLEIPX CONFIGURATION EXAMPLEFigure 15-2 builds on the example showing the IP/RIP configurati

Página 215

15-12 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGFigure 15-2: IPX routing configuration exampleThe stations connected to the system generate a combinat

Página 216 - = NetBIOS traffic

EXTREMEWARE SOFTWARE USER GUIDE15-13DISPLAYING IPX SETTINGSThe IPX configuration shown in example in Figure 15-2 is as follows:create vlan Execcreate

Página 217

15-14 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGRESETTING AND DISABLING IPXTo return IPX settings to their defaults and disable IPX functions, use the

Página 218

EXTREMEWARE SOFTWARE USER GUIDE16-116Access PoliciesThis chapter describes the following topics:• Overview of Access Policies on page 16-1• Using IP A

Página 219

16-2 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESIP ACCESS LISTSIP access lists consist of IP access rules, and are used to perform packet filtering

Página 220

EXTREMEWARE SOFTWARE USER GUIDE16-3USING IP ACCESS LISTS• Physical source port• Precedence number (optional)HOW IP ACCESS LISTS WORKWhen a packet arri

Página 221 - Protocols

16-4 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESThe access-list example, below, performs packet filtering in the following sequence, as determined

Página 222 - ROTOCOLS

EXTREMEWARE SOFTWARE USER GUIDE16-5USING IP ACCESS LISTSMAXIMUM ENTRIESA maximum of 255 entries with an assigned precedence can be used. In addition t

Página 223 - VER VIEW

IIIContentsPREFACEIntroduction xixTerminology xxConventions xxRelated Publications xxi1EXTREMEWARE OVERVIEWSummary of Features 1-1Virtual LANs (VLANs)

Página 224

1-8 EXTREMEWARE SOFTWARE USER GUIDEEXTREMEWARE OVER VIEWOBTAINING A SECURITY LICENSETo obtain information on enabling features that require export res

Página 225

16-6 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESVERIFYING ACCESS LIST CONFIGURATIONSTo verify access list settings you can view the access list con

Página 226

EXTREMEWARE SOFTWARE USER GUIDE16-7USING IP ACCESS LISTSTable 16-1: Access List Configuration CommandsCommand Descriptioncreate access-list <name&g

Página 227

16-8 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIEScreate access-list <name> tcp destination [<dst_ipaddress>/<dst_mask> | any] ip-p

Página 228

EXTREMEWARE SOFTWARE USER GUIDE16-9USING IP ACCESS LISTScreate access-list <name> udp destination [<dst_ipaddress>/<dst_mask> | any]

Página 229 - Area 2 Area 1 Area 0

16-10 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIEScreate access-list icmp destination [<dest_ipaddress>/<mask> | any] source [<src_ip

Página 230 - Area 1 Area 0 Area 3

EXTREMEWARE SOFTWARE USER GUIDE16-11USING IP ACCESS LISTSIP ACCESS LIST EXAMPLESThis section presents two IP access list examples:• Using the permit-e

Página 231 - ASBR ASBR

16-12 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESThe following command creates the access-list:create access-list denyall ip destination any source

Página 232

EXTREMEWARE SOFTWARE USER GUIDE16-13USING IP ACCESS LISTSFigure 16-3: Access list allows TCP trafficStep 3 - Permit-Established Access List. When a T

Página 233 - ISTRIBUTING

16-14 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESThe exact command line entry for this example is as follows:create access-list telnet-allow tcp de

Página 234

EXTREMEWARE SOFTWARE USER GUIDE16-15USING ROUTING ACCESS POLICIESFigure 16-6: ICMP packets are filtered outUSING ROUTING ACCESS POLICIESTo use routing

Página 235

EXTREMEWARE SOFTWARE USER GUIDE1-9SOFTWARE FACTORY DEFAULTSFor default settings of individual ExtremeWare features, refer to individual chapters in th

Página 236 - Triggered update

16-16 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESCREATING AN ACCESS PROFILEThe first thing to do when using routing access policies is to create an

Página 237

EXTREMEWARE SOFTWARE USER GUIDE16-17USING ROUTING ACCESS POLICIESTo configure the access profile mode, use the following command:config access-profile

Página 238

16-18 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESPERMIT AND DENY ENTRIESIf you have configured the access profile mode to be none, you must specify

Página 239

EXTREMEWARE SOFTWARE USER GUIDE16-19USING ROUTING ACCESS POLICIESROUTING ACCESS POLICIES FOR RIPIf you are using the RIP protocol, the switch can be c

Página 240

16-20 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESFigure 16-7: RIP access policy exampleAssuming the backbone VLAN interconnects all the routers in

Página 241

EXTREMEWARE SOFTWARE USER GUIDE16-21USING ROUTING ACCESS POLICIESIn addition, if the administrator wants to restrict any user belonging to the VLAN En

Página 242

16-22 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESfor the switch as a whole. To configure a direct filter policy, use the following command:config o

Página 243

EXTREMEWARE SOFTWARE USER GUIDE16-23USING ROUTING ACCESS POLICIESTo configure the switch labeled Internet, the commands would be as follows:create acc

Página 244

16-24 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESTo configure the switch labeled Engsvrs, use the following commands:create access-profile nointern

Página 245

EXTREMEWARE SOFTWARE USER GUIDE16-25MAKING CHANGES TO A ROUTING ACCESS POLICYTo configure the switch labeled Engsvrs, the commands would be as follows

Página 246

1-10 EXTREMEWARE SOFTWARE USER GUIDEEXTREMEWARE OVER VIEW

Página 247

16-26 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESon the ingress or egress side, depending on the change. For soft resets to be applied on the ingre

Página 248

EXTREMEWARE SOFTWARE USER GUIDE16-27ROUTING ACCESS POLICY COMMANDSTable 16-3: Routing Access Policy Configuration CommandsCommand Descriptionconfig ac

Página 249

16-28 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESconfig access-profile <access_profile> mode [permit | deny | none]Configures the access prof

Página 250

EXTREMEWARE SOFTWARE USER GUIDE16-29USING ROUTE MAPSUSING ROUTE MAPSRoute maps are a mechanism that can be used to conditionally control the redistrib

Página 251 - Exterior Gateway Routing

16-30 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESTo create a route map, do the following:1 Create a route map.2 Add entries to the route map.3 Add

Página 252

EXTREMEWARE SOFTWARE USER GUIDE16-31USING ROUTE MAPSconfig route-map <route-map> <sequence number> add set [as-path <as_num> | commu

Página 253 - OMMUNITIES

16-32 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESROUTE MAP OPERATIONThe entries in the route map are processed in the ascending order of the sequen

Página 254 - OUTE CONFEDERATION EXAMPLE

EXTREMEWARE SOFTWARE USER GUIDE16-33USING ROUTE MAPSFigure 16-9: Route mapsThe following points apply to this example:• RTA is a member of in AS 1111

Página 255

16-34 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESconfig bgp-out add 20 permitconfig bgp neighbor 10.0.0.2 route-map-filter out bgp-outconfig bgp ne

Página 256

EXTREMEWARE SOFTWARE USER GUIDE16-35USING ROUTE MAPSROUTE MAP COMMANDSTable 16-6 describes route map commands.Table 16-6: Route Map CommandsCommand De

Página 257

EXTREMEWARE SOFTWARE USER GUIDE2-12Accessing the SwitchThis chapter covers the following topics:• Understanding the Command Syntax on page 2-1• Line-E

Página 258

16-36 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESconfig route-map <route-map> <sequence number> delete match [nlri-list <access_prof

Página 259

EXTREMEWARE SOFTWARE USER GUIDE17-117Server Load Balancing (SLB)This chapter describes the following topics:• Overview on page 17-2• SLB Components on

Página 260

17-2 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)OVERVIEWServer Load Balancing (SLB) is a feature of the switch that divides many client

Página 261

EXTREMEWARE SOFTWARE USER GUIDE17-3SLB COMPONENTSNODESA node is an individual service on a physical server that consists of an IP addresses and a port

Página 262

17-4 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)Once you know which virtual server options are useful in your network, you can:• Define

Página 263

EXTREMEWARE SOFTWARE USER GUIDE17-5FORWARDING MODESFORWARDING MODESThe switch supports the following SLB forwarding modes:• Tran sp arent• Tran sl at

Página 264

17-6 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)To configure transparent mode, use the following command:create slb vip <vipname>

Página 265

EXTREMEWARE SOFTWARE USER GUIDE17-7FORWARDING MODES• The service is configured to use the appropriate address and port, as specified in the switch con

Página 266

17-8 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)The following commands enable SLB, configure the server VLAN to act as the server side,

Página 267 - IP Multicast Routing

EXTREMEWARE SOFTWARE USER GUIDE17-9FORWARDING MODESFigure 17-3: Translational modeIn Figure 17-3, the switch is configured to respond to requests for

Página 268 - ULTICAST

2-2 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCH3 The value part of the command specifies how you want the parameter to be set. Values include

Página 269 - PARSE MODE (PIM-SM)

17-10 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)config client add port 1-4enable ipforwardingThe following commands create a round-rob

Página 270 - ULTICASTING

EXTREMEWARE SOFTWARE USER GUIDE17-11FORWARDING MODESTo configure port translation mode, use the following command:create slb vip <vipname> pool

Página 271

17-12 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)The servers are configured as follows:• All servers have the same MAC address.• All se

Página 272

EXTREMEWARE SOFTWARE USER GUIDE17-13BALANCING METHODSprotocol is enabled, the subnet containing the VIPs is propagated through the network.BALANCING M

Página 273 - Protocol (IGMP)

17-14 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)where the number of connections that each machine receives over time is proportionate

Página 274

EXTREMEWARE SOFTWARE USER GUIDE17-15BASIC SLB COMMANDSThe switch will distribute traffic in round-robin fashion among the pools active nodes with the

Página 275

17-16 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)create slb pool <poolname> {slb-method [round-robin | ratio | priority | least-c

Página 276 - PIM-DM C

EXTREMEWARE SOFTWARE USER GUIDE17-17BASIC SLB COMMANDSdisable slb vip <vipname> {close-connections-now} Disables a VIP group. When disabled, no

Página 277

17-18 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)ADVANCED SLB APPLICATION EXAMPLEThis example builds upon the Introductory SLB Applicat

Página 278

EXTREMEWARE SOFTWARE USER GUIDE17-19ADVANCED SLB APPLICATION EXAMPLEFigure 17-5: Advanced SLB configurationThe commands used to configure are describe

Página 279

EXTREMEWARE SOFTWARE USER GUIDE2-3UNDERSTANDING THE COMMAND SYNTAXOnce you have created the VLAN with a unique name, you can then eliminate the keywor

Página 280

17-20 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)To create is the virtual IP VLAN, use the following commands: create vlan sitesconfig

Página 281 - IPX Routing

EXTREMEWARE SOFTWARE USER GUIDE17-21ADVANCED SLB APPLICATION EXAMPLEcreate slb pool site2webconfig slb site2web add 192.168.200.5:80config slb site2we

Página 282 - 192.207.36.0

17-22 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)enable slb vip ftpc service-checkconfig slb vip ftpc service-check ftp user test passw

Página 283 - NCAPSULATION

EXTREMEWARE SOFTWARE USER GUIDE17-23HEALTH CHECKINGPING-CHECKPing-check is Layer 3 based pinging of the physical node. The default ping frequency is o

Página 284 - TATIC ROUTES

17-24 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)SERVICE-CHECKService-check is Layer 7 based application-dependent checking defined on

Página 285 - DVERTISEMENTS

EXTREMEWARE SOFTWARE USER GUIDE17-25HEALTH CHECKINGFor SMTP, service-check identifies the identity of the switch by providing the specified DNS domain

Página 286

17-26 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)PERSISTENCEUsing persistence, you can ensure that traffic flows do not span multiple s

Página 287

EXTREMEWARE SOFTWARE USER GUIDE17-27USING HIGH AVAILABILITY SYSTEM FEATURESYou can only activate sticky persistence on wildcard virtual servers.To con

Página 288

17-28 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)The switches in a redundant SLB configuration should have identical SLB configurations

Página 289

EXTREMEWARE SOFTWARE USER GUIDE17-29USING HIGH AVAILABILITY SYSTEM FEATURESTo assign a VIP to a unit, use the following command:config slb vip <vip

Página 290

2-4 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCHSUMMIT SWITCH NUMERICAL RANGESCommands that require you to enter one or more port numbers on a

Página 291

17-30 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)create vlan insidecreate vlan serverconfig vlan inside ipaddress 1.10.0.2 /16config vl

Página 292

EXTREMEWARE SOFTWARE USER GUIDE17-31USING HIGH AVAILABILITY SYSTEM FEATUREScreate slb pool testpoolconfig slb pool testpool add 1.206.1.1:80config slb

Página 293

17-32 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)3DNS SUPPORTWhen you enable SLB, the switch reports health status to 3DNS using the iQ

Página 294

EXTREMEWARE SOFTWARE USER GUIDE17-33ADVANCED SLB COMMANDSconfig slb failover unit [1 | 2] remote-ip <ipaddress> local-ip <ipaddress>:<L

Página 295 - Access Policies

17-34 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)config slb global [ping-check | tcp-port-check | service-check] frequency <seconds&

Página 296

EXTREMEWARE SOFTWARE USER GUIDE17-35ADVANCED SLB COMMANDSconfig slb global telnet userid <userid> password {encrypted} {<password>}Configu

Página 297

17-36 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)config slb vip <vipname> unit {1 | 2} Configures a unit number of a VIP name for

Página 298 - ESTABLISHED

EXTREMEWARE SOFTWARE USER GUIDE17-37ADVANCED SLB COMMANDSenable slb node <ipaddress> ping-check Enables L3 pinging to the node address. Ping-che

Página 299

17-38 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)WEB CACHE REDIRECTIONWeb cache redirection uses the TCP or UDP port number to redirect

Página 300

EXTREMEWARE SOFTWARE USER GUIDE17-39WEB CACHE REDIRECTIONFLOW REDIRECTION COMMANDSTo configure flow redirection, use the commands listed in Table 17-5

Página 301

EXTREMEWARE SOFTWARE USER GUIDE2-5LINE-EDITING KEYSLINE-EDITING KEYSTab le 2-2 describes the line-editing keys available using the CLI.vertical bar |

Página 302

17-40 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)Figure 17-7: Flow-redirection exampleThe following commands are used to configure the

Página 303

EXTREMEWARE SOFTWARE USER GUIDE18-118Status Monitoring and StatisticsThis chapter describes the following topics:• Status Monitoring on page 18-1• Slo

Página 304

18-2 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICSFor more information about show commands for a specific ExtremeWare feature, refer

Página 305 - 10.10.20.1

EXTREMEWARE SOFTWARE USER GUIDE18-3SLOT DIAGNOSTICSSLOT DIAGNOSTICSThe BlackDiamond switch provides a facility for running normal or extended diagnost

Página 306 - NET20 VLANNET10 VLAN

18-4 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICS•extended — Takes the switch fabric and ports offline, and performs extensive ASIC

Página 307

EXTREMEWARE SOFTWARE USER GUIDE18-5PORT ERRORS• Received Broadcast (RX Bcast) — The total number of frames received by the port that are addressed to

Página 308 - XAMPLE 2: FILTER ICMP PACKETS

18-6 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICSThe following port receive error information is collected by the switch:• Receive

Página 309

EXTREMEWARE SOFTWARE USER GUIDE18-7SETTING THE SYSTEM RECOVERY LEVELSETTING THE SYSTEM RECOVERY LEVELYou can configure the system to automatically reb

Página 310

18-8 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICSBy default, log entries that are assigned a critical or warning level remain in th

Página 311 - EQUENCE NUMBERING

EXTREMEWARE SOFTWARE USER GUIDE18-9LOGGINGLOCAL LOGGINGThe switch maintains 1,000 messages in its internal log. You can display a snapshot of the log

Página 312

2-6 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCHCOMMAND HISTORYExtremeWare “remembers” the last 49 commands you entered. You can display a list

Página 313

18-10 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICS• Configure remote logging by using the following command:config syslog {add} <

Página 314 - Engsvrs Sales

EXTREMEWARE SOFTWARE USER GUIDE18-11LOGGINGLOGGING COMMANDSThe commands described in Table 18-5 allow you to configure logging options, reset logging

Página 315

18-12 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICSRMONUsing the Remote Monitoring (RMON) capabilities of the switch allows network

Página 316

EXTREMEWARE SOFTWARE USER GUIDE18-13RMON• Management workstation — Communicates with the RMON probe and collects the statistics from it. The workstati

Página 317

18-14 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICSAlarms inform you of a network performance problem and can trigger automated acti

Página 318

EXTREMEWARE SOFTWARE USER GUIDE18-15RMONEVENT ACTIONSThe actions that you can define for each alarm are shown in Tab le 18 -6.To be notified of events

Página 319

18-16 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICS

Página 320

EXTREMEWARE SOFTWARE USER GUIDE19-119Using ExtremeWare VistaThis chapter covers the following topics:• Enabling and Disabling Web Access on page 19-2•

Página 321

19-2 EXTREMEWARE SOFTWARE USER GUIDEUSING EXTREMEWARE VISTAENABLING AND DISABLING WEB ACCESSBy default, Web access is enabled on the switch. Use of Ex

Página 322

EXTREMEWARE SOFTWARE USER GUIDE19-3ACCESSING EXTREMEWARE VISTA• Check for newer versions of stored pages. Every visit to the page should be selected a

Página 323

EXTREMEWARE SOFTWARE USER GUIDE2-7COMMON COMMANDSconfig slot <slot> module [f32t | f32f | f48t | g4x | g6x | g8x | g12x]Configures a slot for a

Página 324

19-4 EXTREMEWARE SOFTWARE USER GUIDEUSING EXTREMEWARE VISTATo correct this situation, log out of the switch and log in again.NAVIGATING EXTREMEWARE VI

Página 325

EXTREMEWARE SOFTWARE USER GUIDE19-5NAVIGATING EXTREMEWARE VISTABROWSER CONTROLSBrowser controls include drop-down list boxes, check boxes, and multi-s

Página 326 - OUTE MAP EXAMPLE

19-6 EXTREMEWARE SOFTWARE USER GUIDEUSING EXTREMEWARE VISTASAVING CHANGESThere are two ways to save your changes to non-volatile storage using Extreme

Página 327

EXTREMEWARE SOFTWARE USER GUIDE19-7DO A GET WHEN CONFIGURING A VLANDO A GET WHEN CONFIGURING A VLANWhen configuring a VLAN using ExtremeWare Vista, pr

Página 328

19-8 EXTREMEWARE SOFTWARE USER GUIDEUSING EXTREMEWARE VISTA

Página 329

EXTREMEWARE SOFTWARE USER GUIDE20-120Software Upgrade and Boot OptionsThis chapter describes the following topics:• Downloading a New Image on page 20

Página 330

20-2 EXTREMEWARE SOFTWARE USER GUIDESOFTWARE UPGRADE AND BOOT OPTIONS• Download the new image to the switch using the commanddownload image [<ipadd

Página 331 - Server Load Balancing (SLB)

EXTREMEWARE SOFTWARE USER GUIDE20-3SAVING CONFIGURATION CHANGESSAVING CONFIGURATION CHANGESThe configuration is the customized set of parameters that

Página 332 - OMPONENTS

20-4 EXTREMEWARE SOFTWARE USER GUIDESOFTWARE UPGRADE AND BOOT OPTIONSUSING TFTP TO UPLOAD THE CONFIGURATIONYou can upload the current configuration to

Página 333

EXTREMEWARE SOFTWARE USER GUIDE20-5USING TFTP TO DOWNLOAD THE CONFIGURATIONUSING TFTP TO DOWNLOAD THE CONFIGURATIONYou can download ASCII files that c

Página 334 - ALANCING

IVSecurity Features Under License Control 1-8Software Factory Defaults 1-82ACCESSING THE SWITCHUnderstanding the Command Syntax 2-1Syntax Helper 2-2Co

Página 335

2-8 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCHdelete vlan <name> Deletes a VLAN.disable bootp vlan [<name> | all] Disables BOOTP

Página 336

20-6 EXTREMEWARE SOFTWARE USER GUIDESOFTWARE UPGRADE AND BOOT OPTIONSTo download an incremental configuration, use the following command:download conf

Página 337

EXTREMEWARE SOFTWARE USER GUIDE20-7SYNCHRONIZING MSMSSYNCHRONIZING MSMS On the BlackDiamond switch, you can take the master MSM configurations and ima

Página 338 - RANSLATIONAL

20-8 EXTREMEWARE SOFTWARE USER GUIDESOFTWARE UPGRADE AND BOOT OPTIONSAs soon as you see the BootROM-> prompt, release the spacebar. You can see a

Página 339

EXTREMEWARE SOFTWARE USER GUIDE20-9BOOT OPTION COMMANDSdownload configuration <hostname | ipaddress> <filename> {incremental}Downloads a c

Página 340 - RANSLATION

20-10 EXTREMEWARE SOFTWARE USER GUIDESOFTWARE UPGRADE AND BOOT OPTIONSuse configuration [primary | secondary] Configures the switch to use a particula

Página 341 - Clients Servers

EXTREMEWARE SOFTWARE USER GUIDEA-1ASupported StandardsThe following is a list of software standards supported by ExtremeWare.Standards and ProtocolsRF

Página 342 - DVERTISEMENT

A-2 EXTREMEWARE SOFTWARE USER GUIDESUPPORTED STANDARDSManagement and SecurityRFC 1157 SNMP v1/v2cRFC 1213 MIB IIRFC 1354 IP forwarding table MIBRFC 14

Página 343

EXTREMEWARE SOFTWARE USER GUIDEB-1BTroubleshootingIf you encounter problems when using the switch, this appendix may be helpful. If you have a problem

Página 344 - ONNECTIONS

B-2 EXTREMEWARE SOFTWARE USER GUIDETROUBLESHOOTING• Both ends of the Gigabit link are set to the same autonegotiation state.Both sides if the Gigabit

Página 345

EXTREMEWARE SOFTWARE USER GUIDEB-3USING THE COMMAND-LINE INTERFACEIf this does not work, try using a different power source (different power strip/out

Página 346

EXTREMEWARE SOFTWARE USER GUIDE2-9CONFIGURING MANAGEMENT ACCESSCONFIGURING MANAGEMENT ACCESSExtremeWare supports the following two levels of managemen

Página 347

B-4 EXTREMEWARE SOFTWARE USER GUIDETROUBLESHOOTINGThe SNMP Network Manager or Telnet workstation can no longer access the device:Check that Telnet acc

Página 348 - PPLICATION

EXTREMEWARE SOFTWARE USER GUIDEB-5USING THE COMMAND-LINE INTERFACEIn the case where no one knows a password for an administrator level user, contact y

Página 349 - Server pools

B-6 EXTREMEWARE SOFTWARE USER GUIDETROUBLESHOOTINGEnsure that you are using multi-mode fiber (MMF) when using a 1000BASE-SX GBIC, and single mode fibe

Página 350

EXTREMEWARE SOFTWARE USER GUIDEB-7USING THE COMMAND-LINE INTERFACE802.1Q links do not work correctly:Remember that VLAN names are only locally signifi

Página 351

B-8 EXTREMEWARE SOFTWARE USER GUIDETROUBLESHOOTINGDEBUG TRACINGExtremeWare includes a debug-tracing facility for the switch. The show debug-tracing co

Página 352

IndexNumerics3DNS 17-32802.1p configuration commands (table) 9-14Aaccess levels 2-9access listsBlackDiamond switch maximum entries 16-5configuration c

Página 353

II - INDEXport configuration 4-2port-mirroring, virtual port 4-11slot configuration 4-1verifying load sharing 4-11blackhole entries, FDB 7-2boot optio

Página 354

INDEX - IIIhost attach 10-9linking switches 10-12masterbehavior 10-5definition 10-2determining 10-3electing 10-6election algorithms 10-5port blocks 10

Página 355 - ERVICE-CHECK COMMANDS

IV - INDEXresetting 14-14settings, displaying 14-13show commands (table) 14-13IP multinettingdescription 11-7example 11-9primary VLAN interface 11-7se

Página 356 - ERSISTENCE

INDEX - Vverifying the configuration on Summit switch 5-10local logging 18-9log display 18-9loggingand Telnet 18-9commands (table) 18-11configuration

Página 357 - VAILABILITY

2-10 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCHUSER ACCOUNTA user-level account has viewing access to all manageable parameters, with the exc

Página 358 - SLB switch

VI - INDEXport-mirroringBlackDiamond switch configuration commands (table) 4-12BlackDiamond switch example 4-12description on BlackDiamond switch 4-11

Página 359

INDEX - VIIconfiguration commands (table) 16-35creating 16-30description 16-2, 16-29example 16-32goto entries 16-31match entries 16-31match operation

Página 360

VIII - INDEXusing 3-10SNTPconfiguration commands (table) 3-25configuring 3-22Daylight Savings Time 3-22description 3-21example 3-25Greenwich Mean Time

Página 361 - SING MANUAL FAIL-BACK

INDEX - IXVirtual LANs. See VLANsvirtual link, OSPF 12-8virtual port on Summit switch 5-11VLAN aggregationcommands (table) 11-14description 11-11limit

Página 362

X - INDEX

Página 363

Index of CommandsCclear counters 18-11clear dlcs 9-26clear fdb 7-3, 9-11clear igmp snooping 14-14clear iparp 11-19, 11-28clear ipfdb 11-19, 11-2

Página 364

ii - Index of Commands16-28config esrp port-mode 10-14config fdb agingtime 7-3config flow redirection add next-hop 17-39config flow-redirection del

Página 365

Index of Commands - iiiconfig rip vlan import-filter 16-19, 16-29config rip vlan trusted-gateway 16-19, 16-29config route-map add 16-30, 16-36confi

Página 366

iv - Index of Commandscreate access-list udp destination 16-9create access-profile 16-29create account 2-7, 2-12create bgp neighbor 13-14create fd

Página 367

Index of Commands - vdisable radius-accounting 3-16disable red ports 9-8disable rip 12-20disable rip aggregation 12-20disable rip export 11-4, 12

Página 368 - EDIRECTION

EXTREMEWARE SOFTWARE USER GUIDE2-11CONFIGURING MANAGEMENT ACCESSDEFAULT ACCOUNTSBy default, the switch is configured with two accounts, as shown in Ta

Página 369

vi - Index of Commandsenable license 2-8enable license security 3-7enable log display 18-9, 18-12enable loopback-mode vlan 11-21enable mac-vlan 6

Página 370 - Cache VLAN

Index of Commands - viishow dlcs 9-27show dns-client 2-13show dot1p 9-14show dvmrp 14-13show edp 4-13, 5-12show esrp 10-5, 10-13, 10-16, 10-20sh

Página 371 - ONITORING

viii - Index of Commandsunconfig vlan xnetid 15-14upload configuration 2-13, 20-4, 20-9upload configuration cancel 20-4, 20-9use configuration 20-

Página 372 - Table 18-1 describes

2-12 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCH5 Re-enter the new password at the prompt.If you forget your password while logged out of the

Página 373 - IAGNOSTICS

EXTREMEWARE SOFTWARE USER GUIDE2-13DOMAIN NAME SERVICE CLIENT SERVICESDOMAIN NAME SERVICE CLIENT SERVICESThe Domain Name Service (DNS) client in Extre

Página 374 - TATISTICS

2-14 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCHPINGThe ping command enables you to send Internet Control Message Protocol (ICMP) echo message

Página 375

EXTREMEWARE SOFTWARE USER GUIDE2-15CHECKING BASIC CONNECTIVITYTRACEROUTEThe traceroute command enables you to trace the routed path between the switch

Página 376

2-16 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCH

Página 377

EXTREMEWARE SOFTWARE USER GUIDE3-13Managing the SwitchThis chapter covers the following topics:• Overview on page 3-1• Using the Console Interface on

Página 378

VUsing a BOOTP Server 3-4Manually Configuring the IP Settings 3-4Disconnecting a Telnet Session 3-6Controlling Telnet Access 3-6Using Secure Shell 2 (

Página 379 - EAL-TIME DISPLAY

3-2 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCH— ExtremeWare Vista Web access using a standard Web browser— SNMP access using ExtremeWare Enter

Página 380

EXTREMEWARE SOFTWARE USER GUIDE3-3USING TELNETYou can configure the IP address, subnet mask, and default router for the VLAN mgmt, using the following

Página 381 - Table 18-5: Logging Commands

3-4 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHUSING A BOOTP SERVERIf you are using IP and you have a Bootstrap Protocol (BOOTP) server set up

Página 382

EXTREMEWARE SOFTWARE USER GUIDE3-5USING TELNETmust be assigned an IP address and subnet mask. IP addresses are always assigned to a VLAN. The switch c

Página 383

3-6 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCH6 Configure the default route for the switch using the following command:config iproute add defa

Página 384

EXTREMEWARE SOFTWARE USER GUIDE3-7USING SECURE SHELL 2 (SSH2)To display the status of Telnet, use the following command:show managementYou can choose

Página 385 - Table 18-6: Event Actions

3-8 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHTo enable SSH2, use the following command:enable ssh2 {access-profile [<access_profile> |

Página 386

EXTREMEWARE SOFTWARE USER GUIDE3-9USING EXTREMEWARE VISTAFor more information on assigning an IP address, refer to the section, “Configuring Switch IP

Página 387 - Using ExtremeWare Vista

3-10 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHUSING SNMPAny Network Manager running the Simple Network Management Protocol (SNMP) can manage

Página 388

EXTREMEWARE SOFTWARE USER GUIDE3-11USING SNMPTo configure SNMP read access to use an access profile, use the command:config snmp access-profile readon

Página 389

VILoad-Sharing Algorithms 4-8Configuring BlackDiamond and Alpine Switch Load Sharing 4-9Load-Sharing Example 4-11Verifying the Load-Sharing Configurat

Página 390 - AVIGATING

3-12 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHconfig snmp add trapreceiver <ipaddress> community <string>Adds the IP address of a

Página 391 - ROWSER CONTROLS

EXTREMEWARE SOFTWARE USER GUIDE3-13AUTHENTICATING USERSDISPLAYING SNMP SETTINGSTo display the SNMP settings configured on the switch, use the followin

Página 392 - ILTERING

3-14 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHThe privileges assigned to the user (admin versus non-admin) at the RADIUS server take preceden

Página 393

EXTREMEWARE SOFTWARE USER GUIDE3-15AUTHENTICATING USERSTable 3- 2: RADIUS CommandsCommand Descriptionconfig radius [primary | secondary] server [<i

Página 394

3-16 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHRADIUS RFC 2138 ATTRIBUTESThe RADIUS RFC 2138 optional attributes supported are as follows:• Us

Página 395 - Software Upgrade and Boot

EXTREMEWARE SOFTWARE USER GUIDE3-17AUTHENTICATING USERSfiles. The client configuration file (ClientCfg.txt) defines the authorized source machine, sou

Página 396 - EBOOTING

3-18 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHcompiled format for Solaris™ or Linux™ operating systems, as well as in source code format. For

Página 397

EXTREMEWARE SOFTWARE USER GUIDE3-19AUTHENTICATING USERSuser Password = ""Filter-Id = "unlim"admin Password = "", Service

Página 398

3-20 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHCONFIGURING TACACS+Terminal Access Controller Access Control System Plus (TACACS+) is a mechani

Página 399

EXTREMEWARE SOFTWARE USER GUIDE3-21USING THE SIMPLE NETWORK TIME PROTOCOLUSING THE SIMPLE NETWORK TIME PROTOCOLExtremeWare supports the client portion

Página 400

VIIAssigning a VLAN Tag 6-6Mixing Port-Based and Tagged VLANs 6-9Protocol-Based VLANs 6-9Predefined Protocol Filters 6-10Defining Protocol Filters 6-1

Página 401 - YNCHRONIZING

3-22 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHCONFIGURING AND USING SNTPTo use SNTP, follow these steps:1 Identify the host(s) that are confi

Página 402

EXTREMEWARE SOFTWARE USER GUIDE3-23USING THE SIMPLE NETWORK TIME PROTOCOLThis command provides configuration and statistics associated with SNTP and i

Página 403

3-24 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCH-12:00 -720 IDLW - International Date Line West+1:00 +60 CET - Central European FWT - French Wi

Página 404

EXTREMEWARE SOFTWARE USER GUIDE3-25USING THE SIMPLE NETWORK TIME PROTOCOLSNTP CONFIGURATION COMMANDSTab le 3-5 describes SNTP configuration commands.S

Página 405 - Supported Standards

3-26 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCH

Página 406 - TANDARDS

EXTREMEWARE SOFTWARE USER GUIDE4-14Configuring BlackDiamond and Alpine Switch Slots and PortsThis chapter covers the following topics: • Configuring a

Página 407 - Troubleshooting

4-2 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTSYou can configure the BlackDiamond or Alpine switch with

Página 408 - ROUBLESHOOTING

EXTREMEWARE SOFTWARE USER GUIDE4-3BLACKDIAMOND AND ALPINE SWITCH PORT CONFIGURATIONFor example, if a G4X I/O module (having a total of four ports) is

Página 409 - NTERFACE

4-4 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTS10BASE-T and 100BASE-TX ports can connect to either 10BAS

Página 410

EXTREMEWARE SOFTWARE USER GUIDE4-5BLACKDIAMOND AND ALPINE SWITCH PORT CONFIGURATIONconfig ports <portlist> auto off {speed [10 | 100 | 1000]} du

Página 411

VIII8SPANNING TREE PROTOCOL (STP)Overview of the Spanning Tree Protocol 8-1Spanning Tree Domains 8-2STPD Status for GVRP-Added Ports 8-2Defaults 8-3ST

Página 412

4-6 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTSenable sharing <port> grouping <portlist> {po

Página 413

EXTREMEWARE SOFTWARE USER GUIDE4-7JUMBO FRAMESJUMBO FRAMESJumbo frames are Ethernet frames that are larger than 1523 bytes, including four bytes used

Página 414

4-8 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTSFor example, VLANs see the load-sharing group as a single

Página 415 - Numerics

EXTREMEWARE SOFTWARE USER GUIDE4-9LOAD SHARING ON THE BLACKDIAMOND AND ALPINE SWITCHThe address-based and round-robin load-sharing algorithms are supp

Página 416

4-10 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTSBlackDiamond switch modules that use the “i” chipset do

Página 417

EXTREMEWARE SOFTWARE USER GUIDE4-11BLACKDIAMOND AND ALPINE SWITCH PORT-MIRRORINGLOAD-SHARING EXAMPLEThe following example defines a load-sharing group

Página 418

4-12 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTSUp to eight mirroring filters and one monitor port can b

Página 419

EXTREMEWARE SOFTWARE USER GUIDE4-13BLACKDIAMOND AND ALPINE SWITCH PORT-MIRRORINGEXTREME DISCOVERY PROTOCOLThe Extreme Discovery Protocol (EDP) is used

Página 420

4-14 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTS

Página 421

EXTREMEWARE SOFTWARE USER GUIDE5-15Configuring Summit Switch PortsThis chapter covers the following topics:• Enabling and Disabling Summit Switch Port

Página 422 - (table) 3-23

IXConfiguring DiffServ 9-15Observing DiffServ Information 9-17Changing DiffServ Code point assignments in the Q0S Profile 9-17Replacing DiffServ Code

Página 423

5-2 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSFor example, to disable ports 3, 5, and 12 through 15 on the Summit switch, enter th

Página 424

EXTREMEWARE SOFTWARE USER GUIDE5-3SUMMIT SWITCH PORT COMMANDSTURNING OFF AUTONEGOTIATION FOR A GIGABIT ETHERNET PORTIn certain interoperability situat

Página 425 - Index of Commands

5-4 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSdisable learning ports <portlist> Disables MAC address learning on one or more

Página 426

EXTREMEWARE SOFTWARE USER GUIDE5-5JUMBO FRAMESJUMBO FRAMESJumbo frames are Ethernet frames that are larger than 1523 bytes, including four bytes used

Página 427 - Index of Commands - iii

5-6 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSThe jumbo_frame_mtu range is 1523 to 9216. The value describes the maximum size “on

Página 428

EXTREMEWARE SOFTWARE USER GUIDE5-7LOAD SHARING ON THE SUMMIT SWITCHLOAD SHARING ALGORITHMSLoad sharing algorithms allow you to select the distribution

Página 429 - Index of Commands - v

5-8 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSOn switches that do not have the “i” chipset, the following additional rules apply:•

Página 430

EXTREMEWARE SOFTWARE USER GUIDE5-9LOAD SHARING ON THE SUMMIT SWITCHOn all other Summit switch models, the following rules apply:• A group can contain

Página 431 - replacement ports 9-17

5-10 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSTo define a load-sharing group, you assign a group of ports to a single, logical po

Página 432

EXTREMEWARE SOFTWARE USER GUIDE5-11SUMMIT SWITCH PORT-MIRRORINGThe traffic filter can be defined based on one of the following criteria:• Physical por

Comentários a estes Manuais

Sem comentários