Extreme Networks, Inc.3585 Monroe StreetSanta Clara, California 95051(888) 257-3000http://www.extremenetworks.comExtremeWare Software User GuideSoftwa
XESRP Host Attach 10-9ESRP Domains 10-10ESRP Groups 10-11Linking ESRP Switches 10-12Configuring ESRP and Multinetting 10-12ESRP and Spanning Tree 10-1
5-12 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSSUMMIT SWITCH PORT-MIRRORING EXAMPLEThe following example selects port 3 as the mir
EXTREMEWARE SOFTWARE USER GUIDE5-13SMART REDUNDANCYSMART REDUNDANCYSmart redundancy defines the behavior of switches equipped with redundancy Gigabit
5-14 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSIf smart redundancy is disabled, both the primary and redundant ports are dual-home
EXTREMEWARE SOFTWARE USER GUIDE6-16Virtual LANs (VLANs)This chapter covers the following topics:• Overview of Virtual LANs on page 6-1• Types of VLANs
6-2 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)BENEFITSImplementing VLANs on your networks has the following advantages:• VLANs help to contro
EXTREMEWARE SOFTWARE USER GUIDE6-3TYPES OF VLANS Figure 6-1: Example of a port-based VLAN on the Summit7i switchFor the members of the different IP VL
6-4 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)Figure 6-2: Single port-based VLAN spanning two switches To create multiple VLANs that span two
EXTREMEWARE SOFTWARE USER GUIDE6-5TYPES OF VLANSFigure 6-3: Two port-based VLANs spanning two BlackDiamond switchesVLAN Accounting spans System 1 and
6-6 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)TAGGED VLANSTa g g i n g is a process that inserts a marker (called a tag) into the Ethernet f
EXTREMEWARE SOFTWARE USER GUIDE6-7TYPES OF VLANSFigure 6-4 illustrates the physical view of a network that uses tagged and untagged traffic.Figure 6-4
XIConfiguring DHCP/BOOTP Relay 11-16Verifying the DHCP/BOOTP Relay Configuration 11-16UDP-Forwarding 11-16Configuring UDP-Forwarding 11-17UPD-Forwardi
6-8 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)Figure 6-5 shows a logical diagram of the same network.Figure 6-5: Logical diagram of tagged an
EXTREMEWARE SOFTWARE USER GUIDE6-9TYPES OF VLANSMIXING PORT-BASED AND TAGGED VLANSYou can configure the switch using a combination of port-based and t
6-10 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)Figure 6-6: Protocol-based VLANs PREDEFINED PROTOCOL FILTERSThe following protocol filters are
EXTREMEWARE SOFTWARE USER GUIDE6-11TYPES OF VLANSDEFINING PROTOCOL FILTERSIf necessary, you can define a customized protocol filter based on EtherType
6-12 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)DELETING A PROTOCOL FILTERIf a protocol filter is deleted from a VLAN, the VLAN is assigned a
EXTREMEWARE SOFTWARE USER GUIDE6-13CONFIGURING VLANS ON THE SWITCHRENAMING A VLANTo rename an existing VLAN, use the following command:config vlan <
6-14 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)VLAN CONFIGURATION COMMANDSTab le 6-1 describes the commands used to configure a VLAN.Table 6-
EXTREMEWARE SOFTWARE USER GUIDE6-15CONFIGURING VLANS ON THE SWITCHVLAN CONFIGURATION EXAMPLESThe following BlackDiamond switch example creates a port-
6-16 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)The following Summit switch example creates a VLAN named sales, with the VLANid 120. The VLAN
EXTREMEWARE SOFTWARE USER GUIDE6-17GENERIC VLAN REGISTRATION PROTOCOL• IPX address (if configured)• STPD information• Protocol information• QoS profil
XIIRIP Configuration Example 12-17Displaying RIP Settings 12-19Resetting and Disabling RIP 12-20Configuring OSPF 12-21OSPF Configuration Example 12-25
6-18 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)Figure 6-7: Network example using GVRPIn Figure 6-7, Switch A is a member of VLAN Red. VLAN Re
EXTREMEWARE SOFTWARE USER GUIDE6-19GENERIC VLAN REGISTRATION PROTOCOLVLANs that are automatically created using GVRP are given names in the formatgvrp
6-20 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)MAC-BASED VLANSMAC-Based VLANs allow physical ports to be mapped to a VLAN based on the source
EXTREMEWARE SOFTWARE USER GUIDE6-21MAC-BASED VLANSMAC-BASED VLAN GUIDELINESWhen using the MAC-to-VLAN mapping, consider the following guidelines:• A p
6-22 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)• A MAC address cannot be configured to associate with more than 1 VLAN. If this is attempted,
EXTREMEWARE SOFTWARE USER GUIDE6-23MAC-BASED VLANSenable mac-vlan mac-group any ports 10-15enable mac-vlan mac-group 10 ports 16-17enable mac-vlan mac
6-24 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)The following example shows an incremental configuration file for MAC-based VLAN information t
EXTREMEWARE SOFTWARE USER GUIDE7-17Forwarding Database (FDB)This chapter describes the following topics:• Overview of the FDB on page 7-1• Configuring
7-2 EXTREMEWARE SOFTWARE USER GUIDEFORWARDING DATABASE (FDB)FDB ENTRY TYPESThe following are four types of entries in the FDB:• Dynamic entries — Init
EXTREMEWARE SOFTWARE USER GUIDE7-3CONFIGURING FDB ENTRIESHOW FDB ENTRIES GET ADDEDEntries are added into the FDB in the following two ways:• The switc
XIIIPIM-DM Configuration Example 14-10Configuration for IR1 14-11Configuration for ABR1 14-13Displaying IP Multicast Routing Settings 14-13Deleting an
7-4 EXTREMEWARE SOFTWARE USER GUIDEFORWARDING DATABASE (FDB)FDB CONFIGURATION EXAMPLESThe following example adds a permanent entry to the FDB:create f
EXTREMEWARE SOFTWARE USER GUIDE7-5DISPLAYING FDB ENTRIES• Slot number for this device is 3.• Port number for this device is 4.This example associates
7-6 EXTREMEWARE SOFTWARE USER GUIDEFORWARDING DATABASE (FDB)
EXTREMEWARE SOFTWARE USER GUIDE8-18Spanning Tree Protocol (STP)This chapter covers the following topic:• Overview of the Spanning Tree Protocol on pag
8-2 EXTREMEWARE SOFTWARE USER GUIDESPANNING TREE PROTOCOL (STP)SPANNING TREE DOMAINSThe switch can be partitioned into multiple virtual bridges. Each
EXTREMEWARE SOFTWARE USER GUIDE8-3STP CONFIGURATIONSFor more information on GVRP, refer to Chapter 6.DEFAULTSThe default device configuration contains
8-4 EXTREMEWARE SOFTWARE USER GUIDESPANNING TREE PROTOCOL (STP)Figure 8-1: Multiple Spanning Tree DomainsWhen the switches in this configuration start
EXTREMEWARE SOFTWARE USER GUIDE8-5STP CONFIGURATIONSFigure 8-2: Tag-based STP configurationThe tag-based network in Figure 8-2 has the following confi
8-6 EXTREMEWARE SOFTWARE USER GUIDESPANNING TREE PROTOCOL (STP)CONFIGURING STP ON THE SWITCHTo configure STP you must perform the following actions:•
EXTREMEWARE SOFTWARE USER GUIDE8-7CONFIGURING STP ON THE SWITCHTab le 8-1 shows the commands used to configure STP.Table 8- 1: STP Configuration Comma
XIVAccess Lists for ICMP 16-5Verifying Access List Configurations 16-6Access List Commands 16-6IP Access List Examples 16-11Using the Permit-Establish
8-8 EXTREMEWARE SOFTWARE USER GUIDESPANNING TREE PROTOCOL (STP)STP CONFIGURATION EXAMPLEThe following BlackDiamond switch example creates and enables
EXTREMEWARE SOFTWARE USER GUIDE8-9DISABLING AND RESETTING STPThis command displays the following information:• STPD name• Bridge ID• STPD configuratio
8-10 EXTREMEWARE SOFTWARE USER GUIDESPANNING TREE PROTOCOL (STP)
EXTREMEWARE SOFTWARE USER GUIDE9-19Quality of Service (QoS)This chapter covers the following topics:• Overview of Policy-Based Quality of Service on p
9-2 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)OVERVIEW OF POLICY-BASED QUALITY OF SERVICEPolicy-Based QoS allows you to protect bandwidth
EXTREMEWARE SOFTWARE USER GUIDE9-3APPLICATIONS AND TYPES OF QOSAPPLICATIONS AND TYPES OF QOSDifferent applications have different QoS requirements. Th
9-4 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)CRITICAL DATABASE APPLICATIONSDatabase applications, such as those associated with ERP, typ
EXTREMEWARE SOFTWARE USER GUIDE9-5ASSIGNING QOS ATTRIBUTESASSIGNING QOS ATTRIBUTES Assigning QoS attributes is a three-step process which consists of
9-6 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)QOS PROFILESA QoS profile defines a class of service by specifying traffic behavior attribu
EXTREMEWARE SOFTWARE USER GUIDE9-7QOS PROFILESFour or eight default QoS profiles are provided, depending on the chipset used in the switch. The defaul
XV17 SERVER LOAD BALANCING (SLB)Overview 17-2SLB Components 17-2Nodes 17-3Pools 17-3Virtual Servers 17-3Using Standard or Wildcard Virtual Servers 17-
9-8 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)CONFIGURING A QOS PROFILETab le 9-4 lists the commands used to configure QoS.TRAFFIC GROUPI
EXTREMEWARE SOFTWARE USER GUIDE9-9TRAFFIC GROUPINGS AND CREATING A QOS POLICYTraffic groupings are separated into the following categories for discuss
9-10 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)IP-BASED TRAFFIC GROUPINGSIP-based traffic groupings are based on any combination of:• IP
EXTREMEWARE SOFTWARE USER GUIDE9-11TRAFFIC GROUPINGS AND CREATING A QOS POLICYDYNAMIC MAC ADDRESSESDynamic MAC addresses can be assigned a QoS profile
9-12 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)VERIFYING MAC-BASED QOS SETTINGSTo verify any of the MAC-based QoS settings, use either th
EXTREMEWARE SOFTWARE USER GUIDE9-13TRAFFIC GROUPINGS AND CREATING A QOS POLICYFigure 9-1: Ethernet packet encapsulationOBSERVING 802.1P INFORMATIONWhe
9-14 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)802.1P COMMANDSTab le 9-7 shows the commands used to configure 802.1p priority. Two are ex
EXTREMEWARE SOFTWARE USER GUIDE9-15TRAFFIC GROUPINGS AND CREATING A QOS POLICY802.1p priority information is replaced according to the hardware queue
9-16 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)Figure 9-2: IP packet header encapsulationTab le 9-9 lists the commands used to configure
EXTREMEWARE SOFTWARE USER GUIDE9-17TRAFFIC GROUPINGS AND CREATING A QOS POLICYOBSERVING DIFFSERV INFORMATIONWhen a packet arrives at the switch on an
XVISample Active-Active Configuration 17-29Using Manual Fail-Back 17-313DNS Support 17-32Advanced SLB Commands 17-32Web Cache Redirection 17-38Flow Re
9-18 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)You can change the QoS profile assignment for all 64 code points using the following comma
EXTREMEWARE SOFTWARE USER GUIDE9-19TRAFFIC GROUPINGS AND CREATING A QOS POLICYYou then change the 802.1p priority to DiffServ code point mapping to an
9-20 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)3 To enable the switch to overwrite the DiffServ code point:enable dot1p replacementenable
EXTREMEWARE SOFTWARE USER GUIDE9-21VERIFYING CONFIGURATION AND PERFORMANCEFor example, all devices on VLAN servnet require use of the QoS profile qp4.
9-22 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)REAL-TIME PERFORMANCE MONITORINGThe real-time display scrolls through the given portlist t
EXTREMEWARE SOFTWARE USER GUIDE9-23MODIFYING A QOS POLICYDISPLAYING QOS PROFILE INFORMATIONThe QoS monitor can also be used to verify the QoS configur
9-24 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)INTRA-SUBNET QOSIntra-Subnet QoS™ (ISQ) is used only on Extreme switches that do not use t
EXTREMEWARE SOFTWARE USER GUIDE9-25DYNAMIC LINK CONTEXT SYSTEMDYNAMIC LINK CONTEXT SYSTEMThe Dynamic Link Context System (DLCS) is a feature that snoo
9-26 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)DLCS LIMITATIONSConsider the following limitations concerning data received from WINS snoo
EXTREMEWARE SOFTWARE USER GUIDE9-27DYNAMIC LINK CONTEXT SYSTEMconfig isq-server <wins-servers-listname> delete mac <mac-address-of-next-hop&g
XVIITask Frame 19-4Content Frame 19-4Browser Controls 19-5Status Messages 19-5Standalone Buttons 19-5Saving Changes 19-6Filtering Information 19-6Do a
9-28 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)
EXTREMEWARE SOFTWARE USER GUIDE10-110Extreme Standby Router ProtocolThis chapter covers the following topics:• Overview on page 10-1• ESRP Basics on p
10-2 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLnetwork system design, ESRP can provide better resiliency than using the Spanning T
EXTREMEWARE SOFTWARE USER GUIDE10-3DETERMINING THE ESRP MASTERIf you configure OSPF and ESRP, you must manually configure an OSPF router identifier (I
10-4 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLIf any of the configured tracking mechanisms fail, the master ESRP switch relinquis
EXTREMEWARE SOFTWARE USER GUIDE10-5DETERMINING THE ESRP MASTERautomatically relinquishes master status and remains in standby mode if a ping keepalive
10-6 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLSTANDBY SWITCH BEHAVIORIf a switch is in standby mode, it exchanges ESRP packets wi
EXTREMEWARE SOFTWARE USER GUIDE10-7GROUPING BLOCKS OF 10/100 PORTSGROUPING BLOCKS OF 10/100 PORTSRestrictions on port groupings apply only to switches
10-8 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLFigure 10-2: Summit24 switch ESRP port blocksFigure 10-3: Summit4 switch ESRP port
EXTREMEWARE SOFTWARE USER GUIDE10-9ESRP OPTIONSFigure 10-5: Summit48 switch ESRP port blocksFor switches that do not use the “i” chipset, all VLANs us
XVIIITOP Command B-8Contacting Extreme Technical Support B-8INDEXINDEX OF COMMANDS
10-10 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLThe ESRP HA option is useful if you are using dual-homed network interface cards (
EXTREMEWARE SOFTWARE USER GUIDE10-11ESRP OPTIONSESRP GROUPSExtremeWare supports running multiple instances of ESRP within the same VLAN or broadcast d
10-12 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLLINKING ESRP SWITCHESWhen considering system design using ESRP, direct links betwe
EXTREMEWARE SOFTWARE USER GUIDE10-13ESRP AND VLAN AGGREGATIONESRP AND VLAN AGGREGATIONESRP can be used to provide redundant default router protection
10-14 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLESRP COMMANDSTable 10-1 describes the commands used to configure ESRP.Table 10-1:
EXTREMEWARE SOFTWARE USER GUIDE10-15ESRP COMMANDSconfig vlan <name> esrp election-algorithm [ports_track_priority_mac | track_ports_priority_mac
10-16 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLESRP EXAMPLESThis section provides examples of ESRP configurations.SINGLE VLAN USI
EXTREMEWARE SOFTWARE USER GUIDE10-17ESRP COMMANDSFigure 10-8: ESRP example using layer 2 and layer 3 redundancyThe BlackDiamond switch, acting as mast
10-18 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLflush FDB entries associated with the uplinks to the ESRP-enabled BlackDiamond swi
EXTREMEWARE SOFTWARE USER GUIDE10-19ESRP COMMANDSFigure 10-9: ESRP example using layer 2 redundancyThis example builds on the previous example, but el
EXTREMEWARE SOFTWARE USER GUIDE XIXPrefaceThis Preface provides an overview of this guide, describes guide conventions, and lists other publications t
10-20 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLIn this example, the BlackDiamond switches are configured for ESRP such that the V
EXTREMEWARE SOFTWARE USER GUIDE11-111IP Unicast RoutingThis chapter describes the following topics:• Overview of IP Unicast Routing on page 11-2• Prox
11-2 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGFor more information on interior gateway protocols, refer to Chapter 12. For information on exte
EXTREMEWARE SOFTWARE USER GUIDE11-3OVERVIEW OF IP UNICAST ROUTINGFigure 11-1: Routing between VLANsPOPULATING THE ROUTING TABLE The switch maintains a
11-4 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGDYNAMIC ROUTESDynamic routes are typically learned by way of RIP or OSPF. Routers that use RIP o
EXTREMEWARE SOFTWARE USER GUIDE11-5PROXY ARPYou can also configure blackhole routes — traffic to these destinations is silently dropped.IP ROUTE SHARI
11-6 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTING• The proxy ARP table entry indicates that the system should always answer this ARP Request, reg
EXTREMEWARE SOFTWARE USER GUIDE11-7IP MULTINETTINGTo change the relative route priority, use the following command:config iproute priority [rip | boot
11-8 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTING• The FDB aging timer is automatically set to 3,000 seconds (50 minutes).• If you are using a UD
EXTREMEWARE SOFTWARE USER GUIDE11-9IP MULTINETTING10 Enable IP multinetting, by using the following command:enable multinetting11 If you are using RIP
II©2000 Extreme Networks, Inc. All rights reserved. Extreme Networks and BlackDiamond are registered trademarks of Extreme Networks, Inc. in the Unite
XXEXTREMEWARE SOFTWARE USER GUIDEPREFACE• Internet Packet Exchange (IPX) concepts• Server Load Balancing (SLB) concepts• Simple Network Management Pro
11-10 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGcreate vlan net35create vlan net37config net34 ipaddress 192.67.34.1config net35 ipaddress 192.
EXTREMEWARE SOFTWARE USER GUIDE11-11VLAN AGGREGATION3 Configure a default route, using the following command:config iproute add default <gateway>
11-12 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGAs a result, sub-VLANs can be quite small, but allow for growth without re-defining subnet boun
EXTREMEWARE SOFTWARE USER GUIDE11-13VLAN AGGREGATIONVLAN AGGREGATION PROPERTIESVLAN aggregation is a very specific application, and the following prop
11-14 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGISOLATION OPTION FOR COMMUNICATION BETWEEN SUB-VLANSTo facilitate communication between sub-VLA
EXTREMEWARE SOFTWARE USER GUIDE11-15VLAN AGGREGATIONVLAN AGGREGATION EXAMPLEThe follow example illustrates how to configure VLAN aggregation. The VLAN
11-16 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGCONFIGURING DHCP/BOOTP RELAYOnce IP unicast routing is configured, you can configure the switch
EXTREMEWARE SOFTWARE USER GUIDE11-17UDP-FORWARDING• If the UDP profile includes other types of traffic, these packets have the IP destination address
11-18 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGICMP PACKET PROCESSINGAs ICMP packets are routed or generated, you can take various actions to
EXTREMEWARE SOFTWARE USER GUIDE11-19IP COMMANDSIP COMMANDSTab le 11-4 describes the commands used to configure basic IP settings.create udp-profile &
EXTREMEWARE SOFTWARE USER GUIDE XXIRELATED PUBLICATIONSRELATED PUBLICATIONSThe following is a list of related publications:• ExtremeWare Quick Referen
11-20 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGconfig iparp add proxy <ipaddress> {<mask>} {<mac_address>} {always}Configure
EXTREMEWARE SOFTWARE USER GUIDE11-21IP COMMANDSTab le 11-5 describes the commands used to configure the IP route table.enable bootprelay Enables the
11-22 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGTab le 11-6 describes the commands used to configure IP options and the ICMP protocol.config ip
EXTREMEWARE SOFTWARE USER GUIDE11-23IP COMMANDSconfig irdp <mininterval> <maxinterval> <lifetime> <preference>Configures the r
11-24 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGenable icmp port-unreachables {vlan <name>} Enables the generation of ICMP port unreachab
EXTREMEWARE SOFTWARE USER GUIDE11-25ROUTING CONFIGURATION EXAMPLEROUTING CONFIGURATION EXAMPLEFigure 11-3 illustrates a BlackDiamond switch that has t
11-26 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGFigure 11-3: Unicast routing configuration exampleThe stations connected to the system generate
EXTREMEWARE SOFTWARE USER GUIDE11-27DISPLAYING ROUTER SETTINGSconfig Finance protocol ipconfig Personnel protocol ipconfig Finance add port 1:*,3:*con
11-28 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGRESETTING AND DISABLING ROUTER SETTINGSTo return router settings to their defaults and disable
EXTREMEWARE SOFTWARE USER GUIDE11-29RESETTING AND DISABLING ROUTER SETTINGSdisable icmp redirects {vlan <name>} Disables the generation of ICMP
XXIIEXTREMEWARE SOFTWARE USER GUIDEPREFACE
11-30 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTING
EXTREMEWARE SOFTWARE USER GUIDE12-112Interior Gateway Routing ProtocolsThis chapter describes the following topics:• Overview on page 12-2• Overview o
12-2 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLS• Interconnections: Bridges and Routers by Radia PerlmanISBN 0-201-56332-0Publis
EXTREMEWARE SOFTWARE USER GUIDE12-3OVER VIEW OF RIPRIP has a number of limitations that can cause problems in large networks, including the following:
12-4 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLS• IP address of the next router• Timer that tracks the amount of time since the
EXTREMEWARE SOFTWARE USER GUIDE12-5OVERVIEW OF OSPFRIP VERSION 1 VERSUS RIP VERSION 2A new version of RIP, called RIP version 2, expands the functiona
12-6 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSAREASOSPF allows parts of a network to be grouped together into areas. The topol
EXTREMEWARE SOFTWARE USER GUIDE12-7OVERVIEW OF OSPFThe backbone allows summary information to be exchanged between ABRs. Every ABR hears the area summ
12-8 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSperform translation (as indicated in the NSSA specification). The option should
EXTREMEWARE SOFTWARE USER GUIDE12-9OVERVIEW OF OSPFFigure 12-1: Virtual link using Area 1 as a transit areaVirtual links are also used to repair a dis
EXTREMEWARE SOFTWARE USER GUIDE1-11ExtremeWare OverviewThis chapter covers the following topics:• Summary of Features on page 1-1• “i” Chipset Product
12-10 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSFigure 12-2: Virtual link providing redundancyROUTE RE-DISTRIBUTIONBoth RIP and
EXTREMEWARE SOFTWARE USER GUIDE12-11ROUTE RE-DISTRIBUTIONFigure 12-3: Route re-distributionCONFIGURING ROUTE RE-DISTRIBUTIONExporting routes from OSPF
12-12 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSRE-DISTRIBUTING ROUTES INTO OSPFEnable or disable the exporting of RIP, static,
EXTREMEWARE SOFTWARE USER GUIDE12-13ROUTE RE-DISTRIBUTIONIn versions of ExtremeWare prior to release 6.0, direct routes corresponding to the interface
12-14 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSCONFIGURING RIPTable 12-2 describes the commands used to configure RIP.Table 12
EXTREMEWARE SOFTWARE USER GUIDE12-15CONFIGURING RIPconfig rip txmode [none | v1only | v1comp | v2only] {vlan <name>}Changes the RIP transmission
12-16 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSenable rip export [static | direct | ospf | ospf-intra | ospf-inter | ospf-exte
EXTREMEWARE SOFTWARE USER GUIDE12-17RIP CONFIGURATION EXAMPLERIP CONFIGURATION EXAMPLEFigure 12-4 illustrates a BlackDiamond switch that has three VLA
12-18 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSFigure 12-4: RIP configuration exampleThe stations connected to the system gene
EXTREMEWARE SOFTWARE USER GUIDE12-19DISPLAYING RIP SETTINGSThe example in Figure 12-4 is configured as follows:create vlan Financecreate vlan Personne
1-2 EXTREMEWARE SOFTWARE USER GUIDEEXTREMEWARE OVER VIEW• Extreme Standby Router Protocol (ESRP)• Routing Information Protocol (RIP) version 1 and RIP
12-20 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSRESETTING AND DISABLING RIPTo return RIP settings to their defaults, or to disa
EXTREMEWARE SOFTWARE USER GUIDE12-21CONFIGURING OSPFCONFIGURING OSPFEach switch that is configured to run OSPF must have a unique router ID. It is rec
12-22 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSconfig ospf [vlan <name> | area <areaid> | virtual-link <routeri
EXTREMEWARE SOFTWARE USER GUIDE12-23CONFIGURING OSPFconfig ospf area <areaid> nssa [summary | nosummary] stub-default-cost <cost> {transla
12-24 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSconfig ospf spf-hold-time {<seconds>} Configures the minimum number of se
EXTREMEWARE SOFTWARE USER GUIDE12-25OSPF CONFIGURATION EXAMPLEOSPF CONFIGURATION EXAMPLEFigure 12-5 shows an example of an autonomous system using OSP
12-26 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSArea 0 is the backbone area. It is located at the headquarters and has the foll
EXTREMEWARE SOFTWARE USER GUIDE12-27OSPF CONFIGURATION EXAMPLECONFIGURATION FOR ABR1The following is the configuration for the router labeled ABR1:cre
12-28 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSDISPLAYING OSPF SETTINGSTo display settings for OSPF, use the commands listed i
EXTREMEWARE SOFTWARE USER GUIDE12-29RESETTING AND DISABLING OSPF SETTINGSdisable ospf export direct Disables exporting of local interface (direct) rou
EXTREMEWARE SOFTWARE USER GUIDE1-3SUMMARY OF FEATURESVIRTUAL LANS (VLANS)ExtremeWare has a VLAN feature that enables you to construct your broadcast d
12-30 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLS
EXTREMEWARE SOFTWARE USER GUIDE13-113Exterior Gateway Routing ProtocolsThis chapter covers the following topics:• Overview on page 13-2• BGP Attribute
13-2 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSOVERVIEWBGP is an exterior routing protocol that was developed for use in TCP/IP
EXTREMEWARE SOFTWARE USER GUIDE13-3BGP COMMUNITIES• Community – Identifies a group of destinations that share one or more common attributes.• Cluster_
13-4 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSFigure 13-1: Route reflectorsROUTE CONFEDERATIONSBGP requires networks to use a
EXTREMEWARE SOFTWARE USER GUIDE13-5BGP FEATURESFigure 13-2: Routing confederationIn this example, AS 200 has five BGP speakers. Without a confederatio
13-6 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSenable ipforwarding vlan ac config ospf add vlan ac area 0.0.0.0 disable bgpco
EXTREMEWARE SOFTWARE USER GUIDE13-7BGP FEATURESTo configure Router C, use the following commands:create vlan caconfig vlan ca add port 1config vlan c
13-8 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLScreate bgp neighbor 192.1.1.9 as-number remote-AS-number 65001create bgp neighbo
EXTREMEWARE SOFTWARE USER GUIDE13-9BGP FEATURESIGP SYNCHRONIZATIONYou can configure an AS to be a transit AS, so that it can pass traffic through from
1-4 EXTREMEWARE SOFTWARE USER GUIDEEXTREMEWARE OVER VIEWFor more information on Quality of Service, refer to Chapter 9.UNICAST ROUTINGThe switch can r
13-10 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSCONFIGURING BGPTable 13-1 describes the commands used to configure BGP.Table 13
EXTREMEWARE SOFTWARE USER GUIDE13-11CONFIGURING BGPconfig bgp add dampening <halflife> <reuse> <suppress> <max_suppression> bg
13-12 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSconfig bgp dampening <halflife> <reuse> <suppress> <max_su
EXTREMEWARE SOFTWARE USER GUIDE13-13CONFIGURING BGPconfig bgp neighbor [<ipaddress> | all] [route-reflector-client | no-route-reflector-client]C
13-14 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSconfig bgp neighbor [<ipaddress> | all] weight <weight>Assigns a lo
EXTREMEWARE SOFTWARE USER GUIDE13-15DISPLAYING BGP SETTINGSDISPLAYING BGP SETTINGSTo display settings for BGP, use the commands listed in Table 13-2.R
13-16 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLS
EXTREMEWARE SOFTWARE USER GUIDE14-114IP Multicast RoutingThis chapter covers the following topics:• Overview on page 14-2• Configuring IP Multicasting
14-2 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGOVERVIEWIP multicast routing is a function that allows a single IP host to send a packet to a
EXTREMEWARE SOFTWARE USER GUIDE14-3OVERVIEWPIM DENSE MODEProtocol Independent Multicast- Dense Mode (PIM-DM) is a multicast routing protocol that is s
EXTREMEWARE SOFTWARE USER GUIDE1-5“I” CHIPSET PRODUCTSFor information on load sharing, refer to Chapter 4 and Chapter 5.“i” CHIPSET PRODUCTSSummit swi
14-4 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGIGMP is enabled by default on the switch. However, the switch can be configured to disable the
EXTREMEWARE SOFTWARE USER GUIDE14-5CONFIGURING IP MULTICASTING ROUTING4 Enable DVMRP or PIM on the router, using one of the following commands:enable
14-6 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGconfig dvmrp vlan <name> timer <probe_interval> <neighbor_timeout_interval>C
EXTREMEWARE SOFTWARE USER GUIDE14-7CONFIGURING IP MULTICASTING ROUTINGTable 14-2 describes the commands used to configure the Internet Gateway Message
14-8 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGTable 14-2: IGMP Configuration CommandsCommand Descriptionconfig igmp <query_interval> &
EXTREMEWARE SOFTWARE USER GUIDE14-9CONFIGURATION EXAMPLESCONFIGURATION EXAMPLESFigure 14-1 and Figure 13-2 are used in Chapter 12 to describe the OSPF
14-10 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGPIM-DM CONFIGURATION EXAMPLEFigure 14-1: IP multicast routing using PIM-DM configuration exam
EXTREMEWARE SOFTWARE USER GUIDE14-11CONFIGURATION EXAMPLESCONFIGURATION FOR IR1The following is the configuration for the router labeled IR1:config vl
14-12 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGFigure 14-2: IP multicast routing using PIM-SM configuration exampleArea 010.0.1.1HQ_10_0_110
EXTREMEWARE SOFTWARE USER GUIDE14-13DISPLAYING IP MULTICAST ROUTING SETTINGSCONFIGURATION FOR ABR1The following is the configuration for the router la
1-6 EXTREMEWARE SOFTWARE USER GUIDEEXTREMEWARE OVER VIEWSOFTWARE LICENSINGSome Extreme Networks products have capabilities that are enabled by using a
14-14 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGDELETING AND RESETTING IP MULTICAST SETTINGSTo return IP multicast routing settings to their
EXTREMEWARE SOFTWARE USER GUIDE15-115IPX RoutingThis chapter describes the following topics:• Overview of IPX on page 15-1• IPX/RIP Routing on page 15
15-2 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGAs you create VLANs with different IPX NetIDs the switch automatically routes between them. Both the VL
EXTREMEWARE SOFTWARE USER GUIDE15-3OVERVIEW OF IPXTraffic within each VLAN is switched using the Ethernet MAC address. Traffic between Exec and Suppor
15-4 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGPOPULATING THE ROUTING TABLE The switch builds and maintains an IPX routing table. As in the case of IP
EXTREMEWARE SOFTWARE USER GUIDE15-5IPX/RIP ROUTINGIPX/RIP is automatically enabled when a NetID is assigned to the VLAN. To remove the advertisement o
15-6 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGCONFIGURING IPXThis section describes the commands associated with configuring IPX, IPX/RIP, and IPX/SA
EXTREMEWARE SOFTWARE USER GUIDE15-7IPX COMMANDSPROTOCOL-BASED VLANS FOR IPXWhen combining IPX VLANs with other VLANs on the same physical port, it may
15-8 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGconfig ipxroute add [<dest_netid> | default] <next_hop_id> <next_hop_node_addr> <h
EXTREMEWARE SOFTWARE USER GUIDE15-9IPX COMMANDSTable 15-4 describes the commands used to configure the IPX route table.config vlan <name> xnetid
EXTREMEWARE SOFTWARE USER GUIDE1-7SOFTWARE LICENSINGPRODUCT SUPPORTExtremeWare version 6.0 and above supports router licensing on the Summit24 switch,
15-10 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGTable 15-5 describes the commands used to configure IPX/SAP.config ipxrip vlan [<name> | all] up
EXTREMEWARE SOFTWARE USER GUIDE15-11IPX CONFIGURATION EXAMPLEIPX CONFIGURATION EXAMPLEFigure 15-2 builds on the example showing the IP/RIP configurati
15-12 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGFigure 15-2: IPX routing configuration exampleThe stations connected to the system generate a combinat
EXTREMEWARE SOFTWARE USER GUIDE15-13DISPLAYING IPX SETTINGSThe IPX configuration shown in example in Figure 15-2 is as follows:create vlan Execcreate
15-14 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGRESETTING AND DISABLING IPXTo return IPX settings to their defaults and disable IPX functions, use the
EXTREMEWARE SOFTWARE USER GUIDE16-116Access PoliciesThis chapter describes the following topics:• Overview of Access Policies on page 16-1• Using IP A
16-2 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESIP ACCESS LISTSIP access lists consist of IP access rules, and are used to perform packet filtering
EXTREMEWARE SOFTWARE USER GUIDE16-3USING IP ACCESS LISTS• Physical source port• Precedence number (optional)HOW IP ACCESS LISTS WORKWhen a packet arri
16-4 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESThe access-list example, below, performs packet filtering in the following sequence, as determined
EXTREMEWARE SOFTWARE USER GUIDE16-5USING IP ACCESS LISTSMAXIMUM ENTRIESA maximum of 255 entries with an assigned precedence can be used. In addition t
IIIContentsPREFACEIntroduction xixTerminology xxConventions xxRelated Publications xxi1EXTREMEWARE OVERVIEWSummary of Features 1-1Virtual LANs (VLANs)
1-8 EXTREMEWARE SOFTWARE USER GUIDEEXTREMEWARE OVER VIEWOBTAINING A SECURITY LICENSETo obtain information on enabling features that require export res
16-6 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESVERIFYING ACCESS LIST CONFIGURATIONSTo verify access list settings you can view the access list con
EXTREMEWARE SOFTWARE USER GUIDE16-7USING IP ACCESS LISTSTable 16-1: Access List Configuration CommandsCommand Descriptioncreate access-list <name&g
16-8 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIEScreate access-list <name> tcp destination [<dst_ipaddress>/<dst_mask> | any] ip-p
EXTREMEWARE SOFTWARE USER GUIDE16-9USING IP ACCESS LISTScreate access-list <name> udp destination [<dst_ipaddress>/<dst_mask> | any]
16-10 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIEScreate access-list icmp destination [<dest_ipaddress>/<mask> | any] source [<src_ip
EXTREMEWARE SOFTWARE USER GUIDE16-11USING IP ACCESS LISTSIP ACCESS LIST EXAMPLESThis section presents two IP access list examples:• Using the permit-e
16-12 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESThe following command creates the access-list:create access-list denyall ip destination any source
EXTREMEWARE SOFTWARE USER GUIDE16-13USING IP ACCESS LISTSFigure 16-3: Access list allows TCP trafficStep 3 - Permit-Established Access List. When a T
16-14 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESThe exact command line entry for this example is as follows:create access-list telnet-allow tcp de
EXTREMEWARE SOFTWARE USER GUIDE16-15USING ROUTING ACCESS POLICIESFigure 16-6: ICMP packets are filtered outUSING ROUTING ACCESS POLICIESTo use routing
EXTREMEWARE SOFTWARE USER GUIDE1-9SOFTWARE FACTORY DEFAULTSFor default settings of individual ExtremeWare features, refer to individual chapters in th
16-16 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESCREATING AN ACCESS PROFILEThe first thing to do when using routing access policies is to create an
EXTREMEWARE SOFTWARE USER GUIDE16-17USING ROUTING ACCESS POLICIESTo configure the access profile mode, use the following command:config access-profile
16-18 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESPERMIT AND DENY ENTRIESIf you have configured the access profile mode to be none, you must specify
EXTREMEWARE SOFTWARE USER GUIDE16-19USING ROUTING ACCESS POLICIESROUTING ACCESS POLICIES FOR RIPIf you are using the RIP protocol, the switch can be c
16-20 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESFigure 16-7: RIP access policy exampleAssuming the backbone VLAN interconnects all the routers in
EXTREMEWARE SOFTWARE USER GUIDE16-21USING ROUTING ACCESS POLICIESIn addition, if the administrator wants to restrict any user belonging to the VLAN En
16-22 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESfor the switch as a whole. To configure a direct filter policy, use the following command:config o
EXTREMEWARE SOFTWARE USER GUIDE16-23USING ROUTING ACCESS POLICIESTo configure the switch labeled Internet, the commands would be as follows:create acc
16-24 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESTo configure the switch labeled Engsvrs, use the following commands:create access-profile nointern
EXTREMEWARE SOFTWARE USER GUIDE16-25MAKING CHANGES TO A ROUTING ACCESS POLICYTo configure the switch labeled Engsvrs, the commands would be as follows
1-10 EXTREMEWARE SOFTWARE USER GUIDEEXTREMEWARE OVER VIEW
16-26 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESon the ingress or egress side, depending on the change. For soft resets to be applied on the ingre
EXTREMEWARE SOFTWARE USER GUIDE16-27ROUTING ACCESS POLICY COMMANDSTable 16-3: Routing Access Policy Configuration CommandsCommand Descriptionconfig ac
16-28 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESconfig access-profile <access_profile> mode [permit | deny | none]Configures the access prof
EXTREMEWARE SOFTWARE USER GUIDE16-29USING ROUTE MAPSUSING ROUTE MAPSRoute maps are a mechanism that can be used to conditionally control the redistrib
16-30 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESTo create a route map, do the following:1 Create a route map.2 Add entries to the route map.3 Add
EXTREMEWARE SOFTWARE USER GUIDE16-31USING ROUTE MAPSconfig route-map <route-map> <sequence number> add set [as-path <as_num> | commu
16-32 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESROUTE MAP OPERATIONThe entries in the route map are processed in the ascending order of the sequen
EXTREMEWARE SOFTWARE USER GUIDE16-33USING ROUTE MAPSFigure 16-9: Route mapsThe following points apply to this example:• RTA is a member of in AS 1111
16-34 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESconfig bgp-out add 20 permitconfig bgp neighbor 10.0.0.2 route-map-filter out bgp-outconfig bgp ne
EXTREMEWARE SOFTWARE USER GUIDE16-35USING ROUTE MAPSROUTE MAP COMMANDSTable 16-6 describes route map commands.Table 16-6: Route Map CommandsCommand De
EXTREMEWARE SOFTWARE USER GUIDE2-12Accessing the SwitchThis chapter covers the following topics:• Understanding the Command Syntax on page 2-1• Line-E
16-36 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESconfig route-map <route-map> <sequence number> delete match [nlri-list <access_prof
EXTREMEWARE SOFTWARE USER GUIDE17-117Server Load Balancing (SLB)This chapter describes the following topics:• Overview on page 17-2• SLB Components on
17-2 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)OVERVIEWServer Load Balancing (SLB) is a feature of the switch that divides many client
EXTREMEWARE SOFTWARE USER GUIDE17-3SLB COMPONENTSNODESA node is an individual service on a physical server that consists of an IP addresses and a port
17-4 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)Once you know which virtual server options are useful in your network, you can:• Define
EXTREMEWARE SOFTWARE USER GUIDE17-5FORWARDING MODESFORWARDING MODESThe switch supports the following SLB forwarding modes:• Tran sp arent• Tran sl at
17-6 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)To configure transparent mode, use the following command:create slb vip <vipname>
EXTREMEWARE SOFTWARE USER GUIDE17-7FORWARDING MODES• The service is configured to use the appropriate address and port, as specified in the switch con
17-8 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)The following commands enable SLB, configure the server VLAN to act as the server side,
EXTREMEWARE SOFTWARE USER GUIDE17-9FORWARDING MODESFigure 17-3: Translational modeIn Figure 17-3, the switch is configured to respond to requests for
2-2 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCH3 The value part of the command specifies how you want the parameter to be set. Values include
17-10 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)config client add port 1-4enable ipforwardingThe following commands create a round-rob
EXTREMEWARE SOFTWARE USER GUIDE17-11FORWARDING MODESTo configure port translation mode, use the following command:create slb vip <vipname> pool
17-12 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)The servers are configured as follows:• All servers have the same MAC address.• All se
EXTREMEWARE SOFTWARE USER GUIDE17-13BALANCING METHODSprotocol is enabled, the subnet containing the VIPs is propagated through the network.BALANCING M
17-14 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)where the number of connections that each machine receives over time is proportionate
EXTREMEWARE SOFTWARE USER GUIDE17-15BASIC SLB COMMANDSThe switch will distribute traffic in round-robin fashion among the pools active nodes with the
17-16 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)create slb pool <poolname> {slb-method [round-robin | ratio | priority | least-c
EXTREMEWARE SOFTWARE USER GUIDE17-17BASIC SLB COMMANDSdisable slb vip <vipname> {close-connections-now} Disables a VIP group. When disabled, no
17-18 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)ADVANCED SLB APPLICATION EXAMPLEThis example builds upon the Introductory SLB Applicat
EXTREMEWARE SOFTWARE USER GUIDE17-19ADVANCED SLB APPLICATION EXAMPLEFigure 17-5: Advanced SLB configurationThe commands used to configure are describe
EXTREMEWARE SOFTWARE USER GUIDE2-3UNDERSTANDING THE COMMAND SYNTAXOnce you have created the VLAN with a unique name, you can then eliminate the keywor
17-20 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)To create is the virtual IP VLAN, use the following commands: create vlan sitesconfig
EXTREMEWARE SOFTWARE USER GUIDE17-21ADVANCED SLB APPLICATION EXAMPLEcreate slb pool site2webconfig slb site2web add 192.168.200.5:80config slb site2we
17-22 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)enable slb vip ftpc service-checkconfig slb vip ftpc service-check ftp user test passw
EXTREMEWARE SOFTWARE USER GUIDE17-23HEALTH CHECKINGPING-CHECKPing-check is Layer 3 based pinging of the physical node. The default ping frequency is o
17-24 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)SERVICE-CHECKService-check is Layer 7 based application-dependent checking defined on
EXTREMEWARE SOFTWARE USER GUIDE17-25HEALTH CHECKINGFor SMTP, service-check identifies the identity of the switch by providing the specified DNS domain
17-26 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)PERSISTENCEUsing persistence, you can ensure that traffic flows do not span multiple s
EXTREMEWARE SOFTWARE USER GUIDE17-27USING HIGH AVAILABILITY SYSTEM FEATURESYou can only activate sticky persistence on wildcard virtual servers.To con
17-28 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)The switches in a redundant SLB configuration should have identical SLB configurations
EXTREMEWARE SOFTWARE USER GUIDE17-29USING HIGH AVAILABILITY SYSTEM FEATURESTo assign a VIP to a unit, use the following command:config slb vip <vip
2-4 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCHSUMMIT SWITCH NUMERICAL RANGESCommands that require you to enter one or more port numbers on a
17-30 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)create vlan insidecreate vlan serverconfig vlan inside ipaddress 1.10.0.2 /16config vl
EXTREMEWARE SOFTWARE USER GUIDE17-31USING HIGH AVAILABILITY SYSTEM FEATUREScreate slb pool testpoolconfig slb pool testpool add 1.206.1.1:80config slb
17-32 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)3DNS SUPPORTWhen you enable SLB, the switch reports health status to 3DNS using the iQ
EXTREMEWARE SOFTWARE USER GUIDE17-33ADVANCED SLB COMMANDSconfig slb failover unit [1 | 2] remote-ip <ipaddress> local-ip <ipaddress>:<L
17-34 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)config slb global [ping-check | tcp-port-check | service-check] frequency <seconds&
EXTREMEWARE SOFTWARE USER GUIDE17-35ADVANCED SLB COMMANDSconfig slb global telnet userid <userid> password {encrypted} {<password>}Configu
17-36 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)config slb vip <vipname> unit {1 | 2} Configures a unit number of a VIP name for
EXTREMEWARE SOFTWARE USER GUIDE17-37ADVANCED SLB COMMANDSenable slb node <ipaddress> ping-check Enables L3 pinging to the node address. Ping-che
17-38 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)WEB CACHE REDIRECTIONWeb cache redirection uses the TCP or UDP port number to redirect
EXTREMEWARE SOFTWARE USER GUIDE17-39WEB CACHE REDIRECTIONFLOW REDIRECTION COMMANDSTo configure flow redirection, use the commands listed in Table 17-5
EXTREMEWARE SOFTWARE USER GUIDE2-5LINE-EDITING KEYSLINE-EDITING KEYSTab le 2-2 describes the line-editing keys available using the CLI.vertical bar |
17-40 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)Figure 17-7: Flow-redirection exampleThe following commands are used to configure the
EXTREMEWARE SOFTWARE USER GUIDE18-118Status Monitoring and StatisticsThis chapter describes the following topics:• Status Monitoring on page 18-1• Slo
18-2 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICSFor more information about show commands for a specific ExtremeWare feature, refer
EXTREMEWARE SOFTWARE USER GUIDE18-3SLOT DIAGNOSTICSSLOT DIAGNOSTICSThe BlackDiamond switch provides a facility for running normal or extended diagnost
18-4 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICS•extended — Takes the switch fabric and ports offline, and performs extensive ASIC
EXTREMEWARE SOFTWARE USER GUIDE18-5PORT ERRORS• Received Broadcast (RX Bcast) — The total number of frames received by the port that are addressed to
18-6 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICSThe following port receive error information is collected by the switch:• Receive
EXTREMEWARE SOFTWARE USER GUIDE18-7SETTING THE SYSTEM RECOVERY LEVELSETTING THE SYSTEM RECOVERY LEVELYou can configure the system to automatically reb
18-8 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICSBy default, log entries that are assigned a critical or warning level remain in th
EXTREMEWARE SOFTWARE USER GUIDE18-9LOGGINGLOCAL LOGGINGThe switch maintains 1,000 messages in its internal log. You can display a snapshot of the log
2-6 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCHCOMMAND HISTORYExtremeWare “remembers” the last 49 commands you entered. You can display a list
18-10 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICS• Configure remote logging by using the following command:config syslog {add} <
EXTREMEWARE SOFTWARE USER GUIDE18-11LOGGINGLOGGING COMMANDSThe commands described in Table 18-5 allow you to configure logging options, reset logging
18-12 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICSRMONUsing the Remote Monitoring (RMON) capabilities of the switch allows network
EXTREMEWARE SOFTWARE USER GUIDE18-13RMON• Management workstation — Communicates with the RMON probe and collects the statistics from it. The workstati
18-14 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICSAlarms inform you of a network performance problem and can trigger automated acti
EXTREMEWARE SOFTWARE USER GUIDE18-15RMONEVENT ACTIONSThe actions that you can define for each alarm are shown in Tab le 18 -6.To be notified of events
18-16 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICS
EXTREMEWARE SOFTWARE USER GUIDE19-119Using ExtremeWare VistaThis chapter covers the following topics:• Enabling and Disabling Web Access on page 19-2•
19-2 EXTREMEWARE SOFTWARE USER GUIDEUSING EXTREMEWARE VISTAENABLING AND DISABLING WEB ACCESSBy default, Web access is enabled on the switch. Use of Ex
EXTREMEWARE SOFTWARE USER GUIDE19-3ACCESSING EXTREMEWARE VISTA• Check for newer versions of stored pages. Every visit to the page should be selected a
EXTREMEWARE SOFTWARE USER GUIDE2-7COMMON COMMANDSconfig slot <slot> module [f32t | f32f | f48t | g4x | g6x | g8x | g12x]Configures a slot for a
19-4 EXTREMEWARE SOFTWARE USER GUIDEUSING EXTREMEWARE VISTATo correct this situation, log out of the switch and log in again.NAVIGATING EXTREMEWARE VI
EXTREMEWARE SOFTWARE USER GUIDE19-5NAVIGATING EXTREMEWARE VISTABROWSER CONTROLSBrowser controls include drop-down list boxes, check boxes, and multi-s
19-6 EXTREMEWARE SOFTWARE USER GUIDEUSING EXTREMEWARE VISTASAVING CHANGESThere are two ways to save your changes to non-volatile storage using Extreme
EXTREMEWARE SOFTWARE USER GUIDE19-7DO A GET WHEN CONFIGURING A VLANDO A GET WHEN CONFIGURING A VLANWhen configuring a VLAN using ExtremeWare Vista, pr
19-8 EXTREMEWARE SOFTWARE USER GUIDEUSING EXTREMEWARE VISTA
EXTREMEWARE SOFTWARE USER GUIDE20-120Software Upgrade and Boot OptionsThis chapter describes the following topics:• Downloading a New Image on page 20
20-2 EXTREMEWARE SOFTWARE USER GUIDESOFTWARE UPGRADE AND BOOT OPTIONS• Download the new image to the switch using the commanddownload image [<ipadd
EXTREMEWARE SOFTWARE USER GUIDE20-3SAVING CONFIGURATION CHANGESSAVING CONFIGURATION CHANGESThe configuration is the customized set of parameters that
20-4 EXTREMEWARE SOFTWARE USER GUIDESOFTWARE UPGRADE AND BOOT OPTIONSUSING TFTP TO UPLOAD THE CONFIGURATIONYou can upload the current configuration to
EXTREMEWARE SOFTWARE USER GUIDE20-5USING TFTP TO DOWNLOAD THE CONFIGURATIONUSING TFTP TO DOWNLOAD THE CONFIGURATIONYou can download ASCII files that c
IVSecurity Features Under License Control 1-8Software Factory Defaults 1-82ACCESSING THE SWITCHUnderstanding the Command Syntax 2-1Syntax Helper 2-2Co
2-8 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCHdelete vlan <name> Deletes a VLAN.disable bootp vlan [<name> | all] Disables BOOTP
20-6 EXTREMEWARE SOFTWARE USER GUIDESOFTWARE UPGRADE AND BOOT OPTIONSTo download an incremental configuration, use the following command:download conf
EXTREMEWARE SOFTWARE USER GUIDE20-7SYNCHRONIZING MSMSSYNCHRONIZING MSMS On the BlackDiamond switch, you can take the master MSM configurations and ima
20-8 EXTREMEWARE SOFTWARE USER GUIDESOFTWARE UPGRADE AND BOOT OPTIONSAs soon as you see the BootROM-> prompt, release the spacebar. You can see a
EXTREMEWARE SOFTWARE USER GUIDE20-9BOOT OPTION COMMANDSdownload configuration <hostname | ipaddress> <filename> {incremental}Downloads a c
20-10 EXTREMEWARE SOFTWARE USER GUIDESOFTWARE UPGRADE AND BOOT OPTIONSuse configuration [primary | secondary] Configures the switch to use a particula
EXTREMEWARE SOFTWARE USER GUIDEA-1ASupported StandardsThe following is a list of software standards supported by ExtremeWare.Standards and ProtocolsRF
A-2 EXTREMEWARE SOFTWARE USER GUIDESUPPORTED STANDARDSManagement and SecurityRFC 1157 SNMP v1/v2cRFC 1213 MIB IIRFC 1354 IP forwarding table MIBRFC 14
EXTREMEWARE SOFTWARE USER GUIDEB-1BTroubleshootingIf you encounter problems when using the switch, this appendix may be helpful. If you have a problem
B-2 EXTREMEWARE SOFTWARE USER GUIDETROUBLESHOOTING• Both ends of the Gigabit link are set to the same autonegotiation state.Both sides if the Gigabit
EXTREMEWARE SOFTWARE USER GUIDEB-3USING THE COMMAND-LINE INTERFACEIf this does not work, try using a different power source (different power strip/out
EXTREMEWARE SOFTWARE USER GUIDE2-9CONFIGURING MANAGEMENT ACCESSCONFIGURING MANAGEMENT ACCESSExtremeWare supports the following two levels of managemen
B-4 EXTREMEWARE SOFTWARE USER GUIDETROUBLESHOOTINGThe SNMP Network Manager or Telnet workstation can no longer access the device:Check that Telnet acc
EXTREMEWARE SOFTWARE USER GUIDEB-5USING THE COMMAND-LINE INTERFACEIn the case where no one knows a password for an administrator level user, contact y
B-6 EXTREMEWARE SOFTWARE USER GUIDETROUBLESHOOTINGEnsure that you are using multi-mode fiber (MMF) when using a 1000BASE-SX GBIC, and single mode fibe
EXTREMEWARE SOFTWARE USER GUIDEB-7USING THE COMMAND-LINE INTERFACE802.1Q links do not work correctly:Remember that VLAN names are only locally signifi
B-8 EXTREMEWARE SOFTWARE USER GUIDETROUBLESHOOTINGDEBUG TRACINGExtremeWare includes a debug-tracing facility for the switch. The show debug-tracing co
IndexNumerics3DNS 17-32802.1p configuration commands (table) 9-14Aaccess levels 2-9access listsBlackDiamond switch maximum entries 16-5configuration c
II - INDEXport configuration 4-2port-mirroring, virtual port 4-11slot configuration 4-1verifying load sharing 4-11blackhole entries, FDB 7-2boot optio
INDEX - IIIhost attach 10-9linking switches 10-12masterbehavior 10-5definition 10-2determining 10-3electing 10-6election algorithms 10-5port blocks 10
IV - INDEXresetting 14-14settings, displaying 14-13show commands (table) 14-13IP multinettingdescription 11-7example 11-9primary VLAN interface 11-7se
INDEX - Vverifying the configuration on Summit switch 5-10local logging 18-9log display 18-9loggingand Telnet 18-9commands (table) 18-11configuration
2-10 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCHUSER ACCOUNTA user-level account has viewing access to all manageable parameters, with the exc
VI - INDEXport-mirroringBlackDiamond switch configuration commands (table) 4-12BlackDiamond switch example 4-12description on BlackDiamond switch 4-11
INDEX - VIIconfiguration commands (table) 16-35creating 16-30description 16-2, 16-29example 16-32goto entries 16-31match entries 16-31match operation
VIII - INDEXusing 3-10SNTPconfiguration commands (table) 3-25configuring 3-22Daylight Savings Time 3-22description 3-21example 3-25Greenwich Mean Time
INDEX - IXVirtual LANs. See VLANsvirtual link, OSPF 12-8virtual port on Summit switch 5-11VLAN aggregationcommands (table) 11-14description 11-11limit
X - INDEX
Index of CommandsCclear counters 18-11clear dlcs 9-26clear fdb 7-3, 9-11clear igmp snooping 14-14clear iparp 11-19, 11-28clear ipfdb 11-19, 11-2
ii - Index of Commands16-28config esrp port-mode 10-14config fdb agingtime 7-3config flow redirection add next-hop 17-39config flow-redirection del
Index of Commands - iiiconfig rip vlan import-filter 16-19, 16-29config rip vlan trusted-gateway 16-19, 16-29config route-map add 16-30, 16-36confi
iv - Index of Commandscreate access-list udp destination 16-9create access-profile 16-29create account 2-7, 2-12create bgp neighbor 13-14create fd
Index of Commands - vdisable radius-accounting 3-16disable red ports 9-8disable rip 12-20disable rip aggregation 12-20disable rip export 11-4, 12
EXTREMEWARE SOFTWARE USER GUIDE2-11CONFIGURING MANAGEMENT ACCESSDEFAULT ACCOUNTSBy default, the switch is configured with two accounts, as shown in Ta
vi - Index of Commandsenable license 2-8enable license security 3-7enable log display 18-9, 18-12enable loopback-mode vlan 11-21enable mac-vlan 6
Index of Commands - viishow dlcs 9-27show dns-client 2-13show dot1p 9-14show dvmrp 14-13show edp 4-13, 5-12show esrp 10-5, 10-13, 10-16, 10-20sh
viii - Index of Commandsunconfig vlan xnetid 15-14upload configuration 2-13, 20-4, 20-9upload configuration cancel 20-4, 20-9use configuration 20-
2-12 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCH5 Re-enter the new password at the prompt.If you forget your password while logged out of the
EXTREMEWARE SOFTWARE USER GUIDE2-13DOMAIN NAME SERVICE CLIENT SERVICESDOMAIN NAME SERVICE CLIENT SERVICESThe Domain Name Service (DNS) client in Extre
2-14 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCHPINGThe ping command enables you to send Internet Control Message Protocol (ICMP) echo message
EXTREMEWARE SOFTWARE USER GUIDE2-15CHECKING BASIC CONNECTIVITYTRACEROUTEThe traceroute command enables you to trace the routed path between the switch
2-16 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCH
EXTREMEWARE SOFTWARE USER GUIDE3-13Managing the SwitchThis chapter covers the following topics:• Overview on page 3-1• Using the Console Interface on
VUsing a BOOTP Server 3-4Manually Configuring the IP Settings 3-4Disconnecting a Telnet Session 3-6Controlling Telnet Access 3-6Using Secure Shell 2 (
3-2 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCH— ExtremeWare Vista Web access using a standard Web browser— SNMP access using ExtremeWare Enter
EXTREMEWARE SOFTWARE USER GUIDE3-3USING TELNETYou can configure the IP address, subnet mask, and default router for the VLAN mgmt, using the following
3-4 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHUSING A BOOTP SERVERIf you are using IP and you have a Bootstrap Protocol (BOOTP) server set up
EXTREMEWARE SOFTWARE USER GUIDE3-5USING TELNETmust be assigned an IP address and subnet mask. IP addresses are always assigned to a VLAN. The switch c
3-6 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCH6 Configure the default route for the switch using the following command:config iproute add defa
EXTREMEWARE SOFTWARE USER GUIDE3-7USING SECURE SHELL 2 (SSH2)To display the status of Telnet, use the following command:show managementYou can choose
3-8 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHTo enable SSH2, use the following command:enable ssh2 {access-profile [<access_profile> |
EXTREMEWARE SOFTWARE USER GUIDE3-9USING EXTREMEWARE VISTAFor more information on assigning an IP address, refer to the section, “Configuring Switch IP
3-10 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHUSING SNMPAny Network Manager running the Simple Network Management Protocol (SNMP) can manage
EXTREMEWARE SOFTWARE USER GUIDE3-11USING SNMPTo configure SNMP read access to use an access profile, use the command:config snmp access-profile readon
VILoad-Sharing Algorithms 4-8Configuring BlackDiamond and Alpine Switch Load Sharing 4-9Load-Sharing Example 4-11Verifying the Load-Sharing Configurat
3-12 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHconfig snmp add trapreceiver <ipaddress> community <string>Adds the IP address of a
EXTREMEWARE SOFTWARE USER GUIDE3-13AUTHENTICATING USERSDISPLAYING SNMP SETTINGSTo display the SNMP settings configured on the switch, use the followin
3-14 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHThe privileges assigned to the user (admin versus non-admin) at the RADIUS server take preceden
EXTREMEWARE SOFTWARE USER GUIDE3-15AUTHENTICATING USERSTable 3- 2: RADIUS CommandsCommand Descriptionconfig radius [primary | secondary] server [<i
3-16 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHRADIUS RFC 2138 ATTRIBUTESThe RADIUS RFC 2138 optional attributes supported are as follows:• Us
EXTREMEWARE SOFTWARE USER GUIDE3-17AUTHENTICATING USERSfiles. The client configuration file (ClientCfg.txt) defines the authorized source machine, sou
3-18 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHcompiled format for Solaris™ or Linux™ operating systems, as well as in source code format. For
EXTREMEWARE SOFTWARE USER GUIDE3-19AUTHENTICATING USERSuser Password = ""Filter-Id = "unlim"admin Password = "", Service
3-20 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHCONFIGURING TACACS+Terminal Access Controller Access Control System Plus (TACACS+) is a mechani
EXTREMEWARE SOFTWARE USER GUIDE3-21USING THE SIMPLE NETWORK TIME PROTOCOLUSING THE SIMPLE NETWORK TIME PROTOCOLExtremeWare supports the client portion
VIIAssigning a VLAN Tag 6-6Mixing Port-Based and Tagged VLANs 6-9Protocol-Based VLANs 6-9Predefined Protocol Filters 6-10Defining Protocol Filters 6-1
3-22 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHCONFIGURING AND USING SNTPTo use SNTP, follow these steps:1 Identify the host(s) that are confi
EXTREMEWARE SOFTWARE USER GUIDE3-23USING THE SIMPLE NETWORK TIME PROTOCOLThis command provides configuration and statistics associated with SNTP and i
3-24 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCH-12:00 -720 IDLW - International Date Line West+1:00 +60 CET - Central European FWT - French Wi
EXTREMEWARE SOFTWARE USER GUIDE3-25USING THE SIMPLE NETWORK TIME PROTOCOLSNTP CONFIGURATION COMMANDSTab le 3-5 describes SNTP configuration commands.S
3-26 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCH
EXTREMEWARE SOFTWARE USER GUIDE4-14Configuring BlackDiamond and Alpine Switch Slots and PortsThis chapter covers the following topics: • Configuring a
4-2 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTSYou can configure the BlackDiamond or Alpine switch with
EXTREMEWARE SOFTWARE USER GUIDE4-3BLACKDIAMOND AND ALPINE SWITCH PORT CONFIGURATIONFor example, if a G4X I/O module (having a total of four ports) is
4-4 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTS10BASE-T and 100BASE-TX ports can connect to either 10BAS
EXTREMEWARE SOFTWARE USER GUIDE4-5BLACKDIAMOND AND ALPINE SWITCH PORT CONFIGURATIONconfig ports <portlist> auto off {speed [10 | 100 | 1000]} du
VIII8SPANNING TREE PROTOCOL (STP)Overview of the Spanning Tree Protocol 8-1Spanning Tree Domains 8-2STPD Status for GVRP-Added Ports 8-2Defaults 8-3ST
4-6 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTSenable sharing <port> grouping <portlist> {po
EXTREMEWARE SOFTWARE USER GUIDE4-7JUMBO FRAMESJUMBO FRAMESJumbo frames are Ethernet frames that are larger than 1523 bytes, including four bytes used
4-8 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTSFor example, VLANs see the load-sharing group as a single
EXTREMEWARE SOFTWARE USER GUIDE4-9LOAD SHARING ON THE BLACKDIAMOND AND ALPINE SWITCHThe address-based and round-robin load-sharing algorithms are supp
4-10 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTSBlackDiamond switch modules that use the “i” chipset do
EXTREMEWARE SOFTWARE USER GUIDE4-11BLACKDIAMOND AND ALPINE SWITCH PORT-MIRRORINGLOAD-SHARING EXAMPLEThe following example defines a load-sharing group
4-12 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTSUp to eight mirroring filters and one monitor port can b
EXTREMEWARE SOFTWARE USER GUIDE4-13BLACKDIAMOND AND ALPINE SWITCH PORT-MIRRORINGEXTREME DISCOVERY PROTOCOLThe Extreme Discovery Protocol (EDP) is used
4-14 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTS
EXTREMEWARE SOFTWARE USER GUIDE5-15Configuring Summit Switch PortsThis chapter covers the following topics:• Enabling and Disabling Summit Switch Port
IXConfiguring DiffServ 9-15Observing DiffServ Information 9-17Changing DiffServ Code point assignments in the Q0S Profile 9-17Replacing DiffServ Code
5-2 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSFor example, to disable ports 3, 5, and 12 through 15 on the Summit switch, enter th
EXTREMEWARE SOFTWARE USER GUIDE5-3SUMMIT SWITCH PORT COMMANDSTURNING OFF AUTONEGOTIATION FOR A GIGABIT ETHERNET PORTIn certain interoperability situat
5-4 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSdisable learning ports <portlist> Disables MAC address learning on one or more
EXTREMEWARE SOFTWARE USER GUIDE5-5JUMBO FRAMESJUMBO FRAMESJumbo frames are Ethernet frames that are larger than 1523 bytes, including four bytes used
5-6 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSThe jumbo_frame_mtu range is 1523 to 9216. The value describes the maximum size “on
EXTREMEWARE SOFTWARE USER GUIDE5-7LOAD SHARING ON THE SUMMIT SWITCHLOAD SHARING ALGORITHMSLoad sharing algorithms allow you to select the distribution
5-8 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSOn switches that do not have the “i” chipset, the following additional rules apply:•
EXTREMEWARE SOFTWARE USER GUIDE5-9LOAD SHARING ON THE SUMMIT SWITCHOn all other Summit switch models, the following rules apply:• A group can contain
5-10 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSTo define a load-sharing group, you assign a group of ports to a single, logical po
EXTREMEWARE SOFTWARE USER GUIDE5-11SUMMIT SWITCH PORT-MIRRORINGThe traffic filter can be defined based on one of the following criteria:• Physical por
Comments to this Manuals