Extreme Networks ExtremeWare Enterprise Manager User's Guide

Browse online or download User's Guide for Software Extreme Networks ExtremeWare Enterprise Manager. Extreme Networks ExtremeWare Enterprise Manager User guide User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 432
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - User Guide

Extreme Networks, Inc.3585 Monroe StreetSanta Clara, California 95051(888) 257-3000http://www.extremenetworks.comExtremeWare Software User GuideSoftwa

Page 2

XESRP Host Attach 10-9ESRP Domains 10-10ESRP Groups 10-11Linking ESRP Switches 10-12Configuring ESRP and Multinetting 10-12ESRP and Spanning Tree 10-1

Page 3 - Contents

5-12 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSSUMMIT SWITCH PORT-MIRRORING EXAMPLEThe following example selects port 3 as the mir

Page 4 - 3MANAGING THE SWITCH

EXTREMEWARE SOFTWARE USER GUIDE5-13SMART REDUNDANCYSMART REDUNDANCYSmart redundancy defines the behavior of switches equipped with redundancy Gigabit

Page 5 - AND PORTS

5-14 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSIf smart redundancy is disabled, both the primary and redundant ports are dual-home

Page 6 - 6VIRTUAL LANS (VLANS)

EXTREMEWARE SOFTWARE USER GUIDE6-16Virtual LANs (VLANs)This chapter covers the following topics:• Overview of Virtual LANs on page 6-1• Types of VLANs

Page 7 - 7FORWARDING DATABASE (FDB)

6-2 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)BENEFITSImplementing VLANs on your networks has the following advantages:• VLANs help to contro

Page 8 - 9QUALITY OF SERVICE (QOS)

EXTREMEWARE SOFTWARE USER GUIDE6-3TYPES OF VLANS Figure 6-1: Example of a port-based VLAN on the Summit7i switchFor the members of the different IP VL

Page 9

6-4 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)Figure 6-2: Single port-based VLAN spanning two switches To create multiple VLANs that span two

Page 10 - 11 IP UNICAST ROUTING

EXTREMEWARE SOFTWARE USER GUIDE6-5TYPES OF VLANSFigure 6-3: Two port-based VLANs spanning two BlackDiamond switchesVLAN Accounting spans System 1 and

Page 11

6-6 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)TAGGED VLANSTa g g i n g is a process that inserts a marker (called a tag) into the Ethernet f

Page 12 - 14 IP MULTICAST ROUTING

EXTREMEWARE SOFTWARE USER GUIDE6-7TYPES OF VLANSFigure 6-4 illustrates the physical view of a network that uses tagged and untagged traffic.Figure 6-4

Page 13 - 16 ACCESS POLICIES

XIConfiguring DHCP/BOOTP Relay 11-16Verifying the DHCP/BOOTP Relay Configuration 11-16UDP-Forwarding 11-16Configuring UDP-Forwarding 11-17UPD-Forwardi

Page 14

6-8 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)Figure 6-5 shows a logical diagram of the same network.Figure 6-5: Logical diagram of tagged an

Page 15 - ERVER LOAD BALANCING (SLB)

EXTREMEWARE SOFTWARE USER GUIDE6-9TYPES OF VLANSMIXING PORT-BASED AND TAGGED VLANSYou can configure the switch using a combination of port-based and t

Page 16 - 19 USING EXTREMEWARE VISTA

6-10 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)Figure 6-6: Protocol-based VLANs PREDEFINED PROTOCOL FILTERSThe following protocol filters are

Page 17 - BTROUBLESHOOTING

EXTREMEWARE SOFTWARE USER GUIDE6-11TYPES OF VLANSDEFINING PROTOCOL FILTERSIf necessary, you can define a customized protocol filter based on EtherType

Page 18 - INDEX OF COMMANDS

6-12 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)DELETING A PROTOCOL FILTERIf a protocol filter is deleted from a VLAN, the VLAN is assigned a

Page 19 - NTRODUCTION

EXTREMEWARE SOFTWARE USER GUIDE6-13CONFIGURING VLANS ON THE SWITCHRENAMING A VLANTo rename an existing VLAN, use the following command:config vlan <

Page 20 - ONVENTIONS

6-14 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)VLAN CONFIGURATION COMMANDSTab le 6-1 describes the commands used to configure a VLAN.Table 6-

Page 21 - UBLICATIONS

EXTREMEWARE SOFTWARE USER GUIDE6-15CONFIGURING VLANS ON THE SWITCHVLAN CONFIGURATION EXAMPLESThe following BlackDiamond switch example creates a port-

Page 22

6-16 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)The following Summit switch example creates a VLAN named sales, with the VLANid 120. The VLAN

Page 23 - ExtremeWare Overview

EXTREMEWARE SOFTWARE USER GUIDE6-17GENERIC VLAN REGISTRATION PROTOCOL• IPX address (if configured)• STPD information• Protocol information• QoS profil

Page 24

XIIRIP Configuration Example 12-17Displaying RIP Settings 12-19Resetting and Disabling RIP 12-20Configuring OSPF 12-21OSPF Configuration Example 12-25

Page 25

6-18 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)Figure 6-7: Network example using GVRPIn Figure 6-7, Switch A is a member of VLAN Red. VLAN Re

Page 26

EXTREMEWARE SOFTWARE USER GUIDE6-19GENERIC VLAN REGISTRATION PROTOCOLVLANs that are automatically created using GVRP are given names in the formatgvrp

Page 27 - IFFERENCES

6-20 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)MAC-BASED VLANSMAC-Based VLANs allow physical ports to be mapped to a VLAN based on the source

Page 28 - ULL L3 FUNCTIONALITY

EXTREMEWARE SOFTWARE USER GUIDE6-21MAC-BASED VLANSMAC-BASED VLAN GUIDELINESWhen using the MAC-to-VLAN mapping, consider the following guidelines:• A p

Page 29 - ICENSING

6-22 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)• A MAC address cannot be configured to associate with more than 1 VLAN. If this is attempted,

Page 30 - BTAINING

EXTREMEWARE SOFTWARE USER GUIDE6-23MAC-BASED VLANSenable mac-vlan mac-group any ports 10-15enable mac-vlan mac-group 10 ports 16-17enable mac-vlan mac

Page 31 - MacVLanDiscover

6-24 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)The following example shows an incremental configuration file for MAC-based VLAN information t

Page 32

EXTREMEWARE SOFTWARE USER GUIDE7-17Forwarding Database (FDB)This chapter describes the following topics:• Overview of the FDB on page 7-1• Configuring

Page 33 - Accessing the Switch

7-2 EXTREMEWARE SOFTWARE USER GUIDEFORWARDING DATABASE (FDB)FDB ENTRY TYPESThe following are four types of entries in the FDB:• Dynamic entries — Init

Page 34 - BBREVIATED SYNTAX

EXTREMEWARE SOFTWARE USER GUIDE7-3CONFIGURING FDB ENTRIESHOW FDB ENTRIES GET ADDEDEntries are added into the FDB in the following two ways:• The switc

Page 35 - NDERSTANDING

XIIIPIM-DM Configuration Example 14-10Configuration for IR1 14-11Configuration for ABR1 14-13Displaying IP Multicast Routing Settings 14-13Deleting an

Page 36 - CCESSING

7-4 EXTREMEWARE SOFTWARE USER GUIDEFORWARDING DATABASE (FDB)FDB CONFIGURATION EXAMPLESThe following example adds a permanent entry to the FDB:create f

Page 37 - Table 2- 2: Line-Editing Keys

EXTREMEWARE SOFTWARE USER GUIDE7-5DISPLAYING FDB ENTRIES• Slot number for this device is 3.• Port number for this device is 4.This example associates

Page 38

7-6 EXTREMEWARE SOFTWARE USER GUIDEFORWARDING DATABASE (FDB)

Page 39 - is +/- minutes from

EXTREMEWARE SOFTWARE USER GUIDE8-18Spanning Tree Protocol (STP)This chapter covers the following topic:• Overview of the Spanning Tree Protocol on pag

Page 40

8-2 EXTREMEWARE SOFTWARE USER GUIDESPANNING TREE PROTOCOL (STP)SPANNING TREE DOMAINSThe switch can be partitioned into multiple virtual bridges. Each

Page 41 - ANAGEMENT

EXTREMEWARE SOFTWARE USER GUIDE8-3STP CONFIGURATIONSFor more information on GVRP, refer to Chapter 6.DEFAULTSThe default device configuration contains

Page 42 - DMINISTRATOR

8-4 EXTREMEWARE SOFTWARE USER GUIDESPANNING TREE PROTOCOL (STP)Figure 8-1: Multiple Spanning Tree DomainsWhen the switches in this configuration start

Page 43 - HANGING THE DEFAULT PASSWORD

EXTREMEWARE SOFTWARE USER GUIDE8-5STP CONFIGURATIONSFigure 8-2: Tag-based STP configurationThe tag-based network in Figure 8-2 has the following confi

Page 44 - IEWING ACCOUNTS

8-6 EXTREMEWARE SOFTWARE USER GUIDESPANNING TREE PROTOCOL (STP)CONFIGURING STP ON THE SWITCHTo configure STP you must perform the following actions:•

Page 45

EXTREMEWARE SOFTWARE USER GUIDE8-7CONFIGURING STP ON THE SWITCHTab le 8-1 shows the commands used to configure STP.Table 8- 1: STP Configuration Comma

Page 46

XIVAccess Lists for ICMP 16-5Verifying Access List Configurations 16-6Access List Commands 16-6IP Access List Examples 16-11Using the Permit-Establish

Page 47 - RACEROUTE

8-8 EXTREMEWARE SOFTWARE USER GUIDESPANNING TREE PROTOCOL (STP)STP CONFIGURATION EXAMPLEThe following BlackDiamond switch example creates and enables

Page 48

EXTREMEWARE SOFTWARE USER GUIDE8-9DISABLING AND RESETTING STPThis command displays the following information:• STPD name• Bridge ID• STPD configuratio

Page 49 - Managing the Switch

8-10 EXTREMEWARE SOFTWARE USER GUIDESPANNING TREE PROTOCOL (STP)

Page 50 - 10/100 UTP M

EXTREMEWARE SOFTWARE USER GUIDE9-19Quality of Service (QoS)This chapter covers the following topics:• Overview of Policy-Based Quality of Service on p

Page 51

9-2 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)OVERVIEW OF POLICY-BASED QUALITY OF SERVICEPolicy-Based QoS allows you to protect bandwidth

Page 52

EXTREMEWARE SOFTWARE USER GUIDE9-3APPLICATIONS AND TYPES OF QOSAPPLICATIONS AND TYPES OF QOSDifferent applications have different QoS requirements. Th

Page 53

9-4 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)CRITICAL DATABASE APPLICATIONSDatabase applications, such as those associated with ERP, typ

Page 54

EXTREMEWARE SOFTWARE USER GUIDE9-5ASSIGNING QOS ATTRIBUTESASSIGNING QOS ATTRIBUTES Assigning QoS attributes is a three-step process which consists of

Page 55 - 2 (SSH2)

9-6 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)QOS PROFILESA QoS profile defines a class of service by specifying traffic behavior attribu

Page 56 - <tcp_port_number>}

EXTREMEWARE SOFTWARE USER GUIDE9-7QOS PROFILESFour or eight default QoS profiles are provided, depending on the chipset used in the switch. The defaul

Page 57 - ONTROLLING

XV17 SERVER LOAD BALANCING (SLB)Overview 17-2SLB Components 17-2Nodes 17-3Pools 17-3Virtual Servers 17-3Using Standard or Wildcard Virtual Servers 17-

Page 58

9-8 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)CONFIGURING A QOS PROFILETab le 9-4 lists the commands used to configure QoS.TRAFFIC GROUPI

Page 59

EXTREMEWARE SOFTWARE USER GUIDE9-9TRAFFIC GROUPINGS AND CREATING A QOS POLICYTraffic groupings are separated into the following categories for discuss

Page 60

9-10 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)IP-BASED TRAFFIC GROUPINGSIP-based traffic groupings are based on any combination of:• IP

Page 61 - RADIUS C

EXTREMEWARE SOFTWARE USER GUIDE9-11TRAFFIC GROUPINGS AND CREATING A QOS POLICYDYNAMIC MAC ADDRESSESDynamic MAC addresses can be assigned a QoS profile

Page 62 - ONFIGURING RADIUS CLIENT

9-12 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)VERIFYING MAC-BASED QOS SETTINGSTo verify any of the MAC-based QoS settings, use either th

Page 63 - Table 3- 2: RADIUS Commands

EXTREMEWARE SOFTWARE USER GUIDE9-13TRAFFIC GROUPINGS AND CREATING A QOS POLICYFigure 9-1: Ethernet packet encapsulationOBSERVING 802.1P INFORMATIONWhe

Page 64

9-14 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)802.1P COMMANDSTab le 9-7 shows the commands used to configure 802.1p priority. Two are ex

Page 65

EXTREMEWARE SOFTWARE USER GUIDE9-15TRAFFIC GROUPINGS AND CREATING A QOS POLICY802.1p priority information is replaced according to the hardware queue

Page 66

9-16 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)Figure 9-2: IP packet header encapsulationTab le 9-9 lists the commands used to configure

Page 67 - UTHENTICATING

EXTREMEWARE SOFTWARE USER GUIDE9-17TRAFFIC GROUPINGS AND CREATING A QOS POLICYOBSERVING DIFFSERV INFORMATIONWhen a packet arrives at the switch on an

Page 68 - TACACS+

XVISample Active-Active Configuration 17-29Using Manual Fail-Back 17-313DNS Support 17-32Advanced SLB Commands 17-32Web Cache Redirection 17-38Flow Re

Page 69

9-18 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)You can change the QoS profile assignment for all 64 code points using the following comma

Page 70

EXTREMEWARE SOFTWARE USER GUIDE9-19TRAFFIC GROUPINGS AND CREATING A QOS POLICYYou then change the 802.1p priority to DiffServ code point mapping to an

Page 71

9-20 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)3 To enable the switch to overwrite the DiffServ code point:enable dot1p replacementenable

Page 72

EXTREMEWARE SOFTWARE USER GUIDE9-21VERIFYING CONFIGURATION AND PERFORMANCEFor example, all devices on VLAN servnet require use of the QoS profile qp4.

Page 73

9-22 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)REAL-TIME PERFORMANCE MONITORINGThe real-time display scrolls through the given portlist t

Page 74

EXTREMEWARE SOFTWARE USER GUIDE9-23MODIFYING A QOS POLICYDISPLAYING QOS PROFILE INFORMATIONThe QoS monitor can also be used to verify the QoS configur

Page 75 - Alpine Switch Slots and Ports

9-24 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)INTRA-SUBNET QOSIntra-Subnet QoS™ (ISQ) is used only on Extreme switches that do not use t

Page 76

EXTREMEWARE SOFTWARE USER GUIDE9-25DYNAMIC LINK CONTEXT SYSTEMDYNAMIC LINK CONTEXT SYSTEMThe Dynamic Link Context System (DLCS) is a feature that snoo

Page 77

9-26 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)DLCS LIMITATIONSConsider the following limitations concerning data received from WINS snoo

Page 78

EXTREMEWARE SOFTWARE USER GUIDE9-27DYNAMIC LINK CONTEXT SYSTEMconfig isq-server <wins-servers-listname> delete mac <mac-address-of-next-hop&g

Page 79

XVIITask Frame 19-4Content Frame 19-4Browser Controls 19-5Status Messages 19-5Standalone Buttons 19-5Saving Changes 19-6Filtering Information 19-6Do a

Page 80

9-28 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)

Page 81

EXTREMEWARE SOFTWARE USER GUIDE10-110Extreme Standby Router ProtocolThis chapter covers the following topics:• Overview on page 10-1• ESRP Basics on p

Page 82

10-2 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLnetwork system design, ESRP can provide better resiliency than using the Spanning T

Page 83 - 2-port groups x x x x

EXTREMEWARE SOFTWARE USER GUIDE10-3DETERMINING THE ESRP MASTERIf you configure OSPF and ESRP, you must manually configure an OSPF router identifier (I

Page 84

10-4 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLIf any of the configured tracking mechanisms fail, the master ESRP switch relinquis

Page 85

EXTREMEWARE SOFTWARE USER GUIDE10-5DETERMINING THE ESRP MASTERautomatically relinquishes master status and remains in standby mode if a ping keepalive

Page 86

10-6 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLSTANDBY SWITCH BEHAVIORIf a switch is in standby mode, it exchanges ESRP packets wi

Page 87 - ISCOVERY

EXTREMEWARE SOFTWARE USER GUIDE10-7GROUPING BLOCKS OF 10/100 PORTSGROUPING BLOCKS OF 10/100 PORTSRestrictions on port groupings apply only to switches

Page 88

10-8 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLFigure 10-2: Summit24 switch ESRP port blocksFigure 10-3: Summit4 switch ESRP port

Page 89

EXTREMEWARE SOFTWARE USER GUIDE10-9ESRP OPTIONSFigure 10-5: Summit48 switch ESRP port blocksFor switches that do not use the “i” chipset, all VLANs us

Page 90

XVIIITOP Command B-8Contacting Extreme Technical Support B-8INDEXINDEX OF COMMANDS

Page 91

10-10 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLThe ESRP HA option is useful if you are using dual-homed network interface cards (

Page 92

EXTREMEWARE SOFTWARE USER GUIDE10-11ESRP OPTIONSESRP GROUPSExtremeWare supports running multiple instances of ESRP within the same VLAN or broadcast d

Page 93

10-12 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLLINKING ESRP SWITCHESWhen considering system design using ESRP, direct links betwe

Page 94

EXTREMEWARE SOFTWARE USER GUIDE10-13ESRP AND VLAN AGGREGATIONESRP AND VLAN AGGREGATIONESRP can be used to provide redundant default router protection

Page 95

10-14 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLESRP COMMANDSTable 10-1 describes the commands used to configure ESRP.Table 10-1:

Page 96

EXTREMEWARE SOFTWARE USER GUIDE10-15ESRP COMMANDSconfig vlan <name> esrp election-algorithm [ports_track_priority_mac | track_ports_priority_mac

Page 97

10-16 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLESRP EXAMPLESThis section provides examples of ESRP configurations.SINGLE VLAN USI

Page 98 - IRRORING

EXTREMEWARE SOFTWARE USER GUIDE10-17ESRP COMMANDSFigure 10-8: ESRP example using layer 2 and layer 3 redundancyThe BlackDiamond switch, acting as mast

Page 99

10-18 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLflush FDB entries associated with the uplinks to the ESRP-enabled BlackDiamond swi

Page 100 - ONFIGURING

EXTREMEWARE SOFTWARE USER GUIDE10-19ESRP COMMANDSFigure 10-9: ESRP example using layer 2 redundancyThis example builds on the previous example, but el

Page 101 - Failover linksPrimary links

EXTREMEWARE SOFTWARE USER GUIDE XIXPrefaceThis Preface provides an overview of this guide, describes guide conventions, and lists other publications t

Page 102

10-20 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLIn this example, the BlackDiamond switches are configured for ESRP such that the V

Page 103 - Virtual LANs (VLANs)

EXTREMEWARE SOFTWARE USER GUIDE11-111IP Unicast RoutingThis chapter describes the following topics:• Overview of IP Unicast Routing on page 11-2• Prox

Page 104

11-2 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGFor more information on interior gateway protocols, refer to Chapter 12. For information on exte

Page 105 - Marketing

EXTREMEWARE SOFTWARE USER GUIDE11-3OVERVIEW OF IP UNICAST ROUTINGFigure 11-1: Routing between VLANsPOPULATING THE ROUTING TABLE The switch maintains a

Page 106 - System 2

11-4 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGDYNAMIC ROUTESDynamic routes are typically learned by way of RIP or OSPF. Routers that use RIP o

Page 107 - Engineering

EXTREMEWARE SOFTWARE USER GUIDE11-5PROXY ARPYou can also configure blackhole routes — traffic to these destinations is silently dropped.IP ROUTE SHARI

Page 108 - SSIGNING A VLAN TAG

11-6 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTING• The proxy ARP table entry indicates that the system should always answer this ARP Request, reg

Page 109

EXTREMEWARE SOFTWARE USER GUIDE11-7IP MULTINETTINGTo change the relative route priority, use the following command:config iproute priority [rip | boot

Page 110

11-8 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTING• The FDB aging timer is automatically set to 3,000 seconds (50 minutes).• If you are using a UD

Page 111

EXTREMEWARE SOFTWARE USER GUIDE11-9IP MULTINETTING10 Enable IP multinetting, by using the following command:enable multinetting11 If you are using RIP

Page 112 - = All other traffic

II©2000 Extreme Networks, Inc. All rights reserved. Extreme Networks and BlackDiamond are registered trademarks of Extreme Networks, Inc. in the Unite

Page 113

XXEXTREMEWARE SOFTWARE USER GUIDEPREFACE• Internet Packet Exchange (IPX) concepts• Server Load Balancing (SLB) concepts• Simple Network Management Pro

Page 114

11-10 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGcreate vlan net35create vlan net37config net34 ipaddress 192.67.34.1config net35 ipaddress 192.

Page 115

EXTREMEWARE SOFTWARE USER GUIDE11-11VLAN AGGREGATION3 Configure a default route, using the following command:config iproute add default <gateway>

Page 116 - ONFIGURATION

11-12 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGAs a result, sub-VLANs can be quite small, but allow for growth without re-defining subnet boun

Page 117

EXTREMEWARE SOFTWARE USER GUIDE11-13VLAN AGGREGATIONVLAN AGGREGATION PROPERTIESVLAN aggregation is a very specific application, and the following prop

Page 118 - ISPLAYING

11-14 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGISOLATION OPTION FOR COMMUNICATION BETWEEN SUB-VLANSTo facilitate communication between sub-VLA

Page 119 - EGISTRATION

EXTREMEWARE SOFTWARE USER GUIDE11-15VLAN AGGREGATIONVLAN AGGREGATION EXAMPLEThe follow example illustrates how to configure VLAN aggregation. The VLAN

Page 120 - Untagged

11-16 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGCONFIGURING DHCP/BOOTP RELAYOnce IP unicast routing is configured, you can configure the switch

Page 121

EXTREMEWARE SOFTWARE USER GUIDE11-17UDP-FORWARDING• If the UDP profile includes other types of traffic, these packets have the IP destination address

Page 122

11-18 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGICMP PACKET PROCESSINGAs ICMP packets are routed or generated, you can take various actions to

Page 123 - IMITATIONS

EXTREMEWARE SOFTWARE USER GUIDE11-19IP COMMANDSIP COMMANDSTab le 11-4 describes the commands used to configure basic IP settings.create udp-profile &

Page 124

EXTREMEWARE SOFTWARE USER GUIDE XXIRELATED PUBLICATIONSRELATED PUBLICATIONSThe following is a list of related publications:• ExtremeWare Quick Referen

Page 125

11-20 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGconfig iparp add proxy <ipaddress> {<mask>} {<mac_address>} {always}Configure

Page 126

EXTREMEWARE SOFTWARE USER GUIDE11-21IP COMMANDSTab le 11-5 describes the commands used to configure the IP route table.enable bootprelay Enables the

Page 127 - Forwarding Database (FDB)

11-22 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGTab le 11-6 describes the commands used to configure IP options and the ICMP protocol.config ip

Page 128 - ORWARDING

EXTREMEWARE SOFTWARE USER GUIDE11-23IP COMMANDSconfig irdp <mininterval> <maxinterval> <lifetime> <preference>Configures the r

Page 129

11-24 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGenable icmp port-unreachables {vlan <name>} Enables the generation of ICMP port unreachab

Page 130

EXTREMEWARE SOFTWARE USER GUIDE11-25ROUTING CONFIGURATION EXAMPLEROUTING CONFIGURATION EXAMPLEFigure 11-3 illustrates a BlackDiamond switch that has t

Page 131

11-26 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGFigure 11-3: Unicast routing configuration exampleThe stations connected to the system generate

Page 132

EXTREMEWARE SOFTWARE USER GUIDE11-27DISPLAYING ROUTER SETTINGSconfig Finance protocol ipconfig Personnel protocol ipconfig Finance add port 1:*,3:*con

Page 133 - Spanning Tree Protocol (STP)

11-28 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGRESETTING AND DISABLING ROUTER SETTINGSTo return router settings to their defaults and disable

Page 134

EXTREMEWARE SOFTWARE USER GUIDE11-29RESETTING AND DISABLING ROUTER SETTINGSdisable icmp redirects {vlan <name>} Disables the generation of ICMP

Page 135 - ONFIGURATIONS

XXIIEXTREMEWARE SOFTWARE USER GUIDEPREFACE

Page 136 - Sales, Personnel, Marketing

11-30 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTING

Page 137 - Sales & Engineering

EXTREMEWARE SOFTWARE USER GUIDE12-112Interior Gateway Routing ProtocolsThis chapter describes the following topics:• Overview on page 12-2• Overview o

Page 138

12-2 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLS• Interconnections: Bridges and Routers by Radia PerlmanISBN 0-201-56332-0Publis

Page 139

EXTREMEWARE SOFTWARE USER GUIDE12-3OVER VIEW OF RIPRIP has a number of limitations that can cause problems in large networks, including the following:

Page 140

12-4 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLS• IP address of the next router• Timer that tracks the amount of time since the

Page 141 - ESETTING

EXTREMEWARE SOFTWARE USER GUIDE12-5OVERVIEW OF OSPFRIP VERSION 1 VERSUS RIP VERSION 2A new version of RIP, called RIP version 2, expands the functiona

Page 142

12-6 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSAREASOSPF allows parts of a network to be grouped together into areas. The topol

Page 143 - Quality of Service (QoS)

EXTREMEWARE SOFTWARE USER GUIDE12-7OVERVIEW OF OSPFThe backbone allows summary information to be exchanged between ABRs. Every ABR hears the area summ

Page 144

12-8 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSperform translation (as indicated in the NSSA specification). The option should

Page 145 - PPLICATIONS

EXTREMEWARE SOFTWARE USER GUIDE12-9OVERVIEW OF OSPFFigure 12-1: Virtual link using Area 1 as a transit areaVirtual links are also used to repair a dis

Page 146

EXTREMEWARE SOFTWARE USER GUIDE1-11ExtremeWare OverviewThis chapter covers the following topics:• Summary of Features on page 1-1• “i” Chipset Product

Page 147 - TTRIBUTES

12-10 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSFigure 12-2: Virtual link providing redundancyROUTE RE-DISTRIBUTIONBoth RIP and

Page 148

EXTREMEWARE SOFTWARE USER GUIDE12-11ROUTE RE-DISTRIBUTIONFigure 12-3: Route re-distributionCONFIGURING ROUTE RE-DISTRIBUTIONExporting routes from OSPF

Page 149

12-12 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSRE-DISTRIBUTING ROUTES INTO OSPFEnable or disable the exporting of RIP, static,

Page 150

EXTREMEWARE SOFTWARE USER GUIDE12-13ROUTE RE-DISTRIBUTIONIn versions of ExtremeWare prior to release 6.0, direct routes corresponding to the interface

Page 151

12-14 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSCONFIGURING RIPTable 12-2 describes the commands used to configure RIP.Table 12

Page 152 - ERMANENT MAC ADDRESSES

EXTREMEWARE SOFTWARE USER GUIDE12-15CONFIGURING RIPconfig rip txmode [none | v1only | v1comp | v2only] {vlan <name>}Changes the RIP transmission

Page 153 - LACKHOLE

12-16 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSenable rip export [static | direct | ospf | ospf-intra | ospf-inter | ospf-exte

Page 154 - ONFIGURING 802.1P PRIORITY

EXTREMEWARE SOFTWARE USER GUIDE12-17RIP CONFIGURATION EXAMPLERIP CONFIGURATION EXAMPLEFigure 12-4 illustrates a BlackDiamond switch that has three VLA

Page 155 - NFORMATION

12-18 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSFigure 12-4: RIP configuration exampleThe stations connected to the system gene

Page 156

EXTREMEWARE SOFTWARE USER GUIDE12-19DISPLAYING RIP SETTINGSThe example in Figure 12-4 is configured as follows:create vlan Financecreate vlan Personne

Page 157

1-2 EXTREMEWARE SOFTWARE USER GUIDEEXTREMEWARE OVER VIEW• Extreme Standby Router Protocol (ESRP)• Routing Information Protocol (RIP) version 1 and RIP

Page 158

12-20 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSRESETTING AND DISABLING RIPTo return RIP settings to their defaults, or to disa

Page 159

EXTREMEWARE SOFTWARE USER GUIDE12-21CONFIGURING OSPFCONFIGURING OSPFEach switch that is configured to run OSPF must have a unique router ID. It is rec

Page 160 - EPLACING

12-22 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSconfig ospf [vlan <name> | area <areaid> | virtual-link <routeri

Page 161 - point instead of repeating

EXTREMEWARE SOFTWARE USER GUIDE12-23CONFIGURING OSPFconfig ospf area <areaid> nssa [summary | nosummary] stub-default-cost <cost> {transla

Page 162 - ROUPINGS

12-24 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSconfig ospf spf-hold-time {<seconds>} Configures the minimum number of se

Page 163 - ERFORMANCE

EXTREMEWARE SOFTWARE USER GUIDE12-25OSPF CONFIGURATION EXAMPLEOSPF CONFIGURATION EXAMPLEFigure 12-5 shows an example of an autonomous system using OSP

Page 164

12-26 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSArea 0 is the backbone area. It is located at the headquarters and has the foll

Page 165 - ODIFYING

EXTREMEWARE SOFTWARE USER GUIDE12-27OSPF CONFIGURATION EXAMPLECONFIGURATION FOR ABR1The following is the configuration for the router labeled ABR1:cre

Page 166

12-28 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSDISPLAYING OSPF SETTINGSTo display settings for OSPF, use the commands listed i

Page 167

EXTREMEWARE SOFTWARE USER GUIDE12-29RESETTING AND DISABLING OSPF SETTINGSdisable ospf export direct Disables exporting of local interface (direct) rou

Page 168

EXTREMEWARE SOFTWARE USER GUIDE1-3SUMMARY OF FEATURESVIRTUAL LANS (VLANS)ExtremeWare has a VLAN feature that enables you to construct your broadcast d

Page 169

12-30 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLS

Page 170

EXTREMEWARE SOFTWARE USER GUIDE13-113Exterior Gateway Routing ProtocolsThis chapter covers the following topics:• Overview on page 13-2• BGP Attribute

Page 171

13-2 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSOVERVIEWBGP is an exterior routing protocol that was developed for use in TCP/IP

Page 172

EXTREMEWARE SOFTWARE USER GUIDE13-3BGP COMMUNITIES• Community – Identifies a group of destinations that share one or more common attributes.• Cluster_

Page 173 - ETERMINING

13-4 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSFigure 13-1: Route reflectorsROUTE CONFEDERATIONSBGP requires networks to use a

Page 174

EXTREMEWARE SOFTWARE USER GUIDE13-5BGP FEATURESFigure 13-2: Routing confederationIn this example, AS 200 has five BGP speakers. Without a confederatio

Page 175 - LGORITHMS

13-6 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSenable ipforwarding vlan ac config ospf add vlan ac area 0.0.0.0 disable bgpco

Page 176

EXTREMEWARE SOFTWARE USER GUIDE13-7BGP FEATURESTo configure Router C, use the following commands:create vlan caconfig vlan ca add port 1config vlan c

Page 177 - BD_F32T8

13-8 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLScreate bgp neighbor 192.1.1.9 as-number remote-AS-number 65001create bgp neighbo

Page 178 - SUG_4FX8

EXTREMEWARE SOFTWARE USER GUIDE13-9BGP FEATURESIGP SYNCHRONIZATIONYou can configure an AS to be a transit AS, so that it can pass traffic through from

Page 179 - SUG_48f8

1-4 EXTREMEWARE SOFTWARE USER GUIDEEXTREMEWARE OVER VIEWFor more information on Quality of Service, refer to Chapter 9.UNICAST ROUTINGThe switch can r

Page 180 - OSPF/BGP4

13-10 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSCONFIGURING BGPTable 13-1 describes the commands used to configure BGP.Table 13

Page 181

EXTREMEWARE SOFTWARE USER GUIDE13-11CONFIGURING BGPconfig bgp add dampening <halflife> <reuse> <suppress> <max_suppression> bg

Page 182

13-12 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSconfig bgp dampening <halflife> <reuse> <suppress> <max_su

Page 183 - AGGREGATION

EXTREMEWARE SOFTWARE USER GUIDE13-13CONFIGURING BGPconfig bgp neighbor [<ipaddress> | all] [route-reflector-client | no-route-reflector-client]C

Page 184 - Table 10-1: ESRP Commands

13-14 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSconfig bgp neighbor [<ipaddress> | all] weight <weight>Assigns a lo

Page 185

EXTREMEWARE SOFTWARE USER GUIDE13-15DISPLAYING BGP SETTINGSDISPLAYING BGP SETTINGSTo display settings for BGP, use the commands listed in Table 13-2.R

Page 186

13-16 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLS

Page 187 - OSPF or RIP

EXTREMEWARE SOFTWARE USER GUIDE14-114IP Multicast RoutingThis chapter covers the following topics:• Overview on page 14-2• Configuring IP Multicasting

Page 188

14-2 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGOVERVIEWIP multicast routing is a function that allows a single IP host to send a packet to a

Page 189

EXTREMEWARE SOFTWARE USER GUIDE14-3OVERVIEWPIM DENSE MODEProtocol Independent Multicast- Dense Mode (PIM-DM) is a multicast routing protocol that is s

Page 190

EXTREMEWARE SOFTWARE USER GUIDE1-5“I” CHIPSET PRODUCTSFor information on load sharing, refer to Chapter 4 and Chapter 5.“i” CHIPSET PRODUCTSSummit swi

Page 191 - IP Unicast Routing

14-4 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGIGMP is enabled by default on the switch. However, the switch can be configured to disable the

Page 192 - NTERFACES

EXTREMEWARE SOFTWARE USER GUIDE14-5CONFIGURING IP MULTICASTING ROUTING4 Enable DVMRP or PIM on the router, using one of the following commands:enable

Page 193 - OPULATING

14-6 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGconfig dvmrp vlan <name> timer <probe_interval> <neighbor_timeout_interval>C

Page 194 - ULTIPLE ROUTES

EXTREMEWARE SOFTWARE USER GUIDE14-7CONFIGURING IP MULTICASTING ROUTINGTable 14-2 describes the commands used to configure the Internet Gateway Message

Page 195 - NCAPABLE

14-8 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGTable 14-2: IGMP Configuration CommandsCommand Descriptionconfig igmp <query_interval> &

Page 196 - RIORITIES

EXTREMEWARE SOFTWARE USER GUIDE14-9CONFIGURATION EXAMPLESCONFIGURATION EXAMPLESFigure 14-1 and Figure 13-2 are used in Chapter 12 to describe the OSPF

Page 197 - ULTINETTING

14-10 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGPIM-DM CONFIGURATION EXAMPLEFigure 14-1: IP multicast routing using PIM-DM configuration exam

Page 198 - PERATION

EXTREMEWARE SOFTWARE USER GUIDE14-11CONFIGURATION EXAMPLESCONFIGURATION FOR IR1The following is the configuration for the router labeled IR1:config vl

Page 199

14-12 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGFigure 14-2: IP multicast routing using PIM-SM configuration exampleArea 010.0.1.1HQ_10_0_110

Page 200

EXTREMEWARE SOFTWARE USER GUIDE14-13DISPLAYING IP MULTICAST ROUTING SETTINGSCONFIGURATION FOR ABR1The following is the configuration for the router la

Page 201 - GGREGATION

1-6 EXTREMEWARE SOFTWARE USER GUIDEEXTREMEWARE OVER VIEWSOFTWARE LICENSINGSome Extreme Networks products have capabilities that are enabled by using a

Page 202 - 1234AB5678

14-14 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGDELETING AND RESETTING IP MULTICAST SETTINGSTo return IP multicast routing settings to their

Page 203 - ROPERTIES

EXTREMEWARE SOFTWARE USER GUIDE15-115IPX RoutingThis chapter describes the following topics:• Overview of IPX on page 15-1• IPX/RIP Routing on page 15

Page 204

15-2 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGAs you create VLANs with different IPX NetIDs the switch automatically routes between them. Both the VL

Page 205

EXTREMEWARE SOFTWARE USER GUIDE15-3OVERVIEW OF IPXTraffic within each VLAN is switched using the Ethernet MAC address. Traffic between Exec and Suppor

Page 206 - DHCP/BOOTP R

15-4 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGPOPULATING THE ROUTING TABLE The switch builds and maintains an IPX routing table. As in the case of IP

Page 207

EXTREMEWARE SOFTWARE USER GUIDE15-5IPX/RIP ROUTINGIPX/RIP is automatically enabled when a NetID is assigned to the VLAN. To remove the advertisement o

Page 208 - ROCESSING

15-6 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGCONFIGURING IPXThis section describes the commands associated with configuring IPX, IPX/RIP, and IPX/SA

Page 209 - Table 11-4: Basic IP Commands

EXTREMEWARE SOFTWARE USER GUIDE15-7IPX COMMANDSPROTOCOL-BASED VLANS FOR IPXWhen combining IPX VLANs with other VLANs on the same physical port, it may

Page 210

15-8 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGconfig ipxroute add [<dest_netid> | default] <next_hop_id> <next_hop_node_addr> <h

Page 211

EXTREMEWARE SOFTWARE USER GUIDE15-9IPX COMMANDSTable 15-4 describes the commands used to configure the IPX route table.config vlan <name> xnetid

Page 212

EXTREMEWARE SOFTWARE USER GUIDE1-7SOFTWARE LICENSINGPRODUCT SUPPORTExtremeWare version 6.0 and above supports router licensing on the Summit24 switch,

Page 213

15-10 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGTable 15-5 describes the commands used to configure IPX/SAP.config ipxrip vlan [<name> | all] up

Page 214

EXTREMEWARE SOFTWARE USER GUIDE15-11IPX CONFIGURATION EXAMPLEIPX CONFIGURATION EXAMPLEFigure 15-2 builds on the example showing the IP/RIP configurati

Page 215

15-12 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGFigure 15-2: IPX routing configuration exampleThe stations connected to the system generate a combinat

Page 216 - = NetBIOS traffic

EXTREMEWARE SOFTWARE USER GUIDE15-13DISPLAYING IPX SETTINGSThe IPX configuration shown in example in Figure 15-2 is as follows:create vlan Execcreate

Page 217

15-14 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGRESETTING AND DISABLING IPXTo return IPX settings to their defaults and disable IPX functions, use the

Page 218

EXTREMEWARE SOFTWARE USER GUIDE16-116Access PoliciesThis chapter describes the following topics:• Overview of Access Policies on page 16-1• Using IP A

Page 219

16-2 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESIP ACCESS LISTSIP access lists consist of IP access rules, and are used to perform packet filtering

Page 220

EXTREMEWARE SOFTWARE USER GUIDE16-3USING IP ACCESS LISTS• Physical source port• Precedence number (optional)HOW IP ACCESS LISTS WORKWhen a packet arri

Page 221 - Protocols

16-4 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESThe access-list example, below, performs packet filtering in the following sequence, as determined

Page 222 - ROTOCOLS

EXTREMEWARE SOFTWARE USER GUIDE16-5USING IP ACCESS LISTSMAXIMUM ENTRIESA maximum of 255 entries with an assigned precedence can be used. In addition t

Page 223 - VER VIEW

IIIContentsPREFACEIntroduction xixTerminology xxConventions xxRelated Publications xxi1EXTREMEWARE OVERVIEWSummary of Features 1-1Virtual LANs (VLANs)

Page 224

1-8 EXTREMEWARE SOFTWARE USER GUIDEEXTREMEWARE OVER VIEWOBTAINING A SECURITY LICENSETo obtain information on enabling features that require export res

Page 225

16-6 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESVERIFYING ACCESS LIST CONFIGURATIONSTo verify access list settings you can view the access list con

Page 226

EXTREMEWARE SOFTWARE USER GUIDE16-7USING IP ACCESS LISTSTable 16-1: Access List Configuration CommandsCommand Descriptioncreate access-list <name&g

Page 227

16-8 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIEScreate access-list <name> tcp destination [<dst_ipaddress>/<dst_mask> | any] ip-p

Page 228

EXTREMEWARE SOFTWARE USER GUIDE16-9USING IP ACCESS LISTScreate access-list <name> udp destination [<dst_ipaddress>/<dst_mask> | any]

Page 229 - Area 2 Area 1 Area 0

16-10 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIEScreate access-list icmp destination [<dest_ipaddress>/<mask> | any] source [<src_ip

Page 230 - Area 1 Area 0 Area 3

EXTREMEWARE SOFTWARE USER GUIDE16-11USING IP ACCESS LISTSIP ACCESS LIST EXAMPLESThis section presents two IP access list examples:• Using the permit-e

Page 231 - ASBR ASBR

16-12 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESThe following command creates the access-list:create access-list denyall ip destination any source

Page 232

EXTREMEWARE SOFTWARE USER GUIDE16-13USING IP ACCESS LISTSFigure 16-3: Access list allows TCP trafficStep 3 - Permit-Established Access List. When a T

Page 233 - ISTRIBUTING

16-14 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESThe exact command line entry for this example is as follows:create access-list telnet-allow tcp de

Page 234

EXTREMEWARE SOFTWARE USER GUIDE16-15USING ROUTING ACCESS POLICIESFigure 16-6: ICMP packets are filtered outUSING ROUTING ACCESS POLICIESTo use routing

Page 235

EXTREMEWARE SOFTWARE USER GUIDE1-9SOFTWARE FACTORY DEFAULTSFor default settings of individual ExtremeWare features, refer to individual chapters in th

Page 236 - Triggered update

16-16 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESCREATING AN ACCESS PROFILEThe first thing to do when using routing access policies is to create an

Page 237

EXTREMEWARE SOFTWARE USER GUIDE16-17USING ROUTING ACCESS POLICIESTo configure the access profile mode, use the following command:config access-profile

Page 238

16-18 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESPERMIT AND DENY ENTRIESIf you have configured the access profile mode to be none, you must specify

Page 239

EXTREMEWARE SOFTWARE USER GUIDE16-19USING ROUTING ACCESS POLICIESROUTING ACCESS POLICIES FOR RIPIf you are using the RIP protocol, the switch can be c

Page 240

16-20 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESFigure 16-7: RIP access policy exampleAssuming the backbone VLAN interconnects all the routers in

Page 241

EXTREMEWARE SOFTWARE USER GUIDE16-21USING ROUTING ACCESS POLICIESIn addition, if the administrator wants to restrict any user belonging to the VLAN En

Page 242

16-22 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESfor the switch as a whole. To configure a direct filter policy, use the following command:config o

Page 243

EXTREMEWARE SOFTWARE USER GUIDE16-23USING ROUTING ACCESS POLICIESTo configure the switch labeled Internet, the commands would be as follows:create acc

Page 244

16-24 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESTo configure the switch labeled Engsvrs, use the following commands:create access-profile nointern

Page 245

EXTREMEWARE SOFTWARE USER GUIDE16-25MAKING CHANGES TO A ROUTING ACCESS POLICYTo configure the switch labeled Engsvrs, the commands would be as follows

Page 246

1-10 EXTREMEWARE SOFTWARE USER GUIDEEXTREMEWARE OVER VIEW

Page 247

16-26 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESon the ingress or egress side, depending on the change. For soft resets to be applied on the ingre

Page 248

EXTREMEWARE SOFTWARE USER GUIDE16-27ROUTING ACCESS POLICY COMMANDSTable 16-3: Routing Access Policy Configuration CommandsCommand Descriptionconfig ac

Page 249

16-28 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESconfig access-profile <access_profile> mode [permit | deny | none]Configures the access prof

Page 250

EXTREMEWARE SOFTWARE USER GUIDE16-29USING ROUTE MAPSUSING ROUTE MAPSRoute maps are a mechanism that can be used to conditionally control the redistrib

Page 251 - Exterior Gateway Routing

16-30 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESTo create a route map, do the following:1 Create a route map.2 Add entries to the route map.3 Add

Page 252

EXTREMEWARE SOFTWARE USER GUIDE16-31USING ROUTE MAPSconfig route-map <route-map> <sequence number> add set [as-path <as_num> | commu

Page 253 - OMMUNITIES

16-32 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESROUTE MAP OPERATIONThe entries in the route map are processed in the ascending order of the sequen

Page 254 - OUTE CONFEDERATION EXAMPLE

EXTREMEWARE SOFTWARE USER GUIDE16-33USING ROUTE MAPSFigure 16-9: Route mapsThe following points apply to this example:• RTA is a member of in AS 1111

Page 255

16-34 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESconfig bgp-out add 20 permitconfig bgp neighbor 10.0.0.2 route-map-filter out bgp-outconfig bgp ne

Page 256

EXTREMEWARE SOFTWARE USER GUIDE16-35USING ROUTE MAPSROUTE MAP COMMANDSTable 16-6 describes route map commands.Table 16-6: Route Map CommandsCommand De

Page 257

EXTREMEWARE SOFTWARE USER GUIDE2-12Accessing the SwitchThis chapter covers the following topics:• Understanding the Command Syntax on page 2-1• Line-E

Page 258

16-36 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESconfig route-map <route-map> <sequence number> delete match [nlri-list <access_prof

Page 259

EXTREMEWARE SOFTWARE USER GUIDE17-117Server Load Balancing (SLB)This chapter describes the following topics:• Overview on page 17-2• SLB Components on

Page 260

17-2 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)OVERVIEWServer Load Balancing (SLB) is a feature of the switch that divides many client

Page 261

EXTREMEWARE SOFTWARE USER GUIDE17-3SLB COMPONENTSNODESA node is an individual service on a physical server that consists of an IP addresses and a port

Page 262

17-4 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)Once you know which virtual server options are useful in your network, you can:• Define

Page 263

EXTREMEWARE SOFTWARE USER GUIDE17-5FORWARDING MODESFORWARDING MODESThe switch supports the following SLB forwarding modes:• Tran sp arent• Tran sl at

Page 264

17-6 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)To configure transparent mode, use the following command:create slb vip <vipname>

Page 265

EXTREMEWARE SOFTWARE USER GUIDE17-7FORWARDING MODES• The service is configured to use the appropriate address and port, as specified in the switch con

Page 266

17-8 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)The following commands enable SLB, configure the server VLAN to act as the server side,

Page 267 - IP Multicast Routing

EXTREMEWARE SOFTWARE USER GUIDE17-9FORWARDING MODESFigure 17-3: Translational modeIn Figure 17-3, the switch is configured to respond to requests for

Page 268 - ULTICAST

2-2 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCH3 The value part of the command specifies how you want the parameter to be set. Values include

Page 269 - PARSE MODE (PIM-SM)

17-10 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)config client add port 1-4enable ipforwardingThe following commands create a round-rob

Page 270 - ULTICASTING

EXTREMEWARE SOFTWARE USER GUIDE17-11FORWARDING MODESTo configure port translation mode, use the following command:create slb vip <vipname> pool

Page 271

17-12 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)The servers are configured as follows:• All servers have the same MAC address.• All se

Page 272

EXTREMEWARE SOFTWARE USER GUIDE17-13BALANCING METHODSprotocol is enabled, the subnet containing the VIPs is propagated through the network.BALANCING M

Page 273 - Protocol (IGMP)

17-14 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)where the number of connections that each machine receives over time is proportionate

Page 274

EXTREMEWARE SOFTWARE USER GUIDE17-15BASIC SLB COMMANDSThe switch will distribute traffic in round-robin fashion among the pools active nodes with the

Page 275

17-16 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)create slb pool <poolname> {slb-method [round-robin | ratio | priority | least-c

Page 276 - PIM-DM C

EXTREMEWARE SOFTWARE USER GUIDE17-17BASIC SLB COMMANDSdisable slb vip <vipname> {close-connections-now} Disables a VIP group. When disabled, no

Page 277

17-18 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)ADVANCED SLB APPLICATION EXAMPLEThis example builds upon the Introductory SLB Applicat

Page 278

EXTREMEWARE SOFTWARE USER GUIDE17-19ADVANCED SLB APPLICATION EXAMPLEFigure 17-5: Advanced SLB configurationThe commands used to configure are describe

Page 279

EXTREMEWARE SOFTWARE USER GUIDE2-3UNDERSTANDING THE COMMAND SYNTAXOnce you have created the VLAN with a unique name, you can then eliminate the keywor

Page 280

17-20 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)To create is the virtual IP VLAN, use the following commands: create vlan sitesconfig

Page 281 - IPX Routing

EXTREMEWARE SOFTWARE USER GUIDE17-21ADVANCED SLB APPLICATION EXAMPLEcreate slb pool site2webconfig slb site2web add 192.168.200.5:80config slb site2we

Page 282 - 192.207.36.0

17-22 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)enable slb vip ftpc service-checkconfig slb vip ftpc service-check ftp user test passw

Page 283 - NCAPSULATION

EXTREMEWARE SOFTWARE USER GUIDE17-23HEALTH CHECKINGPING-CHECKPing-check is Layer 3 based pinging of the physical node. The default ping frequency is o

Page 284 - TATIC ROUTES

17-24 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)SERVICE-CHECKService-check is Layer 7 based application-dependent checking defined on

Page 285 - DVERTISEMENTS

EXTREMEWARE SOFTWARE USER GUIDE17-25HEALTH CHECKINGFor SMTP, service-check identifies the identity of the switch by providing the specified DNS domain

Page 286

17-26 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)PERSISTENCEUsing persistence, you can ensure that traffic flows do not span multiple s

Page 287

EXTREMEWARE SOFTWARE USER GUIDE17-27USING HIGH AVAILABILITY SYSTEM FEATURESYou can only activate sticky persistence on wildcard virtual servers.To con

Page 288

17-28 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)The switches in a redundant SLB configuration should have identical SLB configurations

Page 289

EXTREMEWARE SOFTWARE USER GUIDE17-29USING HIGH AVAILABILITY SYSTEM FEATURESTo assign a VIP to a unit, use the following command:config slb vip <vip

Page 290

2-4 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCHSUMMIT SWITCH NUMERICAL RANGESCommands that require you to enter one or more port numbers on a

Page 291

17-30 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)create vlan insidecreate vlan serverconfig vlan inside ipaddress 1.10.0.2 /16config vl

Page 292

EXTREMEWARE SOFTWARE USER GUIDE17-31USING HIGH AVAILABILITY SYSTEM FEATUREScreate slb pool testpoolconfig slb pool testpool add 1.206.1.1:80config slb

Page 293

17-32 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)3DNS SUPPORTWhen you enable SLB, the switch reports health status to 3DNS using the iQ

Page 294

EXTREMEWARE SOFTWARE USER GUIDE17-33ADVANCED SLB COMMANDSconfig slb failover unit [1 | 2] remote-ip <ipaddress> local-ip <ipaddress>:<L

Page 295 - Access Policies

17-34 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)config slb global [ping-check | tcp-port-check | service-check] frequency <seconds&

Page 296

EXTREMEWARE SOFTWARE USER GUIDE17-35ADVANCED SLB COMMANDSconfig slb global telnet userid <userid> password {encrypted} {<password>}Configu

Page 297

17-36 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)config slb vip <vipname> unit {1 | 2} Configures a unit number of a VIP name for

Page 298 - ESTABLISHED

EXTREMEWARE SOFTWARE USER GUIDE17-37ADVANCED SLB COMMANDSenable slb node <ipaddress> ping-check Enables L3 pinging to the node address. Ping-che

Page 299

17-38 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)WEB CACHE REDIRECTIONWeb cache redirection uses the TCP or UDP port number to redirect

Page 300

EXTREMEWARE SOFTWARE USER GUIDE17-39WEB CACHE REDIRECTIONFLOW REDIRECTION COMMANDSTo configure flow redirection, use the commands listed in Table 17-5

Page 301

EXTREMEWARE SOFTWARE USER GUIDE2-5LINE-EDITING KEYSLINE-EDITING KEYSTab le 2-2 describes the line-editing keys available using the CLI.vertical bar |

Page 302

17-40 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)Figure 17-7: Flow-redirection exampleThe following commands are used to configure the

Page 303

EXTREMEWARE SOFTWARE USER GUIDE18-118Status Monitoring and StatisticsThis chapter describes the following topics:• Status Monitoring on page 18-1• Slo

Page 304

18-2 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICSFor more information about show commands for a specific ExtremeWare feature, refer

Page 305 - 10.10.20.1

EXTREMEWARE SOFTWARE USER GUIDE18-3SLOT DIAGNOSTICSSLOT DIAGNOSTICSThe BlackDiamond switch provides a facility for running normal or extended diagnost

Page 306 - NET20 VLANNET10 VLAN

18-4 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICS•extended — Takes the switch fabric and ports offline, and performs extensive ASIC

Page 307

EXTREMEWARE SOFTWARE USER GUIDE18-5PORT ERRORS• Received Broadcast (RX Bcast) — The total number of frames received by the port that are addressed to

Page 308 - XAMPLE 2: FILTER ICMP PACKETS

18-6 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICSThe following port receive error information is collected by the switch:• Receive

Page 309

EXTREMEWARE SOFTWARE USER GUIDE18-7SETTING THE SYSTEM RECOVERY LEVELSETTING THE SYSTEM RECOVERY LEVELYou can configure the system to automatically reb

Page 310

18-8 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICSBy default, log entries that are assigned a critical or warning level remain in th

Page 311 - EQUENCE NUMBERING

EXTREMEWARE SOFTWARE USER GUIDE18-9LOGGINGLOCAL LOGGINGThe switch maintains 1,000 messages in its internal log. You can display a snapshot of the log

Page 312

2-6 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCHCOMMAND HISTORYExtremeWare “remembers” the last 49 commands you entered. You can display a list

Page 313

18-10 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICS• Configure remote logging by using the following command:config syslog {add} <

Page 314 - Engsvrs Sales

EXTREMEWARE SOFTWARE USER GUIDE18-11LOGGINGLOGGING COMMANDSThe commands described in Table 18-5 allow you to configure logging options, reset logging

Page 315

18-12 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICSRMONUsing the Remote Monitoring (RMON) capabilities of the switch allows network

Page 316

EXTREMEWARE SOFTWARE USER GUIDE18-13RMON• Management workstation — Communicates with the RMON probe and collects the statistics from it. The workstati

Page 317

18-14 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICSAlarms inform you of a network performance problem and can trigger automated acti

Page 318

EXTREMEWARE SOFTWARE USER GUIDE18-15RMONEVENT ACTIONSThe actions that you can define for each alarm are shown in Tab le 18 -6.To be notified of events

Page 319

18-16 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICS

Page 320

EXTREMEWARE SOFTWARE USER GUIDE19-119Using ExtremeWare VistaThis chapter covers the following topics:• Enabling and Disabling Web Access on page 19-2•

Page 321

19-2 EXTREMEWARE SOFTWARE USER GUIDEUSING EXTREMEWARE VISTAENABLING AND DISABLING WEB ACCESSBy default, Web access is enabled on the switch. Use of Ex

Page 322

EXTREMEWARE SOFTWARE USER GUIDE19-3ACCESSING EXTREMEWARE VISTA• Check for newer versions of stored pages. Every visit to the page should be selected a

Page 323

EXTREMEWARE SOFTWARE USER GUIDE2-7COMMON COMMANDSconfig slot <slot> module [f32t | f32f | f48t | g4x | g6x | g8x | g12x]Configures a slot for a

Page 324

19-4 EXTREMEWARE SOFTWARE USER GUIDEUSING EXTREMEWARE VISTATo correct this situation, log out of the switch and log in again.NAVIGATING EXTREMEWARE VI

Page 325

EXTREMEWARE SOFTWARE USER GUIDE19-5NAVIGATING EXTREMEWARE VISTABROWSER CONTROLSBrowser controls include drop-down list boxes, check boxes, and multi-s

Page 326 - OUTE MAP EXAMPLE

19-6 EXTREMEWARE SOFTWARE USER GUIDEUSING EXTREMEWARE VISTASAVING CHANGESThere are two ways to save your changes to non-volatile storage using Extreme

Page 327

EXTREMEWARE SOFTWARE USER GUIDE19-7DO A GET WHEN CONFIGURING A VLANDO A GET WHEN CONFIGURING A VLANWhen configuring a VLAN using ExtremeWare Vista, pr

Page 328

19-8 EXTREMEWARE SOFTWARE USER GUIDEUSING EXTREMEWARE VISTA

Page 329

EXTREMEWARE SOFTWARE USER GUIDE20-120Software Upgrade and Boot OptionsThis chapter describes the following topics:• Downloading a New Image on page 20

Page 330

20-2 EXTREMEWARE SOFTWARE USER GUIDESOFTWARE UPGRADE AND BOOT OPTIONS• Download the new image to the switch using the commanddownload image [<ipadd

Page 331 - Server Load Balancing (SLB)

EXTREMEWARE SOFTWARE USER GUIDE20-3SAVING CONFIGURATION CHANGESSAVING CONFIGURATION CHANGESThe configuration is the customized set of parameters that

Page 332 - OMPONENTS

20-4 EXTREMEWARE SOFTWARE USER GUIDESOFTWARE UPGRADE AND BOOT OPTIONSUSING TFTP TO UPLOAD THE CONFIGURATIONYou can upload the current configuration to

Page 333

EXTREMEWARE SOFTWARE USER GUIDE20-5USING TFTP TO DOWNLOAD THE CONFIGURATIONUSING TFTP TO DOWNLOAD THE CONFIGURATIONYou can download ASCII files that c

Page 334 - ALANCING

IVSecurity Features Under License Control 1-8Software Factory Defaults 1-82ACCESSING THE SWITCHUnderstanding the Command Syntax 2-1Syntax Helper 2-2Co

Page 335

2-8 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCHdelete vlan <name> Deletes a VLAN.disable bootp vlan [<name> | all] Disables BOOTP

Page 336

20-6 EXTREMEWARE SOFTWARE USER GUIDESOFTWARE UPGRADE AND BOOT OPTIONSTo download an incremental configuration, use the following command:download conf

Page 337

EXTREMEWARE SOFTWARE USER GUIDE20-7SYNCHRONIZING MSMSSYNCHRONIZING MSMS On the BlackDiamond switch, you can take the master MSM configurations and ima

Page 338 - RANSLATIONAL

20-8 EXTREMEWARE SOFTWARE USER GUIDESOFTWARE UPGRADE AND BOOT OPTIONSAs soon as you see the BootROM-> prompt, release the spacebar. You can see a

Page 339

EXTREMEWARE SOFTWARE USER GUIDE20-9BOOT OPTION COMMANDSdownload configuration <hostname | ipaddress> <filename> {incremental}Downloads a c

Page 340 - RANSLATION

20-10 EXTREMEWARE SOFTWARE USER GUIDESOFTWARE UPGRADE AND BOOT OPTIONSuse configuration [primary | secondary] Configures the switch to use a particula

Page 341 - Clients Servers

EXTREMEWARE SOFTWARE USER GUIDEA-1ASupported StandardsThe following is a list of software standards supported by ExtremeWare.Standards and ProtocolsRF

Page 342 - DVERTISEMENT

A-2 EXTREMEWARE SOFTWARE USER GUIDESUPPORTED STANDARDSManagement and SecurityRFC 1157 SNMP v1/v2cRFC 1213 MIB IIRFC 1354 IP forwarding table MIBRFC 14

Page 343

EXTREMEWARE SOFTWARE USER GUIDEB-1BTroubleshootingIf you encounter problems when using the switch, this appendix may be helpful. If you have a problem

Page 344 - ONNECTIONS

B-2 EXTREMEWARE SOFTWARE USER GUIDETROUBLESHOOTING• Both ends of the Gigabit link are set to the same autonegotiation state.Both sides if the Gigabit

Page 345

EXTREMEWARE SOFTWARE USER GUIDEB-3USING THE COMMAND-LINE INTERFACEIf this does not work, try using a different power source (different power strip/out

Page 346

EXTREMEWARE SOFTWARE USER GUIDE2-9CONFIGURING MANAGEMENT ACCESSCONFIGURING MANAGEMENT ACCESSExtremeWare supports the following two levels of managemen

Page 347

B-4 EXTREMEWARE SOFTWARE USER GUIDETROUBLESHOOTINGThe SNMP Network Manager or Telnet workstation can no longer access the device:Check that Telnet acc

Page 348 - PPLICATION

EXTREMEWARE SOFTWARE USER GUIDEB-5USING THE COMMAND-LINE INTERFACEIn the case where no one knows a password for an administrator level user, contact y

Page 349 - Server pools

B-6 EXTREMEWARE SOFTWARE USER GUIDETROUBLESHOOTINGEnsure that you are using multi-mode fiber (MMF) when using a 1000BASE-SX GBIC, and single mode fibe

Page 350

EXTREMEWARE SOFTWARE USER GUIDEB-7USING THE COMMAND-LINE INTERFACE802.1Q links do not work correctly:Remember that VLAN names are only locally signifi

Page 351

B-8 EXTREMEWARE SOFTWARE USER GUIDETROUBLESHOOTINGDEBUG TRACINGExtremeWare includes a debug-tracing facility for the switch. The show debug-tracing co

Page 352

IndexNumerics3DNS 17-32802.1p configuration commands (table) 9-14Aaccess levels 2-9access listsBlackDiamond switch maximum entries 16-5configuration c

Page 353

II - INDEXport configuration 4-2port-mirroring, virtual port 4-11slot configuration 4-1verifying load sharing 4-11blackhole entries, FDB 7-2boot optio

Page 354

INDEX - IIIhost attach 10-9linking switches 10-12masterbehavior 10-5definition 10-2determining 10-3electing 10-6election algorithms 10-5port blocks 10

Page 355 - ERVICE-CHECK COMMANDS

IV - INDEXresetting 14-14settings, displaying 14-13show commands (table) 14-13IP multinettingdescription 11-7example 11-9primary VLAN interface 11-7se

Page 356 - ERSISTENCE

INDEX - Vverifying the configuration on Summit switch 5-10local logging 18-9log display 18-9loggingand Telnet 18-9commands (table) 18-11configuration

Page 357 - VAILABILITY

2-10 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCHUSER ACCOUNTA user-level account has viewing access to all manageable parameters, with the exc

Page 358 - SLB switch

VI - INDEXport-mirroringBlackDiamond switch configuration commands (table) 4-12BlackDiamond switch example 4-12description on BlackDiamond switch 4-11

Page 359

INDEX - VIIconfiguration commands (table) 16-35creating 16-30description 16-2, 16-29example 16-32goto entries 16-31match entries 16-31match operation

Page 360

VIII - INDEXusing 3-10SNTPconfiguration commands (table) 3-25configuring 3-22Daylight Savings Time 3-22description 3-21example 3-25Greenwich Mean Time

Page 361 - SING MANUAL FAIL-BACK

INDEX - IXVirtual LANs. See VLANsvirtual link, OSPF 12-8virtual port on Summit switch 5-11VLAN aggregationcommands (table) 11-14description 11-11limit

Page 362

X - INDEX

Page 363

Index of CommandsCclear counters 18-11clear dlcs 9-26clear fdb 7-3, 9-11clear igmp snooping 14-14clear iparp 11-19, 11-28clear ipfdb 11-19, 11-2

Page 364

ii - Index of Commands16-28config esrp port-mode 10-14config fdb agingtime 7-3config flow redirection add next-hop 17-39config flow-redirection del

Page 365

Index of Commands - iiiconfig rip vlan import-filter 16-19, 16-29config rip vlan trusted-gateway 16-19, 16-29config route-map add 16-30, 16-36confi

Page 366

iv - Index of Commandscreate access-list udp destination 16-9create access-profile 16-29create account 2-7, 2-12create bgp neighbor 13-14create fd

Page 367

Index of Commands - vdisable radius-accounting 3-16disable red ports 9-8disable rip 12-20disable rip aggregation 12-20disable rip export 11-4, 12

Page 368 - EDIRECTION

EXTREMEWARE SOFTWARE USER GUIDE2-11CONFIGURING MANAGEMENT ACCESSDEFAULT ACCOUNTSBy default, the switch is configured with two accounts, as shown in Ta

Page 369

vi - Index of Commandsenable license 2-8enable license security 3-7enable log display 18-9, 18-12enable loopback-mode vlan 11-21enable mac-vlan 6

Page 370 - Cache VLAN

Index of Commands - viishow dlcs 9-27show dns-client 2-13show dot1p 9-14show dvmrp 14-13show edp 4-13, 5-12show esrp 10-5, 10-13, 10-16, 10-20sh

Page 371 - ONITORING

viii - Index of Commandsunconfig vlan xnetid 15-14upload configuration 2-13, 20-4, 20-9upload configuration cancel 20-4, 20-9use configuration 20-

Page 372 - Table 18-1 describes

2-12 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCH5 Re-enter the new password at the prompt.If you forget your password while logged out of the

Page 373 - IAGNOSTICS

EXTREMEWARE SOFTWARE USER GUIDE2-13DOMAIN NAME SERVICE CLIENT SERVICESDOMAIN NAME SERVICE CLIENT SERVICESThe Domain Name Service (DNS) client in Extre

Page 374 - TATISTICS

2-14 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCHPINGThe ping command enables you to send Internet Control Message Protocol (ICMP) echo message

Page 375

EXTREMEWARE SOFTWARE USER GUIDE2-15CHECKING BASIC CONNECTIVITYTRACEROUTEThe traceroute command enables you to trace the routed path between the switch

Page 376

2-16 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCH

Page 377

EXTREMEWARE SOFTWARE USER GUIDE3-13Managing the SwitchThis chapter covers the following topics:• Overview on page 3-1• Using the Console Interface on

Page 378

VUsing a BOOTP Server 3-4Manually Configuring the IP Settings 3-4Disconnecting a Telnet Session 3-6Controlling Telnet Access 3-6Using Secure Shell 2 (

Page 379 - EAL-TIME DISPLAY

3-2 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCH— ExtremeWare Vista Web access using a standard Web browser— SNMP access using ExtremeWare Enter

Page 380

EXTREMEWARE SOFTWARE USER GUIDE3-3USING TELNETYou can configure the IP address, subnet mask, and default router for the VLAN mgmt, using the following

Page 381 - Table 18-5: Logging Commands

3-4 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHUSING A BOOTP SERVERIf you are using IP and you have a Bootstrap Protocol (BOOTP) server set up

Page 382

EXTREMEWARE SOFTWARE USER GUIDE3-5USING TELNETmust be assigned an IP address and subnet mask. IP addresses are always assigned to a VLAN. The switch c

Page 383

3-6 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCH6 Configure the default route for the switch using the following command:config iproute add defa

Page 384

EXTREMEWARE SOFTWARE USER GUIDE3-7USING SECURE SHELL 2 (SSH2)To display the status of Telnet, use the following command:show managementYou can choose

Page 385 - Table 18-6: Event Actions

3-8 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHTo enable SSH2, use the following command:enable ssh2 {access-profile [<access_profile> |

Page 386

EXTREMEWARE SOFTWARE USER GUIDE3-9USING EXTREMEWARE VISTAFor more information on assigning an IP address, refer to the section, “Configuring Switch IP

Page 387 - Using ExtremeWare Vista

3-10 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHUSING SNMPAny Network Manager running the Simple Network Management Protocol (SNMP) can manage

Page 388

EXTREMEWARE SOFTWARE USER GUIDE3-11USING SNMPTo configure SNMP read access to use an access profile, use the command:config snmp access-profile readon

Page 389

VILoad-Sharing Algorithms 4-8Configuring BlackDiamond and Alpine Switch Load Sharing 4-9Load-Sharing Example 4-11Verifying the Load-Sharing Configurat

Page 390 - AVIGATING

3-12 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHconfig snmp add trapreceiver <ipaddress> community <string>Adds the IP address of a

Page 391 - ROWSER CONTROLS

EXTREMEWARE SOFTWARE USER GUIDE3-13AUTHENTICATING USERSDISPLAYING SNMP SETTINGSTo display the SNMP settings configured on the switch, use the followin

Page 392 - ILTERING

3-14 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHThe privileges assigned to the user (admin versus non-admin) at the RADIUS server take preceden

Page 393

EXTREMEWARE SOFTWARE USER GUIDE3-15AUTHENTICATING USERSTable 3- 2: RADIUS CommandsCommand Descriptionconfig radius [primary | secondary] server [<i

Page 394

3-16 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHRADIUS RFC 2138 ATTRIBUTESThe RADIUS RFC 2138 optional attributes supported are as follows:• Us

Page 395 - Software Upgrade and Boot

EXTREMEWARE SOFTWARE USER GUIDE3-17AUTHENTICATING USERSfiles. The client configuration file (ClientCfg.txt) defines the authorized source machine, sou

Page 396 - EBOOTING

3-18 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHcompiled format for Solaris™ or Linux™ operating systems, as well as in source code format. For

Page 397

EXTREMEWARE SOFTWARE USER GUIDE3-19AUTHENTICATING USERSuser Password = ""Filter-Id = "unlim"admin Password = "", Service

Page 398

3-20 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHCONFIGURING TACACS+Terminal Access Controller Access Control System Plus (TACACS+) is a mechani

Page 399

EXTREMEWARE SOFTWARE USER GUIDE3-21USING THE SIMPLE NETWORK TIME PROTOCOLUSING THE SIMPLE NETWORK TIME PROTOCOLExtremeWare supports the client portion

Page 400

VIIAssigning a VLAN Tag 6-6Mixing Port-Based and Tagged VLANs 6-9Protocol-Based VLANs 6-9Predefined Protocol Filters 6-10Defining Protocol Filters 6-1

Page 401 - YNCHRONIZING

3-22 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHCONFIGURING AND USING SNTPTo use SNTP, follow these steps:1 Identify the host(s) that are confi

Page 402

EXTREMEWARE SOFTWARE USER GUIDE3-23USING THE SIMPLE NETWORK TIME PROTOCOLThis command provides configuration and statistics associated with SNTP and i

Page 403

3-24 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCH-12:00 -720 IDLW - International Date Line West+1:00 +60 CET - Central European FWT - French Wi

Page 404

EXTREMEWARE SOFTWARE USER GUIDE3-25USING THE SIMPLE NETWORK TIME PROTOCOLSNTP CONFIGURATION COMMANDSTab le 3-5 describes SNTP configuration commands.S

Page 405 - Supported Standards

3-26 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCH

Page 406 - TANDARDS

EXTREMEWARE SOFTWARE USER GUIDE4-14Configuring BlackDiamond and Alpine Switch Slots and PortsThis chapter covers the following topics: • Configuring a

Page 407 - Troubleshooting

4-2 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTSYou can configure the BlackDiamond or Alpine switch with

Page 408 - ROUBLESHOOTING

EXTREMEWARE SOFTWARE USER GUIDE4-3BLACKDIAMOND AND ALPINE SWITCH PORT CONFIGURATIONFor example, if a G4X I/O module (having a total of four ports) is

Page 409 - NTERFACE

4-4 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTS10BASE-T and 100BASE-TX ports can connect to either 10BAS

Page 410

EXTREMEWARE SOFTWARE USER GUIDE4-5BLACKDIAMOND AND ALPINE SWITCH PORT CONFIGURATIONconfig ports <portlist> auto off {speed [10 | 100 | 1000]} du

Page 411

VIII8SPANNING TREE PROTOCOL (STP)Overview of the Spanning Tree Protocol 8-1Spanning Tree Domains 8-2STPD Status for GVRP-Added Ports 8-2Defaults 8-3ST

Page 412

4-6 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTSenable sharing <port> grouping <portlist> {po

Page 413

EXTREMEWARE SOFTWARE USER GUIDE4-7JUMBO FRAMESJUMBO FRAMESJumbo frames are Ethernet frames that are larger than 1523 bytes, including four bytes used

Page 414

4-8 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTSFor example, VLANs see the load-sharing group as a single

Page 415 - Numerics

EXTREMEWARE SOFTWARE USER GUIDE4-9LOAD SHARING ON THE BLACKDIAMOND AND ALPINE SWITCHThe address-based and round-robin load-sharing algorithms are supp

Page 416

4-10 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTSBlackDiamond switch modules that use the “i” chipset do

Page 417

EXTREMEWARE SOFTWARE USER GUIDE4-11BLACKDIAMOND AND ALPINE SWITCH PORT-MIRRORINGLOAD-SHARING EXAMPLEThe following example defines a load-sharing group

Page 418

4-12 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTSUp to eight mirroring filters and one monitor port can b

Page 419

EXTREMEWARE SOFTWARE USER GUIDE4-13BLACKDIAMOND AND ALPINE SWITCH PORT-MIRRORINGEXTREME DISCOVERY PROTOCOLThe Extreme Discovery Protocol (EDP) is used

Page 420

4-14 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTS

Page 421

EXTREMEWARE SOFTWARE USER GUIDE5-15Configuring Summit Switch PortsThis chapter covers the following topics:• Enabling and Disabling Summit Switch Port

Page 422 - (table) 3-23

IXConfiguring DiffServ 9-15Observing DiffServ Information 9-17Changing DiffServ Code point assignments in the Q0S Profile 9-17Replacing DiffServ Code

Page 423

5-2 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSFor example, to disable ports 3, 5, and 12 through 15 on the Summit switch, enter th

Page 424

EXTREMEWARE SOFTWARE USER GUIDE5-3SUMMIT SWITCH PORT COMMANDSTURNING OFF AUTONEGOTIATION FOR A GIGABIT ETHERNET PORTIn certain interoperability situat

Page 425 - Index of Commands

5-4 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSdisable learning ports <portlist> Disables MAC address learning on one or more

Page 426

EXTREMEWARE SOFTWARE USER GUIDE5-5JUMBO FRAMESJUMBO FRAMESJumbo frames are Ethernet frames that are larger than 1523 bytes, including four bytes used

Page 427 - Index of Commands - iii

5-6 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSThe jumbo_frame_mtu range is 1523 to 9216. The value describes the maximum size “on

Page 428

EXTREMEWARE SOFTWARE USER GUIDE5-7LOAD SHARING ON THE SUMMIT SWITCHLOAD SHARING ALGORITHMSLoad sharing algorithms allow you to select the distribution

Page 429 - Index of Commands - v

5-8 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSOn switches that do not have the “i” chipset, the following additional rules apply:•

Page 430

EXTREMEWARE SOFTWARE USER GUIDE5-9LOAD SHARING ON THE SUMMIT SWITCHOn all other Summit switch models, the following rules apply:• A group can contain

Page 431 - replacement ports 9-17

5-10 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSTo define a load-sharing group, you assign a group of ports to a single, logical po

Page 432

EXTREMEWARE SOFTWARE USER GUIDE5-11SUMMIT SWITCH PORT-MIRRORINGThe traffic filter can be defined based on one of the following criteria:• Physical por

Comments to this Manuals

No comments