Extreme Networks ExtremeWare Enterprise Manager Betriebsanweisung

Stöbern Sie online oder laden Sie Betriebsanweisung nach Software Extreme Networks ExtremeWare Enterprise Manager herunter. Extreme Networks ExtremeWare Enterprise Manager User guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 432
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - User Guide

Extreme Networks, Inc.3585 Monroe StreetSanta Clara, California 95051(888) 257-3000http://www.extremenetworks.comExtremeWare Software User GuideSoftwa

Seite 2

XESRP Host Attach 10-9ESRP Domains 10-10ESRP Groups 10-11Linking ESRP Switches 10-12Configuring ESRP and Multinetting 10-12ESRP and Spanning Tree 10-1

Seite 3 - Contents

5-12 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSSUMMIT SWITCH PORT-MIRRORING EXAMPLEThe following example selects port 3 as the mir

Seite 4 - 3MANAGING THE SWITCH

EXTREMEWARE SOFTWARE USER GUIDE5-13SMART REDUNDANCYSMART REDUNDANCYSmart redundancy defines the behavior of switches equipped with redundancy Gigabit

Seite 5 - AND PORTS

5-14 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSIf smart redundancy is disabled, both the primary and redundant ports are dual-home

Seite 6 - 6VIRTUAL LANS (VLANS)

EXTREMEWARE SOFTWARE USER GUIDE6-16Virtual LANs (VLANs)This chapter covers the following topics:• Overview of Virtual LANs on page 6-1• Types of VLANs

Seite 7 - 7FORWARDING DATABASE (FDB)

6-2 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)BENEFITSImplementing VLANs on your networks has the following advantages:• VLANs help to contro

Seite 8 - 9QUALITY OF SERVICE (QOS)

EXTREMEWARE SOFTWARE USER GUIDE6-3TYPES OF VLANS Figure 6-1: Example of a port-based VLAN on the Summit7i switchFor the members of the different IP VL

Seite 9

6-4 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)Figure 6-2: Single port-based VLAN spanning two switches To create multiple VLANs that span two

Seite 10 - 11 IP UNICAST ROUTING

EXTREMEWARE SOFTWARE USER GUIDE6-5TYPES OF VLANSFigure 6-3: Two port-based VLANs spanning two BlackDiamond switchesVLAN Accounting spans System 1 and

Seite 11

6-6 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)TAGGED VLANSTa g g i n g is a process that inserts a marker (called a tag) into the Ethernet f

Seite 12 - 14 IP MULTICAST ROUTING

EXTREMEWARE SOFTWARE USER GUIDE6-7TYPES OF VLANSFigure 6-4 illustrates the physical view of a network that uses tagged and untagged traffic.Figure 6-4

Seite 13 - 16 ACCESS POLICIES

XIConfiguring DHCP/BOOTP Relay 11-16Verifying the DHCP/BOOTP Relay Configuration 11-16UDP-Forwarding 11-16Configuring UDP-Forwarding 11-17UPD-Forwardi

Seite 14

6-8 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)Figure 6-5 shows a logical diagram of the same network.Figure 6-5: Logical diagram of tagged an

Seite 15 - ERVER LOAD BALANCING (SLB)

EXTREMEWARE SOFTWARE USER GUIDE6-9TYPES OF VLANSMIXING PORT-BASED AND TAGGED VLANSYou can configure the switch using a combination of port-based and t

Seite 16 - 19 USING EXTREMEWARE VISTA

6-10 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)Figure 6-6: Protocol-based VLANs PREDEFINED PROTOCOL FILTERSThe following protocol filters are

Seite 17 - BTROUBLESHOOTING

EXTREMEWARE SOFTWARE USER GUIDE6-11TYPES OF VLANSDEFINING PROTOCOL FILTERSIf necessary, you can define a customized protocol filter based on EtherType

Seite 18 - INDEX OF COMMANDS

6-12 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)DELETING A PROTOCOL FILTERIf a protocol filter is deleted from a VLAN, the VLAN is assigned a

Seite 19 - NTRODUCTION

EXTREMEWARE SOFTWARE USER GUIDE6-13CONFIGURING VLANS ON THE SWITCHRENAMING A VLANTo rename an existing VLAN, use the following command:config vlan <

Seite 20 - ONVENTIONS

6-14 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)VLAN CONFIGURATION COMMANDSTab le 6-1 describes the commands used to configure a VLAN.Table 6-

Seite 21 - UBLICATIONS

EXTREMEWARE SOFTWARE USER GUIDE6-15CONFIGURING VLANS ON THE SWITCHVLAN CONFIGURATION EXAMPLESThe following BlackDiamond switch example creates a port-

Seite 22

6-16 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)The following Summit switch example creates a VLAN named sales, with the VLANid 120. The VLAN

Seite 23 - ExtremeWare Overview

EXTREMEWARE SOFTWARE USER GUIDE6-17GENERIC VLAN REGISTRATION PROTOCOL• IPX address (if configured)• STPD information• Protocol information• QoS profil

Seite 24

XIIRIP Configuration Example 12-17Displaying RIP Settings 12-19Resetting and Disabling RIP 12-20Configuring OSPF 12-21OSPF Configuration Example 12-25

Seite 25

6-18 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)Figure 6-7: Network example using GVRPIn Figure 6-7, Switch A is a member of VLAN Red. VLAN Re

Seite 26

EXTREMEWARE SOFTWARE USER GUIDE6-19GENERIC VLAN REGISTRATION PROTOCOLVLANs that are automatically created using GVRP are given names in the formatgvrp

Seite 27 - IFFERENCES

6-20 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)MAC-BASED VLANSMAC-Based VLANs allow physical ports to be mapped to a VLAN based on the source

Seite 28 - ULL L3 FUNCTIONALITY

EXTREMEWARE SOFTWARE USER GUIDE6-21MAC-BASED VLANSMAC-BASED VLAN GUIDELINESWhen using the MAC-to-VLAN mapping, consider the following guidelines:• A p

Seite 29 - ICENSING

6-22 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)• A MAC address cannot be configured to associate with more than 1 VLAN. If this is attempted,

Seite 30 - BTAINING

EXTREMEWARE SOFTWARE USER GUIDE6-23MAC-BASED VLANSenable mac-vlan mac-group any ports 10-15enable mac-vlan mac-group 10 ports 16-17enable mac-vlan mac

Seite 31 - MacVLanDiscover

6-24 EXTREMEWARE SOFTWARE USER GUIDEVIRTUAL LANS (VLANS)The following example shows an incremental configuration file for MAC-based VLAN information t

Seite 32

EXTREMEWARE SOFTWARE USER GUIDE7-17Forwarding Database (FDB)This chapter describes the following topics:• Overview of the FDB on page 7-1• Configuring

Seite 33 - Accessing the Switch

7-2 EXTREMEWARE SOFTWARE USER GUIDEFORWARDING DATABASE (FDB)FDB ENTRY TYPESThe following are four types of entries in the FDB:• Dynamic entries — Init

Seite 34 - BBREVIATED SYNTAX

EXTREMEWARE SOFTWARE USER GUIDE7-3CONFIGURING FDB ENTRIESHOW FDB ENTRIES GET ADDEDEntries are added into the FDB in the following two ways:• The switc

Seite 35 - NDERSTANDING

XIIIPIM-DM Configuration Example 14-10Configuration for IR1 14-11Configuration for ABR1 14-13Displaying IP Multicast Routing Settings 14-13Deleting an

Seite 36 - CCESSING

7-4 EXTREMEWARE SOFTWARE USER GUIDEFORWARDING DATABASE (FDB)FDB CONFIGURATION EXAMPLESThe following example adds a permanent entry to the FDB:create f

Seite 37 - Table 2- 2: Line-Editing Keys

EXTREMEWARE SOFTWARE USER GUIDE7-5DISPLAYING FDB ENTRIES• Slot number for this device is 3.• Port number for this device is 4.This example associates

Seite 38

7-6 EXTREMEWARE SOFTWARE USER GUIDEFORWARDING DATABASE (FDB)

Seite 39 - is +/- minutes from

EXTREMEWARE SOFTWARE USER GUIDE8-18Spanning Tree Protocol (STP)This chapter covers the following topic:• Overview of the Spanning Tree Protocol on pag

Seite 40

8-2 EXTREMEWARE SOFTWARE USER GUIDESPANNING TREE PROTOCOL (STP)SPANNING TREE DOMAINSThe switch can be partitioned into multiple virtual bridges. Each

Seite 41 - ANAGEMENT

EXTREMEWARE SOFTWARE USER GUIDE8-3STP CONFIGURATIONSFor more information on GVRP, refer to Chapter 6.DEFAULTSThe default device configuration contains

Seite 42 - DMINISTRATOR

8-4 EXTREMEWARE SOFTWARE USER GUIDESPANNING TREE PROTOCOL (STP)Figure 8-1: Multiple Spanning Tree DomainsWhen the switches in this configuration start

Seite 43 - HANGING THE DEFAULT PASSWORD

EXTREMEWARE SOFTWARE USER GUIDE8-5STP CONFIGURATIONSFigure 8-2: Tag-based STP configurationThe tag-based network in Figure 8-2 has the following confi

Seite 44 - IEWING ACCOUNTS

8-6 EXTREMEWARE SOFTWARE USER GUIDESPANNING TREE PROTOCOL (STP)CONFIGURING STP ON THE SWITCHTo configure STP you must perform the following actions:•

Seite 45

EXTREMEWARE SOFTWARE USER GUIDE8-7CONFIGURING STP ON THE SWITCHTab le 8-1 shows the commands used to configure STP.Table 8- 1: STP Configuration Comma

Seite 46

XIVAccess Lists for ICMP 16-5Verifying Access List Configurations 16-6Access List Commands 16-6IP Access List Examples 16-11Using the Permit-Establish

Seite 47 - RACEROUTE

8-8 EXTREMEWARE SOFTWARE USER GUIDESPANNING TREE PROTOCOL (STP)STP CONFIGURATION EXAMPLEThe following BlackDiamond switch example creates and enables

Seite 48

EXTREMEWARE SOFTWARE USER GUIDE8-9DISABLING AND RESETTING STPThis command displays the following information:• STPD name• Bridge ID• STPD configuratio

Seite 49 - Managing the Switch

8-10 EXTREMEWARE SOFTWARE USER GUIDESPANNING TREE PROTOCOL (STP)

Seite 50 - 10/100 UTP M

EXTREMEWARE SOFTWARE USER GUIDE9-19Quality of Service (QoS)This chapter covers the following topics:• Overview of Policy-Based Quality of Service on p

Seite 51

9-2 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)OVERVIEW OF POLICY-BASED QUALITY OF SERVICEPolicy-Based QoS allows you to protect bandwidth

Seite 52

EXTREMEWARE SOFTWARE USER GUIDE9-3APPLICATIONS AND TYPES OF QOSAPPLICATIONS AND TYPES OF QOSDifferent applications have different QoS requirements. Th

Seite 53

9-4 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)CRITICAL DATABASE APPLICATIONSDatabase applications, such as those associated with ERP, typ

Seite 54

EXTREMEWARE SOFTWARE USER GUIDE9-5ASSIGNING QOS ATTRIBUTESASSIGNING QOS ATTRIBUTES Assigning QoS attributes is a three-step process which consists of

Seite 55 - 2 (SSH2)

9-6 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)QOS PROFILESA QoS profile defines a class of service by specifying traffic behavior attribu

Seite 56 - <tcp_port_number>}

EXTREMEWARE SOFTWARE USER GUIDE9-7QOS PROFILESFour or eight default QoS profiles are provided, depending on the chipset used in the switch. The defaul

Seite 57 - ONTROLLING

XV17 SERVER LOAD BALANCING (SLB)Overview 17-2SLB Components 17-2Nodes 17-3Pools 17-3Virtual Servers 17-3Using Standard or Wildcard Virtual Servers 17-

Seite 58

9-8 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)CONFIGURING A QOS PROFILETab le 9-4 lists the commands used to configure QoS.TRAFFIC GROUPI

Seite 59

EXTREMEWARE SOFTWARE USER GUIDE9-9TRAFFIC GROUPINGS AND CREATING A QOS POLICYTraffic groupings are separated into the following categories for discuss

Seite 60

9-10 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)IP-BASED TRAFFIC GROUPINGSIP-based traffic groupings are based on any combination of:• IP

Seite 61 - RADIUS C

EXTREMEWARE SOFTWARE USER GUIDE9-11TRAFFIC GROUPINGS AND CREATING A QOS POLICYDYNAMIC MAC ADDRESSESDynamic MAC addresses can be assigned a QoS profile

Seite 62 - ONFIGURING RADIUS CLIENT

9-12 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)VERIFYING MAC-BASED QOS SETTINGSTo verify any of the MAC-based QoS settings, use either th

Seite 63 - Table 3- 2: RADIUS Commands

EXTREMEWARE SOFTWARE USER GUIDE9-13TRAFFIC GROUPINGS AND CREATING A QOS POLICYFigure 9-1: Ethernet packet encapsulationOBSERVING 802.1P INFORMATIONWhe

Seite 64

9-14 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)802.1P COMMANDSTab le 9-7 shows the commands used to configure 802.1p priority. Two are ex

Seite 65

EXTREMEWARE SOFTWARE USER GUIDE9-15TRAFFIC GROUPINGS AND CREATING A QOS POLICY802.1p priority information is replaced according to the hardware queue

Seite 66

9-16 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)Figure 9-2: IP packet header encapsulationTab le 9-9 lists the commands used to configure

Seite 67 - UTHENTICATING

EXTREMEWARE SOFTWARE USER GUIDE9-17TRAFFIC GROUPINGS AND CREATING A QOS POLICYOBSERVING DIFFSERV INFORMATIONWhen a packet arrives at the switch on an

Seite 68 - TACACS+

XVISample Active-Active Configuration 17-29Using Manual Fail-Back 17-313DNS Support 17-32Advanced SLB Commands 17-32Web Cache Redirection 17-38Flow Re

Seite 69

9-18 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)You can change the QoS profile assignment for all 64 code points using the following comma

Seite 70

EXTREMEWARE SOFTWARE USER GUIDE9-19TRAFFIC GROUPINGS AND CREATING A QOS POLICYYou then change the 802.1p priority to DiffServ code point mapping to an

Seite 71

9-20 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)3 To enable the switch to overwrite the DiffServ code point:enable dot1p replacementenable

Seite 72

EXTREMEWARE SOFTWARE USER GUIDE9-21VERIFYING CONFIGURATION AND PERFORMANCEFor example, all devices on VLAN servnet require use of the QoS profile qp4.

Seite 73

9-22 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)REAL-TIME PERFORMANCE MONITORINGThe real-time display scrolls through the given portlist t

Seite 74

EXTREMEWARE SOFTWARE USER GUIDE9-23MODIFYING A QOS POLICYDISPLAYING QOS PROFILE INFORMATIONThe QoS monitor can also be used to verify the QoS configur

Seite 75 - Alpine Switch Slots and Ports

9-24 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)INTRA-SUBNET QOSIntra-Subnet QoS™ (ISQ) is used only on Extreme switches that do not use t

Seite 76

EXTREMEWARE SOFTWARE USER GUIDE9-25DYNAMIC LINK CONTEXT SYSTEMDYNAMIC LINK CONTEXT SYSTEMThe Dynamic Link Context System (DLCS) is a feature that snoo

Seite 77

9-26 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)DLCS LIMITATIONSConsider the following limitations concerning data received from WINS snoo

Seite 78

EXTREMEWARE SOFTWARE USER GUIDE9-27DYNAMIC LINK CONTEXT SYSTEMconfig isq-server <wins-servers-listname> delete mac <mac-address-of-next-hop&g

Seite 79

XVIITask Frame 19-4Content Frame 19-4Browser Controls 19-5Status Messages 19-5Standalone Buttons 19-5Saving Changes 19-6Filtering Information 19-6Do a

Seite 80

9-28 EXTREMEWARE SOFTWARE USER GUIDEQUALITY OF SERVICE (QOS)

Seite 81

EXTREMEWARE SOFTWARE USER GUIDE10-110Extreme Standby Router ProtocolThis chapter covers the following topics:• Overview on page 10-1• ESRP Basics on p

Seite 82

10-2 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLnetwork system design, ESRP can provide better resiliency than using the Spanning T

Seite 83 - 2-port groups x x x x

EXTREMEWARE SOFTWARE USER GUIDE10-3DETERMINING THE ESRP MASTERIf you configure OSPF and ESRP, you must manually configure an OSPF router identifier (I

Seite 84

10-4 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLIf any of the configured tracking mechanisms fail, the master ESRP switch relinquis

Seite 85

EXTREMEWARE SOFTWARE USER GUIDE10-5DETERMINING THE ESRP MASTERautomatically relinquishes master status and remains in standby mode if a ping keepalive

Seite 86

10-6 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLSTANDBY SWITCH BEHAVIORIf a switch is in standby mode, it exchanges ESRP packets wi

Seite 87 - ISCOVERY

EXTREMEWARE SOFTWARE USER GUIDE10-7GROUPING BLOCKS OF 10/100 PORTSGROUPING BLOCKS OF 10/100 PORTSRestrictions on port groupings apply only to switches

Seite 88

10-8 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLFigure 10-2: Summit24 switch ESRP port blocksFigure 10-3: Summit4 switch ESRP port

Seite 89

EXTREMEWARE SOFTWARE USER GUIDE10-9ESRP OPTIONSFigure 10-5: Summit48 switch ESRP port blocksFor switches that do not use the “i” chipset, all VLANs us

Seite 90

XVIIITOP Command B-8Contacting Extreme Technical Support B-8INDEXINDEX OF COMMANDS

Seite 91

10-10 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLThe ESRP HA option is useful if you are using dual-homed network interface cards (

Seite 92

EXTREMEWARE SOFTWARE USER GUIDE10-11ESRP OPTIONSESRP GROUPSExtremeWare supports running multiple instances of ESRP within the same VLAN or broadcast d

Seite 93

10-12 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLLINKING ESRP SWITCHESWhen considering system design using ESRP, direct links betwe

Seite 94

EXTREMEWARE SOFTWARE USER GUIDE10-13ESRP AND VLAN AGGREGATIONESRP AND VLAN AGGREGATIONESRP can be used to provide redundant default router protection

Seite 95

10-14 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLESRP COMMANDSTable 10-1 describes the commands used to configure ESRP.Table 10-1:

Seite 96

EXTREMEWARE SOFTWARE USER GUIDE10-15ESRP COMMANDSconfig vlan <name> esrp election-algorithm [ports_track_priority_mac | track_ports_priority_mac

Seite 97

10-16 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLESRP EXAMPLESThis section provides examples of ESRP configurations.SINGLE VLAN USI

Seite 98 - IRRORING

EXTREMEWARE SOFTWARE USER GUIDE10-17ESRP COMMANDSFigure 10-8: ESRP example using layer 2 and layer 3 redundancyThe BlackDiamond switch, acting as mast

Seite 99

10-18 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLflush FDB entries associated with the uplinks to the ESRP-enabled BlackDiamond swi

Seite 100 - ONFIGURING

EXTREMEWARE SOFTWARE USER GUIDE10-19ESRP COMMANDSFigure 10-9: ESRP example using layer 2 redundancyThis example builds on the previous example, but el

Seite 101 - Failover linksPrimary links

EXTREMEWARE SOFTWARE USER GUIDE XIXPrefaceThis Preface provides an overview of this guide, describes guide conventions, and lists other publications t

Seite 102

10-20 EXTREMEWARE SOFTWARE USER GUIDEEXTREME STANDBY ROUTER PROTOCOLIn this example, the BlackDiamond switches are configured for ESRP such that the V

Seite 103 - Virtual LANs (VLANs)

EXTREMEWARE SOFTWARE USER GUIDE11-111IP Unicast RoutingThis chapter describes the following topics:• Overview of IP Unicast Routing on page 11-2• Prox

Seite 104

11-2 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGFor more information on interior gateway protocols, refer to Chapter 12. For information on exte

Seite 105 - Marketing

EXTREMEWARE SOFTWARE USER GUIDE11-3OVERVIEW OF IP UNICAST ROUTINGFigure 11-1: Routing between VLANsPOPULATING THE ROUTING TABLE The switch maintains a

Seite 106 - System 2

11-4 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGDYNAMIC ROUTESDynamic routes are typically learned by way of RIP or OSPF. Routers that use RIP o

Seite 107 - Engineering

EXTREMEWARE SOFTWARE USER GUIDE11-5PROXY ARPYou can also configure blackhole routes — traffic to these destinations is silently dropped.IP ROUTE SHARI

Seite 108 - SSIGNING A VLAN TAG

11-6 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTING• The proxy ARP table entry indicates that the system should always answer this ARP Request, reg

Seite 109

EXTREMEWARE SOFTWARE USER GUIDE11-7IP MULTINETTINGTo change the relative route priority, use the following command:config iproute priority [rip | boot

Seite 110

11-8 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTING• The FDB aging timer is automatically set to 3,000 seconds (50 minutes).• If you are using a UD

Seite 111

EXTREMEWARE SOFTWARE USER GUIDE11-9IP MULTINETTING10 Enable IP multinetting, by using the following command:enable multinetting11 If you are using RIP

Seite 112 - = All other traffic

II©2000 Extreme Networks, Inc. All rights reserved. Extreme Networks and BlackDiamond are registered trademarks of Extreme Networks, Inc. in the Unite

Seite 113

XXEXTREMEWARE SOFTWARE USER GUIDEPREFACE• Internet Packet Exchange (IPX) concepts• Server Load Balancing (SLB) concepts• Simple Network Management Pro

Seite 114

11-10 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGcreate vlan net35create vlan net37config net34 ipaddress 192.67.34.1config net35 ipaddress 192.

Seite 115

EXTREMEWARE SOFTWARE USER GUIDE11-11VLAN AGGREGATION3 Configure a default route, using the following command:config iproute add default <gateway>

Seite 116 - ONFIGURATION

11-12 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGAs a result, sub-VLANs can be quite small, but allow for growth without re-defining subnet boun

Seite 117

EXTREMEWARE SOFTWARE USER GUIDE11-13VLAN AGGREGATIONVLAN AGGREGATION PROPERTIESVLAN aggregation is a very specific application, and the following prop

Seite 118 - ISPLAYING

11-14 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGISOLATION OPTION FOR COMMUNICATION BETWEEN SUB-VLANSTo facilitate communication between sub-VLA

Seite 119 - EGISTRATION

EXTREMEWARE SOFTWARE USER GUIDE11-15VLAN AGGREGATIONVLAN AGGREGATION EXAMPLEThe follow example illustrates how to configure VLAN aggregation. The VLAN

Seite 120 - Untagged

11-16 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGCONFIGURING DHCP/BOOTP RELAYOnce IP unicast routing is configured, you can configure the switch

Seite 121

EXTREMEWARE SOFTWARE USER GUIDE11-17UDP-FORWARDING• If the UDP profile includes other types of traffic, these packets have the IP destination address

Seite 122

11-18 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGICMP PACKET PROCESSINGAs ICMP packets are routed or generated, you can take various actions to

Seite 123 - IMITATIONS

EXTREMEWARE SOFTWARE USER GUIDE11-19IP COMMANDSIP COMMANDSTab le 11-4 describes the commands used to configure basic IP settings.create udp-profile &

Seite 124

EXTREMEWARE SOFTWARE USER GUIDE XXIRELATED PUBLICATIONSRELATED PUBLICATIONSThe following is a list of related publications:• ExtremeWare Quick Referen

Seite 125

11-20 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGconfig iparp add proxy <ipaddress> {<mask>} {<mac_address>} {always}Configure

Seite 126

EXTREMEWARE SOFTWARE USER GUIDE11-21IP COMMANDSTab le 11-5 describes the commands used to configure the IP route table.enable bootprelay Enables the

Seite 127 - Forwarding Database (FDB)

11-22 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGTab le 11-6 describes the commands used to configure IP options and the ICMP protocol.config ip

Seite 128 - ORWARDING

EXTREMEWARE SOFTWARE USER GUIDE11-23IP COMMANDSconfig irdp <mininterval> <maxinterval> <lifetime> <preference>Configures the r

Seite 129

11-24 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGenable icmp port-unreachables {vlan <name>} Enables the generation of ICMP port unreachab

Seite 130

EXTREMEWARE SOFTWARE USER GUIDE11-25ROUTING CONFIGURATION EXAMPLEROUTING CONFIGURATION EXAMPLEFigure 11-3 illustrates a BlackDiamond switch that has t

Seite 131

11-26 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGFigure 11-3: Unicast routing configuration exampleThe stations connected to the system generate

Seite 132

EXTREMEWARE SOFTWARE USER GUIDE11-27DISPLAYING ROUTER SETTINGSconfig Finance protocol ipconfig Personnel protocol ipconfig Finance add port 1:*,3:*con

Seite 133 - Spanning Tree Protocol (STP)

11-28 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTINGRESETTING AND DISABLING ROUTER SETTINGSTo return router settings to their defaults and disable

Seite 134

EXTREMEWARE SOFTWARE USER GUIDE11-29RESETTING AND DISABLING ROUTER SETTINGSdisable icmp redirects {vlan <name>} Disables the generation of ICMP

Seite 135 - ONFIGURATIONS

XXIIEXTREMEWARE SOFTWARE USER GUIDEPREFACE

Seite 136 - Sales, Personnel, Marketing

11-30 EXTREMEWARE SOFTWARE USER GUIDEIP UNICAST ROUTING

Seite 137 - Sales & Engineering

EXTREMEWARE SOFTWARE USER GUIDE12-112Interior Gateway Routing ProtocolsThis chapter describes the following topics:• Overview on page 12-2• Overview o

Seite 138

12-2 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLS• Interconnections: Bridges and Routers by Radia PerlmanISBN 0-201-56332-0Publis

Seite 139

EXTREMEWARE SOFTWARE USER GUIDE12-3OVER VIEW OF RIPRIP has a number of limitations that can cause problems in large networks, including the following:

Seite 140

12-4 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLS• IP address of the next router• Timer that tracks the amount of time since the

Seite 141 - ESETTING

EXTREMEWARE SOFTWARE USER GUIDE12-5OVERVIEW OF OSPFRIP VERSION 1 VERSUS RIP VERSION 2A new version of RIP, called RIP version 2, expands the functiona

Seite 142

12-6 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSAREASOSPF allows parts of a network to be grouped together into areas. The topol

Seite 143 - Quality of Service (QoS)

EXTREMEWARE SOFTWARE USER GUIDE12-7OVERVIEW OF OSPFThe backbone allows summary information to be exchanged between ABRs. Every ABR hears the area summ

Seite 144

12-8 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSperform translation (as indicated in the NSSA specification). The option should

Seite 145 - PPLICATIONS

EXTREMEWARE SOFTWARE USER GUIDE12-9OVERVIEW OF OSPFFigure 12-1: Virtual link using Area 1 as a transit areaVirtual links are also used to repair a dis

Seite 146

EXTREMEWARE SOFTWARE USER GUIDE1-11ExtremeWare OverviewThis chapter covers the following topics:• Summary of Features on page 1-1• “i” Chipset Product

Seite 147 - TTRIBUTES

12-10 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSFigure 12-2: Virtual link providing redundancyROUTE RE-DISTRIBUTIONBoth RIP and

Seite 148

EXTREMEWARE SOFTWARE USER GUIDE12-11ROUTE RE-DISTRIBUTIONFigure 12-3: Route re-distributionCONFIGURING ROUTE RE-DISTRIBUTIONExporting routes from OSPF

Seite 149

12-12 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSRE-DISTRIBUTING ROUTES INTO OSPFEnable or disable the exporting of RIP, static,

Seite 150

EXTREMEWARE SOFTWARE USER GUIDE12-13ROUTE RE-DISTRIBUTIONIn versions of ExtremeWare prior to release 6.0, direct routes corresponding to the interface

Seite 151

12-14 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSCONFIGURING RIPTable 12-2 describes the commands used to configure RIP.Table 12

Seite 152 - ERMANENT MAC ADDRESSES

EXTREMEWARE SOFTWARE USER GUIDE12-15CONFIGURING RIPconfig rip txmode [none | v1only | v1comp | v2only] {vlan <name>}Changes the RIP transmission

Seite 153 - LACKHOLE

12-16 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSenable rip export [static | direct | ospf | ospf-intra | ospf-inter | ospf-exte

Seite 154 - ONFIGURING 802.1P PRIORITY

EXTREMEWARE SOFTWARE USER GUIDE12-17RIP CONFIGURATION EXAMPLERIP CONFIGURATION EXAMPLEFigure 12-4 illustrates a BlackDiamond switch that has three VLA

Seite 155 - NFORMATION

12-18 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSFigure 12-4: RIP configuration exampleThe stations connected to the system gene

Seite 156

EXTREMEWARE SOFTWARE USER GUIDE12-19DISPLAYING RIP SETTINGSThe example in Figure 12-4 is configured as follows:create vlan Financecreate vlan Personne

Seite 157

1-2 EXTREMEWARE SOFTWARE USER GUIDEEXTREMEWARE OVER VIEW• Extreme Standby Router Protocol (ESRP)• Routing Information Protocol (RIP) version 1 and RIP

Seite 158

12-20 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSRESETTING AND DISABLING RIPTo return RIP settings to their defaults, or to disa

Seite 159

EXTREMEWARE SOFTWARE USER GUIDE12-21CONFIGURING OSPFCONFIGURING OSPFEach switch that is configured to run OSPF must have a unique router ID. It is rec

Seite 160 - EPLACING

12-22 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSconfig ospf [vlan <name> | area <areaid> | virtual-link <routeri

Seite 161 - point instead of repeating

EXTREMEWARE SOFTWARE USER GUIDE12-23CONFIGURING OSPFconfig ospf area <areaid> nssa [summary | nosummary] stub-default-cost <cost> {transla

Seite 162 - ROUPINGS

12-24 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSconfig ospf spf-hold-time {<seconds>} Configures the minimum number of se

Seite 163 - ERFORMANCE

EXTREMEWARE SOFTWARE USER GUIDE12-25OSPF CONFIGURATION EXAMPLEOSPF CONFIGURATION EXAMPLEFigure 12-5 shows an example of an autonomous system using OSP

Seite 164

12-26 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSArea 0 is the backbone area. It is located at the headquarters and has the foll

Seite 165 - ODIFYING

EXTREMEWARE SOFTWARE USER GUIDE12-27OSPF CONFIGURATION EXAMPLECONFIGURATION FOR ABR1The following is the configuration for the router labeled ABR1:cre

Seite 166

12-28 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLSDISPLAYING OSPF SETTINGSTo display settings for OSPF, use the commands listed i

Seite 167

EXTREMEWARE SOFTWARE USER GUIDE12-29RESETTING AND DISABLING OSPF SETTINGSdisable ospf export direct Disables exporting of local interface (direct) rou

Seite 168

EXTREMEWARE SOFTWARE USER GUIDE1-3SUMMARY OF FEATURESVIRTUAL LANS (VLANS)ExtremeWare has a VLAN feature that enables you to construct your broadcast d

Seite 169

12-30 EXTREMEWARE SOFTWARE USER GUIDEINTERIOR GATEWAY ROUTING PROTOCOLS

Seite 170

EXTREMEWARE SOFTWARE USER GUIDE13-113Exterior Gateway Routing ProtocolsThis chapter covers the following topics:• Overview on page 13-2• BGP Attribute

Seite 171

13-2 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSOVERVIEWBGP is an exterior routing protocol that was developed for use in TCP/IP

Seite 172

EXTREMEWARE SOFTWARE USER GUIDE13-3BGP COMMUNITIES• Community – Identifies a group of destinations that share one or more common attributes.• Cluster_

Seite 173 - ETERMINING

13-4 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSFigure 13-1: Route reflectorsROUTE CONFEDERATIONSBGP requires networks to use a

Seite 174

EXTREMEWARE SOFTWARE USER GUIDE13-5BGP FEATURESFigure 13-2: Routing confederationIn this example, AS 200 has five BGP speakers. Without a confederatio

Seite 175 - LGORITHMS

13-6 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSenable ipforwarding vlan ac config ospf add vlan ac area 0.0.0.0 disable bgpco

Seite 176

EXTREMEWARE SOFTWARE USER GUIDE13-7BGP FEATURESTo configure Router C, use the following commands:create vlan caconfig vlan ca add port 1config vlan c

Seite 177 - BD_F32T8

13-8 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLScreate bgp neighbor 192.1.1.9 as-number remote-AS-number 65001create bgp neighbo

Seite 178 - SUG_4FX8

EXTREMEWARE SOFTWARE USER GUIDE13-9BGP FEATURESIGP SYNCHRONIZATIONYou can configure an AS to be a transit AS, so that it can pass traffic through from

Seite 179 - SUG_48f8

1-4 EXTREMEWARE SOFTWARE USER GUIDEEXTREMEWARE OVER VIEWFor more information on Quality of Service, refer to Chapter 9.UNICAST ROUTINGThe switch can r

Seite 180 - OSPF/BGP4

13-10 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSCONFIGURING BGPTable 13-1 describes the commands used to configure BGP.Table 13

Seite 181

EXTREMEWARE SOFTWARE USER GUIDE13-11CONFIGURING BGPconfig bgp add dampening <halflife> <reuse> <suppress> <max_suppression> bg

Seite 182

13-12 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSconfig bgp dampening <halflife> <reuse> <suppress> <max_su

Seite 183 - AGGREGATION

EXTREMEWARE SOFTWARE USER GUIDE13-13CONFIGURING BGPconfig bgp neighbor [<ipaddress> | all] [route-reflector-client | no-route-reflector-client]C

Seite 184 - Table 10-1: ESRP Commands

13-14 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLSconfig bgp neighbor [<ipaddress> | all] weight <weight>Assigns a lo

Seite 185

EXTREMEWARE SOFTWARE USER GUIDE13-15DISPLAYING BGP SETTINGSDISPLAYING BGP SETTINGSTo display settings for BGP, use the commands listed in Table 13-2.R

Seite 186

13-16 EXTREMEWARE SOFTWARE USER GUIDEEXTERIOR GATEWAY ROUTING PROTOCOLS

Seite 187 - OSPF or RIP

EXTREMEWARE SOFTWARE USER GUIDE14-114IP Multicast RoutingThis chapter covers the following topics:• Overview on page 14-2• Configuring IP Multicasting

Seite 188

14-2 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGOVERVIEWIP multicast routing is a function that allows a single IP host to send a packet to a

Seite 189

EXTREMEWARE SOFTWARE USER GUIDE14-3OVERVIEWPIM DENSE MODEProtocol Independent Multicast- Dense Mode (PIM-DM) is a multicast routing protocol that is s

Seite 190

EXTREMEWARE SOFTWARE USER GUIDE1-5“I” CHIPSET PRODUCTSFor information on load sharing, refer to Chapter 4 and Chapter 5.“i” CHIPSET PRODUCTSSummit swi

Seite 191 - IP Unicast Routing

14-4 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGIGMP is enabled by default on the switch. However, the switch can be configured to disable the

Seite 192 - NTERFACES

EXTREMEWARE SOFTWARE USER GUIDE14-5CONFIGURING IP MULTICASTING ROUTING4 Enable DVMRP or PIM on the router, using one of the following commands:enable

Seite 193 - OPULATING

14-6 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGconfig dvmrp vlan <name> timer <probe_interval> <neighbor_timeout_interval>C

Seite 194 - ULTIPLE ROUTES

EXTREMEWARE SOFTWARE USER GUIDE14-7CONFIGURING IP MULTICASTING ROUTINGTable 14-2 describes the commands used to configure the Internet Gateway Message

Seite 195 - NCAPABLE

14-8 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGTable 14-2: IGMP Configuration CommandsCommand Descriptionconfig igmp <query_interval> &

Seite 196 - RIORITIES

EXTREMEWARE SOFTWARE USER GUIDE14-9CONFIGURATION EXAMPLESCONFIGURATION EXAMPLESFigure 14-1 and Figure 13-2 are used in Chapter 12 to describe the OSPF

Seite 197 - ULTINETTING

14-10 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGPIM-DM CONFIGURATION EXAMPLEFigure 14-1: IP multicast routing using PIM-DM configuration exam

Seite 198 - PERATION

EXTREMEWARE SOFTWARE USER GUIDE14-11CONFIGURATION EXAMPLESCONFIGURATION FOR IR1The following is the configuration for the router labeled IR1:config vl

Seite 199

14-12 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGFigure 14-2: IP multicast routing using PIM-SM configuration exampleArea 010.0.1.1HQ_10_0_110

Seite 200

EXTREMEWARE SOFTWARE USER GUIDE14-13DISPLAYING IP MULTICAST ROUTING SETTINGSCONFIGURATION FOR ABR1The following is the configuration for the router la

Seite 201 - GGREGATION

1-6 EXTREMEWARE SOFTWARE USER GUIDEEXTREMEWARE OVER VIEWSOFTWARE LICENSINGSome Extreme Networks products have capabilities that are enabled by using a

Seite 202 - 1234AB5678

14-14 EXTREMEWARE SOFTWARE USER GUIDEIP MULTICAST ROUTINGDELETING AND RESETTING IP MULTICAST SETTINGSTo return IP multicast routing settings to their

Seite 203 - ROPERTIES

EXTREMEWARE SOFTWARE USER GUIDE15-115IPX RoutingThis chapter describes the following topics:• Overview of IPX on page 15-1• IPX/RIP Routing on page 15

Seite 204

15-2 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGAs you create VLANs with different IPX NetIDs the switch automatically routes between them. Both the VL

Seite 205

EXTREMEWARE SOFTWARE USER GUIDE15-3OVERVIEW OF IPXTraffic within each VLAN is switched using the Ethernet MAC address. Traffic between Exec and Suppor

Seite 206 - DHCP/BOOTP R

15-4 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGPOPULATING THE ROUTING TABLE The switch builds and maintains an IPX routing table. As in the case of IP

Seite 207

EXTREMEWARE SOFTWARE USER GUIDE15-5IPX/RIP ROUTINGIPX/RIP is automatically enabled when a NetID is assigned to the VLAN. To remove the advertisement o

Seite 208 - ROCESSING

15-6 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGCONFIGURING IPXThis section describes the commands associated with configuring IPX, IPX/RIP, and IPX/SA

Seite 209 - Table 11-4: Basic IP Commands

EXTREMEWARE SOFTWARE USER GUIDE15-7IPX COMMANDSPROTOCOL-BASED VLANS FOR IPXWhen combining IPX VLANs with other VLANs on the same physical port, it may

Seite 210

15-8 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGconfig ipxroute add [<dest_netid> | default] <next_hop_id> <next_hop_node_addr> <h

Seite 211

EXTREMEWARE SOFTWARE USER GUIDE15-9IPX COMMANDSTable 15-4 describes the commands used to configure the IPX route table.config vlan <name> xnetid

Seite 212

EXTREMEWARE SOFTWARE USER GUIDE1-7SOFTWARE LICENSINGPRODUCT SUPPORTExtremeWare version 6.0 and above supports router licensing on the Summit24 switch,

Seite 213

15-10 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGTable 15-5 describes the commands used to configure IPX/SAP.config ipxrip vlan [<name> | all] up

Seite 214

EXTREMEWARE SOFTWARE USER GUIDE15-11IPX CONFIGURATION EXAMPLEIPX CONFIGURATION EXAMPLEFigure 15-2 builds on the example showing the IP/RIP configurati

Seite 215

15-12 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGFigure 15-2: IPX routing configuration exampleThe stations connected to the system generate a combinat

Seite 216 - = NetBIOS traffic

EXTREMEWARE SOFTWARE USER GUIDE15-13DISPLAYING IPX SETTINGSThe IPX configuration shown in example in Figure 15-2 is as follows:create vlan Execcreate

Seite 217

15-14 EXTREMEWARE SOFTWARE USER GUIDEIPX ROUTINGRESETTING AND DISABLING IPXTo return IPX settings to their defaults and disable IPX functions, use the

Seite 218

EXTREMEWARE SOFTWARE USER GUIDE16-116Access PoliciesThis chapter describes the following topics:• Overview of Access Policies on page 16-1• Using IP A

Seite 219

16-2 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESIP ACCESS LISTSIP access lists consist of IP access rules, and are used to perform packet filtering

Seite 220

EXTREMEWARE SOFTWARE USER GUIDE16-3USING IP ACCESS LISTS• Physical source port• Precedence number (optional)HOW IP ACCESS LISTS WORKWhen a packet arri

Seite 221 - Protocols

16-4 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESThe access-list example, below, performs packet filtering in the following sequence, as determined

Seite 222 - ROTOCOLS

EXTREMEWARE SOFTWARE USER GUIDE16-5USING IP ACCESS LISTSMAXIMUM ENTRIESA maximum of 255 entries with an assigned precedence can be used. In addition t

Seite 223 - VER VIEW

IIIContentsPREFACEIntroduction xixTerminology xxConventions xxRelated Publications xxi1EXTREMEWARE OVERVIEWSummary of Features 1-1Virtual LANs (VLANs)

Seite 224

1-8 EXTREMEWARE SOFTWARE USER GUIDEEXTREMEWARE OVER VIEWOBTAINING A SECURITY LICENSETo obtain information on enabling features that require export res

Seite 225

16-6 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESVERIFYING ACCESS LIST CONFIGURATIONSTo verify access list settings you can view the access list con

Seite 226

EXTREMEWARE SOFTWARE USER GUIDE16-7USING IP ACCESS LISTSTable 16-1: Access List Configuration CommandsCommand Descriptioncreate access-list <name&g

Seite 227

16-8 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIEScreate access-list <name> tcp destination [<dst_ipaddress>/<dst_mask> | any] ip-p

Seite 228

EXTREMEWARE SOFTWARE USER GUIDE16-9USING IP ACCESS LISTScreate access-list <name> udp destination [<dst_ipaddress>/<dst_mask> | any]

Seite 229 - Area 2 Area 1 Area 0

16-10 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIEScreate access-list icmp destination [<dest_ipaddress>/<mask> | any] source [<src_ip

Seite 230 - Area 1 Area 0 Area 3

EXTREMEWARE SOFTWARE USER GUIDE16-11USING IP ACCESS LISTSIP ACCESS LIST EXAMPLESThis section presents two IP access list examples:• Using the permit-e

Seite 231 - ASBR ASBR

16-12 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESThe following command creates the access-list:create access-list denyall ip destination any source

Seite 232

EXTREMEWARE SOFTWARE USER GUIDE16-13USING IP ACCESS LISTSFigure 16-3: Access list allows TCP trafficStep 3 - Permit-Established Access List. When a T

Seite 233 - ISTRIBUTING

16-14 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESThe exact command line entry for this example is as follows:create access-list telnet-allow tcp de

Seite 234

EXTREMEWARE SOFTWARE USER GUIDE16-15USING ROUTING ACCESS POLICIESFigure 16-6: ICMP packets are filtered outUSING ROUTING ACCESS POLICIESTo use routing

Seite 235

EXTREMEWARE SOFTWARE USER GUIDE1-9SOFTWARE FACTORY DEFAULTSFor default settings of individual ExtremeWare features, refer to individual chapters in th

Seite 236 - Triggered update

16-16 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESCREATING AN ACCESS PROFILEThe first thing to do when using routing access policies is to create an

Seite 237

EXTREMEWARE SOFTWARE USER GUIDE16-17USING ROUTING ACCESS POLICIESTo configure the access profile mode, use the following command:config access-profile

Seite 238

16-18 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESPERMIT AND DENY ENTRIESIf you have configured the access profile mode to be none, you must specify

Seite 239

EXTREMEWARE SOFTWARE USER GUIDE16-19USING ROUTING ACCESS POLICIESROUTING ACCESS POLICIES FOR RIPIf you are using the RIP protocol, the switch can be c

Seite 240

16-20 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESFigure 16-7: RIP access policy exampleAssuming the backbone VLAN interconnects all the routers in

Seite 241

EXTREMEWARE SOFTWARE USER GUIDE16-21USING ROUTING ACCESS POLICIESIn addition, if the administrator wants to restrict any user belonging to the VLAN En

Seite 242

16-22 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESfor the switch as a whole. To configure a direct filter policy, use the following command:config o

Seite 243

EXTREMEWARE SOFTWARE USER GUIDE16-23USING ROUTING ACCESS POLICIESTo configure the switch labeled Internet, the commands would be as follows:create acc

Seite 244

16-24 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESTo configure the switch labeled Engsvrs, use the following commands:create access-profile nointern

Seite 245

EXTREMEWARE SOFTWARE USER GUIDE16-25MAKING CHANGES TO A ROUTING ACCESS POLICYTo configure the switch labeled Engsvrs, the commands would be as follows

Seite 246

1-10 EXTREMEWARE SOFTWARE USER GUIDEEXTREMEWARE OVER VIEW

Seite 247

16-26 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESon the ingress or egress side, depending on the change. For soft resets to be applied on the ingre

Seite 248

EXTREMEWARE SOFTWARE USER GUIDE16-27ROUTING ACCESS POLICY COMMANDSTable 16-3: Routing Access Policy Configuration CommandsCommand Descriptionconfig ac

Seite 249

16-28 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESconfig access-profile <access_profile> mode [permit | deny | none]Configures the access prof

Seite 250

EXTREMEWARE SOFTWARE USER GUIDE16-29USING ROUTE MAPSUSING ROUTE MAPSRoute maps are a mechanism that can be used to conditionally control the redistrib

Seite 251 - Exterior Gateway Routing

16-30 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESTo create a route map, do the following:1 Create a route map.2 Add entries to the route map.3 Add

Seite 252

EXTREMEWARE SOFTWARE USER GUIDE16-31USING ROUTE MAPSconfig route-map <route-map> <sequence number> add set [as-path <as_num> | commu

Seite 253 - OMMUNITIES

16-32 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESROUTE MAP OPERATIONThe entries in the route map are processed in the ascending order of the sequen

Seite 254 - OUTE CONFEDERATION EXAMPLE

EXTREMEWARE SOFTWARE USER GUIDE16-33USING ROUTE MAPSFigure 16-9: Route mapsThe following points apply to this example:• RTA is a member of in AS 1111

Seite 255

16-34 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESconfig bgp-out add 20 permitconfig bgp neighbor 10.0.0.2 route-map-filter out bgp-outconfig bgp ne

Seite 256

EXTREMEWARE SOFTWARE USER GUIDE16-35USING ROUTE MAPSROUTE MAP COMMANDSTable 16-6 describes route map commands.Table 16-6: Route Map CommandsCommand De

Seite 257

EXTREMEWARE SOFTWARE USER GUIDE2-12Accessing the SwitchThis chapter covers the following topics:• Understanding the Command Syntax on page 2-1• Line-E

Seite 258

16-36 EXTREMEWARE SOFTWARE USER GUIDEACCESS POLICIESconfig route-map <route-map> <sequence number> delete match [nlri-list <access_prof

Seite 259

EXTREMEWARE SOFTWARE USER GUIDE17-117Server Load Balancing (SLB)This chapter describes the following topics:• Overview on page 17-2• SLB Components on

Seite 260

17-2 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)OVERVIEWServer Load Balancing (SLB) is a feature of the switch that divides many client

Seite 261

EXTREMEWARE SOFTWARE USER GUIDE17-3SLB COMPONENTSNODESA node is an individual service on a physical server that consists of an IP addresses and a port

Seite 262

17-4 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)Once you know which virtual server options are useful in your network, you can:• Define

Seite 263

EXTREMEWARE SOFTWARE USER GUIDE17-5FORWARDING MODESFORWARDING MODESThe switch supports the following SLB forwarding modes:• Tran sp arent• Tran sl at

Seite 264

17-6 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)To configure transparent mode, use the following command:create slb vip <vipname>

Seite 265

EXTREMEWARE SOFTWARE USER GUIDE17-7FORWARDING MODES• The service is configured to use the appropriate address and port, as specified in the switch con

Seite 266

17-8 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)The following commands enable SLB, configure the server VLAN to act as the server side,

Seite 267 - IP Multicast Routing

EXTREMEWARE SOFTWARE USER GUIDE17-9FORWARDING MODESFigure 17-3: Translational modeIn Figure 17-3, the switch is configured to respond to requests for

Seite 268 - ULTICAST

2-2 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCH3 The value part of the command specifies how you want the parameter to be set. Values include

Seite 269 - PARSE MODE (PIM-SM)

17-10 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)config client add port 1-4enable ipforwardingThe following commands create a round-rob

Seite 270 - ULTICASTING

EXTREMEWARE SOFTWARE USER GUIDE17-11FORWARDING MODESTo configure port translation mode, use the following command:create slb vip <vipname> pool

Seite 271

17-12 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)The servers are configured as follows:• All servers have the same MAC address.• All se

Seite 272

EXTREMEWARE SOFTWARE USER GUIDE17-13BALANCING METHODSprotocol is enabled, the subnet containing the VIPs is propagated through the network.BALANCING M

Seite 273 - Protocol (IGMP)

17-14 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)where the number of connections that each machine receives over time is proportionate

Seite 274

EXTREMEWARE SOFTWARE USER GUIDE17-15BASIC SLB COMMANDSThe switch will distribute traffic in round-robin fashion among the pools active nodes with the

Seite 275

17-16 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)create slb pool <poolname> {slb-method [round-robin | ratio | priority | least-c

Seite 276 - PIM-DM C

EXTREMEWARE SOFTWARE USER GUIDE17-17BASIC SLB COMMANDSdisable slb vip <vipname> {close-connections-now} Disables a VIP group. When disabled, no

Seite 277

17-18 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)ADVANCED SLB APPLICATION EXAMPLEThis example builds upon the Introductory SLB Applicat

Seite 278

EXTREMEWARE SOFTWARE USER GUIDE17-19ADVANCED SLB APPLICATION EXAMPLEFigure 17-5: Advanced SLB configurationThe commands used to configure are describe

Seite 279

EXTREMEWARE SOFTWARE USER GUIDE2-3UNDERSTANDING THE COMMAND SYNTAXOnce you have created the VLAN with a unique name, you can then eliminate the keywor

Seite 280

17-20 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)To create is the virtual IP VLAN, use the following commands: create vlan sitesconfig

Seite 281 - IPX Routing

EXTREMEWARE SOFTWARE USER GUIDE17-21ADVANCED SLB APPLICATION EXAMPLEcreate slb pool site2webconfig slb site2web add 192.168.200.5:80config slb site2we

Seite 282 - 192.207.36.0

17-22 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)enable slb vip ftpc service-checkconfig slb vip ftpc service-check ftp user test passw

Seite 283 - NCAPSULATION

EXTREMEWARE SOFTWARE USER GUIDE17-23HEALTH CHECKINGPING-CHECKPing-check is Layer 3 based pinging of the physical node. The default ping frequency is o

Seite 284 - TATIC ROUTES

17-24 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)SERVICE-CHECKService-check is Layer 7 based application-dependent checking defined on

Seite 285 - DVERTISEMENTS

EXTREMEWARE SOFTWARE USER GUIDE17-25HEALTH CHECKINGFor SMTP, service-check identifies the identity of the switch by providing the specified DNS domain

Seite 286

17-26 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)PERSISTENCEUsing persistence, you can ensure that traffic flows do not span multiple s

Seite 287

EXTREMEWARE SOFTWARE USER GUIDE17-27USING HIGH AVAILABILITY SYSTEM FEATURESYou can only activate sticky persistence on wildcard virtual servers.To con

Seite 288

17-28 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)The switches in a redundant SLB configuration should have identical SLB configurations

Seite 289

EXTREMEWARE SOFTWARE USER GUIDE17-29USING HIGH AVAILABILITY SYSTEM FEATURESTo assign a VIP to a unit, use the following command:config slb vip <vip

Seite 290

2-4 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCHSUMMIT SWITCH NUMERICAL RANGESCommands that require you to enter one or more port numbers on a

Seite 291

17-30 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)create vlan insidecreate vlan serverconfig vlan inside ipaddress 1.10.0.2 /16config vl

Seite 292

EXTREMEWARE SOFTWARE USER GUIDE17-31USING HIGH AVAILABILITY SYSTEM FEATUREScreate slb pool testpoolconfig slb pool testpool add 1.206.1.1:80config slb

Seite 293

17-32 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)3DNS SUPPORTWhen you enable SLB, the switch reports health status to 3DNS using the iQ

Seite 294

EXTREMEWARE SOFTWARE USER GUIDE17-33ADVANCED SLB COMMANDSconfig slb failover unit [1 | 2] remote-ip <ipaddress> local-ip <ipaddress>:<L

Seite 295 - Access Policies

17-34 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)config slb global [ping-check | tcp-port-check | service-check] frequency <seconds&

Seite 296

EXTREMEWARE SOFTWARE USER GUIDE17-35ADVANCED SLB COMMANDSconfig slb global telnet userid <userid> password {encrypted} {<password>}Configu

Seite 297

17-36 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)config slb vip <vipname> unit {1 | 2} Configures a unit number of a VIP name for

Seite 298 - ESTABLISHED

EXTREMEWARE SOFTWARE USER GUIDE17-37ADVANCED SLB COMMANDSenable slb node <ipaddress> ping-check Enables L3 pinging to the node address. Ping-che

Seite 299

17-38 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)WEB CACHE REDIRECTIONWeb cache redirection uses the TCP or UDP port number to redirect

Seite 300

EXTREMEWARE SOFTWARE USER GUIDE17-39WEB CACHE REDIRECTIONFLOW REDIRECTION COMMANDSTo configure flow redirection, use the commands listed in Table 17-5

Seite 301

EXTREMEWARE SOFTWARE USER GUIDE2-5LINE-EDITING KEYSLINE-EDITING KEYSTab le 2-2 describes the line-editing keys available using the CLI.vertical bar |

Seite 302

17-40 EXTREMEWARE SOFTWARE USER GUIDESERVER LOAD BALANCING (SLB)Figure 17-7: Flow-redirection exampleThe following commands are used to configure the

Seite 303

EXTREMEWARE SOFTWARE USER GUIDE18-118Status Monitoring and StatisticsThis chapter describes the following topics:• Status Monitoring on page 18-1• Slo

Seite 304

18-2 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICSFor more information about show commands for a specific ExtremeWare feature, refer

Seite 305 - 10.10.20.1

EXTREMEWARE SOFTWARE USER GUIDE18-3SLOT DIAGNOSTICSSLOT DIAGNOSTICSThe BlackDiamond switch provides a facility for running normal or extended diagnost

Seite 306 - NET20 VLANNET10 VLAN

18-4 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICS•extended — Takes the switch fabric and ports offline, and performs extensive ASIC

Seite 307

EXTREMEWARE SOFTWARE USER GUIDE18-5PORT ERRORS• Received Broadcast (RX Bcast) — The total number of frames received by the port that are addressed to

Seite 308 - XAMPLE 2: FILTER ICMP PACKETS

18-6 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICSThe following port receive error information is collected by the switch:• Receive

Seite 309

EXTREMEWARE SOFTWARE USER GUIDE18-7SETTING THE SYSTEM RECOVERY LEVELSETTING THE SYSTEM RECOVERY LEVELYou can configure the system to automatically reb

Seite 310

18-8 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICSBy default, log entries that are assigned a critical or warning level remain in th

Seite 311 - EQUENCE NUMBERING

EXTREMEWARE SOFTWARE USER GUIDE18-9LOGGINGLOCAL LOGGINGThe switch maintains 1,000 messages in its internal log. You can display a snapshot of the log

Seite 312

2-6 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCHCOMMAND HISTORYExtremeWare “remembers” the last 49 commands you entered. You can display a list

Seite 313

18-10 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICS• Configure remote logging by using the following command:config syslog {add} <

Seite 314 - Engsvrs Sales

EXTREMEWARE SOFTWARE USER GUIDE18-11LOGGINGLOGGING COMMANDSThe commands described in Table 18-5 allow you to configure logging options, reset logging

Seite 315

18-12 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICSRMONUsing the Remote Monitoring (RMON) capabilities of the switch allows network

Seite 316

EXTREMEWARE SOFTWARE USER GUIDE18-13RMON• Management workstation — Communicates with the RMON probe and collects the statistics from it. The workstati

Seite 317

18-14 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICSAlarms inform you of a network performance problem and can trigger automated acti

Seite 318

EXTREMEWARE SOFTWARE USER GUIDE18-15RMONEVENT ACTIONSThe actions that you can define for each alarm are shown in Tab le 18 -6.To be notified of events

Seite 319

18-16 EXTREMEWARE SOFTWARE USER GUIDESTATUS MONITORING AND STATISTICS

Seite 320

EXTREMEWARE SOFTWARE USER GUIDE19-119Using ExtremeWare VistaThis chapter covers the following topics:• Enabling and Disabling Web Access on page 19-2•

Seite 321

19-2 EXTREMEWARE SOFTWARE USER GUIDEUSING EXTREMEWARE VISTAENABLING AND DISABLING WEB ACCESSBy default, Web access is enabled on the switch. Use of Ex

Seite 322

EXTREMEWARE SOFTWARE USER GUIDE19-3ACCESSING EXTREMEWARE VISTA• Check for newer versions of stored pages. Every visit to the page should be selected a

Seite 323

EXTREMEWARE SOFTWARE USER GUIDE2-7COMMON COMMANDSconfig slot <slot> module [f32t | f32f | f48t | g4x | g6x | g8x | g12x]Configures a slot for a

Seite 324

19-4 EXTREMEWARE SOFTWARE USER GUIDEUSING EXTREMEWARE VISTATo correct this situation, log out of the switch and log in again.NAVIGATING EXTREMEWARE VI

Seite 325

EXTREMEWARE SOFTWARE USER GUIDE19-5NAVIGATING EXTREMEWARE VISTABROWSER CONTROLSBrowser controls include drop-down list boxes, check boxes, and multi-s

Seite 326 - OUTE MAP EXAMPLE

19-6 EXTREMEWARE SOFTWARE USER GUIDEUSING EXTREMEWARE VISTASAVING CHANGESThere are two ways to save your changes to non-volatile storage using Extreme

Seite 327

EXTREMEWARE SOFTWARE USER GUIDE19-7DO A GET WHEN CONFIGURING A VLANDO A GET WHEN CONFIGURING A VLANWhen configuring a VLAN using ExtremeWare Vista, pr

Seite 328

19-8 EXTREMEWARE SOFTWARE USER GUIDEUSING EXTREMEWARE VISTA

Seite 329

EXTREMEWARE SOFTWARE USER GUIDE20-120Software Upgrade and Boot OptionsThis chapter describes the following topics:• Downloading a New Image on page 20

Seite 330

20-2 EXTREMEWARE SOFTWARE USER GUIDESOFTWARE UPGRADE AND BOOT OPTIONS• Download the new image to the switch using the commanddownload image [<ipadd

Seite 331 - Server Load Balancing (SLB)

EXTREMEWARE SOFTWARE USER GUIDE20-3SAVING CONFIGURATION CHANGESSAVING CONFIGURATION CHANGESThe configuration is the customized set of parameters that

Seite 332 - OMPONENTS

20-4 EXTREMEWARE SOFTWARE USER GUIDESOFTWARE UPGRADE AND BOOT OPTIONSUSING TFTP TO UPLOAD THE CONFIGURATIONYou can upload the current configuration to

Seite 333

EXTREMEWARE SOFTWARE USER GUIDE20-5USING TFTP TO DOWNLOAD THE CONFIGURATIONUSING TFTP TO DOWNLOAD THE CONFIGURATIONYou can download ASCII files that c

Seite 334 - ALANCING

IVSecurity Features Under License Control 1-8Software Factory Defaults 1-82ACCESSING THE SWITCHUnderstanding the Command Syntax 2-1Syntax Helper 2-2Co

Seite 335

2-8 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCHdelete vlan <name> Deletes a VLAN.disable bootp vlan [<name> | all] Disables BOOTP

Seite 336

20-6 EXTREMEWARE SOFTWARE USER GUIDESOFTWARE UPGRADE AND BOOT OPTIONSTo download an incremental configuration, use the following command:download conf

Seite 337

EXTREMEWARE SOFTWARE USER GUIDE20-7SYNCHRONIZING MSMSSYNCHRONIZING MSMS On the BlackDiamond switch, you can take the master MSM configurations and ima

Seite 338 - RANSLATIONAL

20-8 EXTREMEWARE SOFTWARE USER GUIDESOFTWARE UPGRADE AND BOOT OPTIONSAs soon as you see the BootROM-> prompt, release the spacebar. You can see a

Seite 339

EXTREMEWARE SOFTWARE USER GUIDE20-9BOOT OPTION COMMANDSdownload configuration <hostname | ipaddress> <filename> {incremental}Downloads a c

Seite 340 - RANSLATION

20-10 EXTREMEWARE SOFTWARE USER GUIDESOFTWARE UPGRADE AND BOOT OPTIONSuse configuration [primary | secondary] Configures the switch to use a particula

Seite 341 - Clients Servers

EXTREMEWARE SOFTWARE USER GUIDEA-1ASupported StandardsThe following is a list of software standards supported by ExtremeWare.Standards and ProtocolsRF

Seite 342 - DVERTISEMENT

A-2 EXTREMEWARE SOFTWARE USER GUIDESUPPORTED STANDARDSManagement and SecurityRFC 1157 SNMP v1/v2cRFC 1213 MIB IIRFC 1354 IP forwarding table MIBRFC 14

Seite 343

EXTREMEWARE SOFTWARE USER GUIDEB-1BTroubleshootingIf you encounter problems when using the switch, this appendix may be helpful. If you have a problem

Seite 344 - ONNECTIONS

B-2 EXTREMEWARE SOFTWARE USER GUIDETROUBLESHOOTING• Both ends of the Gigabit link are set to the same autonegotiation state.Both sides if the Gigabit

Seite 345

EXTREMEWARE SOFTWARE USER GUIDEB-3USING THE COMMAND-LINE INTERFACEIf this does not work, try using a different power source (different power strip/out

Seite 346

EXTREMEWARE SOFTWARE USER GUIDE2-9CONFIGURING MANAGEMENT ACCESSCONFIGURING MANAGEMENT ACCESSExtremeWare supports the following two levels of managemen

Seite 347

B-4 EXTREMEWARE SOFTWARE USER GUIDETROUBLESHOOTINGThe SNMP Network Manager or Telnet workstation can no longer access the device:Check that Telnet acc

Seite 348 - PPLICATION

EXTREMEWARE SOFTWARE USER GUIDEB-5USING THE COMMAND-LINE INTERFACEIn the case where no one knows a password for an administrator level user, contact y

Seite 349 - Server pools

B-6 EXTREMEWARE SOFTWARE USER GUIDETROUBLESHOOTINGEnsure that you are using multi-mode fiber (MMF) when using a 1000BASE-SX GBIC, and single mode fibe

Seite 350

EXTREMEWARE SOFTWARE USER GUIDEB-7USING THE COMMAND-LINE INTERFACE802.1Q links do not work correctly:Remember that VLAN names are only locally signifi

Seite 351

B-8 EXTREMEWARE SOFTWARE USER GUIDETROUBLESHOOTINGDEBUG TRACINGExtremeWare includes a debug-tracing facility for the switch. The show debug-tracing co

Seite 352

IndexNumerics3DNS 17-32802.1p configuration commands (table) 9-14Aaccess levels 2-9access listsBlackDiamond switch maximum entries 16-5configuration c

Seite 353

II - INDEXport configuration 4-2port-mirroring, virtual port 4-11slot configuration 4-1verifying load sharing 4-11blackhole entries, FDB 7-2boot optio

Seite 354

INDEX - IIIhost attach 10-9linking switches 10-12masterbehavior 10-5definition 10-2determining 10-3electing 10-6election algorithms 10-5port blocks 10

Seite 355 - ERVICE-CHECK COMMANDS

IV - INDEXresetting 14-14settings, displaying 14-13show commands (table) 14-13IP multinettingdescription 11-7example 11-9primary VLAN interface 11-7se

Seite 356 - ERSISTENCE

INDEX - Vverifying the configuration on Summit switch 5-10local logging 18-9log display 18-9loggingand Telnet 18-9commands (table) 18-11configuration

Seite 357 - VAILABILITY

2-10 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCHUSER ACCOUNTA user-level account has viewing access to all manageable parameters, with the exc

Seite 358 - SLB switch

VI - INDEXport-mirroringBlackDiamond switch configuration commands (table) 4-12BlackDiamond switch example 4-12description on BlackDiamond switch 4-11

Seite 359

INDEX - VIIconfiguration commands (table) 16-35creating 16-30description 16-2, 16-29example 16-32goto entries 16-31match entries 16-31match operation

Seite 360

VIII - INDEXusing 3-10SNTPconfiguration commands (table) 3-25configuring 3-22Daylight Savings Time 3-22description 3-21example 3-25Greenwich Mean Time

Seite 361 - SING MANUAL FAIL-BACK

INDEX - IXVirtual LANs. See VLANsvirtual link, OSPF 12-8virtual port on Summit switch 5-11VLAN aggregationcommands (table) 11-14description 11-11limit

Seite 362

X - INDEX

Seite 363

Index of CommandsCclear counters 18-11clear dlcs 9-26clear fdb 7-3, 9-11clear igmp snooping 14-14clear iparp 11-19, 11-28clear ipfdb 11-19, 11-2

Seite 364

ii - Index of Commands16-28config esrp port-mode 10-14config fdb agingtime 7-3config flow redirection add next-hop 17-39config flow-redirection del

Seite 365

Index of Commands - iiiconfig rip vlan import-filter 16-19, 16-29config rip vlan trusted-gateway 16-19, 16-29config route-map add 16-30, 16-36confi

Seite 366

iv - Index of Commandscreate access-list udp destination 16-9create access-profile 16-29create account 2-7, 2-12create bgp neighbor 13-14create fd

Seite 367

Index of Commands - vdisable radius-accounting 3-16disable red ports 9-8disable rip 12-20disable rip aggregation 12-20disable rip export 11-4, 12

Seite 368 - EDIRECTION

EXTREMEWARE SOFTWARE USER GUIDE2-11CONFIGURING MANAGEMENT ACCESSDEFAULT ACCOUNTSBy default, the switch is configured with two accounts, as shown in Ta

Seite 369

vi - Index of Commandsenable license 2-8enable license security 3-7enable log display 18-9, 18-12enable loopback-mode vlan 11-21enable mac-vlan 6

Seite 370 - Cache VLAN

Index of Commands - viishow dlcs 9-27show dns-client 2-13show dot1p 9-14show dvmrp 14-13show edp 4-13, 5-12show esrp 10-5, 10-13, 10-16, 10-20sh

Seite 371 - ONITORING

viii - Index of Commandsunconfig vlan xnetid 15-14upload configuration 2-13, 20-4, 20-9upload configuration cancel 20-4, 20-9use configuration 20-

Seite 372 - Table 18-1 describes

2-12 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCH5 Re-enter the new password at the prompt.If you forget your password while logged out of the

Seite 373 - IAGNOSTICS

EXTREMEWARE SOFTWARE USER GUIDE2-13DOMAIN NAME SERVICE CLIENT SERVICESDOMAIN NAME SERVICE CLIENT SERVICESThe Domain Name Service (DNS) client in Extre

Seite 374 - TATISTICS

2-14 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCHPINGThe ping command enables you to send Internet Control Message Protocol (ICMP) echo message

Seite 375

EXTREMEWARE SOFTWARE USER GUIDE2-15CHECKING BASIC CONNECTIVITYTRACEROUTEThe traceroute command enables you to trace the routed path between the switch

Seite 376

2-16 EXTREMEWARE SOFTWARE USER GUIDEACCESSING THE SWITCH

Seite 377

EXTREMEWARE SOFTWARE USER GUIDE3-13Managing the SwitchThis chapter covers the following topics:• Overview on page 3-1• Using the Console Interface on

Seite 378

VUsing a BOOTP Server 3-4Manually Configuring the IP Settings 3-4Disconnecting a Telnet Session 3-6Controlling Telnet Access 3-6Using Secure Shell 2 (

Seite 379 - EAL-TIME DISPLAY

3-2 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCH— ExtremeWare Vista Web access using a standard Web browser— SNMP access using ExtremeWare Enter

Seite 380

EXTREMEWARE SOFTWARE USER GUIDE3-3USING TELNETYou can configure the IP address, subnet mask, and default router for the VLAN mgmt, using the following

Seite 381 - Table 18-5: Logging Commands

3-4 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHUSING A BOOTP SERVERIf you are using IP and you have a Bootstrap Protocol (BOOTP) server set up

Seite 382

EXTREMEWARE SOFTWARE USER GUIDE3-5USING TELNETmust be assigned an IP address and subnet mask. IP addresses are always assigned to a VLAN. The switch c

Seite 383

3-6 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCH6 Configure the default route for the switch using the following command:config iproute add defa

Seite 384

EXTREMEWARE SOFTWARE USER GUIDE3-7USING SECURE SHELL 2 (SSH2)To display the status of Telnet, use the following command:show managementYou can choose

Seite 385 - Table 18-6: Event Actions

3-8 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHTo enable SSH2, use the following command:enable ssh2 {access-profile [<access_profile> |

Seite 386

EXTREMEWARE SOFTWARE USER GUIDE3-9USING EXTREMEWARE VISTAFor more information on assigning an IP address, refer to the section, “Configuring Switch IP

Seite 387 - Using ExtremeWare Vista

3-10 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHUSING SNMPAny Network Manager running the Simple Network Management Protocol (SNMP) can manage

Seite 388

EXTREMEWARE SOFTWARE USER GUIDE3-11USING SNMPTo configure SNMP read access to use an access profile, use the command:config snmp access-profile readon

Seite 389

VILoad-Sharing Algorithms 4-8Configuring BlackDiamond and Alpine Switch Load Sharing 4-9Load-Sharing Example 4-11Verifying the Load-Sharing Configurat

Seite 390 - AVIGATING

3-12 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHconfig snmp add trapreceiver <ipaddress> community <string>Adds the IP address of a

Seite 391 - ROWSER CONTROLS

EXTREMEWARE SOFTWARE USER GUIDE3-13AUTHENTICATING USERSDISPLAYING SNMP SETTINGSTo display the SNMP settings configured on the switch, use the followin

Seite 392 - ILTERING

3-14 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHThe privileges assigned to the user (admin versus non-admin) at the RADIUS server take preceden

Seite 393

EXTREMEWARE SOFTWARE USER GUIDE3-15AUTHENTICATING USERSTable 3- 2: RADIUS CommandsCommand Descriptionconfig radius [primary | secondary] server [<i

Seite 394

3-16 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHRADIUS RFC 2138 ATTRIBUTESThe RADIUS RFC 2138 optional attributes supported are as follows:• Us

Seite 395 - Software Upgrade and Boot

EXTREMEWARE SOFTWARE USER GUIDE3-17AUTHENTICATING USERSfiles. The client configuration file (ClientCfg.txt) defines the authorized source machine, sou

Seite 396 - EBOOTING

3-18 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHcompiled format for Solaris™ or Linux™ operating systems, as well as in source code format. For

Seite 397

EXTREMEWARE SOFTWARE USER GUIDE3-19AUTHENTICATING USERSuser Password = ""Filter-Id = "unlim"admin Password = "", Service

Seite 398

3-20 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHCONFIGURING TACACS+Terminal Access Controller Access Control System Plus (TACACS+) is a mechani

Seite 399

EXTREMEWARE SOFTWARE USER GUIDE3-21USING THE SIMPLE NETWORK TIME PROTOCOLUSING THE SIMPLE NETWORK TIME PROTOCOLExtremeWare supports the client portion

Seite 400

VIIAssigning a VLAN Tag 6-6Mixing Port-Based and Tagged VLANs 6-9Protocol-Based VLANs 6-9Predefined Protocol Filters 6-10Defining Protocol Filters 6-1

Seite 401 - YNCHRONIZING

3-22 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCHCONFIGURING AND USING SNTPTo use SNTP, follow these steps:1 Identify the host(s) that are confi

Seite 402

EXTREMEWARE SOFTWARE USER GUIDE3-23USING THE SIMPLE NETWORK TIME PROTOCOLThis command provides configuration and statistics associated with SNTP and i

Seite 403

3-24 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCH-12:00 -720 IDLW - International Date Line West+1:00 +60 CET - Central European FWT - French Wi

Seite 404

EXTREMEWARE SOFTWARE USER GUIDE3-25USING THE SIMPLE NETWORK TIME PROTOCOLSNTP CONFIGURATION COMMANDSTab le 3-5 describes SNTP configuration commands.S

Seite 405 - Supported Standards

3-26 EXTREMEWARE SOFTWARE USER GUIDEMANAGING THE SWITCH

Seite 406 - TANDARDS

EXTREMEWARE SOFTWARE USER GUIDE4-14Configuring BlackDiamond and Alpine Switch Slots and PortsThis chapter covers the following topics: • Configuring a

Seite 407 - Troubleshooting

4-2 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTSYou can configure the BlackDiamond or Alpine switch with

Seite 408 - ROUBLESHOOTING

EXTREMEWARE SOFTWARE USER GUIDE4-3BLACKDIAMOND AND ALPINE SWITCH PORT CONFIGURATIONFor example, if a G4X I/O module (having a total of four ports) is

Seite 409 - NTERFACE

4-4 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTS10BASE-T and 100BASE-TX ports can connect to either 10BAS

Seite 410

EXTREMEWARE SOFTWARE USER GUIDE4-5BLACKDIAMOND AND ALPINE SWITCH PORT CONFIGURATIONconfig ports <portlist> auto off {speed [10 | 100 | 1000]} du

Seite 411

VIII8SPANNING TREE PROTOCOL (STP)Overview of the Spanning Tree Protocol 8-1Spanning Tree Domains 8-2STPD Status for GVRP-Added Ports 8-2Defaults 8-3ST

Seite 412

4-6 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTSenable sharing <port> grouping <portlist> {po

Seite 413

EXTREMEWARE SOFTWARE USER GUIDE4-7JUMBO FRAMESJUMBO FRAMESJumbo frames are Ethernet frames that are larger than 1523 bytes, including four bytes used

Seite 414

4-8 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTSFor example, VLANs see the load-sharing group as a single

Seite 415 - Numerics

EXTREMEWARE SOFTWARE USER GUIDE4-9LOAD SHARING ON THE BLACKDIAMOND AND ALPINE SWITCHThe address-based and round-robin load-sharing algorithms are supp

Seite 416

4-10 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTSBlackDiamond switch modules that use the “i” chipset do

Seite 417

EXTREMEWARE SOFTWARE USER GUIDE4-11BLACKDIAMOND AND ALPINE SWITCH PORT-MIRRORINGLOAD-SHARING EXAMPLEThe following example defines a load-sharing group

Seite 418

4-12 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTSUp to eight mirroring filters and one monitor port can b

Seite 419

EXTREMEWARE SOFTWARE USER GUIDE4-13BLACKDIAMOND AND ALPINE SWITCH PORT-MIRRORINGEXTREME DISCOVERY PROTOCOLThe Extreme Discovery Protocol (EDP) is used

Seite 420

4-14 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING BLACKDIAMOND AND ALPINE SWITCH SLOTS AND PORTS

Seite 421

EXTREMEWARE SOFTWARE USER GUIDE5-15Configuring Summit Switch PortsThis chapter covers the following topics:• Enabling and Disabling Summit Switch Port

Seite 422 - (table) 3-23

IXConfiguring DiffServ 9-15Observing DiffServ Information 9-17Changing DiffServ Code point assignments in the Q0S Profile 9-17Replacing DiffServ Code

Seite 423

5-2 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSFor example, to disable ports 3, 5, and 12 through 15 on the Summit switch, enter th

Seite 424

EXTREMEWARE SOFTWARE USER GUIDE5-3SUMMIT SWITCH PORT COMMANDSTURNING OFF AUTONEGOTIATION FOR A GIGABIT ETHERNET PORTIn certain interoperability situat

Seite 425 - Index of Commands

5-4 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSdisable learning ports <portlist> Disables MAC address learning on one or more

Seite 426

EXTREMEWARE SOFTWARE USER GUIDE5-5JUMBO FRAMESJUMBO FRAMESJumbo frames are Ethernet frames that are larger than 1523 bytes, including four bytes used

Seite 427 - Index of Commands - iii

5-6 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSThe jumbo_frame_mtu range is 1523 to 9216. The value describes the maximum size “on

Seite 428

EXTREMEWARE SOFTWARE USER GUIDE5-7LOAD SHARING ON THE SUMMIT SWITCHLOAD SHARING ALGORITHMSLoad sharing algorithms allow you to select the distribution

Seite 429 - Index of Commands - v

5-8 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSOn switches that do not have the “i” chipset, the following additional rules apply:•

Seite 430

EXTREMEWARE SOFTWARE USER GUIDE5-9LOAD SHARING ON THE SUMMIT SWITCHOn all other Summit switch models, the following rules apply:• A group can contain

Seite 431 - replacement ports 9-17

5-10 EXTREMEWARE SOFTWARE USER GUIDECONFIGURING SUMMIT SWITCH PORTSTo define a load-sharing group, you assign a group of ports to a single, logical po

Seite 432

EXTREMEWARE SOFTWARE USER GUIDE5-11SUMMIT SWITCH PORT-MIRRORINGThe traffic filter can be defined based on one of the following criteria:• Physical por

Kommentare zu diesen Handbüchern

Keine Kommentare