Alcatel Omni Switch/Router manuel d'utilisation
- Voir en ligne ou télécharger le manuel d’utilisation
- 1100 pages
- 0.19 mb
Aller à la page of
Un bon manuel d’utilisation
Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation Alcatel Omni Switch/Router. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel Alcatel Omni Switch/Router ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.
Qu'est ce que le manuel d’utilisation?
Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation Alcatel Omni Switch/Router décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.
Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.
Donc, ce qui devrait contenir le manuel parfait?
Tout d'abord, le manuel d’utilisation Alcatel Omni Switch/Router devrait contenir:
- informations sur les caractéristiques techniques du dispositif Alcatel Omni Switch/Router
- nom du fabricant et année de fabrication Alcatel Omni Switch/Router
- instructions d'utilisation, de réglage et d’entretien de l'équipement Alcatel Omni Switch/Router
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes
Pourquoi nous ne lisons pas les manuels d’utilisation?
Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage Alcatel Omni Switch/Router ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles Alcatel Omni Switch/Router et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service Alcatel en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées Alcatel Omni Switch/Router, comme c’est le cas pour la version papier.
Pourquoi lire le manuel d’utilisation?
Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif Alcatel Omni Switch/Router, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.
Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation Alcatel Omni Switch/Router. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.
Table des matières du manuel d’utilisation
-
Page 1
Par t No. 060166-10, Rev . C March 2005 Omni Switch/Router ™ User Manual Release 4.5 www .alcatel.com[...]
-
Page 2
Copyright © 2005 by Alcatel Internetworking, Inc. All rights reserved. This document may not be reproduced in whole or in part without the express written permission of Alcatel Internetworking, Inc. Alcatel ® and the Alcatel logo are registered trademarks of Alcatel. Xylan ® , OmniSwitch ® , PizzaSwitch ® and OmniStack ® are registered tradem[...]
-
Page 3
page iii Cautions FCC Compliance : This equipment has been tested and found to comply with the limits for Class A digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and[...]
-
Page 4
page iv[...]
-
Page 5
page v T able of Contents 1 Omni Switch/Router Chassis and P ow er Supplies . . . . . . . . . . . . . . . . 1-1 Omni Switch/Router User Interface (UI) Software . . . . . . . . . . . . . . . . . . . 1-2 Omni Switch/Router Network Management Software (NMS) . . . . . . . . . . . 1-2 Omni Switch/Router Distributed Switching Fabric . . . . . . . . . . .[...]
-
Page 6
T able of Contents page vi MPX Redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-9 Change-Over Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-9 MPX Redundancy Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-10 3 Omni [...]
-
Page 7
T able of Contents page vii 4 The U ser Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1 Overview of Command Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1 Changing Between the CLI and UI Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2 Exi[...]
-
Page 8
T able of Contents page viii Multiple User Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-33 Listing Other Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-34 Communicating with Other Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .[...]
-
Page 9
T able of Contents page ix Synchronizing Configuration Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-16 Synchronizing Image Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-16 Loading a File From the Primary MPX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-[...]
-
Page 10
T able of Contents page x Secure Switch Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-4 Configuring the Secure Switch Access Filter Database . . . . . . . . . . . . . . . . . . . 8-4 Configuring Secure Access Filter Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-7 Enabling/Dis[...]
-
Page 11
T able of Contents page xi Duplicate MAC Address Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-30 Multicast Claiming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-32 Disabling Flood Limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .[...]
-
Page 12
T able of Contents page xii NTP Information Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-15 Display List of Peers the Server Knows About . . . . . . . . . . . . . . . . . . . . . . . . 12-15 Display Peer Summary Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-16 Display A[...]
-
Page 13
T able of Contents page xiii 13 SNMP (Simple Netw ork Management Protocol) . . . . . . . . . . . . . . . . 13-1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-1 Configuring SNMP Parameters and Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-2 Configuring a N[...]
-
Page 14
T able of Contents page xiv 16 Managing 802.1Q Gr oups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-1 IEEE 802.1Q Sections Not Implemented . . . . . . . . . . . . . . . . . . . . . . . . . 16-2 Application Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-3 Single vs. Mult[...]
-
Page 15
T able of Contents page xv Configuring Fast Spanning Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-34 Truncating Tree Timing & Speedy Tree Protocol . . . . . . . . . . . . . . . . . . . . . . 17-35 Truncating Tree Timing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-35 Speedy Tr[...]
-
Page 16
T able of Contents page xvi MTU Handling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-12 IP Fragmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-12 ICMP Based MTU Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-12 IPX P[...]
-
Page 17
T able of Contents page xvii 19 Managing Groups and P orts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-1 How Ports Are Assigned to Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-2 Static Port Assignment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-2 Dynami[...]
-
Page 18
T able of Contents page xviii Port Mirroring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-57 How Port Mirroring Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-57 What Happens to the Mirroring Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-57 U[...]
-
Page 19
T able of Contents page xix Viewing Policy Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-24 Viewing Virtual Ports’ Group/VLAN Membership . . . . . . . . . . . . . . . . . . . . . . . . 20-25 View VLAN Membership of MAC Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-26 Applicati[...]
-
Page 20
T able of Contents page xx Routing Between AutoTracker VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-15 Creating AutoTracker VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-16 Step A. Entering Basic VLAN Information . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-16 Step B. Defini[...]
-
Page 21
T able of Contents page xxi 25 IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25-1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25-1 IP Routing Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .[...]
-
Page 22
T able of Contents page xxii Displaying IP RIP Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25-37 Displaying a List of All IP RIP Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25-37 Displaying a List of “Global” IP RIP Filters . . . . . . . . . . . . . . . . . . . . . . . 25-38 Displayi[...]
-
Page 23
T able of Contents page xxiii 27 IPX Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27-1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27-1 IPX Routing Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .[...]
-
Page 24
T able of Contents page xxiv Configuring Extended RIP and SAP Packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27-37 Enabling or Disabling Extended RIP and SAP Packets . . . . . . . . . . . . . . . . . . 27-37 Viewing the Current Status of Extended Packets . . . . . . . . . . . . . . . . . . . . . . 27-37 Configuring an IPX Default R[...]
-
Page 25
T able of Contents page xxv 29 Managing Frame Relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29-1 Back-to-Back Frame Relay Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . 29-3 Universal Serial Port Cable Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29-4 “Physi[...]
-
Page 26
T able of Contents page xxvi Managing Frame Relay Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29-55 Configuring a Bridging Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29-57 Configuring a WAN Routing Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [...]
-
Page 27
T able of Contents page xxvii Viewing WAN Links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31-12 Displaying All Existing WAN Links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31-12 Displaying Information for a Specific WAN Link . . . . . . . . . . . . . . . . . . . 31-13 Displaying Link S[...]
-
Page 28
T able of Contents page xxviii 34 Backup Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34-1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34-1 Backup Services Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [...]
-
Page 29
T able of Contents page xxix TEMP LED is Amber . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35-10 Solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35-10 STA LED Is Off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .[...]
-
Page 30
T able of Contents page xxx A The Boot Line Prompt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-1 Entering the Boot Prompt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-2 Boot Prompt Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .[...]
-
Page 31
Page 1-1 1 Omni Switch/Router Chassis and P o w er Supplies Alcatel's Omni Switch/Router (OmniS/R) is an advanced, multi-layer switching platform (Layer 2 and 3) that supports the most demanding switch requirements. With Omni Switch/Router, network administrators can replace aging FDDI or Fast Ethernet backbones with high capacity Gigabit Ethe[...]
-
Page 32
Page 1-2 Currently, Omni Switch/Router switching modules consist of Gigabit Ethernet modules, auto- sensing Ethernet modules, Fast 10/100 Ethernet modules, 10 Mbps Ethernet modules, WAN modules, and Voice Over IP ( VOIP ) modules. See Chapter 3, “Omni Switch/Router Switching Modules,” for documentation. ♦ Important Note ♦ Omni Switch/Router[...]
-
Page 33
Omni Switch/Router Distributed Switching Fabric Page 1-3 Omni Switch/Router Distributed Switching F abric Many switches in the market employ a shared memory architecture, which uses a central switching engine to send data to the appropriate port. As shown in the figure below, data enters the input port ( ➊ below), crosses the switching fabric on [...]
-
Page 34
Omni Switch/Router Distributed Switching Fabric Page 1-4 Omni Switch/Router Fabric Capacity In a chassis with Omni Switch/Router modules only, each Omni Switch/Router module provides 2.4 Gbps of switching capacity in full-duplex mode. In a chassis with all Omni Switch/Router modules, the Omni Switch/Router architecture provides up to a 22 Gbps dist[...]
-
Page 35
Omni Switch/Router Applications and Configurations Page 1-5 Omni Switch/Router Applications and Configur ations Omni Switch/Router hardware is ideally suited to meet the most demanding server and back- bone needs. In addition, Omni Switch/Router hardware can be integrated easily with OmniSwitches and with OmniStack workgroup switches. The examples[...]
-
Page 36
Omni Switch/Router Applications and Configurations Page 1-6 Omni Switch/Router as the Centr al Backbone Switch/Router and in the Wiring Closet The figure below shows Omni Switch/Router chassis used in the wiring closet and as a network backbone switch/router connecting the wiring closets and server farm. On the third floor, an Omni Switch/Router ch[...]
-
Page 37
Omni Switch/Router Chassis and Power Supplies Page 1-7 Omni Switch/Router Chassis and P ow er Supplies The Omni Switch/Router chassis houses the MPX , switching modules, and one or two power supplies. The modular design of the chassis provides the ability to configure your Omni Switch/Router to meet your networking needs. The Omni Switch/Router cha[...]
-
Page 38
Omni Switch/Router Chassis and Power Supplies Page 1-8 OmniS/R-3 The OmniS/R-3 chassis features three slots for an MPX and specific switching modules (contact your Alcatel sales representative for information on module availability). Slots are numbered from 1 to 3 starting with the topmost slot. A built-in power supply is located on the right side [...]
-
Page 39
Omni Switch/Router Chassis and Power Supplies Page 1-9 OmniS/R-3 Chassis T echnical Specifications Total Module Slots 3 Total Slots for Switching Modules 2 Physical Dimensions 5.25” (13.34 cm) high, 17.13” (43.51 cm) wide, 13.00” (33.02 cm) deep Weight 18 lb. (8.18 kg), fully populated with modules and power supplies. Switching Backplane Up [...]
-
Page 40
Omni Switch/Router Chassis and Power Supplies Page 1-10 OmniS/R-5 The OmniS/R-5 chassis has five slots for an MPX and switching modules (see figure below). Slots are numbered from 1 to 5 starting with the topmost slot. Slots for two power supplies are located at the bottom of the chassis. ♦ Warning ♦ If you have an OmniS/R-5 with a single power[...]
-
Page 41
Omni Switch/Router Chassis and Power Supplies Page 1-11 The OmniS/R-5 provides bays for two power supplies. The power supplies are self-enclosed to allow safe hot-insertion and hot-removal. When two power supplies are installed, they share the electrical load. If one should fail, the remaining power supply automatically takes up the load without an[...]
-
Page 42
Omni Switch/Router Chassis and Power Supplies Page 1-12 OmniS/R-5 T echnical Specifications Total Module Slots 5 Total Slots for Switching Modules 4 Physical Dimensions 12.25” (31.12 cm) high, 17.14” (43.54 cm) wide, 13” (33.02 cm) deep Weight approximately 55 lb. (24.09 kg), fully populated with mod- ules and power supplies. Switching Backp[...]
-
Page 43
Omni Switch/Router Chassis and Power Supplies Page 1-13 OmniS/R-9 and OmniS/R-9P The OmniS/R-9 and OmniS/R-9P chassis have nine slots for an MPX and switching modules (see figure below). Slots are numbered from 1 to 9 starting with the left-most slot. Slots for two power supplies are located at the bottom of the chassis. A separate, removable fan t[...]
-
Page 44
Omni Switch/Router Chassis and Power Supplies Page 1-14 The OmniS/R-9 and OmniS/R-9P provide bays for two power supplies. The power supplies are self-enclosed to allow safe hot-insertion and hot-removal. When two power supplies are installed, they share the electrical load. If one should fail, the remaining power supply automatically takes up the l[...]
-
Page 45
Omni Switch/Router Chassis and Power Supplies Page 1-15 OmniS/R-9 T echnical Specifications Total Module Slots 9 Total Slots for Switching Modules 8 Physical Dimensions 24.50” (62.23 cm) high, 16.60” (42.16 cm) wide, 13.25” (36.66 cm) deep Weight 96 lb. (43.55 kg), fully populated with modules and power supplies. Switching Backplane Up to 22[...]
-
Page 46
Omni Switch/Router Chassis and Power Supplies Page 1-16 OmniS/R-9P T echnical Specifications Total Module Slots 9 Total Slots for Switching Modules 8 Physical Dimensions 24.50” (62.23 cm) high, 16.60” (42.16 cm) wide, 13.25” (36.66 cm) deep Weight 96 lb. (43.55 kg), fully populated with modules and power supplies. Switching Backplane Up to 2[...]
-
Page 47
Omni Switch/Router Chassis and Power Supplies Page 1-17 OmniS/R-9P-48V T echnical Specifications Total Module Slots 9 Total Slots for Switching Modules 8 Physical Dimensions 24.50” (62.23 cm) high, 16.60” (42.16 cm) wide, 13.25” (36.66 cm) deep Weight 96 lb. (43.55 kg), fully populated with modules and power supplies. Switching Backplane Up [...]
-
Page 48
Omni Switch/Router Chassis and Power Supplies Page 1-18 Omni Switch/Router P ow er Requirements Always make sure that the total power requirements of the modules in your chassis do not exceed the limits of your power supply. To check the power consumption of your configura- tion, refer to the tables on the following pages and add up the DC Current [...]
-
Page 49
Omni Switch/Router Chassis and Power Supplies Page 1-19 Module Power Requirements without an HRE-X Module Description DC Current Draw (Amps) FCC Class Approval MPX Management Processor Module. 3.75 B ESX-K-100C-32W Advanced auto-Sensing 10/100 Ethernet module with thirty-two (32) RJ-45 ports. 10.25 B ESX-K-100FM/FS-16W Advanced Fast Ethernet (100 M[...]
-
Page 50
Omni Switch/Router Chassis and Power Supplies Page 1-20 Module Power Requirements with an HRE-X Module Description DC Current Draw (Amps) FCC Class Approval MPX-L3 Management Processor Module. 5.25 B ESX-K-100C-32W-L3 Advanced auto-Sensing 10/100 Ethernet module with thirty-two (32) RJ-45 ports. 11.75 B ESX-FM-24W-L3 10 Mbps Ethernet module with tw[...]
-
Page 51
Omni Switch/Router Chassis and Power Supplies Page 1-21 Grounding a Chassis Omni Switch/Routers have two grounding screw holes on the back of the chassis. These holes use 10-32 screws and are approximately 1 inch apart. In addition, these holes do not have paint and are surrounded by a small paint-free rectangular section, which provides for a good[...]
-
Page 52
The Omni Switch/Router Hardware Routing Engine (HRE-X) Page 1-22 The Omni Switch/Router Har dwar e Routing Engine (HRE-X) The Omni Switch/Router Hardware Routing Engine ( HRE-X ) is available for the MPX and all Omni Switch/Router switching modules. The HRE-X is a submodule, which plugs into an Omni Switch/Router module, that provides high speed La[...]
-
Page 53
The Omni Switch/Router Hardware Routing Engine (HRE-X) Page 1-23 Each HRE-X routes up to 1.5 million packets per second. In an OmniS/R-9 with an HRE-X on every switching module, for example, you could have up to 12 Mpps routed throughput. On a per switch basis, the HRE-X also supports over 256,000 route entries and 64,000 Next Hop destinations. V a[...]
-
Page 54
Connecting a DC Power Source to an OmniS/R-PS5-DC375 Page 1-24 Connecting a DC P ow er Sour ce to an OmniS/R-PS5-DC375 The OmniS/R-5 can use a DC power supply called the OmniS/R-5-DC375. This power supply contains a female power connector as shown in the figure below. This supply requires the use of 12 gauge wire. A clamp inside each connector keep[...]
-
Page 55
Connecting a DC Power Source to an OmniS/R-PS5-DC375 Page 1-25 Opening Wire Bay on Screw-Style Connector 5. Insert the appropriate wire lead into the open circular hole. The silkscreen above each hole indicates which power lead—negative (-), positive (+), or ground (GND)—to plug into which hole. The lead you insert must match the lead attached [...]
-
Page 56
Connecting a DC Power Source to an OmniS/R-PS5-DC375 Page 1-26 7. Repeat Steps 4 through 6 for the remaining two wire leads. Be sure that the end of each lead attaches to the same power source that you connected to on the power supply (i.e., negative to negative, positive to positive, ground to ground).[...]
-
Page 57
Connecting a DC Power Source to an OmniS/R-PS9-DC725 Page 1-27 Connecting a DC P ow er Sour ce to an OmniS/R-PS9-DC725 The OmniS/R-9P can use a DC power supply called the OmniS/R-PS9-DC725. This power supply contains a female power connector as shown in the figure below. This supply requires the use of 10 gauge wire. A clamp inside each connector k[...]
-
Page 58
Connecting a DC Power Source to an OmniS/R-PS9-DC725 Page 1-28 Installing DC P ow er Source Wir e Leads These instructions describe how to connect your 3-wire DC power source to the power connector on your DC power supply. A small flat-tip screwdriver and a wire stripper are required for this procedure. 1. Prepare the three (3) wires—10 gauge—t[...]
-
Page 59
Connecting a DC Power Source to an OmniS/R-PS9-DC725 Page 1-29 Inserting the Wire Lead Into the Circular Hole 6. Close the wire bay door. Use the small screwdriver (from Step 4a) to tighten the screw above the wire bay into which you inserted the wire lead. The wire lead should be securely attached inside the connector. You should be able to pull o[...]
-
Page 60
Replacing Power Supplies (9-Slot Chassis) Page 1-30 Replacing P ow er Supplies (9-Slot Chassis) If a power supply ever needs to be replaced in an Omni Switch/Router 9-slot Chassis (e.g., OmniS/R-9 or OmniS/R-9p), it is strongly recommended that power supplies not be mixed, except under the conditions and exceptions shown in the following table. ♦[...]
-
Page 61
Page 2-1 2 The Omni Switch/Router MPX Omni Switch/Router Management Pr ocessor Module (MPX) F eatures The MPX provides such system services as maintenance of user configuration information, downloading of switching module software, basic bridge management functions, basic rout- ing functions, the SNMP management agent, access to the User Interface [...]
-
Page 62
Omni Switch/Router Management Processor Module (MPX) Features Page 2-2 Omni Switch/Router Management Processor Module (MPX) Status LEDs MPX 10 mm MODEM CONSOLE PRI SEC TEMP PS1 PS2 OK2 OK1 ACT COL LINK ETHERNET OK1 (Hardware Status). This dual- state LED is on Green when the MPX has passed power-on hardware diag- nostics successfully. On Amber when[...]
-
Page 63
Omni Switch/Router Management Processor Module (MPX) Features Page 2-3 MPX Management Connectors COL (Collision). On Yellow when a collision has been detected on the port. ACT (Activity). On Green when data is transmitted or received on the Ethernet management port. LINK (Link Status/Disabled). On Green continuously when a good cable connection exi[...]
-
Page 64
MPX Serial and Ethernet Management Ports Page 2-4 MPX Serial and Ethernet Management P orts You can gain access to switch management software through one of the two serial ( RS-232 ) ports on the MPX or the Ethernet management port. The two serial ports are configured with 9-pin “D” connectors ( DB-9 ) per the IBM AT serial port specification. [...]
-
Page 65
MPX Serial and Ethernet Management Ports Page 2-5 MPX Modem Port Ethernet Management P ort The MPX also supports an out-of-band Ethernet port for high-speed uploads and switch management functions. With this port, you can access the Omni Switch/Router over a network via Telnet or FTP . You can use the Boot prompt to configure an IP address for the [...]
-
Page 66
MPX Serial and Ethernet Management Ports Page 2-6 Configuring MPX Serial P orts The serial communications parameters for the two MPX serial ports are set by default to the following: • 9600 bits per second (bps) • 8 data bits • 1 stop bit • no parity • no hardware flow control (Windows 95) Each serial port supports serial data rates of 1[...]
-
Page 67
Flash Memory and Omni Switch/Router Software Page 2-7 Flash Memory and Omni Switch/Router Softw are Flash memory on the MPX holds the Omni Switch/Router’s executable images and configura- tion data. When a switching module comes online, the MPX downloads the appropriate image file for that module to that module’s memory. Image files (those with[...]
-
Page 68
Flash Memory and Omni Switch/Router Software Page 2-8 Flash Memory Guidelines The switch alters flash memory contents when a software command requests a configuration change, when a remote administrator downloads a new executable image, or when the switch fails and a record of the failure is written to flash memory. These operations require availab[...]
-
Page 69
MPX Redundancy Page 2-9 MPX Redundanc y In order to provide greater reliability, Omni Switch/Router supports two MPX s in a primary/secondary redundant configuration. If the primary MPX fails, the secondary MPX takes over without any operator intervention. ♦ Warning ♦ Do not install any version of the MPM (i.e, MPM-C , MPM 1G , MPM II , or orig[...]
-
Page 70
MPX Redundancy Page 2-10 The primary MPX has the ability to transfer files to and from the secondary MPX . In the condi- tion where the secondary MPX has an older version of software (Software Fallback), it is not desirable to update the configuration file of the secondary. It is therefore the default not to update the configuration file on the sec[...]
-
Page 71
Page 3-1 3 Omni Switch/Router Switching Modules Omni Switch/Router switching modules perform software filtering, translations between dissimilar network interfaces, and hardware-based switching. Omni Switch/Router switching modules have an additional on-board interface connector for the HRE-X . Currently, Omni Switch/Router switching modules consis[...]
-
Page 72
Page 3-2 Omni Switch/Router Hardware Routing Engine The HRE-X offers high-speed Layer 3 switching from 1.5 to 12.0 million packets per second (Mpps) in a fully loaded chassis. See Chapter 1, “Omni Switch/Router Chassis and Power Supplies,” for more information on the HRE-X . ♦ Important Note ♦ Omni Switch/Router switching modules require an[...]
-
Page 73
Page 3-3 Required Image Files See the table below for the required images files for the MPX and switching modules. You must load the image file (or files) listed for the corresponding module or it will not run. Required Image Files Module Image File(s) MPX mpx.img, fpx.img ESX-K-100C-32W esx.img ESX-K-100FM/FS-16W esx.img GSX-K-FM/FS/FH-2W esx.img [...]
-
Page 74
Installing a Switching Module Page 3-4 Installing a Switching Module All switching modules can be inserted and removed from the switch chassis while power is on or off without disrupting the other modules. A standard screwdriver is required for install- ing and removing switching modules. You can also hot swap modules of the same type while the swi[...]
-
Page 75
Installing a Switching Module Page 3-5 2. Once the module is in the slot, close the two card ejectors (one on each end of the module) by pressing them in toward the module until they snap into place. 3. Use a standard screwdriver to tighten the two screw fasteners to secure the module inside the chassis. The screws should be tight enough such that [...]
-
Page 76
Installing a Switching Module Page 3-6 Removing a Switching Module To remove a switching module, follow the instructions below. If you are “hot swapping” the modules (i.e., removing and inserting while power is on), see Hot Swapping a Switching Module on page 3-7. ♦ Anti-Static Warning ♦ Before handling a switching module, free your hands o[...]
-
Page 77
Hot Swapping a Switching Module Page 3-7 Hot Sw apping a Switching Module You may remove and insert switching modules while the switch is running. This technique is referred to as “hot swapping.” When you hot swap, you must replace the module with the same module type as the one you removed. For example, if you remove an ESX switching module yo[...]
-
Page 78
Hot Swapping a Switching Module Page 3-8 4. Carefully remove the switching module from the chassis and put it in a safe place. (See Removing a Switching Module on page 3-6 for instructions on removing a switching module.) The MPX’s OK2 LED will flash amber 1 or 2 times, then return to normal flashing green. In addition, the swap time will reset t[...]
-
Page 79
Diagnostic Tests Page 3-9 9. If the hot swapping mode has not timed out, enter swap off at the system prompt. Something like the following will then be displayed. Swap is OFF, timeout is 5 minutes usage swap { ON [ minutes ] | OFF [ minutes ] } Diagnostic T ests All switching modules are subjected to extensive power-on diagnostics during the Power-[...]
-
Page 80
Handling Fiber and Fiber Optic Connectors Page 3-10 Handling Fiber and Fiber Optic Connector s Using fiber is extremely simple, but a few important rules should always be followed: Step 1. Use Premium Grade Jumper Cables with Duplex SC Connectors There are many brands of fiber optic jumper cables, with a wide range of quality between each manufactu[...]
-
Page 81
Handling Fiber and Fiber Optic Connectors Page 3-11 2. Keeping your thumb pressed on the cloth-forwarding lever, press the optical plug ferrule endface against the cleaning cloth and drag the plug down toward your body (there should be arrows on the top of the tool that indicate the proper wiping direction). The connector is now clean. 3. Release t[...]
-
Page 82
Gigabit Ethernet Modules Page 3-12 Gigabit Ethernet Modules Gigabit Ethernet connections can be used as network backbones or in a wiring closet. The following Omni Switch/Router Gigabit Ethernet modules are available: • GSX-K-FM/FS/FH-2W Advanced switching module with two (2) Gigabit Ethernet back- bone connections using fiber ( SC ) connectors. [...]
-
Page 83
Gigabit Ethernet Modules Page 3-13 ♦ Special Note ♦ The single mode version of this module has been deemed: CLASS 1 LASER PRODUCT LASER KLASSE 1 LUOKAN 1 LASERLAITE APPAREIL A LASER DE CLASSE 1 to IEC 825:1984/CENELEC HD 482 S1 . GSX-K-FM/FS/FH-2W T echnical Specifications Number of ports 2 Connector Type SC Standards Supported 802-3z, 1000Bas[...]
-
Page 84
Gigabit Ethernet Modules Page 3-14 2-Port Advanced Gigabit Ethernet Switching Module Port LEDs LINK TX RX 1 2 RX TX RX TX 1 2 LINK (Link Status/Disabled). On Green when the corre- sponding port has a valid phys- ical link and a signal is present. Under normal conditions, this LED should always be on when a cable is connected. TX (Transmit). On Gree[...]
-
Page 85
Auto-Sensing 10/100 Ethernet Modules Page 3-15 A uto-Sensing 10/100 Ethernet Modules Alcatel’s Omni Switch/Router 10/100 Ethernet modules can be used to connect networks with a mix of 10 Mbps and 100 Mbps workstations or as a network backbone. The following Omni Switch/Router 10/100 and Fast Ethernet modules are available: • ESX-K-100C-32W Adva[...]
-
Page 86
Auto-Sensing 10/100 Ethernet Modules Page 3-16 The 32 RJ-45 ports may connect to unshielded or shielded twisted pair ( UTP ) cable (see ESX- K-100C-32W Technical Specifications on page 3-17 for more information). Each port may connect to a single high-speed device or a hub serving multiple devices. The ESX-K-100C-32W can be used in the wiring close[...]
-
Page 87
Auto-Sensing 10/100 Ethernet Modules Page 3-17 ESX-K-100C-32W T echnical Specifications Number of ports 32 Connector Type RJ-45 Standards Supported IEEE 802.3; IAB RFCs 826, 894 Data Rate 10 or 100 Mbps (full or half duplex) Maximum Frame Size 1,518 bytes MAC Addresses Supported ESX-K-100C-32W: 1,024 ESX-K-100C-32W4: 4,096 Connections Supported 10[...]
-
Page 88
Auto-Sensing 10/100 Ethernet Modules Page 3-18 32-Port Advanced Auto-Sensing 10/100 Ethernet Switching Module 1 6 2 3 4 57 8 OK2 OK1 ESX-K 10/100 Module LEDs D C B A 1x 6x 2x 3x 4x 5x 7x 8x 1x 6x 2x 3x 4x 5x 7x 8x 1 6 2 3 4 57 8 1 6 2 3 4 57 8 1 6 2 3 4 57 8 D D Port LEDs Each LED corresponds to a port on the module. When an LED is on Green continu[...]
-
Page 89
Fast (100 Mbps) Ethernet Modules Page 3-19 F ast (100 Mbps) Ethernet Modules Alcatel’s Omni Switch/Router Fast Ethernet modules can be used to connect networks with 100 Mbps workstations or as a network backbone. The following Omni Switch/Router Fast Ethernet modules are available: • ESX-K-100FM/FS-16W Advanced switching module with sixteen (16[...]
-
Page 90
Fast (100 Mbps) Ethernet Modules Page 3-20 ESX-K-100FM/FS-16W T echnical Specifications Number of ports 16 Connector Type MT-RJ Standards Supported IEEE 802.3; IAB RFCs 826, 894 Data Rate 100 Mbps (full duplex) Maximum Frame Size 1,518 bytes MAC Addresses Supported 8,192 Connections Supported 100Base-Fx connection to backbone or server Cable Suppo[...]
-
Page 91
Fast (100 Mbps) Ethernet Modules Page 3-21 16-Port Advanced Fast Ethernet Switching Module 1 2 3 4 OK1 OK2 Port LEDs 8 5 6 7 4 1 2 3 MT-RJ connectors will be color coded to indicate multimode (Black) or single mode (Blue). ESX-K 100 sm Warning Label . This label indicates that the module contains an optical transceiver). Module Label . This label w[...]
-
Page 92
WAN Modules Page 3-22 W AN Modules The Omni Switch/Router currently supports the following Wide Area Network ( WAN ) modules: • WSX-S-2W Provides two serial ports that support Frame Relay or PPP . • WSX-SC Provides four or eight serial ports that support Frame Relay or PPP with data compression . • WSX-FT1/E1-SC Provides o ne or two T1 / E1 p[...]
-
Page 93
WAN Modules Page 3-23 W AN BRI P ort Specifications (S/T Interface) Pin Number Standard Signal Name 1 Not Used 2 Not Used 3 Rcv + from TE 4, Rcv - from TE 5 Xmt + from TE 6 Xmt - from TE 7 Not Used 8 Not Used 18 W AN BRI P ort Specifications (U Interface) Pin Number Standard Signal Name 1 Not Used 2 Not Used 3 Xmt to /Rcv from Network 4, Xmt to /[...]
-
Page 94
WAN Modules Page 3-24 WAN Serial Port Numbering W AN T1/E1 P ort Specifications Pin Number Standard Signal Name 1 Rx_Ring 2 Rx_Tip 3 Chassis GND 4, Tx_Ring 5 Tx_Tip 6 Chassis GND 7 Chassis GND (A jumper is provided for connecting Pins 7 and 8 to the chassis ground, if required.) 8 Chassis GND (A jumper is provided for connecting Pins 7 and 8 to th[...]
-
Page 95
WAN Modules Page 3-25 W AN Serial P ort Specifications Alcatel SPI EIA-530 RS-449 Generic Signal Name Source Mnemonic Pin Mnemonic Pin Mnemonic Pin Shield -- Shield 1 -- 1 -- 1 Signal Ground -- AB 7 AB 7 SG 19 Transmitted Data DTE TD(A) 2 BA(A) 2 SD(A) 4 TD(B) 14 BA(B) 14 SD(B) 22 Received Data DCE RD(A) 3 BB(A) 3 RD(A) 6 RD(B) 16 BB(B) 16 RD(B) 2[...]
-
Page 96
WAN Modules Page 3-26 W AN Serial P ort Specifications (cont.) X.21/X.26 V.35 RS232 Generic Signal Name Source Mnemonic Pin Mnemonic Pin Mnemonic Pin Shield -- -- 1 -- A -- 1 Signal Ground -- G 8 102 B AB 7 Transmitted Data DTE T(A) 2 103(A) P BA 2 T(B) 9 103(B) S Received Data DCE R(A) 4 104(A) R BB 3 R(B) 11 104(B) T Transmit Clock DCE -- -- 114[...]
-
Page 97
WAN Modules Page 3-27 WSX-S-2W The WSX-S-2W supports two (2) serial ports, which can provide access rates from 9.6 Kbps to 2 Mbps. The WSX-S-2W also supports three types of clocking (internal, external, and split). See WSX-S-2W Technical Specifications on page 3-27 for more information. ♦ Note ♦ The WSX-S-2W does not support hardware compres- s[...]
-
Page 98
WAN Modules Page 3-28 2-Port WAN Frame Relay Switching Module STA (Status). On Green con- tinuously when the port con- nection is operational. Off when the port is disabled or the cable is detached. Blink- ing On/Off if cable is attached but receive control data is detected as down. This LED also blinks during initialization, diagnostics, or when i[...]
-
Page 99
WAN Modules Page 3-29 WSX-SC The WSX-SC supports 4 or 8 serial ports, each of which can provide access rates from 9.6 Kbps to 2 Mbps. The 4-port version is referred to as the WSX-SC-4W , and the 8-port version is referred to as the WSX-SC-8W . The WSX-SC supports STAC hardware compression and three types of clocking (internal, external, and split).[...]
-
Page 100
WAN Modules Page 3-30 WSX-SC T echnical Specifications Number of ports 4 or 8 Connector Type High-density 26-pin shielded serial Protocols Supported Frame Relay and Point-to-Point (PPP) Data Rates Supported 9.6, 19.2, 56, 64, 128, 256, 512, 768, 1024, 1536, 2048 Kbps Compression Hardware-based using STAC 9705 Clocking Internal, External, or Split [...]
-
Page 101
WAN Modules Page 3-31 8-Port WAN Frame Relay Switching Module 1 2 3 STA RX TX 4 3 1 2 The module includes one row of LEDs for each port. The LEDs for a given port are located in the row labeled with the port number. If the WSX module includes a total of eight ports, then the module con- tains two sets of four rows of LEDs. The second set of LEDs ar[...]
-
Page 102
WAN Modules Page 3-32 WSX-FT1/E1-SC The WSX-FT1/E1-SC module contains one or two T1 or E1 ports and one or two serial ports. T1 and E1 ports use RJ-48C connectors. The T1 version of this module is referred to as the WSX-FT1-SC; t he E1 version is referred to as the WSX-FE1-SC. You can configure these ports to run either Frame Relay or the Point-to-[...]
-
Page 103
WAN Modules Page 3-33 WSX-FT1/E1-SC T echnical Specifications Number of ports 1 or 2 T1 or E1 ports 1 or 2 Universal Serial ports Connector Types T1/E1: RJ-48C Serial: High-density, 26-pin shielded Standards Supported RFCs 1406, 1213, 1659 Frame Formats T1: Superframe, Extended Superframe, Unframed E1: E1, E1-CRC, E1-MF, E1-CRC-MF, Unframed Line C[...]
-
Page 104
WAN Modules Page 3-34 WAN 2-Port Serial and 2-Port Fractional T1/E1 Switching Module This module includes one set of LEDs for each port. The LEDs for a given port are located above the port. If the WSX module includes four ports, then the module con- tains two sets of LEDs. The second set of LEDs are located above the third and fourth ports. STA AL[...]
-
Page 105
WAN Modules Page 3-35 WSX-FE1-SC Cabling/Jumper Settings The WSX-FE1-SC supports both twisted pair (120 Ohm) and coaxial (75 Ohm) cable types. The default is 120 Ohm. You must set a pair of jumpers ( JP2 and JP4 ) on the back of the board to correspond to the type of cable you are using. For more detailed information on the types of cables to use w[...]
-
Page 106
WAN Modules Page 3-36 WSX-BRI-SC The ISDN Basic Rate Interface WAN Switching Module ( WSX-BRI-SC ) supports either one (1) serial port and one (1) BRI port or two (2) serial ports and two (2) BRI ports. The version with 1 serial port and 1 BRI port is referred to as the WSX-BRI-SC-1W ; the version with 2 serial ports and 2 BRI ports is referred to [...]
-
Page 107
WAN Modules Page 3-37 WSX-BRI-SC T echnical Specifications Number of ports 1 or 2 pairs of a serial port and an ISDN Basic Rate Interface (BRI) port Serial Connector Type High-density 26-pin shielded serial BRI Connector Type RJ-45 Protocols Supported Point-to-Point Protocol (PPP); Frame Relay (sup- ported on the serial port only) Data Rates Suppo[...]
-
Page 108
WAN Modules Page 3-38 WAN 2-Port Serial and 2-Port BRI-ISDN Switching Module 1 2 STA RX TX The WSX-BRI module includes one set of LEDs for each port. The LEDs for a given port are located in the set labeled with the port number. If the HSX module contains two WSX- BRI daughter cards, the second set of ports (one Serial and one BRI) are numbered as [...]
-
Page 109
WAN Modules Page 3-39 J16 S U S U J15 TT TT RT RT J14 S U S U J13 S U BRI P or t Jumper Conf iguration for the “U” Interface The gr ay bo xes ar e the jumper bloc ks This is a simplified view of the bottom lower-right quadrant of the WSX-BRI submodule. Immediately above the BRI port are three jumper blocks labelled J14, J15, and J16. About two [...]
-
Page 110
WAN Modules Page 3-40[...]
-
Page 111
Page 4-1 4 The U ser Interface In order to configure parameters and statistics on the switch, you may connect it to a terminal, such as a PC or UNIX workstation, using terminal emulation software. The command interfaces used on the switch are part of the MPX executable image. When a switch boots up, the boot monitor handles the loading of this exec[...]
-
Page 112
Overview of Command Interfaces Page 4-2 Changing Between the CLI and UI Modes Once you log on to the switch, the following screen displays. You must press the <Enter> key to start the command interface. ************************************************************************************* Alcatel Omni Switch/Router Copyright (c), 1994-2002 Alc[...]
-
Page 113
Overview of Command Interfaces Page 4-3 Exit the Command Interface To exit your current session with the switch from the CLI or the UI mode, type either quit or logout at the prompt, then press <Enter> . Your session is immediately terminated. ♦ Note ♦ If you forget which command interface mode you are in, type the ? character. If you are[...]
-
Page 114
UI to CLI Command Cross Reference Page 4-4 UI to CLI Command Cr oss Reference The chapters in this Users Guide are organized around the UI commands as they are grouped into menus and sub-menus. Even though the Omni Switch/Router software has been changed to boot up in the CLI mode, the Users Guide conforms to its original design. The CLI commands a[...]
-
Page 115
UI to CLI Command Cross Reference Page 4-5 Basic Switch Management T able Chapter UI Command Equivalent CLI Commands PM Family 4, “The User Interface” alert, echo, history, kill, ping, pwd, timeout, who lookup, save, summary, uic, write alert, echo, history, kill, ping, password, timeout, who Unsupported No PM Support 5, “Installing Switch So[...]
-
Page 116
UI to CLI Command Cross Reference Page 4-6 Netw ork Management Commands The table on page 4-6 summarizes the commands supported in the UI and the CLI for Chapters 12 through 14. Basic Switch Management T able (continued) Chapter UI Command Equivalent CLI Commands PM Family 9, “Switch-Wide Parameters” cacheconfig camstat dt hrexassign hrexdispla[...]
-
Page 117
UI to CLI Command Cross Reference Page 4-7 Layer II Switching Commands The table on page 4-7 summarizes the features supported in the UI and the CLI for Chapters 15 through 18. Layer II S w i tc hi ng T a bl e Chapter UI Commands Equivalent CLI Commands PM Family 15, “Managing Ethernet Modules” addprtcnl chnlinfo crechnl delchnl delprtchnl eth1[...]
-
Page 118
UI to CLI Command Cross Reference Page 4-8 Groups , VLANs, P olicies Commands The table beginning on page 4-8 summarizes the features supported in the UI and the CLI for Chapters 19 through 24. Groups , VLANs, P olicies T able Chapter UI Command Equivalent CLI Commands PM Family 19, “Managing Groups and Ports” swch vi autoencaps, ethdef, facdef[...]
-
Page 119
UI to CLI Command Cross Reference Page 4-9 Group, VLANs , P olicies T able (continued) Chapter UI Commands Equivalent CLI Commands PM Family 22, “Managing AutoTracker VLANs” gmap, gmapst gmapgaptime gmapholdtime gmapuptime xmapst xmapls xmapcmntime xmapdisctime gmap gmap gap time gmap hold time gmap up time xmap, view xmap status view xmap, vie[...]
-
Page 120
UI to CLI Command Cross Reference Page 4-10 Routing Commands The table beginning on page 4-10 summarizes the features supported in the UI and the CLI for Chapters 25 through 27. Routing T able Chapter UI Command Equivalent CLI Commands PM Family 25, “IP Routing” All IP Routing commands are supported in the CLI. All IP Routing commands are suppo[...]
-
Page 121
UI to CLI Command Cross Reference Page 4-11 W AN A ccess Commands The table beginning on page 4-11 summarizes the features supported in the UI and the CLI for Chapters 28 through 34. W AN Access T able Chapter UI Command Equivalent CLI Commands PM Family 28, “WAN Switching Modules” wpadd wpdelete aaa 10-WAN 29, “Managing Frame Relay” fradd,[...]
-
Page 122
UI to CLI Command Cross Reference Page 4-12 W AN Access T able (continued) Chapter UI Command Equivalent CLI Commands PM Family 31, “WAN Links” linkadd, linkmodify interface dialer status description inactivity-timer min call duration max call duration direction organization carrier delay timeout max retries retry delay failure delay phone numb[...]
-
Page 123
UI to CLI Command Cross Reference Page 4-13 Tr oubleshooting Diagnostics Commands The table beginning on page 4-13 summarizes the features supported in the UI and the CLI for Chapters 35 and 36 and Appendices A and B. Tr oubleshooting/Diagnostics T able Chapter/ Appendices UI Command Equivalent CLI Commands PM Family 35, “Troubleshoot- ing” uic[...]
-
Page 124
User Interface Menu Page 4-14 U ser Interface Menu This menu provides a top-level view of all UI menus. The commands are grouped together in the form of sub-menus. Within each sub-menu there is a set of commands and/or another sub-menu. Command Main Menu --------------- -------------------------------------------------------------------------------[...]
-
Page 125
Main Menu Summary Page 4-15 Main Menu Summary These menus, their sub-menus, and sub-options are described in this manual. The following provides a brief overview of each item on this main menu. File . Contains options for downloading system software, listing software files, copying files, editing files, and deleting files. This menu is fully descri[...]
-
Page 126
General User Interface Guidelines Page 4-16 Diag . This menu, fully available to the diag login account, contains commands to run diagnos- tic tests. It is described in Chapter 36, “Running Hardware Diagnostics.” Quit . Logs you out of the UI . You can also enter logout to exit. ? Displays the options for current menu. Gener al U ser Interface [...]
-
Page 127
General User Interface Guidelines Page 4-17 ♦ Note ♦ If you cannot see a UI command confirmation prompt or if you do not get the command prompt after the completion of a command, press the <Enter> key to regain the prompt. Quitting a Command Many of the commands give you a list of parameters to change. With most commands you can enter in [...]
-
Page 128
General User Interface Guidelines Page 4-18 Configuring the System Pr ompt The uic submenu is listed under the system menu. The uic submenu allows you to change the system prompt. The prompt can be made up of literal information, system variable informa- tion, or a combination of the two. Literal information means that the prompt will reflect exac[...]
-
Page 129
General User Interface Guidelines Page 4-19 Configuring More Mode for the U ser Interface Enabling More Mode The more mode allows you to specify the maximum number of lines that will be scrolled to your workstation’s display. However, before you can specify the maximum number of lines that can be displayed, you must first verify that the more mo[...]
-
Page 130
General User Interface Guidelines Page 4-20 A screen similar to the following will be displayed. UI Configuration 1) Prompt : ‘$Menu-Path% ’ 2) More : on 21) Lines : 22 lines 3) Verbose : off 4) Timeout : 5 minutes Command {Item=Value/?/Help?Quit?Redraw?Save} (Redraw) : Type 21= , followed by the maximum number of lines to be displayed, and pre[...]
-
Page 131
General User Interface Guidelines Page 4-21 Disabling More Mode To disable more mode, type uic at the user prompt and press <Enter> . A screen similar to the following will be displayed. UI Configuration 1) Prompt : ‘$Menu-Path% ’ 2) More : on 21) Lines : 22 lines 3) Verbose : off 4) Timeout : 5 minutes Command {Item=Value/?/Help?Quit?Red[...]
-
Page 132
General User Interface Guidelines Page 4-22 Setting V erbose/T erse Mode for the U ser Interface Enabling V erbose Mode When verbose mode is enabled, you are not required to enter a question mark in order to view the switch’s configuration menus. Instead, menus are displayed automatically. For exam- ple, if verbose mode is enabled and you enter s[...]
-
Page 133
General User Interface Guidelines Page 4-23 Disabling V erbose Mode Although the terse command is no longer supported as of Release 4.1, disabling verbose mode via the uic submenu is the command equivalent. When verbose mode is disabled, configuration menus will not be displayed automatically. To display a current menu when verbose mode is disabled[...]
-
Page 134
General User Interface Guidelines Page 4-24 Configuring the Auto Logout Time When the switch detects no user activity on the UI for a certain period of time, it automati- cally logs the user out of the system. By default, this automatic logout occurs after 4 minutes of console inactivity. You can configure the automatic logout to range from 1 minu[...]
-
Page 135
General User Interface Guidelines Page 4-25 Viewing Commands If at any time you are not sure of the commands available, enter ? and you will be given a list of the commands in the current sub-menu. Following each list of commands is a list of sub- menus. You can go directly to any sub-menu in the list. You can specify whether the full menu will be [...]
-
Page 136
General User Interface Guidelines Page 4-26 Command History and Re-Executing Commands The history command displays up to 50 commands numbered in order with the most recently executed command listed last. The following is a typical example of the history command. 1: view mpx.cmd 2: vlan 3: at 4: atvl 5: vimcvl 6: mcvl 7: vivl 8: fwtvl 9: xlat 10: hi[...]
-
Page 137
General User Interface Guidelines Page 4-27 In addition, you can re-execute a command by entering an exclamation point ( ! ) followed by the first character(s) of the most recently executed command. In the example at the begin- ning of this section, entering !vim would re-execute the vimcvl command. Entering !vi however, would re-execute the vivl c[...]
-
Page 138
General User Interface Guidelines Page 4-28 Abbre viating IP Addr esses The Omni Switch/Router software provides the user with a more concise way to enter the dotted decimal format of a 32-bit IP address. The new syntax conforms to the traditional Inter- net interpretation. Several examples of abbreviated IP addresses are shown in the table below. [...]
-
Page 139
General User Interface Guidelines Page 4-29 This abbreviated IP address format can be used with the ftp , telnet , crgp , modvl , ping , snmpc , and xlat commands. For example, to ping the IP address 198.0.0.2, you can abbreviate this IP address by entering ping 198.2 at the system prompt. After you answer a few prompts (see Chapter 25, “ IP Rout[...]
-
Page 140
User Interface Display Options Page 4-30 U ser Interface Display Options The System menu several commands to configure help information, character display, and the system prompt for the UI . Enter system at the system prompt to enter the System menu. Press the question mark ( ? ) to see the System menu commands, as shown below. Command System Menu [...]
-
Page 141
User Interface Display Options Page 4-31 Setting Echo/NoEcho for U ser Entry You can determine whether your entries will appear by enabling the echo for user entries. The default is to echo all characters. To enable the echo, enter echo at the system prompt. Everything you enter will be displayed. For example, if you enter history at the system pro[...]
-
Page 142
User Interface Display Options Page 4-32 Creating a ne w Banner Three steps are required to change the login banner. They are listed here. • Create a text file containing the new banner in the switch’s flash directory. • Add the UI_add_do_alert() command syntax to the switch’s mpx.cmd file. • Enable the feature by executing the alert {con[...]
-
Page 143
Login Accounts Page 4-33 Login A ccounts The UI provides three default login accounts—Administrator, User and Diagnostics. The Administrator login provides full access to all functions. The initial login name for an Adminis- trator account is admin . The Diagnostics login also has full access to all switch functions plus a special sub-menu with a[...]
-
Page 144
Multiple User Sessions Page 4-34 Listing Other U sers To display all the users currently logged on to the switch, type who at the system prompt. The following is an example of the display shown where two Telnet sessions are logged in, one as admin and the other as user . SESSION USER PRIVILEGES TTY READ WRITE GLOBAL 3 admin 000000008007fffd 0000000[...]
-
Page 145
Multiple User Sessions Page 4-35 Communicating with Other U sers If you want to send a message to another user, enter write followed by the user’s session number. If you wanted to send a message to a user connected on the console port (session 0), you would enter write 0 at the system prompt. The switch would then display Enter message. (End with[...]
-
Page 146
Multiple User Sessions Page 4-36 For example, to end the session of the user connected to the console port (session 0) and let him finish his current command, you would enter kill 0 at the system prompt. The system would then display something similar to the following: Press <Enter> to cancel. Trying...........................................[...]
-
Page 147
Multiple User Sessions Page 4-37 Adv anced Kill Command Options You can also kill the session of a user immediately by adding the parameter -f followed by the session number of the user. This option will kill the user’s session before he can finish his current command. In addition, this option will end the user’s sessions without waiting for hi[...]
-
Page 148
UI Table Filtering (Using Search and Filter Commands) Page 4-38 UI T able Filtering (U sing Sear ch and Filter Commands) The amount of information displayed in UI tables can be extensive, especially with larger networks. Common UI commands, such as ipr , vivl , macinfo , and fwt , often return multi-page tables. The user can locate specific informa[...]
-
Page 149
UI Table Filtering (Using Search and Filter Commands) Page 4-39 The Sear ch Command Starting from the page being displayed, the Search command ( / ) searches all lines of a UI table for a specified text pattern (up to 80 characters). The first line containing the pattern is brought to the top of the page, followed by any remaining lines in the tabl[...]
-
Page 150
UI Table Filtering (Using Search and Filter Commands) Page 4-40 2. Type / at the More? prompt. The Search prompt ( / ) will appear automatically. At the Search prompt, enter the text pattern for the desired MAC address. For example: /0020DA:9E479D Press <Enter> . A screen similar to the following will be displayed: Note that the line containi[...]
-
Page 151
UI Table Filtering (Using Search and Filter Commands) Page 4-41 The Filter Command The Filter command filters unwanted information from a UI table by displaying only those lines containing a specified text pattern (up to 80 characters). Once the Filter command has been executed, the Filter mode remains active until the end of the UI table has been [...]
-
Page 152
UI Table Filtering (Using Search and Filter Commands) Page 4-42 2. Type f at the More? prompt. The Filter prompt ( f/ ) will appear automatically. At the Filter prompt, enter the desired text pattern (remember to type the text pattern exactly as it would appear in the UI table): f/Lne Press <Enter> . A screen similar to the following will be [...]
-
Page 153
UI Table Filtering (Using Search and Filter Commands) Page 4-43 1. Type ipr and press <Enter> . A table similar to the following will be displayed: Note that, because the information in the table exceeds the more command’s default of 22 lines, the More? prompt appears at the bottom of the screen. 2. Use the Filter command to display all IP [...]
-
Page 154
UI Table Filtering (Using Search and Filter Commands) Page 4-44 3. In order to further refine your results, you can now combine the Search and Filter commands. In this example, you will search for IP addresses beginning 198.206.2 . To do this, enter / at the Filter mode’s More? prompt, followed by the specified text pattern: /198.206.2 Press <[...]
-
Page 155
UI Table Filtering (Using Search and Filter Commands) Page 4-45 Single Character s A question mark ( ? ) is used as a wildcard for a single character in a text pattern. For exam- ple, the Search pattern f/127.?.0.1 will locate the first line in a UI table containing 127. followed by any single character , and then the remaining text pattern .0.1 . [...]
-
Page 156
UI Table Filtering (Using Search and Filter Commands) Page 4-46[...]
-
Page 157
Page 5-1 5 Installing Switch Softw ar e User Interface software comes pre-loaded on your MPX . You do not have to reload unless you are upgrading, backing up, or reloading due to file corruption. There are different methods for loading software into your switch. The method you use depends on your hardware configuration and the condition of the swit[...]
-
Page 158
Using FTP Server Page 5-2 U sing FTP Server The Omni Switch/Router is an FTP server. Using any compatible FTP client software you can load software to and from the switch. Consult the manual that came with your FTP client soft- ware package. The following are general instructions on how to FTP to the switch. 1. You will need to configure the IP add[...]
-
Page 159
Using FTP Client Page 5-3 U sing FTP Client The User Interface contains several FTP commands. Using these commands is similar to using FTP on a UNIX system. Follow the steps below to start the FTP Client. 1. Log on to the switch and type ftp . For instructions on logging into the switch see the Getting Started Guide that came with your switch. 2. T[...]
-
Page 160
Using ZMODEM Page 5-4 U sing ZMODEM Normally you use FTP to transfer files to and from the switch. It is faster than using the serial port. A ZMODEM transfer can take several minutes. There are generally two situations which would require you to use the serial port to load software: • You do not have access to an FTP client or server program. If [...]
-
Page 161
Using ZMODEM Page 5-5 U sing ZMODEM With the Boot Line Prompt If you encounter the situation where you have deleted some or all of the files in your switch, you may need to load files through the boot line prompt. This load procedure is done before the switch has booted. If there is no software available in the switch, then it cannot boot until you[...]
-
Page 162
Using ZMODEM Page 5-6 The [boot] Prompt The [boot] prompt has its own set of commands that are built into the switch. You do not need to have files or software loaded to use this set of commands. You can perform many of the functions that the MPX software does; however, the purpose of these commands are to reload software in order to get the switch[...]
-
Page 163
Using ZMODEM Page 5-7 Starting a ZMODEM Tr ansfer at the [boot] Prompt 1. Type c to change boot parameters. You will be changing the boot device to zm . This will tell the system to load files from a ZMODEM connection instead of flash memory. [Boot]: c ‘.’ = clear field; ‘-’ = go to previous field; ^D = quit Boot device : zm 2. Type zm at t[...]
-
Page 164
Using ZMODEM Page 5-8[...]
-
Page 165
Page 6-1 6 Configuring Management Pr ocessor Modules The management processor module ( MPX on the Omni Switch/Router) coordinates control of the Omni Switch/Router by providing access to the User Interface ( UI ) software, maintaining user configuration information, downloading switching module software, managing basic bridge functions, maintainin[...]
-
Page 166
Changing Serial Port Communication Parameters Page 6-2 Changing Serial P ort Communication P ar ameter s The serial communications parameters for the two MPX ports are set by default to the follow- ing: • 9600 bits per second (bps) • 8 data bits • 1 stop bit • no parity To change the serial port configuration parameters, follow the steps be[...]
-
Page 167
Changing Serial Port Communication Parameters Page 6-3 Enter the port mode and press <Enter> . This option defaults to console for a console connection and down for a modem connection. You can also configure the port for SLIP. If you are configuring the modem port, you should plan the mode configuration care- fully. See Configuring the Modem [...]
-
Page 168
Changing Serial Port Communication Parameters Page 6-4 This configuration does not allow you to use the console port as an optional access method since it is configured down. Using a cross-over cable, you could access the modem port through an attached PC. If you could not use the modem port for some reason, you would have to reboot the switch to g[...]
-
Page 169
Configuring the Ethernet Management Port Page 6-5 Configuring the Ethernet Management P ort To configure the Ethernet management port, you use the ethernetc command. To use this command, enter ethernetc at the system prompt. A screen similar to the following will be displayed. Ethernet Port Configuration 1) Port Admin status UP : Yes 2) IP Address[...]
-
Page 170
Configuring the Ethernet Management Port Page 6-6 2) IP Addr ess Enter an IP address for the Ethernet management port in dotted decimal or hexadecimal nota- tion (the default is 192.168.11.1 ). For example, to change the Ethernet management port’s IP address to 198.206.184.170 , enter 2=198.206.184.170 at the prompt. ♦ Note ♦ This IP address [...]
-
Page 171
Ethernet Management Ports and Redundant Management Processor Modules Page 6-7 Ethernet Management P orts and Redundant Management Pr ocessor Modules If redundant MPXs both have Ethernet management ports ( EMPs ), both EMPs in the switch will have the same IP address if automatic file synchronization is enabled. If both EMPs are plugged into the sam[...]
-
Page 172
Ethernet Management Ports and Redundant Management Processor Modules Page 6-8 12. Enter save at the prompt to save the IP address. 13. Enter renounce at the prompt to make the management module that was originally the primary one primary again.[...]
-
Page 173
The MPM Command/Menu Page 6-9 The MPM Command/Menu The mpm command has two functions: displaying the MPX redundancy configuration and entering the mpm menu. Displaying the MPX redundancy is described below and the mpm menu is described in MPM Menu Commands on page 6-9. Displaying MPX Redundancy You can display the number of MPXs , their location in[...]
-
Page 174
The MPM Command/Menu Page 6-10 All of the mpm menu commands, except for the nisuf and swap commands, function only if you have redundant MPXs . If you are connected to the secondary MPX , type a ? to list the mpm commands shown below. Command Redundancy Menu mpmget Get file from Primary MPM takeover Become Primary All of the mpm commands are descri[...]
-
Page 175
Listing the Secondary MPX Files Page 6-11 Listing the Secondary MPX Files The sls command lists the files in the secondary MPX module. This is similar to the ls command; however, it lists files in the secondary MPX . To list files in the secondary MPX , enter sls at the system prompt. The following is a typical example. /flash/esm.img 27204 7/14/99[...]
-
Page 176
Replacing a File on the Secondary MPX Page 6-12 Replacing a File on the Secondary MPX The mpmreplace command replaces a file on the secondary MPX . It works like a combination of mpmrm , which is described in Removing a File from the Secondary MPX on page 6-13, and mpmstore , which is described in Transferring a File to the Secondary MPX on page 6-[...]
-
Page 177
Removing a File from the Secondary MPX Page 6-13 Remo ving a File from the Secondary MPX The mpmrm command removes (deletes) a file from the flash memory of the secondary MPX . To use this command, enter mpmrm , followed by a space, a slash ( / ), the name of the flash directory, another slash ( / ), and the name of the file you want to remove. ♦[...]
-
Page 178
Giving Up Control to the Secondary MPX Page 6-14 Giving Up Contr ol to the Secondary MPX The renounce command tells the primary MPX to give up control and become the secondary MPX . It does this by issuing a request to the secondary MPX to take control. You must be logged into the primary MPX to use this command. If you are logged into the secondar[...]
-
Page 179
Setting Automatic Config Synchronization Page 6-15 Setting A utomatic Config Synchronization The syncctl command sets the automatic configuration synchronization to Enabled or Disabled. If it is Enabled, then the MPX primary/secondary pair will continue to maintain synchronization automatically. This means that when the configuration file ( mpm.cf[...]
-
Page 180
Synchronizing Configuration Data Page 6-16 Synchr onizing Configuration Data The configsync command copies the configuration files ( mpm.cnf and mpm.cfg ) in the primary MPX to the secondary MPX . You can run this command whether or not automatic config synchronization is on. For example, to copy the configuration file from the primary MPX to the [...]
-
Page 181
Loading a File From the Primary MPX Page 6-17 Loading a File Fr om the Primary MPX The mpmget command loads a file from the primary MPX and copies it into the secondary MPX . This command is only available and can only be run from a secondary MPX . To use this command, enter mpmget , followed by a space, a slash ( / ), the name of the flash directo[...]
-
Page 182
Gaining Control from the Primary MPX Page 6-18 Gaining Contr ol from the Primary MPX The takeover command tells the secondary MPX to take control and become the primary MPX . It does this by issuing a request to the primary MPX to relinquish control. You must be logged into the secondary MPX to use this command. If you are logged into the primary M[...]
-
Page 183
Resetting a Secondary MPX Page 6-19 Resetting a Secondary MPX The secreset command initiates a soft reset on the secondary MPX . Conceptually, resetting a secondary MPX with this command is similar to switching off power to the module; the MPX will be in the same state after a reset as it is after a power on. To reset a secondary MPX , enter secres[...]
-
Page 184
Displaying and Setting the Swap State Page 6-20 Displaying and Setting the Sw ap State The swap command displays or alters the swap state of the chassis. The swap state must be on in order to hot swap modules. If not, the system may halt or restart. While the swap state is on, performance may decrease. Therefore, the swap state should only be turne[...]
-
Page 185
Displaying and Setting the Swap State Page 6-21 Disabling the Swap Mode Normally, the swap mode will timeout and no user intervention is required. However, you can manually turn the swap mode off. This function is particularly useful since the perfor- mance of the switch can be adversely affected if the swap mode is enabled. To turn the swap mode o[...]
-
Page 186
Displaying and Setting the Swap State Page 6-22[...]
-
Page 187
Page 7-1 7 Managing Files Depending on the model type and configuration, an Alcatel switch has anywhere from 8 or 16 MB of usable flash memory. This memory is used to store files, including executable files (used to operate switching modules), configuration files, and switch usage log files. Through the User Interface ( UI ), you can load, copy, an[...]
-
Page 188
Displaying the Current Directory Page 7-2 Displaying the Curr ent Directory To display the switch’s current directory, enter pwd at the system prompt. The working directory will be the /flash memory system and the corre- sponding directory information will be displayed: /flash Configuration and Log File Gener ation The mpm.cnf , mpm.cfg , and mp[...]
-
Page 189
Listing Switch Files Page 7-3 Listing Switch Files You can use the ls command to list the files in the primary MPX ’s flash memory. To use this command, enter ls at the system prompt. A screen similar to the following will be displayed. mpx.cmd 18 05/30/98 13:04 mpm.log 18072 06/15/98 17:57 mpx.img 1573617 06/18/98 12:16 esx.img 24289 06/18/98 12[...]
-
Page 190
Deleting Switch Files Page 7-4 Deleting Switch Files You can use the rm command to delete files in the primary MPX’s flash memory. To use this command, enter rm , followed by the name of the file you want to delete. For example, to delete the file mpm.log , you would enter rm mpm.log at the UI prompt. The following screen will be displayed: File [...]
-
Page 191
Deleting Switch Files Page 7-5 Deleting All Image Files You can use the imgcl command to delete all executable (image) files. The files deleted by the imgcl command include the MPX boot file ( mpx.img ), and all executable switching module files (the factory default is all files ending with the .img extension). ♦ Important ♦ You should only use[...]
-
Page 192
Copying System Files Page 7-6 Cop ying System Files You can use the cp command to copy files. This is particularly useful if you want to make backups of important files. To use this command, enter cp , followed by the name of the origi- nal file you want to copy, and then by the name that you wish to give the duplicate file. For example, to make a [...]
-
Page 193
Editing Text Files Page 7-7 Editing T ext Files The commands in the Edit sub-menu (also called the Text Buffer or Edit Buffer) are used to create new text files and to modify existing text files. To enter the edit sub-menu, enter edit at the system prompt. If verbose mode is enabled, the following list of commands will be displayed automatically. I[...]
-
Page 194
Editing Text Files Page 7-8 Loading an ASCII File into the T ext Buffer You can use the rb command to load—or read —an existing ASCII file in flash memory to the Edit buffer’s memory. To use this command, enter rb , followed by the file you wish to edit. For example, to edit the mpx.cmd file, enter rb mpx.cmd at the system prompt. ♦ Loading[...]
-
Page 195
Editing Text Files Page 7-9 Deleting a Line of T ext fr om the T ext Buffer You can use the db command to delete a specific line in the text buffer. To use this command, enter db , followed by line number of the line of text you want delete, which is shown by the lb command. For example, to delete the third line of text in the text buffer, enter db[...]
-
Page 196
Editing Text Files Page 7-10 Creating a File N ame for the T ext Buffer If no file name has been created for the text buffer, the following message is displayed when- ever the lb command is executed: Work buffer is unnamed Use the nb command to create a name for the text buffer. To use this command, enter nb , followed by the name you wish to give [...]
-
Page 197
Real-World Examples Page 7-11 Real-W orld Examples As noted on page 10-7, when you edit text files, you will normally use several of the Edit sub- menu commands to produce the results you want. The following two examples, Real-World Example 1 and Real-World Example 2 , are actual multi-command procedures that you may encounter as you work with your[...]
-
Page 198
Real-World Examples Page 7-12 Real-W orld Example 2 cp mpx.cmd mpx.bak rb mpx.cmd lb 00: cmDoDump=1 01: cmInit 02: reg_port_rule=1 nb mpx.cmd Work buffer name is: /flash/mpx.cmd db 2 lb 00: cmDoDump=1 01: cmInit ib 1 01 : 01 : rifStripping=1 lb 00: cmDoDump=1 01: rifStripping=1 02: cmInit Work buffer name is: /flash/mpx.cmd wb /flash/mpx.cmd exists[...]
-
Page 199
System Menu Page 7-13 Sy stem Menu The System menu contains two commands, fsck and newfs , for checking and deleting all files in the flash memory. To access the System menu, enter system at the UI prompt. If verbose mode is enabled, the following list of commands will be displayed automatically. If verbose mode is disabled, press the question mark[...]
-
Page 200
Checking the Flash File System Page 7-14 Checking the Flash File Sy stem The fsck command performs a file system check of flash memory, which consists of the flash file system. All image files are stored in flash memory and loaded into system memory when the switch boots up. The command also provides diagnostic information in the event of file corr[...]
-
Page 201
Creating a New File System Page 7-15 Cr eating a Ne w File System The newfs command removes a complete flash file system and all files within it, replacing it with a new empty flash file system. Use this command when you want to reload all files in the file system, or in the unlikely event that the flash file system becomes corrupted. To create a n[...]
-
Page 202
Creating a New File System Page 7-16[...]
-
Page 203
Page 8-1 8 Switch Security Commands listed in the Security menu are for configuring system security parameters such as the password and logout time. The menu also provides a command for rebooting the switch. Enter security at the prompt to enter the Security menu. Press ? to see the following list of commands: Command Security Menu pw Set a new pas[...]
-
Page 204
Changing Passwords Page 8-2 Changing P asswor ds The switch provides three types of login accounts by default—Administrator, User and Diag- nostics. The Administrator login provides full READ/WRITE access to all command families. The login name for the Administrator account is admin . The login name for the default User account is user and provid[...]
-
Page 205
Rebooting the Switch Page 8-3 Rebooting the Switch The reboot command should only be executed during network down time and when no data is being transmitted across the network. Also, you should ensure that all configuration infor- mation has been saved first. Note that the reboot command is only available to the admin and the diag logins. ♦ Cauti[...]
-
Page 206
Secure Switch Access Page 8-4 Secur e Switch Access Secure Switch Access is a filtering program that prevents unauthorized access to the switch by allowing you to define a list of filters and filter points . For Secure Switch Access, filters are lists of source traffic that are allowed onto the switch. Filter points operate on IP protocols that inc[...]
-
Page 207
Secure Switch Access Page 8-5 Create This option allows you to create a new filter in the secure access database. The following is a sample display: Create Filter ------------------ Enter Filter Name: Enter IP Address ( [a.b.c.d] ) : Enter MAC Address ( [XXYYZZ: AABBCC] ) : Is this MAC in Canonical or Non-Canonical (C or N) [C] : Enter Slot : Enter[...]
-
Page 208
Secure Switch Access Page 8-6 Modify This option allows you to modify information about an existing secured access filter. Enter the name of the filter you wish to modify, as follows: Modify Filter ----------------- Filter Name: Test The filter’s existing information will display. For example: Source IP Source MAC Slot Port Filter Name Address Ad[...]
-
Page 209
Secure Switch Access Page 8-7 Configuring Secure A ccess Filter P oints The secapply command allows you to view the list of secure access filter points, to enable/ disable security globally or for a specific IP protocol filter point, and to define a filter list for each filter point. To use this command, enter: secapply A screen similar to the fol[...]
-
Page 210
Secure Switch Access Page 8-8 1) FTP Security Indicates whether or not secure access is enabled for File Transfer Protocol ( FTP ) on the switch. Enabled means secure access is enabled for FTP services, and only filters on FTP ’s filter list have authorization. Disabled indicates that secure access is not enabled for FTP services, and all users c[...]
-
Page 211
Secure Switch Access Page 8-9 7) One-touch Security Configures the same Security value for all secure access protocols. Enabled enables security for all secure access filter points. Disabled disables security for all secure access filter points. Any value configured for individual security parameters overrides the global setting. If you wish to set[...]
-
Page 212
Secure Switch Access Page 8-10 Viewing Secur e Access Violations Log The seclog command displays a log of all secure access violations. ♦ Note ♦ To log access violations on the switch, use the swlogc command. For more information on the swlogc command, see Chapter 10, “Switch Logging.” To view the secure access violations log, enter seclog [...]
-
Page 213
Managing User Login Accounts Page 8-11 Managing U ser Login Accounts Prior to software release 4.4, the switch provided security in the form of privilege control for individual login accounts by allocating each user accounts READ or WRITE privileges. Soft- ware release 4.4 contains a partition management feature that enhances the privilege capabil-[...]
-
Page 214
Managing User Login Accounts Page 8-12 Default Accounts Initially each switch is preconfigured with three default logins ( admin, user and diag ). See Chapter 4, “The User Interface,” for more information about login accounts. If you are logged into an account with the WRITE privilege to the USER command you may create or delete login accounts [...]
-
Page 215
Managing User Login Accounts Page 8-13 Adding a U ser Account U sing the CLI Command Mode To add a user account from the CLI mode, you must be logged into an account with adminis- trative privileges. Enter the following at the command prompt. user user_name <password user_password > where user_name is the new user login account name and user_[...]
-
Page 216
Managing User Login Accounts Page 8-14 U ser Write Privileges To assign privileges to a user account, you must be logged into an account with WRITE privi- leges to the USER family of commands. Enter the following command at the system prompt. user userId [write list-of-families ] where userId indicates the name assigned to the user account for whic[...]
-
Page 217
Managing User Login Accounts Page 8-15 Miscellaneous CLI Privileges Commands The following is a list of privileges-related CLI commands. For more details on these commands and other CLI commands, refer to the Text-Based Configuration CLI Reference Guide . • To create a new user login account, use the following command: user user_name [password us[...]
-
Page 218
Managing User Login Accounts Page 8-16 Assigning Account Privileges U sing the UI Command Mode When you add a new user login account, the account has permission to log in and to log out. If you want the new account to have additional privileges you must add them separately. To add privileges to a user account, you must be logged into an account wit[...]
-
Page 219
Managing User Login Accounts Page 8-17 This screen displays the default privileges for a new user login account. Note that the default privileges give the new user neither read nor write permission. To grant privileges to the user account, enter a number from 1 to 5 as indicated in the display. To set WRITE privileges for a single family of command[...]
-
Page 220
Managing User Login Accounts Page 8-18 The global family contains commands that apply globally to the switch rather than to individ- ual applications or services. Privileges for global family commands can be set on an individ- ual command basis or altogether so the privilege applies to the whole global family. If you want to set privileges for the [...]
-
Page 221
Managing User Login Accounts Page 8-19 For example, if you wanted to assign the user account the privilege to use the define command, enter the number 6 as shown here. Give the family number : ( ) : 6 The following will display. Give rights on subset DEFINE 0. NO 1. YES ( ) : If you enter 1, all the command families will display and the DEFINE comm[...]
-
Page 222
Managing User Login Accounts Page 8-20 Modi fying a U ser Account You can use the usermod command to modify account privileges as shown here. You must be logged into a user account with administrative privileges. 1. At the system prompt enter the usermod command. A prompt similar to the following displays: Enter Username: ( ) : 2. Enter the name as[...]
-
Page 223
Page 9-1 9 Configuring Switch-Wide P ar ameter s The switch provides commands to display and configure parameters on a switch-wide basis. These commands are grouped into two menus: the Summary menu and the System menu. Descriptions for commands in the Summary menu begin below; descriptions for commands in the System menu begin on page 9-5. In addi[...]
-
Page 224
Displaying the MIB-II System Group Variables Page 9-2 Displaying the MIB-II Sy stem Group V ariables MIB-II is a core set of definitions created to define the SNMP -based management framework. This MIB module contains definitions for both end systems and routers using the Internet protocol suite. To display the MIB-II system group variables, enter [...]
-
Page 225
Displaying the Chassis Summary Page 9-3 Displaying the Chassis Summary To display the chassis summary information, enter sc at the system prompt. A screen similar to the following will be displayed. Type: Omni Switch/Router XFRAME 9-slot Chassis ID: Alcatel Description: DESCRIPTION NOT SET. Backplane: 5 SLOT Master MPM Serial No.: 52601675 Physical[...]
-
Page 226
Displaying Current Router Interface Status Page 9-4 Displaying Curr ent Router Interface Status To display current interface status information, enter si at the system prompt. A screen similar to the following will be displayed. Interface Summary Status 4 Interfaces Logical Interface Administrative Operational Interface Type Status Status ---------[...]
-
Page 227
System Menu Page 9-5 Sy stem Menu The System menu contains commands to view or set system-specific parameters. To access this menu, enter system at the UI prompt to enter the System menu. If you are not in verbose mode, press a question mark ( ? ) and then press <Enter> to display the commands in the system menu, as shown below. Command Syste[...]
-
Page 228
Displaying Basic System Information Page 9-6 Displaying Basic Sy stem Information To display basic information on the switch, enter info at the system prompt. The following display is a typical example. System Make: Alcatel OmniSwitch System Type: 5-slot OmniSwitch Description: DESCRIPTION NOT SET. Backplane: 9 SLOT Bus Speed: 1200 XFRAME Physical [...]
-
Page 229
Displaying Basic System Information Page 9-7 No. of Resets to the System . The number of times this switch has been reset since the last cold start. ♦ Note ♦ The info command will also display the number of MPXs , their location in chassis, and which one is the primary and which one is the secondary. In addition, it also displays whether automa[...]
-
Page 230
Setting the System Date and Time Page 9-8 Setting the Sy stem Date and Time The dt command allows you to set the local date, time, and time zone. Additionally, you can set the system clock to run on Universal Time Coordinate ( UTC or GMT ). If applicable, you can also configure Daylight Savings Time ( DST ) parameters. To view or make changes to da[...]
-
Page 231
Setting the System Date and Time Page 9-9 3) Timezone This parameter specifies the time zone for the switch and sets the system clock to run on UTC time (or Greenwich Mean Time). Additionally, if Daylight Savings Time is enabled (see option 4 below), the clock automatically sets up default DST parameters (if applicable) for the local time zone. The[...]
-
Page 232
Setting the System Date and Time Page 9-10 Timezone and DST Parameters Abbr. Name Hours from UTC DST Start DST End DST Change NZST New Zealand +12:00 1st Sunday in Oct. at 2:00 a.m. 3rd Sunday in March at 3:00 a.m. 1:00 ZP11 No standard name +11:00 No default No default No default AEST Australia East +10:00 Last Sunday in Oct. at 2:00 a.m. Last Sun[...]
-
Page 233
Setting the System Date and Time Page 9-11 Timezone and DST Parameters Con’t Abbr. Name Hours from UTC DST Start DST End DST Change GMT Greenwich Mean Time +0:00 No default No default No default WAT West Africa -1:00 No default No default No default ZM2 No standard name -2:00 No default No default No default ZM3 No standard name -3:00 No default [...]
-
Page 234
Setting the System Date and Time Page 9-12 4) Daylight Savings Time active Enables and disables DST (Daylight Savings Time). To enable DST , enter: 4=Enable To disable DST , enter: 4=Disable If DST is disabled, options 41-49 will not be displayed. 41) DST Start Month Indicates which month of the year DST starts. To set the month when DST should sta[...]
-
Page 235
Setting the System Date and Time Page 9-13 46) DST End W eek Indicates which week in a month DST ends. To set the week DST should end, enter the sequential number of the week. The possible values are 1st (1), 2nd (2), 3rd (3), 4th (4), and Last. For example, if you want DST to end on the last Tuesday of a month, you would enter the line number for [...]
-
Page 236
Viewing Slot Data Page 9-14 Vie wing Slot Data You can view slot table information by entering the slot command. To view information on a particular slot, enter the slot command together with the slot number. For example, to view information for slot 1, enter slot 1 at the system prompt. You can also view information on all slots in the switch at t[...]
-
Page 237
Viewing System Statistics Page 9-15 Vie wing System Statistics The systat command displays statistics related to system, power, and environment. To view these parameters, enter systat at the system prompt. A screen similar to the following will be displayed. System Uptime 1 days, 12:09:22.64 MPM Transmit Overruns : 0 MPM Receive Overruns : 22 MPM t[...]
-
Page 238
Clearing System Statistics Page 9-16 Clearing Sy stem Statistics You may want to clear statistics for a specific module, port or service for dialogistic or accounting purposes. To clear switch statistics enter clearstat at the system prompt. A screen similar to the following will display. Usage: clearstat slot [,port] [,service] [,instance] As indi[...]
-
Page 239
Viewing Task Utilization Statistics Page 9-17 Vie wing T ask U tilization Statistics The taskstat command displays the task utilization statistics of the switch. To display the task utilization statistics, enter taskstat <task-number> <sample-period> at the system prompt. The <task-number> is an optional number of tasks and the &l[...]
-
Page 240
Viewing Task Utilization Statistics Page 9-18 PRI . Priority of the specified task. STATUS . Current status of the specified task. PC . Program Counter. The program counter identifies the routing code as it enters the stack. SP . Stack pointer. The stack pointer points to the code being loaded when the status is taken. ERRNO . Error number indicato[...]
-
Page 241
Viewing Memory Utilization Page 9-19 Vie wing Memory Utilization The leak monitor diagnostic utility is used to display information about memory utilization. This utility requires the use of three UI commands: leakstart , leakstop and leakdumpall . ♦ Note ♦ You may want to log this operation to a text file to make it easier to view the data. To[...]
-
Page 242
Viewing MPX Memory Statistics Page 9-20 Vie wing MPX Memory Statistics The memstat command displays the MPX’s memory statistics. The statistics will tell you how memory is currently being used and help determine if memory problems exist, such as memory exhaustion. To view the MPX’s memory statistics, enter memstat at the system prompt. A screen[...]
-
Page 243
Checking the Flash File System Page 9-21 Checking the Flash File Sy stem The fsck command performs a file system check of flash memory, which consists of the flash file system. Image files are stored in flash memory and loaded into system memory when the switch boots up. It also provides diagnostics in the case of file corruption. To perform a file[...]
-
Page 244
Creating a New File System Page 9-22 Cr eating a Ne w File System The newfs command removes a complete flash file system and all files within it. It then creates a new flash file system, which is empty. You can use this command when you want to reload all files in the file system from a readily-accessible backup device or in the unlikely event that[...]
-
Page 245
Configuring System Information Page 9-23 Configuring Sy stem Information You can enter or modify a description of a switch, its location, and a contact person. Although this information is not required, you may find it helpful in managing the switch. To enter or modify the switch descriptions, perform the following steps. 1. At the system prompt, [...]
-
Page 246
Viewing CAM Information Page 9-24 Vie wing CAM Information The camstat command displays information and usage about the content addressable memory ( CAM ) on each switching module in the chassis. To view this CAM information, enter camstat at the system prompt. Something similar to the following will be displayed. Slot # of CAMs Cfg Usage Max Avail[...]
-
Page 247
Configuring CAM Distribution Page 9-25 Configuring CAM Distribution CAM (Content Addressable Memory) on switching modules is used to look up the MAC address of endstations attached to the modules. You can use the camstat command to display each module’s CAM usage. See Viewing CAM Information on page 9-24 for more information on the camstat comma[...]
-
Page 248
Configuring CAM Distribution Page 9-26 A message similar to the following will display: Slot 3 Configured to learn 256 MACs will round up to 256 MACs This configuration will take effect only after system reboot 3. The new CAM configuration will take effect after you reboot the system. For this reason, you may want to configure the CAM for all modul[...]
-
Page 249
Configuring the HRE-X Router Port Page 9-27 Configuring the HRE-X Router P ort Various services in the switch use the HRE-X router port MAC registers. The registers are allo- cated as the services are loaded at startup. The hrex submenu contains five commands for use with the Hardware Routing Engines ( HRE s). The hrexassign command allows you to [...]
-
Page 250
Configuring the HRE-X Router Port Page 9-28 For example, to assign register 3 to the Classical IP service enter hrexassign 3 cip at the system prompt. A screen similar to the following is displayed. HRE-X RPM 3 configured for “CIP”; reboot to make effective. As indicated on the screen, the register assignment will not take effect until the swit[...]
-
Page 251
Configuring the HRE-X Router Port Page 9-29 Configuring and Displaying the HRE-X Hash T able The HRE-X s use a hardware implemented hash table to route packets for transmission. The switch employs a default hash function that works well in a broad range of data environ- ments. In rare cases, you may want to change the hash table configuration to o[...]
-
Page 252
Duplicate MAC Address Support Page 9-30 Duplicate MA C Addr ess Support When the switch sees the same MAC address sending traffic on a different switch port (a Duplicate MAC Address), it assumes the original network device moved. The switch sends a trap notifying network management of this station move event. It sends one trap for a device move wit[...]
-
Page 253
Duplicate MAC Address Support Page 9-31 If your network supports duplicate MAC addresses, there may be a significant performance impact due to the following reasons: •A MAC address is usually stored only in the CAM of the switching module where its desti- nation address is located. If duplicate MAC addresses are treated as separate addresses, the[...]
-
Page 254
Multicast Claiming Page 9-32 Multicast Claiming Multicast claiming can be enabled for networks with heavy multicast traffic. When enabled, multicast claiming frees the MPX from processing multicast packets by off-loading this traffic to the switching modules. When multicast claiming is enabled, the switch “claims” destination multicast addresse[...]
-
Page 255
Saving Configurations Page 9-33 Saving Configur ations Under normal conditions, configurations you make using the UI are written into cache and automatically saved into the switch’s flash memory. In this case, it is not necessary to issue a special command to save your configurations. When you use the UI to enter multiple configu- rations, perio[...]
-
Page 256
Saving Configurations Page 9-34 To determine whether you are in the cache configuration mode, enter the cacheconfig command. If cache config is operational the following message will display one of the follow- ing messages. Cache Configuration is currently on. or Cache Configuration is currently off. To turn off the cache configuration mode, enter [...]
-
Page 257
Page 10-1 10 Switch Logging Logging Ov erview Whether you are troubleshooting, configuring, or simply monitoring the switch, you may find it useful to view a history of various switch activities. The Logging submenu contains a list of commands for viewing and configuring logging on the system. To enter the logging submenu, enter logging at the syst[...]
-
Page 258
Configuring the Syslog Parameters Page 10-2 Configuring the Sy slog P arameter s Syslog messages are messages generated by individual processes in the switch. These messages contain information for conditions that range from debugging to emergency error conditions. The syslog command allows you to control how these messages will be handled. You ca[...]
-
Page 259
Configuring the Syslog Parameters Page 10-3 Default facility code The facility code is used to identify which sub-system generated the syslog message. Note that this code is used only as a default for tasks that do not have a facility code. See the table below for a list of the facility codes. The default is local0 . Override internals This setting[...]
-
Page 260
Configuring the Syslog Parameters Page 10-4 Override internals This field will force all syslog messages to use the default priority mask specified instead of their own predefined priority masks. Display internals This field allows the user to display the task log level. Enter 52=yes to display the sub- menu below. If, for example, you wanted to ch[...]
-
Page 261
Configuring the Syslog Parameters Page 10-5 Log T ask ID Determines whether or not you want to see the task ID that can be included in the syslog message. U se T ask Name This allows the user to display descriptive task names for syslog messages (see the Display internals sub-menu above) instead of numeric codes. Message tag Text of up to 10 charac[...]
-
Page 262
Configuring Switch Logging Page 10-6 Configuring Switch Logging Switch logging is a feature that allows you to activate and configure the logging of various types of switch information. Once you activate logging for a specific facility through the switch logging command, you may also decide whether the log output should display on the console, be [...]
-
Page 263
Configuring Switch Logging Page 10-7 3) Flash File Logging Flash file logging records debug information from the code that manages the switch logging feature itself (previously called “flash file system logging”). To enable flash file logging, enter 3=enable . To disable flash file logging, enter 3=disable . Flash file logging messages cannot b[...]
-
Page 264
Configuring Switch Logging Page 10-8 In addition to enabling or disabling each type of logging, you can also specify whether to output the log to a file or to the console: Output to File Set to yes ( y ) to store the log messages in the mpm.log file. Set to no ( n ) to disable send- ing log messages to this file. (This option is not available for f[...]
-
Page 265
Displaying the Command History Entries in the MPM Log Page 10-9 Displaying the Command History Entries in the MPM Log The cmdlog command displays a list commands executed since User Interface (UI) facility logging was activated by the swlogc command (described in Configuring Switch Logging on page 10-6). To display this data, enter cmdlog at the sy[...]
-
Page 266
Displaying the Connection Entries in the MPM Log Page 10-10 Displaying the Connection Entries in the MPM Log The conlog command displays a list of connections made since console event, FTP , or Telnet logging was activated by the swlogc command (described in Configuring Switch Logging on page 10-6). To display this data, enter conlog at the system [...]
-
Page 267
Displaying Screen (Console) Capture Entries in the MPM Log Page 10-11 Displaying Scr een (Console) Capture Entries in the MPM Log The caplog command displays the screen capture entries in the mpm.log file. ( Note: This feature is not yet implemented. ) In order to view screen capture entries through this command, you must first enable the Screen Ca[...]
-
Page 268
Displaying Screen (Console) Capture Entries in the MPM Log Page 10-12 4) Telnet (1) . Displays screen capture entries for the user logged in from the second telnet session. 5) Telnet (2) . Displays screen capture entries for the user logged in from the third telnet session. 6) Telnet (3) . Displays screen capture entries for the user logged in from[...]
-
Page 269
Displaying Debug Entries in the MPM Log Page 10-13 Displaying Debug Entries in the MPM Log The debuglog command displays the debug entries in the mpm.log file. ( Note: Currently there are no facilities using debugging. ) Below is a sample display of the debuglog command. Task Name Time Debug Message -------------------------------- ----------------[...]
-
Page 270
Displaying Secure Access Entries in the MPM Log Page 10-14[...]
-
Page 271
Page 11-1 11 Health Statistics The health statistics feature monitors the consumable resources of a switch, and provides a single integrated source for Network Management Software ( NMS ), such as X-Vision, to use in obtaining statistics on switch performance. With the health statistics, the user can set specific threshold levels for consumable res[...]
-
Page 272
Setting Resource Thresholds Page 11-2 Setting Resour ce Thresholds The health statistics software operates by monitoring set threshold levels on consumable resources. When a resource exceeds a set level, a trap is generated and sent. These threshold levels are set for the entire switch (or device) by using the hdcfg command. To set the thresh- old [...]
-
Page 273
Setting Resource Thresholds Page 11-3 Setting Bandwidth Thr esholds Bandwidth is a measure of the amount of traffic a switch can handle for receiving, sending, and on the backplane. The health statistics allow you to sent a percentage of available band- width, at which an SNMP trap is generated to alert the network administrator that the thresh- ol[...]
-
Page 274
Setting Resource Thresholds Page 11-4 Backplane Threshold The backplane threshold sets a percentage of total backplane bandwidth of the switch, module, or port. When backplane usage exceeds this percentage, an SNMP trap is sent. ♦ Note ♦ When “U-turn” switching (i.e., data enters a module port and is transmitted from a port on the same modu[...]
-
Page 275
Setting Resource Thresholds Page 11-5 CAM Threshold (MPM/HRE or NI) The CAM threshold sets a percentage of the total amount of space available for storing the cache tables. Cache tables maintain associations between received MAC addresses and the ports they were received on. For the switch level, the CAM threshold separately monitors the MPX and th[...]
-
Page 276
View Switch-Level Statistics Page 11-6 Setting the Sampling Interv al The sampling interval is the time interval between polls of the switch’s consumable resources to see if it is performing within the set thresholds. To set the amount of time between polls: 1. Enter health at a system prompt. The health menu (described above) displays. 2. Enter [...]
-
Page 277
View Module-Level Statistics Page 11-7 For field descriptions of the device resources column, see Setting Bandwidth Thresholds on page 11-3 and Setting Miscellaneous Thresholds on page 11-4 above. ♦ Note ♦ When calculating percentages, the health statistics cannot display less than one percent. If a single packet is sent through a port, for exa[...]
-
Page 278
View Port-Level Statistics Page 11-8 For descriptions of the statistics, see View Switch-Level Statistics on page 11-6. ♦ Note ♦ The CPU and memory resources are not applicable to the module level statistics display, and therefore are not shown. Vie w P ort-Lev el Statistics To view port-level statistics, type the hpstat command at a system pro[...]
-
Page 279
Page 12-1 12 N etw ork Time Pr otocol Intr oduction The Network Time Protocol ( NTP ) is used to synchronize the time of a computer client or server to another server or reference time source, such as a radio or satellite receiver. It provides client time accuracies within a millisecond on LAN s, and up to a few tens of millisec- onds on WAN s rela[...]
-
Page 280
Page 12-2 Stratum Stratum is the term used to define the relative proximity of a node in a network to a time source (such as a radio clock). Stratum 1 is the server connected to the time source itself. (In most cases the time source and the stratum 1 server are in the same physical location.) An NTP client or server connected to a stratum 1 source [...]
-
Page 281
Page 12-3 Servers 1a and 1b receive time information from, or synchronize with, a UTC time source such as a radio clock. (In most cases, these servers would not be connected to the same UTC source, though it is shown this way for simplicity.) Servers 1a and 1b become stratum 1 NTP servers and are peered with each other, allowing them to check UTC t[...]
-
Page 282
Page 12-4 When planning your network, it is helpful to use the following general rules: • It is usually not a good idea to synchronize a local time server with a peer (in other words, a server at the same stratum), unless the latter is receiving time updates from a source that has a lower stratum then from where the former is receiving time updat[...]
-
Page 283
Network Time Protocol Management Menu Page 12-5 N etwork Time Pr otocol Management Menu To access the NTP management menu, connect to a switch via a console or telnet session and enter NTP at the system prompt. If you are in verbose mode, or enter a question mark (?) at the prompt, the following screen is displayed: Command NTP Management Menu ----[...]
-
Page 284
NTP Configuration Menu Page 12-6 NTP Configur ation Menu To view the NTP configuration menu, enter the ntconfig command at the system prompt. If you are in verbose mode the NTP configuration menu is displayed. Otherwise, enter a ques- tion mark ( ? ) at the prompt to display this menu: Command NTP Configuration Menu --------------- ---------------[...]
-
Page 285
NTP Configuration Menu Page 12-7 Field Descriptions The following section describes the fields displayed using the ntpconfig command. 1) Response timeout This field sets the timeout period for responses to server queries. Server queries come from the server responsible for providing this client with NTP time information. The default is 8000 millise[...]
-
Page 286
NTP Configuration Menu Page 12-8 Configuring an NTP Client/Server A switch can be configured to act both as a client and a server. If you want to run both the client and server portions of the NTP software, follow the steps below: 1. Enter the command as shown, at the system prompt: ntpiconfig The following menu appears: NTP Startup Configuration [...]
-
Page 287
NTP Configuration Menu Page 12-9 Field Descriptions The following section describes the expanded menu options. 61) Client limit This field allows you to set a specific number of clients that are allowed to make requests of the server during a specified time period. Setting this field to 0 allows an unlimited number of clients to connect to the serv[...]
-
Page 288
NTP Configuration Menu Page 12-10 2. Adjust the configurable variables for this NTP client as needed by entering the line number, and equal sign, and a new value at the system prompt, as shown: <lineNumber>=<value> For example, to change the Response timeout to 10, you would enter 1 (the line number for Response timeout ), an equal sign[...]
-
Page 289
NTP Configuration Menu Page 12-11 Field Descriptions The following section describes the expanded menu options. 31) Configuration info authentication ke y The number of the key in the key file used to authenticate configuration information. Config- uration information sets configuration parameters. For more information on the key file, see NTP and[...]
-
Page 290
NTP Configuration Menu Page 12-12 Configuring a Ne w P eer Association When you have configured the NTP client and/or server, you will need to set at least one peer association for the switch. An NTP peer is a machine of the same stratum that will compare and check time information sent from the switch, and in turn send time information to the swi[...]
-
Page 291
NTP Configuration Menu Page 12-13 Configuring a Ne w Server For the switch to synchronize its time, you must specify a server, or servers, from which the switch receives time information. This is done with the ntpaddserv command. To add a synchronization server to a switch, use the command that follows: ntpaddserv <address> [<keyId><[...]
-
Page 292
NTP Configuration Menu Page 12-14 For example, to add broadcast address 1.1.1.1 with a key identifier of 5, using version 3 of NTP , and a minimum poll time of 16 seconds, you would enter the following: ntpbcast 1.1.1.1 5 3 4 When you have finished press <return> . A brief message appears confirming the addition of a new server. Unconfigur e[...]
-
Page 293
NTP Information Menu Page 12-15 NTP Information Menu To view the NTP configuration menu, enter the ntinfo command at the system prompt. If you are using verbose mode, the NTP configuration menu is displayed. Otherwise, enter a ques- tion mark ( ? ) at the prompt to display this menu: Command NTP Information Menu --------------- --------------------[...]
-
Page 294
NTP Information Menu Page 12-16 Server (4) This type of association is ordinarily created upon arrival of a client request message and exists only in order to reply to that request, after which the association is dissolved. By operating in this mode the host, usually a LAN time server, announces its willingness to synchronize, but not be synchroniz[...]
-
Page 295
NTP Information Menu Page 12-17 Field Descriptions The following sections describe the fields displayed using the ntppeers command Remote . The IP address of the remote association. Local . The local interface address assigned by NTP to the remote association. If this address is 0.0.0.0 , then the local address has yet to be determined. St . The st[...]
-
Page 296
NTP Information Menu Page 12-18 Display Detailed Information for One or Mor e P eers The ntpshowpeer command allows you to view detailed NTP information about any remote associations of this switch. To view detailed NTP information about a remote association enter the ntpshowpeer command in the following manner: ntpshowpeer <address> where &l[...]
-
Page 297
NTP Information Menu Page 12-19 Precision . The advertised precision of this association, which is a number from -4 to -20. For information on setting the advertised precision, see Configuring an NTP Client on page 12-6 and Set the Server’s Advertised Precision on page 12-14. Leap . The status of leap second insertion for this association. Leap s[...]
-
Page 298
NTP Information Menu Page 12-20 Flags Config . This counter lists what flags have been configured for this NTP entity. For more information about setting flags, see Set a System Flag (Auth, Bclient, Monitor, Stats) on page 12-35. Reference Time . This is the local time, in timestamp format, when the local clock was last updated. If the local clock [...]
-
Page 299
NTP Information Menu Page 12-21 Display Local Server Information The ntpinfo command is used to display information about the local switch’s implementation of NTP . To view local switch NTP information, enter the ntpinfo command at the system prompt. A screen similar to the following is shown: system peer: 0.0.0.0 system peer mode: unspec leap in[...]
-
Page 300
NTP Information Menu Page 12-22 Reference time . This is the local time at which the local clock was last set or corrected. System Flags . This counter lists what flags have been configured for this NTP entity. For more information about setting flags, see Set a System Flag (Auth, Bclient, Monitor, Stats) on page 12-35. Frequency . A number indicat[...]
-
Page 301
NTP Statistics Menu Page 12-23 NTP Statistics Menu To view the NTP Statistics Menu, enter the ntstats command at the system prompt. If you are in verbose mode the NTP configuration menu is displayed. Otherwise, enter a question mark ( ? ) at the prompt to display this menu: Command NTP Statistics Menu --------------- -------------------------------[...]
-
Page 302
NTP Statistics Menu Page 12-24 Field Descriptions The following section describes the fields displayed using the ntpstat command. system uptime . The number of seconds the local NTP server has been associated with the switch. time since reset . The number of seconds since the last time the local NTP server was restarted. bad stratum in packet . The[...]
-
Page 303
NTP Statistics Menu Page 12-25 Field Descriptions The following section describes the fields displayed using the ntppstat command. remote host . The IP address of the host whose statistics you are viewing. local interface . The local interface address assigned by NTP to the remote association. If this address is 0.0.0.0 , then the local address has[...]
-
Page 304
NTP Statistics Menu Page 12-26 Display Loop Filter Information The loop filter is used to control and correct the phase of timestamps as processed by the local clock. The loop filter examines timestamps sent to and from the local clock and can adjust them to account for natural wander and jitter. To view the statistics of the loop filter, enter the[...]
-
Page 305
NTP Statistics Menu Page 12-27 calls to findpeer . The number of times the switch sent an NTP packet of any kind to a config- ured NTP association. new peer allocations . The number of new NTP associations created since the last restart. peer demobilizations . The number NTP associations lost since the last restart. hash table counts . The number o[...]
-
Page 306
NTP Statistics Menu Page 12-28 Display Event Timer Subs ystem Statistics The ntptimer command allows you to view significant NTP events that have occurred on this switch. To view significant NTP events, enter the ntptimer command at the system prompt. A screen similar to the following is displayed: time since reset: 0 alarms handled: 0 alarm overru[...]
-
Page 307
NTP Statistics Menu Page 12-29 It is possible to reset the statistics for more than one NTP association at a time by adding more than one address to the command. For example, to reset statistics for a peer with IP address 1.1.1.4 and a peer with IP address 1.1.1.5, you would enter: ntppreset 1.1.1.4 1.1.1.5 A brief message is displayed confirming t[...]
-
Page 308
NTP Statistics Menu Page 12-30 bad offset on input . The number of NTP timestamps received that the switch disallowed because the added time offset parameter appeared to be incorrect. This can occur if an NTP entity becomes unsynchronized and generates false timestamp information. bad version packets . The number of packets received where the versi[...]
-
Page 309
NTP Statistics Menu Page 12-31 leap less than month away . A scheduled leap second insertion less than a month away. leap less than day away . A scheduled leap second insertion less than a day away. leap in less than 2 hours . A scheduled leap second insertion less than two hours away. leap happened . The date of the last leap second insertion. Tur[...]
-
Page 310
NTP Statistics Menu Page 12-32 Field Descriptions The following section describes the fields displayed using the ntpmlist command. remote address . The IP address of the remote association. port . The port the association was learned on and on which the association communicates with the switch. ♦ Note ♦ This is the TCP and UDP definition of a p[...]
-
Page 311
NTP Administration Menu Page 12-33 NTP A dministration Menu To view the NTP Administration Menu, enter the ntadmin command at the system prompt. If you are using verbose mode the NTP configuration menu is displayed. Otherwise, enter a question mark ( ? ) at the prompt to display this menu: Command NTP Administration Menu --------------- -----------[...]
-
Page 312
NTP Administration Menu Page 12-34 Speci fy the Host Whose NTP Server W e T alk T o The ntphost command specifies the name of the NTP server to which server queries are sent. This can be a domain name or an IP address. The default is localhost (the local server). To change the NTP server for the switch, enter the ntphost command as shown: ntphost &[...]
-
Page 313
NTP Administration Menu Page 12-35 Set Ke y Type to U se for Authenticated Requests (DES|MD5) NTP supports two types of encryption: DES or MD5. If you decide to use encryption to authenticate NTP information and configuration requests, you must specify which type of encryption to use. To specify an encryption type enter the ntpkeytype command as sh[...]
-
Page 314
NTP Access Control Menu Page 12-36 NTP A ccess Control Menu To view the NTP Access Control Menu, enter the ntaccess command at the system prompt. If you are using verbose mode the NTP configuration menu is displayed. Otherwise, enter a question mark ( ? ) at the prompt to display this menu: Command NTP Access Control Menu --------------- ----------[...]
-
Page 315
NTP Access Control Menu Page 12-37 Change the Contr ol Message Authentication K ey ID There are two types of messages an NTP entity can send to another NTP entity: request and control. Control messages attempt to change the configuration of the NTP entity in some fash- ion. It is possible to change the authentication key identifier for control mess[...]
-
Page 316
NTP Access Control Menu Page 12-38 Remov e One or More K ey ID's fr om the Trusted List The trusted list in the key file is a list of all keys that are considered authentic and uncompro- mised. Messages from an NTP entity using one of these keys are accepted and acted upon. It is possible to remove a key from the trusted list. To remove a key [...]
-
Page 317
NTP Access Control Menu Page 12-39 Create Restrict Entry/A dd Flags to Entry It is possible to place restriction flags on specific NTP entities in relation to the switch. Restric- tion flags prevent messages or information coming from the NTP entity from affecting the switch. To create a restriction flag, enter the ntpcres command as shown: ntpcres[...]
-
Page 318
NTP Access Control Menu Page 12-40 limited These hosts are subject to a limitation of the number of clients from the same net. Net in this context refers to the IP notion of net (class A , class B , class C , etc.). Only the first client limit hosts that have shown up at the server and that have been active during the last client limit period (in s[...]
-
Page 319
NTP Access Control Menu Page 12-41 Remov e Flags from a Restrict Entry It is possible to place restriction flags on specific NTP entities in relation to the switch. Restric- tion flags prevent messages or information coming from the NTP entity from affecting the switch. To remove a restriction flag from an NTP entity, enter the ntpmres command as s[...]
-
Page 320
NTP Access Control Menu Page 12-42 Display the Tr aps Set in the Server The ntpvtrap command allows you to view a list of trap receivers set for the server. To view the trap list, enter the ntpvtrap command at the system prompt. A display similar to the following is shown: address 127.0.0.1, port 18447 interface: 0.0.0.5, configured set for 0 secon[...]
-
Page 321
Page 13-1 13 SNMP (Simple N etw ork Management Pr otocol) Intr oduction Simple Network Management Protocol ( SNMP ) is an application layer protocol that allows network devices to exchange management information. SNMP works by sending messages, called protocol data units ( PDUs ), to network devices. Network administrators use SNMP to monitor netwo[...]
-
Page 322
Configuring SNMP Parameters and Traps Page 13-2 Configuring SNMP P arameter s and T r aps The snmpc command allows you to configure SNMP parameters and set traps that will be sent to network management stations. The snmpc command also enables you to add, modify, or delete SNMP parameters. The snmpc command is listed under the Networking menu. For [...]
-
Page 323
Configuring SNMP Parameters and Traps Page 13-3 3) Set Community Name The Set Community Name variable is a password (up to 16 characters) that enables NMS stations to read and write objects through SNMP . The default Set Community Name is “public,” which allows all NMS stations read access to readable objects. If you want to specify a Set Commu[...]
-
Page 324
Configuring SNMP Parameters and Traps Page 13-4 6) Broadcast T raps When broadcast traps are enabled, the switch transmits traps to all NMS stations in the default group. If you enable this parameter, unicast traps (see option 6 below) will automatically be disabled. The default for broadcast traps is disabled . To enable broadcast traps, enter the[...]
-
Page 325
Configuring SNMP Parameters and Traps Page 13-5 Here is a sample configuration for setting a combination of traps. Bit Configurations for Setting Traps Example: T o set a combination of trap types, add the hex values of the bits as follows: You would then enter the total mask value of the traps, as follows: Enter trap mask words 0:1 (ffffffff:fffff[...]
-
Page 326
Configuring SNMP Parameters and Traps Page 13-6 e. The following prompt displays: Special Access? (no): yes Select whether or not this Network Management Station has special access. If you enter yes , this NMS will have administrative privileges such as modifying, deleting, or adding to other trap entries as well as its own. Without special access,[...]
-
Page 327
Configuring SNMP Parameters and Traps Page 13-7 Please note that any additional NMS entries must have a unique IP address. Repeat steps b through f to continue configuring additional NMS entries. Once you save your configura- tion and re-enter the snmpc command at the prompt, the screen refreshes to include the new NMS entry. The following is a sam[...]
-
Page 328
Configuring SNMP Parameters and Traps Page 13-8 Viewing SNMP Statistics The snmps command is used to display SNMP statistics. The command displays the SNMP activities since the last time the switch was powered on, or since the last Reset was executed. It also displays a list of the current traps. The snmps command is listed on the Networking menu. [...]
-
Page 329
Configuring SNMP Parameters and Traps Page 13-9 Bad Type Discar ds The total number of SNMP entries discarded because the request type was not recognized. ASN P arse Error s The total number of ASN.1 or BER errors encountered by the SNMP protocols entity when decoding received SNMP Messages. T oo Big Errors The total number of SNMP PDUs delivered t[...]
-
Page 330
Configuring SNMP Parameters and Traps Page 13-10 Get Ne xt Requests The total number of SNMP Get-Next PDUs accepted and processed by the switch SNMP proto- col entity. Set Requests The total number of SNMP Set-Request PDUs which have been accepted and processed by the switch SNMP protocol entity. Get Responses The total number of SNMP Response PDUs[...]
-
Page 331
Trap Tables Page 13-11 T rap T ables The following table is a summary list of the supported SNMP traps and their values. Trap or Mask Name Object ID Bit Position Hex V alue Page coldStart 1.3.6.1.2.1.1 1.0 (word 0) 0 (word 0) 1 13-15 warmStart 1.3.6.1.2.1.1 1.1 (word 0) 1 (word 0) 2 13-16 linkDown 1.3.6.1.2.1.1 1.2 (word 0) 2 (word 0) 4 13-16 linkU[...]
-
Page 332
Trap Tables Page 13-12 tempAlarm 1.3.6.1.4.1.800.3.1.1.4.0.1 (word 1) 0 (word 1) 1 13-27 moduleChange 1.3.6.1.4.1.800.3.1.1.4.0.2 (word 1) 1 (word 1) 2 13-28 powerEvent 1.3.6.1.4.1.800.3.1.1.4.0.3 (word 1) 2 (word 1) 4 13-29 controllerEvent 1.3.6.1.4.1.800.3.1.1.4.0.4 (word 1) 3 (word 1) 8 13-30 loginV iolation 1.3.6.1.4.1.800.3.1.1.4.0.5 (word 1) [...]
-
Page 333
Trap Tables Page 13-13 healthThresholdRising 1.3.6.1.4.1.800.3.1.1.4.0.37 (word 2) 4 (word 2) 10 13-54 healthThresholdFalling 1.3.6.1.4.1.800.3.1.1.4.0.38 (word 2) 5 (word 2) 20 13-54 healthThresholdDevice 1.3.6.1.4.1.800.3.1.1.4.0.39 (word 2) 6 (word 2) 40 13-55 healthThresholdModule 1.3.6.1.4.1.800.3.1.1.4.0.40 (wor d 2) 7 (word 2) 80 13-55 xylan[...]
-
Page 334
Trap Tables Page 13-14 Under1Event 1.3.6.1.4.1.800.3.1.1.4.0.88 (wor d 3) 23 (wor d 3) 80 0000 13-79 Over2Alarm 1.3.6.1.4.1.800.3.1.1.4.0.89 (word 3) 24 (word 3) 100 0000 13-79 Under2Event 1.3.6.1.4.1.800.3.1.1.4.0.90 (wor d 3) 25 (wor d 3) 200 0000 13-80 Over3Alarm 1.3.6.1.4.1.800.3.1.1.4.0.91 (word 3) 26 (word 3) 400 0000 13-80 Under3Event 1.3.6.[...]
-
Page 335
Trap Tables Page 13-15 SNMP Standar d Tr aps This section lists the standard traps that are defined within RFC ( MIB ) documents. These traps signify events as they occur on common network devices. The following information on traps is provided in the tables. Trap. The object name of the trap as it is defined in the corresponding MIB (Management In[...]
-
Page 336
Trap Tables Page 13-16 Trap warmStart Object ID 1.3.6.1.2.1.11.1 Description The sending protocol entity is re-initializing itself such that neither the agent’s configuration nor the protocol entity implementation may be altered. Bit Position (W ord 0) 1 Hex V alue (W ord 0) 2 Trap T ext and V ariable Descrip- tions Warm Start Trap linkDown Objec[...]
-
Page 337
Trap Tables Page 13-17 Trap linkUp Object ID 1.3.6.1.2.1.11.3 Description The sending protocol entity recognizes that one of the communication links represented in the agent’s configuration has come up. Bit Position (W ord 0) 3 Hex V alue (W ord 0) 8 Trap T ext and V ariable Descrip- tions Trap authentica tionFailur e Object ID 1.3.6.1.2.1.11.4 D[...]
-
Page 338
Trap Tables Page 13-18 Trap eg pNeighborLoss Object ID 1.3.6.1.2.1.11.5 Description An EGP neighbor for whom the sending protocol entity was an EGP peer has been marked down and the peer relationship no longer exists. Bit Position (W ord 0) 5 Hex V alue (W ord 0) 20 Trap T ext and V ariable Descrip- tions Trap frDL CIStatusChang e Object ID 1.3.6.1[...]
-
Page 339
Trap Tables Page 13-19 Trap ipxT ra pCircuitDown Object ID 1.3.6.1.4.1.23.2.5.5.1 Description This trap indicates that the specified circuit has gone down. Bit Position (W ord 0) 8 Hex V alue (W ord 0) 100 V ariable Description ipxCircSysInstance - The identifier of this instance of IPX. ipxCircIndex - The identifier of this circuit, for this ins[...]
-
Page 340
Trap Tables Page 13-20 Trap topologyChang e Object ID 1.3.6.1.2.1.17.0.2 Description A bridge’s configured ports either transitioned from Learning state to For- warding state or from Forwarding state to Blocking state. This trap will not be sent if a newRoot trap was sent for the same transition. Bit Position (W ord 0) 11 Hex V alue (W ord 0) 800[...]
-
Page 341
Trap Tables Page 13-21 Trap a tmfVpcChange Object ID 1.3.6.1.4.1.353.0.1 Description Either a permanent VPC was added or deleted at this ATM interface, or an existing VPC was modified. Bit Position (W ord 0) 12 Hex V alue (W ord 0) 1000 Trap T ext and V ariable Descrip- tions A permanent VPC has been added or deleted at this ATM Interface, or the a[...]
-
Page 342
Trap Tables Page 13-22 Trap a tmfVccChange Object ID 1.3.6.1.4.1.353.0.2 Description Either a permanent VCC was added or deleted at this ATM interface, or an existing VCC was modified. Bit Position (W ord 0) 13 Hex V alue (W ord 0) 2000 Trap T ext and V ariable Descrip- tions A permanent VCC has been added or deleted at this ATM Interface, or the a[...]
-
Page 343
Trap Tables Page 13-23 Trap risingAlarm Object ID 1.3.6.1.2.1.16.0.1 Description The value of an Ethernet statistical variable (i.e., a member of the Ether- net statistics group as defined by RFC 1757) has exceeded its rising threshold. The variable’s rising threshold and whether it will generate an SNMP trap for this condition are configured by [...]
-
Page 344
Trap Tables Page 13-24 Trap fallingAlarm Object ID 1.3.6.1.2.1.16.0.2 Description The value of an Ethernet statistical variable (i.e., a member of the Ether- net statistics group as defined by RFC 1757) has dipped below its falling threshold. The variable’s falling threshold and whether it will generate an SNMP trap for this condition are configu[...]
-
Page 345
Trap Tables Page 13-25 Trap Type dsx3LineStatusChang e Object ID 1.3.6.1.2.1.10.30.15.0.1 Description The value of an instance dsx3LineStatus changed. Bit Position (W ord 0) 16 Hex V alue (W ord 1) 1 0000 Trap T ext and V ariable Descrip- tions Line Status Change (line status 1, last change 4) DSX3 Line Status . The line status of the interface. It[...]
-
Page 346
Trap Tables Page 13-26 Trap dsx1LineSta tusChange Object ID 1.3.6.1.2.1.10.18.15.0.1 Description The value of an instance dsx1LineStatus changed. Bit Position (W ord 0) 17 Hex V alue (W ord 1) 2 0000 Trap T ext and V ariable Descrip- tions Line Status Change (line status 1, last change 2) DSX1 Line Status . The line status of the interface. It cont[...]
-
Page 347
Trap Tables Page 13-27 Extended Tr aps This section lists Alcatel-specific traps. These extended traps are generated specifically by Alcatel switch devices. Trap Type tempAlarm Object ID 1.3.6.1.4.1.800.3.1.1.4.0.1 Description The temperature sensor(s) have detected a temperature in the chassis that exceeds the threshold. These sensors are physical[...]
-
Page 348
Trap Tables Page 13-28 Trap Type moduleChange Object ID 1.3.6.1.4.1.800.3.1.1.4.0.2 Description A module was either inserted or removed from the chassis. In some cases, this trap may also be generated when a module is reset. Bit Position (W ord 1) 1 Hex V alue (W ord 1) 2 Trap T ext and V ariable Descrip- tions Module was inserted or removed from c[...]
-
Page 349
Trap Tables Page 13-29 Trap Type powerEvent Object ID 1.3.6.1.4.1.800.3.1.1.4.0.3 Description A power supply was either inserted or removed from the chassis, or there is a problem with the power supply. This trap is also generated when a power supply is switched on or off. Bit Position (W ord 1) 2 Hex V alue (W ord 1) 4 Trap T ext and V ariable Des[...]
-
Page 350
Trap Tables Page 13-30 Trap Type contr ollerEvent Object ID 1.3.6.1.4.1.800.3.1.1.4.0.4 Description A chassis controller ( MPX ) lost or gained the state of the master. Bit Position (W ord 1) 3 Hex V alue (W ord 1) 8 Trap T ext and V ariable Descrip- tions Chassis controller (MPX) lost or gained master control (slot 1, state 3) Slot . The slot numb[...]
-
Page 351
Trap Tables Page 13-31 Trap Type loginViola tion Object ID 1.3.6.1.4.1.800.3.1.1.4.0.5 Description A login attempt for the User Interface (UI) failed due to an incorrect login ID or an invalid password. Three (3) consecutive unsuccessful attempts will trigger this alarm. Bit Position (W ord 1) 4 Hex V alue (W ord 1) 10 Trap T ext and V ariable Desc[...]
-
Page 352
Trap Tables Page 13-32 Trap Type macDuplicateP or t Object ID 1.3.6.1.4.1.800.3.1.1.4.0.7 Description Data from a MAC address that previously came from a source port differ- ent from the port where the frame previously was received although they both ports belong to the same VLAN. Bit Position (W ord 1) 6 Hex V alue (W ord 1) 40 Trap T ext and V ar[...]
-
Page 353
Trap Tables Page 13-33 Trap Type portLinkUpEvent Object ID 1.3.6.1.4.1.800.3.1.1.4.0.8 Description A physical, logical, or virtual port was enabled. These ports may be enabled through the UI or Switch Manager. Note that if you enable a physical port, any associated logical and virtual ports will also be enabled. And if you enable a logical port, su[...]
-
Page 354
Trap Tables Page 13-34 Trap Type portLinkDownEvent Object ID 1.3.6.1.4.1.800.3.1.1.4.0.9 Description A physical, logical, or virtual port was disabled. These ports may be dis- abled through the UI or Switch Manager. Note that if you disable a phys- ical port, any associated logical and virtual ports will also be disabled. And if you disable a logic[...]
-
Page 355
Trap Tables Page 13-35 Trap Type portPartitioned Object ID 1.3.6.1.4.1.800.3.1.1.4.0.10 Description The physical port detected jabber (i.e., the port has transitioned through enable/disable states more than 50 times in the past 200 ms). Jabber may be produced by a bad port connection, such as a faulty cable. Bit Position (W ord 1) 9 Hex V alue (W o[...]
-
Page 356
Trap Tables Page 13-36 Trap Type portRecor dMismatc h Object ID 1.3.6.1.4.1.800.3.1.1.4.0.11 Description The port configuration is different from the previous configuration. Typi- cally this trap is generated when a NIC of one type is swapped for a dif- ferent type (i.e., Ethernet for FDDI , ATM for Token Ring, etc.). Bit Position (W ord 1) 10 Hex [...]
-
Page 357
Trap Tables Page 13-37 Trap Type gr oupChange Object ID 1.3.6.1.4.1.800.3.1.1.4.0.14 Description A Group was either created or deleted through the UI or Switch Manager. Bit Position (W ord 1) 13 Hex V alue (W ord 1) 2000 Trap T ext and V ariable Descrip- tions Group created or deleted (vlan 2 admin status 4) Group number . The Group number that has[...]
-
Page 358
Trap Tables Page 13-38 Trap Type vlanChange Object ID 1.3.6.1.4.1.800.3.1.1.4.0.15 Description A VLAN was either created or deleted through the UI or Switch Manager. Bit Position (W ord 1) 14 Hex V alue (W ord 1) 4000 Trap T ext and V ariable Descrip- tions VLAN Change created or deleted (group 2, admin status 4) Group number . The Group num- ber t[...]
-
Page 359
Trap Tables Page 13-39 Trap Type portMove Object ID 1.3.6.1.4.1.800.3.1.1.4.0.16 Description The specified port has moved from a Group or has had its configuration changed. Bit Position (W ord 1) 15 Hex V alue (W ord 1) 8000 Trap T ext and V ariable Descrip- tions Port VLAN, group or configuration change (slot 2, IF 8, type 4, instance 1) Slot numb[...]
-
Page 360
Trap Tables Page 13-40 Trap moduleR esetReload Object ID 1.3.6.1.4.1.800.3.1.1.4.0.17 Description The specified module has been either reset or reloaded. A reload may occur during a firmware download. Bit Position (W ord 1) 16 Hex V alue (W ord 1) 1 0000 Trap T ext and V ariable Descrip- tions Module reset or reloaded by chassis manager (slot 4 sub[...]
-
Page 361
Trap Tables Page 13-41 Trap Type systemEvent Object ID 1.3.6.1.4.1.800.3.1.1.4.0.18 Description A potentially fatal error occurred in the system. Bit Position (W ord 1) 17 Hex V alue (W ord 1) 2 0000 Trap T ext and V ariable Descrip- tions Potentially fatal error occurred (trap 10) Event Trap Type . A number that identifies the specific error that [...]
-
Page 362
Trap Tables Page 13-42 Trap Type vlanRouteT ableFull Object ID 1.3.6.1.4.1.800.3.1.1.4.0.19 Description The IP or IPX route table is full. Bit Posi- tion (W ord 1) 18 Hex V alue (W ord 1) 4 0000 Trap T ext and V ariable Descrip- tions IP or IPX route table is full on insertion. Trap Type sapT ableFull Object ID 1.3.6.1.4.1.800.3.1.1.4.0.20 Descript[...]
-
Page 363
Trap Tables Page 13-43 Trap Type atmSSCOPsta te Object ID 1.3.6.1.4.1.800.3.1.1.4.0.21 Description A specified port changed. Bit Posi- tion (W ord 1) 20 Hex V alue (W ord 1) 10 0000 Trap T ext and V ariable Descrip- tions Trap Type ilmiState Object ID 1.3.6.1.4.1.800.3.1.1.4.0.22 Description The ILMI state for the specified port changed. This chang[...]
-
Page 364
Trap Tables Page 13-44 Trap Type atmConnection Object ID 1.3.6.1.4.1.800.3.1.1.4.0.23 Description The specified ATM VCC was created or deleted. Bit Position (W ord 1) 22 Hex V alue (W ord 1) 40 0000 Trap T ext and V ariable Descrip- tions ATM VCC created or deleted (slot 3, port 1, Vpi 0, Vci 100, admin status 2) Slot Number . The slot number where[...]
-
Page 365
Trap Tables Page 13-45 Trap Type atmSer vice Object ID 1.3.6.1.4.1.800.3.1.1.4.0.24 Description The specified ATM service (Port-to-Port Bridging, Trunking, LAN Emula- tion, etc.) was created or deleted. Bit Position (W ord 1) 23 Hex V alue (W ord 1) 80 0000 Trap T ext and V ariable Descrip- tions ATM service created or deleted (slot 3, port 1, serv[...]
-
Page 366
Trap Tables Page 13-46 Trap Type dlciNew Object ID 1.3.6.1.4.1.800.3.1.1.4.0.27 Description Frame Relay DLCI was created. Bit Position (W ord 1) 26 Hex V alue (W ord 1) 400 0000 Trap T ext and V ariable Descrip- tions Frame Relay DLCI created (slot 3 port 1 DLCI Number 100) DLCI Number . The number of the DLCI that was created. Slot number . The sl[...]
-
Page 367
Trap Tables Page 13-47 Trap Type dlciDel Object ID 1.3.6.1.4.1.800.3.1.1.4.0.28 Description Frame Relay DLCI was deleted. Bit Position (W ord 1) 27 Hex V alue (W ord 1) 800 0000 Trap T ext and V ariable Descrip- tions Frame Relay DLCI deleted (slot 3 port 1 DLCI Number 100) DLCI number . The number of the DLCI that was just deleted. Slot number . T[...]
-
Page 368
Trap Tables Page 13-48 Trap Type dlciUp Object ID 1.3.6.1.4.1.800.3.1.1.4.0.29 Description Frame Relay DLCI changed to active state. Bit Position (W ord 1) 28 Hex V alue (W ord 1) 1000 0000 Trap T ext and V ariable Descrip- tions Frame Relay DLCI Changed to Active (slot 3 port 1 DLCI Number 100) DLCI Number . The number of the DLCI that was just ac[...]
-
Page 369
Trap Tables Page 13-49 Trap Type dlciDn Object ID 1.3.6.1.4.1.800.3.1.1.4.0.30 Description Frame Relay DLCI changed to inactive state. Bit Position (W ord 1) 29 Hex V alue (W ord 1) 2000 0000 Trap T ext and V ariable Descrip- tions Frame Relay DLCI Changed to Inactive (slot 3 port 1 DLCI Number 100) DLCI Number . The number of the DLCI that was jus[...]
-
Page 370
Trap Tables Page 13-50 Trap Type portManualF orwardingMode Object ID 1.3.6.1.4.1.800.3.1.1.4.0.31 Description The specified port was placed into manual mode forwarding as its default setting. Bit Position (W ord 1) 30 Hex V alue (W ord 1) 4000 0000 Trap T ext and V ariable Descrip- tions Port placed into manual mode forwarding (slot 3, port 1, type[...]
-
Page 371
Trap Tables Page 13-51 Trap Type fddiCFStateChang e Object ID 1.3.6.1.4.1.800.3.1.1.4.0.32 Description The specified FDDI physical port changed from wrap configuration state. Bit Position (W ord 1) 31 Hex V alue (W ord 1) 8000 0000 Trap T ext and V ariable Descrip- tions FDDI physical port changes from wrap configuration state (index 1, state 2) SM[...]
-
Page 372
Trap Tables Page 13-52 Trap Type duplicateIP address Object ID 1.3.6.1.4.1.800.3.1.1.4.0.35 Description The switch detected a duplicate IP address. Bit Position (W ord 2) 2 Hex V alue (W ord 2) 4 Trap T ext and V ariable Descrip- tions Duplicate IP address detected (IP addr 192.168.10.1, Mac 0036589adf01, slot 3, IF 4, dup Mac 00145221cd02, dup slo[...]
-
Page 373
Trap Tables Page 13-53 Trap Type duplicateMA Caddress Object ID 1.3.6.1.4.1.800.3.1.1.4.0.36 Description The switch detected a duplicate MAC address of one of its own router ports. Bit Position (W ord 2) 3 Hex V alue (W ord 2) 8 Trap T ext and V ariable Descrip- tions Duplicate MAC address detected (Mac 00145221cd02, slot 2, IF 3, time 4 MAC Addres[...]
-
Page 374
Trap Tables Page 13-54 Trap Type healthThr esholdRising Object ID 1.3.6.1.4.1.800.3.1.1.4.0.37 Description At least one of the user-specified thresholds was exceeded. Bit Position (W ord 2) 4 Hex V alue (W ord 2) 10 Trap T ext and V ariable Descrip- tions Thresh-hold rising trap Trap Type healthThr esholdFalling Object ID 1.3.6.1.4.1.800.3.1.1.4.0.[...]
-
Page 375
Trap Tables Page 13-55 Trap Type healthThr esholdDevice Object ID 1.3.6.1.4.1.800.3.1.1.4.0.39 Description At least one of the device-level threshold crossing was detected. Bit Position (W ord 2) 6 Hex V alue (W ord 2) 40 Trap T ext and V ariable Descrip- tions Trap Type healthThr esholdModule Object ID 1.3.6.1.4.1.800.3.1.1.4.0.40 Description At l[...]
-
Page 376
Trap Tables Page 13-56 Trap Type xylanXIPXMAPP or tSta tusChange Object ID 1.3.6.1.4.1.800.3.1.1.4.0.41 Description An XMAP turned on or off. Bit Position (W ord 2) 8 Hex V alue (W ord 2) 100 Trap T ext and V ariable Descrip- tions The status of an XMAP-tracked virtual port has changed (port 1, reason 2) Port Number . The virtual port number of the[...]
-
Page 377
Trap Tables Page 13-57 Trap Type xylanXIPXMAPP or tSta teChange Object ID 1.3.6.1.4.1.800.3.1.1.4.0.42 Description An XMAP turned on or off. Bit Position (W ord 2) 9 Hex V alue (W ord 2) 200 Trap T ext and V ariable Descrip- tions The state of the XMAP agent has changed to (state 1) Operating State . The XMAP’s operating state. The follow- ing in[...]
-
Page 378
Trap Tables Page 13-58 Trap Type avlAuthAttempt Object ID 1.3.6.1.4.1.800.3.1.1.4.0.43 Description Indicates the last authenticated VLAN attempt. Bit Position (W ord 2) 1 6 Hex V alue (W ord 2) 1 0000 Trap T ext and V ariable Descrip- tions The last VLAN authentication attempt was: (user 1, event 2, MAC 0036589adf01, port 4, slot 5) User . The last[...]
-
Page 379
Trap Tables Page 13-59 Trap Type xylanXIPGMAPFailedUpda te Object ID 1.3.6.1.4.1.800.3.1.1.4.0.44 Description GMAP is unable to update the forwarding database to reflect information in its internal database. Bit Position (W ord 2) 11 Hex V alue (W ord 2) 800 Trap T ext and V ariable Descrip- tions GMAP is unable to update the forwarding database ([...]
-
Page 380
Trap Tables Page 13-60 Trap Type clkBusLineSta teChange Object ID 1.3.6.1.4.1.800.3.1.1.4.0.45 Description Either the bus line’s status changed (active or inactive) or clock switching occurred. Bit Position (W ord 2) 10 Hex V alue (W ord 2) 400 Trap T ext and V ariable Descrip- tions Bus Line’s status changed (bus line 1, operating state 1) or [...]
-
Page 381
Trap Tables Page 13-61 Trap Type bind-violation Object ID 1.3.6.1.4.1.800.3.1.1.1.0.46 Description A configured binding rule was violated. Bit Position (W ord 2) 23 Hex V alue (W ord 2) 80 0000 Trap T ext and V ariable Descrip- tions A binding rule has been violated (groupId 1, vlanId 2, IP 192.168.10.1 3, Mac 0036589adf01, protocol 5, port 6, rul[...]
-
Page 382
Trap Tables Page 13-62 Trap Type mpcStatisticsOv erflow Object ID 1.3.6.1.4.1.800.3.1.1.4.0.47 Description An entry in the mpcStatisticsT able reached the threshold value. Bit Position (W ord 2) 18 Hex V alue (W ord 2) 4 0000 Trap T ext and V ariable Descrip- tions MPC Index . A unique number that identi- fies a conceptual row in the mpcConfig- Ta[...]
-
Page 383
Trap Tables Page 13-63 Trap Type fddiLerFlagChang e Object ID 1.3.6.1.4.1.800.3.1.1.1.0.65 Description The LER (Link Error Rate) flag on a port changed from CLEAR to SET . Bit Position (W ord 3) 0 Hex V alue (W ord 3) 1 Trap T ext and V ariable Descrip- tions FDDI: Link Error Rate on a port is set (SMTIndex 1, port 2, LerFlag 3) LER Flag . The con[...]
-
Page 384
Trap Tables Page 13-64 Trap Type fddiL CTFailCntIncr Object ID 1.3.6.1.4.1.800.3.1.1.1.0.66 Description The LCT (Link Confidence T est) flag on a port incremented. Bit Position (W ord 3) 1 Hex V alue (W ord 3) 2 Trap T ext and V ariable Descrip- tions Fddi: Link Confidence Test flag on a port incremented (SMTIndex 1, port index 2, failure counts [...]
-
Page 385
Trap Tables Page 13-65 Trap Type mpcStatisticsOv erflow Object ID 1.3.6.1.4.1.800.3.1.1.1.0.67 Description The statisticsNum value of the mpcStatisticsT able reached the threshold value. Bit Position (W ord 2) 18 Hex V alue (W ord 2) 4 0000 V ariables mpcIndex mpcStatRxMpoaResolveReplyInsufECResources Trap T ext and V ariable Descrip- tions GMAP i[...]
-
Page 386
Trap Tables Page 13-66 Trap Type mpcShortCut Object ID 1.3.6.1.4.1.800.3.1.1.4.0.68 Description The established shortcut path either closed or failed to complete the path. Bit Position (W ord 2) 19 Hex V alue (W ord 2) 8 0000 V ariables mpcRowStatus lecControlDir ectVci mpcFlowDetectProtocol mpcIngressCacheDestAddr , mpcIngressCacheDestAtmAddr mpcI[...]
-
Page 387
Trap Tables Page 13-67 Trap Type mpcIngr essRetryTimeOut Object ID 1.3.6.1.4.1.800.3.1.1.4.0.69 Description The retry time exceeded the MPC -p5 time. Bit Position (W ord 2) 20 Hex V alue (W ord 2) 10 0000 V ariables mpcIndex mpcRetryT imeMaximum mpcIngressCacheDestAddr mpcIngressCacheDestAtmAddr mpcFlowDetectProtocol mpcMpsIndex Trap T ext and V ar[...]
-
Page 388
Trap Tables Page 13-68 Trap Type vrrpT rapNe wMaster Object ID 1.3.6.1.2.1.46.1.3.1.0.3 Description The sending agent has transitioned from “Backup” state to “Master” state. Bit Position (W ord 2) 21 Hex V alue (W ord 2) 20 0000 Trap T ext and V ariable Descrip- tions Agent has transitioned from Backup to Master state (If index 1, vrid 2) I[...]
-
Page 389
Trap Tables Page 13-69 Trap Type vrrpAuthF ailure Object ID 1.3.6.1.2.1.46.1.3.1.0.4 Description A packet was received from a router whose authentication key or authen- tication type conflicts with this router’s authentication key or type. Bit Position (W ord 2) 22 Hex V alue (W ord 2) 40 0000 Trap T ext and V ariable Descrip- tions A packet wit[...]
-
Page 390
Trap Tables Page 13-70 Trap Type oamVCAIS Object ID 1.3.6.1.4.1.800.3.1.1.1.0.71 Description The specified connection is in the VC-AIS state. Bit Position (W ord 3) 10 Hex V alue (W ord 3) 400 V ariables xylanOamF5VCSlotIndex xylanOamF5VCPortIndex xylanOamF5VCVpiIndex xylanOamF5VCVciIndex Trap T ext and V ariable Descrip- tions The specified conne[...]
-
Page 391
Trap Tables Page 13-71 Trap Type oamVCRDI Object ID 1.3.6.1.4.1.800.3.1.1.1.0.72 Description The specified connection is in the VC-RDI state. Bit Position (W ord 3) 11 Hex V alue (W ord 3) 800 V ariables xylanOamF5VCSlotIndex xylanOamF5VCPortIndex xylanOamF5VCVpiIndex xylanOamF5VCVciIndex Trap T ext and V ariable Descrip- tions The specified conne[...]
-
Page 392
Trap Tables Page 13-72 Trap Type oamVCL OC Object ID 1.3.6.1.4.1.800.3.1.1.1.0.73 Description The specified connection is in the VC-LOC state. Bit Position (W ord 3) 12 Hex V alue (W ord 3) 1000 V ariables xylanOamF5VCSlotIndex xylanOamF5VCPortIndex xylanOamF5VCVpiIndex xylanOamF5VCVciIndex Trap T ext and V ariable Descrip- tions The specified con[...]
-
Page 393
Trap Tables Page 13-73 Trap Type oamVCUnsuccessLoop Object ID 1.3.6.1.4.1.800.3.1.1.4.0.74 Description The specified connection is in the Unsuccessful Loopback state. Bit Position (W ord 3) 13 Hex V alue (W ord 3) 2000 V ariables xylanOamF5VCSlotIndex xylanOamF5VCPortIndex xylanOamF5VCVpiIndex xylanOamF5VCVciIndex Trap T ext and V ariable Descrip-[...]
-
Page 394
Trap Tables Page 13-74 Trap Type oamVP AIS Object ID 1.3.6.1.4.1.800.3.1.1.4.0.75 Description The specified VP connection is in the VP-AIS state. Bit Position (W ord 3) 14 Hex V alue (W ord 3) 4000 V ariables xylanOamF5VCSlotIndex xylanOamF5VCPortIndex xylanOamF5VCVpiIndex Trap T ext and V ariable Descrip- tions The specified connection is in VP-A[...]
-
Page 395
Trap Tables Page 13-75 Trap Type oamVPRDI Object ID 1.3.6.1.4.1.800.3.1.1.4.0.76 Description The specified VP connection is in the VP-RDI state. Bit Position (W ord 3) 15 Hex V alue (W ord 3) 8000 V ariables xylanOamF5VCSlotIndex xylanOamF5VCPortIndex xylanOamF5VCVpiIndex Trap T ext and V ariable Descrip- tions The specified connection is in VP-LO[...]
-
Page 396
Trap Tables Page 13-76 Trap Type oamVPL OC Object ID 1.3.6.1.4.1.800.3.1.1.4.0.77 Description The specified VP connection is in the VP-LOC state. Bit Position (W ord 3) 16 Hex V alue (W ord 3) 1 0000 V ariables xylanOamF5VCSlotIndex xylanOamF5VCPortIndex xylanOamF5VCVpiIndex Trap T ext and V ariable Descrip- tions The specified connection is in VP[...]
-
Page 397
Trap Tables Page 13-77 Trap Type oamVPUnsuccessLoop Object ID 1.3.6.1.4.1.800.3.1.1.4.0.78 Description The specified VP connection is in the unsuccessful loopback state. Bit Position (W ord 3) 17 Hex V alue (W ord 3) 2 0000 V ariables xylanOamF5VCSlotIndex xylanOamF5VCPortIndex xylanOamF5VCVpiIndex Trap T ext and V ariable Descrip- tions The speci[...]
-
Page 398
Trap Tables Page 13-78 Trap accountEvent Object ID 1.3.6.1.4.1.800.3.1.1.4.0.86 Description An account event is generated to signal that a new accounting file is available on the switch Bit Position (W ord 3) 21 Hex V alue (W ord 3) 20 0000 V ariable Description chasAccountName - Path name of the most recently terminated account- ing file. chasAcc[...]
-
Page 399
Trap Tables Page 13-79 Trap Type Under1Event Object ID 1.3.6.1.4.1.800.3.1.1.4.0.88 Description This event is generated when the filling level goes below the first thresh- old. This event is for information only. Bit Position (W ord 3) 23 Hex V alue (W ord 3) 80 0000 V ariable Description chasAccountFilingLevel - The amount of buffer taken up by ac[...]
-
Page 400
Trap Tables Page 13-80 Trap Under2Event Object ID 1.3.6.1.4.1.800.3.1.1.4.0.90 Description This event is generated when the filling level is lowered below the sec- ond threshold. Bit Position (W ord 3) 25 Hex V alue (W ord 3) 200 0000 V ariable Description chasAccountFilingLevel - The amount of buffer taken up by accounting data. V alue shown as a [...]
-
Page 401
Trap Tables Page 13-81 Trap Under3Event Object ID 1.3.6.1.4.1.800.3.1.1.4.0.92 Description This event is generated when the filling level goes below the third threshold. Bit Position (W ord 3) 27 Hex V alue (W ord 3) 8000 0000 V ariable Description chasAccountFilingLevel - The amount of buffer taken up by accounting data. V alue shown as a percenta[...]
-
Page 402
Trap Tables Page 13-82 Trap FileAlarm Object ID 1.3.6.1.4.1.800.3.1.1.4.0.94 Description This alarm is generated when too many files are awaiting collection. Bit Position (W ord 3) 29 Hex V alue (W ord 3) 2000 0000 V ariable Description chasAccountFileCount - The number of terminated accounting files await- ing collection and removal by an externa[...]
-
Page 403
Trap Tables Page 13-83 Trap Type ldpP eerCrea te Object ID 1.3.6.1.4.1.800.3.1.1.4.0.80 Description A LDP peer is identified by the LDP hello mechanism and a peer entry is created. Bit Position (W ord 3) 5 Hex V alue (W ord 3) 20 V ariables mplsLdpEntityID mplsLpdPeerIndex mplsLdpPeerID Trap T ext and V ariable Descrip- tions Peer Entity is Create[...]
-
Page 404
Trap Tables Page 13-84 Trap Type ldpP eerDelete Object ID 1.3.6.1.4.1.800.3.1.1.1.0.81 Description An LDP peer is lost and the peer entry is deleted. Bit Position (W ord 3) 6 Hex V alue (W ord 3) 40 V ariables mplsLdpEntityID mplsLpdPeerIndex mplsLdpPeerID Trap T ext and V ariable Descrip- tions Peer Entity is Deleted. (EntityId 1, PeerIndex 2, Pee[...]
-
Page 405
Trap Tables Page 13-85 Trap Type ldpSessionCrea te Object ID 1.3.6.1.4.1.800.3.1.1.4.0.82 Description An LDP session with the peer is established and a session entry is cre- ated. Bit Position (W ord 3) 17 Hex V alue (W ord 3) 80 V ariables mplsLdpEntityID mplsLpdPeerIndex mplsLdpPeerID mplsLdpSessionIndex Trap T ext and V ariable Descrip- tions LD[...]
-
Page 406
Trap Tables Page 13-86 Trap Type ldpSessionDelete Object ID 1.3.6.1.4.1.800.3.1.1.4.0.83 Description An LDP session with the peer is lost and the session entry is deleted. Bit Position (W ord 3) 8 Hex V alue (W ord 3) 100 V ariables mplsLdpEntityID mplsLpdPeerIndex mplsLdpPeerID mplsLdpSessionIndex Trap T ext and V ariable Descrip- tions LDP Sessio[...]
-
Page 407
Trap Tables Page 13-87 Trap Type lecStateChang eEvent Object ID 1.3.6.1.4.1.800.3.1.1.4.0.96 Description A trap message is sent to a network manager when a LEC status changes. Bit Position (W ord 2) 26 Hex V alue (W ord 3) 40 00000 V ariables lecID lecActualLanName lecAtmAddress, xylanLecSlotNumber xylanLecPortNumber xylanLecServiceNumber lecInterf[...]
-
Page 408
Trap Tables Page 13-88 Trap T ext and V ariable Descrip- tions LEC Status Change (ELAN Name, Service Instance, New state, previous ELAN Name . The name of the ELAN whose status changed to generate this trap. state). Previous State . The previous status of the LEC that changed to generate this trap. Displayed as an integer as shown below in the Stat[...]
-
Page 409
Page 14-1 14 DNS Resolv er and RMON Intr oduction This chapter describes commands related to the Domain Name Server ( DNS ) resolver and remote network monitoring ( RMON) feature in the switch. This chapter also describes how to configure router port MAC addresses with the chngmac command. The commands for these features are available from the Netw[...]
-
Page 410
Configuring the DNS Resolver Page 14-2 To enable the resolver function, enter 1=y . A screen similar to the following then displays: DNS Resolver Configuration 1) Resolver Enabled : Yes 2) Domain : UNSET 3) Server Address 1 : UNSET 4) Server Address 2 : UNSET 5) Server Address 3 : UNSET Command {Item=Value/?/Help/Quit/Redraw/Save} (Redraw) : The pr[...]
-
Page 411
Remote Network Monitoring (RMON) Page 14-3 Remote N etwork Monitoring (RMON) Remote Network Monitoring ( RMON ) allows you to set up remote monitoring within your Omni Switch/Router. RMON consists of “probes” and “events.” There are two commands in the Networking menu, probes and events , which you can use to monitor, activate and inacti- v[...]
-
Page 412
Remote Network Monitoring (RMON) Page 14-4 The Alarm probe attempts to prevent a flood of alarms from being generated by fluctuating values. It does so by continuously comparing the upper and lower limits. What this means is that the first time either an upper or lower limit is exceeded, an alarm will be generated. However, if the variable moves ba[...]
-
Page 413
Remote Network Monitoring (RMON) Page 14-5 Time Time since the last change in status. System Resour ces Amount of memory that has been allocated to this probe. To see the detail for each of the probes enter the probes command followed by the entry number as shown below. /Networking % probes 1 RMON Probe Summary Entry Slot/Port Flavor Status Time Sy[...]
-
Page 414
Configuring Router Port MAC Addresses Page 14-6 Configuring Router P ort MA C A ddr esses You can use the chngmac command if you want to configure a locally administered address ( LAA ) for a group that has an IP router port, IPX router port, or both. To use this command, enter chngmac followed by the number of the group you want to modify (the de[...]
-
Page 415
Page 15-1 15 Managing Ethernet Modules Ov erview of Omni Switch/Router Ethernet Modules This chapter describes User Interface commands for Ethernet, Fast Ethernet, and Gigabit Ethernet modules. This chapter documents User Interface ( UI ) commands to manage Omni Switch/Router Ether- net modules. For documentation on Command Line Interface ( CLI ) c[...]
-
Page 416
Overview of Omni Switch/Router Ethernet Modules Page 15-2 V ariety of Connector Options Ethernet and Fast Ethernet modules are available in a variety of connector types. On the OmniSwitch, Fast Ethernet modules use copper RJ-45 and fiber SC connectors. On the Omni Switch/Router, 10/100 Ethernet modules use copper RJ-45 connectors and the ESX-100FM/[...]
-
Page 417
Overview of Omni Switch/Router Ethernet Modules Page 15-3 Kodiak Ethernet Modules ESX-K Series Modules and Optimized P orts Kodiak-based modules will flood packets with unknown destination addresses on ports configured for optimized device mode. To prevent this condition, the following command can be entered into the mpx.cmd file: MamOptSwitchPorts[...]
-
Page 418
The Ethernet Management Menus Page 15-4 The Ethernet Management Menus The eth100 and 10/100 sub-menus are described in this chapter. These sub-menus are part of the physical interface sub-menu, which appears similar to the following display: Command Physical Interface Menu --------------- -------------------------------------------------------- sli[...]
-
Page 419
Configuring 10/100 Auto-Sensing Ports Page 15-5 Configuring 10/100 A uto-Sensing P orts The 10/100cfg command allows you to enable auto-negotiation, as well as configure link speed (10 or 100 Mbps) and the link mode (full or half-duplex) on 10/100 Ethernet ports on the ESX-K-100C-32W modules on the Omni Switch/Router. Follow these steps to configu[...]
-
Page 420
Configuring 10/100 Auto-Sensing Ports Page 15-6 6. Since you have enabled auto-negotiation, the port will automatically sense the line speed of the connection. You can also further enable auto-negotiation for the link mode. When the following prompt displays: Link Mode [Half or Auto] (Currently (H)alf Duplex) : select whether you want the port to a[...]
-
Page 421
Configuring Kodiak Ethernet Ports Page 15-7 Configuring K odiak Ethernet P orts The 10/100cfg command allows you to configure the link mode (full or half-duplex) for ports on newer Kodiak Ethernet modules. This procedure describes how to configure Ethernet modules on the Omni Switch/Router. Follow these steps to configure a Kodiak Ethernet port: 1[...]
-
Page 422
Viewing Configurations for 10/100 Ethernet Modules Page 15-8 Vie wing Configurations for 10/100 Ethernet Modules The 10/100vc command allows you to view the current status of newer Ethernet modules (see Kodiak Ethernet Modules on page 15-3). These modules support 100 Mbps, or 1000 Mbps Ethernet. Ethernet 10/100 ports (e.g., ESX-K-100C-32 ) can aut[...]
-
Page 423
OmniChannel Page 15-9 OmniChannel OmniChannel allows you to increase the bandwidth of Fast backbones by combining the capacity of up to four (4) Fast Ethernet ports into one channel. The combined channel oper- ates within Spanning Tree as one virtual port, and can provide up to 800 Mbps (in full-duplex mode) of bandwidth. (In full-duplex mode, 400 [...]
-
Page 424
OmniChannel Page 15-10 ♦ Note ♦ For Kodiak-based 10/100 Ethernet modules, 802.1Q is supported over OmniChannel. See Chapter 16, “Managing 802.1Q Groups” for more information. OmniChannel balances the traffic load among links by MAC address. MAC addresses are assigned to physical links in the OmniChannel in a round-robin fashion. The first M[...]
-
Page 425
OmniChannel Page 15-11 Server Channel Limitations The following are limitations to creating a server channel on the Omni Switch/Router: • The maximum number of Server Channels in the whole box is not fixed; however, it is suggested that no more than 16 be created on the same switch. • Each Server Channel can support up to 4 ports. • Within on[...]
-
Page 426
OmniChannel Page 15-12 If the port you enter is already part of another OmniChannel, then it cannot be used in a second OmniChannel. The following message displays for those ports that are already part of another OmniChannel: Primary port in use 5. The following prompt displays: To select a port, use the convention - Slot/Physical Port. For eg. 2/1[...]
-
Page 427
OmniChannel Page 15-13 Adding P orts to an OmniChannel After you create an OmniChannel with the crechnl command, you can add more secondary ports to the same channel as long as the channel contains less than 4 ports. You use the addprtchnl command to add ports to an OmniChannel. Follow these steps: 1. Enter addprtchnl . 2. The following prompt disp[...]
-
Page 428
OmniChannel Page 15-14 Deleting P orts from an OmniChannel You can delete ports from an OmniChannel using the delprtchnl command. Follow these steps: 1. Enter delprtchnl . 2. The following prompt displays: Channel Number : Enter the channel number on which you want to delete ports. You can check the current port assignments for a given OmniChannel [...]
-
Page 429
OmniChannel Page 15-15 3. A screen similar to the following displays: Displaying channel 2 Channel Id Phy. Port Port Status Mac Count ===================================================================== 2 5/6 Inactive 0 5/7 Inactive 0 3 5/3 Active 35 5/4 Active 34 5/5 Active 34 The following sections describe the variables in this table. Channel I[...]
-
Page 430
OmniChannel Page 15-16[...]
-
Page 431
Page 16-1 16 Managing 802.1Q Gr oups This chapter documents User Interface ( UI ) commands to manage 802.1Q groups. For docu- mentation on Command Line Interface ( CLI ) commands to manage 802.1Q groups, see the Text-Based Configuration CLI Reference Guide . ♦ Important Notes ♦ In Release 4.4 and later, the Omni Switch/Router is factory-configu[...]
-
Page 432
Page 16-2 IEEE 802.1Q Sections Not Implemented Some portions of the 802.1Q specification have not yet been implemented in the Omni Switch/Router. These include the following: • The tunneling of non-canonical 802.5 frames is not supported, since the Alcatel Omni S/R handles such traffic by frame translations. This tunneling mode of operation invol[...]
-
Page 433
Page 16-3 Application Example The following diagram illustrates a simple 802.1Q application: Simple 802.1Q Application In the above diagram, the PC devices (endstations) need to be segmented into different 802.1Q VLANs . The switch port to which each device attaches is assigned to an 802.1Q group (Group 2 for endstations A, B, E, and F, and Group 3[...]
-
Page 434
Page 16-4 Single vs . Multiple Spanning Tr ee In previous releases of the Omni Switch/Router software (4.0 and earlier), spanning tree support was done on a per port basis. In other words, a physical port could only participate in one instance of a spanning tree on the network. If a network is passing both untagged and IEEE tagged frames, single sp[...]
-
Page 435
Page 16-5 while VLAN 2 traffic is allowed to pass. The reverse is true for Switch 1 and Switch 3 (i.e., VLAN 2 traffic is blocked, while VLAN 1 traffic is allowed to pass). Service commands are used in Ethernet modules to assign groups to 10/100 and Gigabit ports. The cas , das , mas , and vas commands create, delete, modify, and view trunk service[...]
-
Page 436
Page 16-6 Since spanning tree is group based, the physical port in the above diagram participates in three spanning tree instances: one for untagged traffic and two for 802.1Q tagged traffic. Both types of frames can now pass through the same port. ♦ Important Notes ♦ Since a trunk is a service, and Alcatel switches have a 16 (10/100) or 15 (Gi[...]
-
Page 437
Assigning an 802.1Q Group to a Port Page 16-7 Assigning an 802.1Q Gr oup to a P ort Previous versions of the Omni Switch/Router (version 4.0 and earlier) only allowed for single spanning tree configured 802.1Q groups using the addqgp , viqgp , and delqgp menu commands. These commands were invalidated in the 4.1 release and replaced by the cas , mas[...]
-
Page 438
Assigning an 802.1Q Group to a Port Page 16-8 Configuring 802.1Q on 10/100 Ethernet P orts Use the cas command to assign 802.1Q groups to 10/100 ports. To use this command, follow the steps below. 1. Enter cas at the system prompt, as shown: cas <slot>/<port> where <slot> is the slot of the module, and <port> is the port nu[...]
-
Page 439
Assigning an 802.1Q Group to a Port Page 16-9 The following sections describe the parameters shown in the screen on the preceding page. Description A textual description (up to thirty characters) for the service created when adding the port to a group. Group ID The number of the group to which the port is to be added. Ta g A simple identifier that [...]
-
Page 440
Assigning an 802.1Q Group to a Port Page 16-10 For example, suppose that Port 3/1 is assigned to be in Group 2, and to use single spanning tree. If the port were to be assigned to another group, it would automatically set itself to use single spanning tree for that group as well. When you set the Mode of the service, the cas screen changes to accom[...]
-
Page 441
Assigning an 802.1Q Group to a Port Page 16-11 Configuring 802.1Q on Gigabit Ethernet P orts Use the cas command to assign 802.1Q groups to Gigabit ports. To use this command, follow the steps below. 1. Enter cas at the system prompt, as shown: cas <slot>/<port> where <slot> is the slot of the module, and <port> is the port[...]
-
Page 442
Modifying 802.1Q Groups Page 16-12 Modi fying 802.1Q Groups 802.1Q groups for both 10/100 and Gigabit Ethernet ports can be modified using the mas command. The procedure is slightly different in each case. The screens for the mas command change, depending on whether you have a legacy Ethernet board or a Kodiak ASIC-based Ethernet board. Modi fying [...]
-
Page 443
Modifying 802.1Q Groups Page 16-13 The ESX-K and GSX-K modules can also remap incom- ing priority on an ingress port. If priority remapping has been configured, the new priority will be carried across the backplane. The priority information is used to queue the packet, and is sent out in the packet if the egress port is tagged. Remember to save the[...]
-
Page 444
Modifying 802.1Q Groups Page 16-14 Modi fying 802.1Q Groups for Gigabit Ethernet P orts To modify the configuration of an 802.1Q group for Gigabit ports, use the mas command as shown: mas <slot>/<port> <instance> where <slot> is the slot number of the module on the switch, <port> is the port number where the service wa[...]
-
Page 445
Modifying 802.1Q Groups Page 16-15 Remember to save the changes to the service by entering save at the system prompt when finished. To find the instance of a port service, use the vas command. See Viewing 802.1Q Groups in a Port on page 16-16 for more information. ♦ Note ♦ Tags (field number 1 ) do not apply if proprietary tagging is used on th[...]
-
Page 446
Viewing 802.1Q Groups in a Port Page 16-16 Vie wing 802.1Q Groups in a P ort To view which ports use which 802.1Q groups, enter the vas command at the system prompt, as shown: vas <slot>/<port> where <slot> is the slot number of the module on the switch and <port> is the port number where the service was created. For example[...]
-
Page 447
Viewing 802.1Q Statistics for 10/100 Ports Page 16-17 Vie wing 802.1Q Statistics for 10/100 P orts The viqs command provides a display of statistics for 802.1Q groups assigned to 10/100 ports. Enter the viqs command, as shown: viqs <slot>/<port> <groupId> where <slot> is the slot number of the module on the switch, <port&[...]
-
Page 448
Deleting 802.1Q Groups from a Port Page 16-18 Deleting 802.1Q Gr oups from a P ort 802.1Q groups for both 10/100 and Gigabit Ethernet ports can be deleted using the das command. The procedure is slightly different in each case. To delete an 802.1Q group from a 10/100 port using single spanning tree, use the das command, as shown: das <slot>/&[...]
-
Page 449
Page 17-1 17 Configuring Bridging P ar ameter s This chapter describes how to configure and maintain bridging parameters. Bridges are devices that interconnect LANs using one (or more) of the available standards such as trans- parent bridging, source route bridging, or source route to transparent bridging. Bridges prima- rily operate at Layer 2 of[...]
-
Page 450
Page 17-2 • Source Route to Transparent Bridging . Used in mixed Ethernet and Token Ring environ- ments, this protocol provides easy translation between transparent and source route bridg- ing. A mixed ethernet and token ring environment is shown in the diagram below: Spanning tree and fast spanning tree are also used to prevent physical loops in[...]
-
Page 451
Configuration Overview Page 17-3 Configur ation Overvie w When configuring bridging parameters, you will need to perform at least some of the following steps: Step 1. Select a group The bridging menu commands operate only on the currently selected group (or, for certain commands, VLAN). You can select a group with the selgp command. For informatio[...]
-
Page 452
Bridge Management Menu Page 17-4 Bridge Management Menu To view the Bridge Management Menu, enter the br command at the system prompt. If you are in verbose mode, the following table appears outlining the commands available to you. If you are not in verbose mode, enter a ? at the prompt to display the Bridge Management Menu. Command Bridge Manageme[...]
-
Page 453
Bridge Management Menu Page 17-5 Bridging Commands . These commands allow you to view bridge forward tables, create and view static address tables, display bridge port statistics, view MAC address information, view remote trunking stations, and view the domain bridge mapping table. Commands in this section include fwt , fs , fc , bps , macinfo , ma[...]
-
Page 454
Bridge Management Menu Page 17-6 Configuring Fast Spanning Tree . These commands allow you to configure and view Fast Spanning Tree for a specific group or VLAN, and include the actfstps and fstps commands. Information is also included on configuring the Truncating Tree Timing and Speedy Tree Protocol features. For more information, see: • Config[...]
-
Page 455
Selecting a Default Group Page 17-7 Selecting a Default Gr oup Most commands in the Bridge Management Menu allow you to specify a group when entering the command at the system prompt. If you do not specify a group when entering a command, the bridge operations are performed on the currently selected group. ♦ Note ♦ You can view the current grou[...]
-
Page 456
Bridging Commands Page 17-8 Bridging Commands The Bridge Management menu provides several commands that are useful in pinpointing problems in the network. The commands allow you to lookup specific MAC addresses and where they were learned, create and view static bridge addresses, view information on remote trunking stations, view MAC address statis[...]
-
Page 457
Bridging Commands Page 17-9 Field Descriptions The following section explains the fields displayed with the fwt command. Sl/In/Srvc/In . The slot number ( Sl ), interface (port) number ( In ), type of service ( Src ), and service instance ( In ). For example, a bridge service on port 1 of slot 3 would be: 3/1/Brg/1 Services provide connection optio[...]
-
Page 458
Bridging Commands Page 17-10 Configuring a Static Bridge Addr ess You can configure static bridge address information by entering the fc command. A static bridge address is a fixed MAC address bridge that does not change or age out. To configure a static MAC address follow these steps: 1. Enter the fc command as follows: fc <groupNumber> whe[...]
-
Page 459
Bridging Commands Page 17-11 Field Descriptions The following section describes the fields in the fc command table. Index. A number assigned to the row to identify a previously created static bridge address, when modifying the address. MAC address. The canonical MAC address for this static bridge. Slot/Intf/Service/Inst. The slot number, interface [...]
-
Page 460
Bridging Commands Page 17-12 2. To modify an entry, use the index number for the specific static bridge address (listed in the leftmost column), the column letter for the column you want to change, an equal sign, and a new value. For example, to change the Static Status of the first address’s in the table from permanent to deleteOnReset , you wou[...]
-
Page 461
Bridging Commands Page 17-13 Displaying Static Bridge Addr esses You can view static bridge address information by entering the fs command. To display the information, enter the fs command as follows: fs <group number> where <group number> is the number of the group for which you want to view static bridge MAC addresses. For example, to[...]
-
Page 462
Bridging Commands Page 17-14 Displaying Bridge P ort Statistics You can display statistics on bridge ports with the bps command. To view bridge port statis- tics enter the bps command as follows: bps <group number> where <group number> is the number of the group for which you want to view bridge port statistics. For example, to view sta[...]
-
Page 463
Bridging Commands Page 17-15 Field descriptions The following section describes the fields displayed in the above table. Frames discarded to full Forwarding Database . The number of frames that were not transmitted because the forwarding database is full. The forwarding database holds all known MAC address for this bridge and is used to learn the n[...]
-
Page 464
Bridging Commands Page 17-16 Displaying Media Access Contr ol (MA C) Information for a Specific MA C address Media Access Control (MAC) information for the switch can be examined by using the macinfo command. You can view specific MAC address information, or choose a slot and view all MAC addresses associated with the selected slot. To view MAC in[...]
-
Page 465
Bridging Commands Page 17-17 Displaying Media Access Contr ol (MA C) Information for all MA C addresses Media Access Control (MAC) information for the switch can be examined by using the macinfo command. You can view all MAC addresses associated with the selected slot. To view MAC information for all addresses: 1. Enter macinfo at the system prompt[...]
-
Page 466
Bridging Commands Page 17-18 Field Descriptions The following section describes the fields displayed using the macstat command. Slot . The slot number of the switch to which the MAC address statistics apply. Discarded . The number of MAC addresses that have been discarded on this slot due to the CAM being full. Aged . The number of MAC addresses th[...]
-
Page 467
Bridging Commands Page 17-19 2. The following prompt is shown: Enter service’s Slot/Station (return for all services): Enter the slot and station (port) number for the local switch for which you wish to view remote trunking services. For example, to list the trunking station at port 1 of slot 3, you would enter: 3/1 If you do not enter a specific[...]
-
Page 468
Bridging Commands Page 17-20 3. A screen similar to the following is shown: DOMAIN BRIDGE MAPPING Group 2 Destination MAC Group ID Age Slot / Intf Domain MAC 00:20:da:7d:ef:44 2 14 8 / 1 00:20:da:6c:fb:85 00:20:da:7d:ef:45 2 120 8 / 1 00:20:da:6c:fb:85 00:20:da:7d:ef:46 2 220 8 / 1 00:20:da:6c:fb:86 Field Descriptions The fields displayed by the db[...]
-
Page 469
Setting Flood Limits Page 17-21 Setting Flood Limits The flood limit is the number of bytes per second of flooded data that may be transmitted on a port on a group. This limit is a mechanism for controlling broadcast storms on the network. The default flood limit for a port, regardless of the media type, is 192,000 bytes per second. You can change [...]
-
Page 470
Setting Flood Limits Page 17-22 Displaying Group Flood Limits The fls command allows you to view the current flood limits set for groups. The limits are set using the flc command. To display flood limits for all Groups, enter fls <groupNumber> where <groupNumber> is the number of the group for which you are viewing the flood limit. For [...]
-
Page 471
Configuring Spanning Tree Page 17-23 Configuring Spanning T ree Spanning Tree is an algorithm developed to help prevent the occurrence of broadcast storms in a network. A packet can be broadcast multiple times in a network if the network is physi- cally configured with loops. If packets are broadcast to all ports (or flooded) in an attempt to deli[...]
-
Page 472
Configuring Spanning Tree Page 17-24 • IBM SRT bridges send an IEEE-style STE RIF over Token Ring networks. The Omni Switch/Router does not support this frame, and any frame of this type received by the switch is discarded. • The OmniSwitch/Router does not support using the same Functional Address (FA) for both data and spanning tree frames. Th[...]
-
Page 473
Configuring Spanning Tree Page 17-25 Configuring Spanning T ree P arameter s The stc command allows you to configure parameters for the spanning tree, and enable or disable the Fast Spanning Tree feature for a VLAN. To configure these parameters: 1. Enter the stc command as follows: stc <groupNumber> where <groupNumber> is the number o[...]
-
Page 474
Configuring Spanning Tree Page 17-26 4. The following prompt is displayed asking whether you would like to use the Fast Spanning Tree feature: Fast Spanning Tree is OFF for this Group, set to ON? (y/n) : Enter n to leave Fast Spanning Tree disabled, or y to enable Fast Spanning Tree, and press <return> . Answering Yes ( y ) changes the settin[...]
-
Page 475
Configuring Spanning Tree Page 17-27 8. The following prompt is displayed allowing you to set the Bridge Forward Delay: New Bridge Forward Delay (4..30 secs) (current value is 4) : Enter the Forward Delay Time as a number between 4 and 30, or press <return> to accept the default listed in parenthesis. This time value controls how fast a port [...]
-
Page 476
Configuring Spanning Tree Page 17-28 Display Spanning Tr ee Bridge P arameter s The sts command allows you to display spanning tree bridge parameters. To display spanning tree parameters, enter the sts command as shown: sts <groupNumber> where <groupNumber> is the number of the group in the switch for which you want to view spanning tre[...]
-
Page 477
Configuring Spanning Tree Page 17-29 Designated Root. The bridge identifier of the root of the spanning tree as determined by the spanning tree protocol. It is created by concatenating the root bridge Priority with its six-byte MAC address. Cost to Root Bridge. The cost of the path to the root bridge as seen from this bridge. Cost represents the di[...]
-
Page 478
Configuring Spanning Tree Page 17-30 Configuring Spanning T ree P ort P arameter s The stpc commands allows you to configure port parameters (as opposed to bridge parame- ters) for spanning tree. To configure port parameters 1. Enter the stpc command as shown: stpc <groupNumber> where <groupNumber> is the number of the group in the swi[...]
-
Page 479
Configuring Spanning Tree Page 17-31 Field Descriptions The following section explains the fields displayed by the stpc command. Index A number assigned as an identifier for the port. Slot/Intf/Service/Inst The slot number ( Slot ), interface (port) number ( Intf ), type of service ( Service ), and service instance ( Inst ). For example, a bridge s[...]
-
Page 480
Configuring Spanning Tree Page 17-32 Manual Mode Allows you to manually set the state for each port (forwarding or blocking) or defer the port’s state configuration to the spanning tree protocol, which will either be IEEE 802.1d or IBM. This column is especially helpful if you are using the IBM Spanning Tree protocol with non- Token Ring (e.g., F[...]
-
Page 481
Configuring Spanning Tree Page 17-33 Field Descriptions The following section explains the fields displayed by the stps command. Slot/Intf . The slot and interface (port) number of the port. Service/Inst . The service type and instance of the service connected to the port. Pri. The value (from 0 to 256) of the priority of the port, 0 being the high[...]
-
Page 482
Configuring Fast Spanning Tree Page 17-34 Configuring F ast Spanning Tr ee The Fast Spanning Tree (Rapid Reconfiguration) feature is designed to help provide an 802.1D standards-based method of quick recovery in the event of link, port and device failures in an Ethernet local area network. By automatically identifying and utilizing alternative sec[...]
-
Page 483
Configuring Fast Spanning Tree Page 17-35 Truncating T ree Timing & Speedy T ree Pr otocol Two additional enhancements are also included with the Fast Spanning Tree feature for improved performance: Truncating Tree Timing and Speedy Tree Protocol. Truncating T ree Timing Truncating Tree Timing allows Designated Ports attached to Point-to-Point [...]
-
Page 484
Configuring Fast Spanning Tree Page 17-36 Displaying Fast Spanning T ree P ort P arameter s The fstps command allows you to view the current Fast Spanning Tree port parameters on a selected group or VLAN . To view the port parameters, enter the fstps command as shown: fstps <groupNumber> where <groupNumber> is the number of the group in[...]
-
Page 485
Configuring Fast Spanning Tree Page 17-37 Role. The port’s current role as defined by application of the fast spanning tree protocol. The Role values include: DISABLED The port has been disabled. ROOT The Root Port on a Bridge has the best path to the Root Bridge, and connects the Bridge to the Root Bridge. DESIGNATED The Designated Port on a Bri[...]
-
Page 486
Configuring Fast Spanning Tree Page 17-38 Enabling Fast Spanning T ree P ort P arameter s The actfstps command allows you to activate Fast Spanning Tree port parameters on a selected group or VLAN . To enable Fast Spanning Tree, enter the actstps command as shown: actfstps <groupNumber> where <groupNumber> is the number of the group in [...]
-
Page 487
Configuring Fast Spanning Tree Page 17-39 Disabling Fast Spanning T ree P ort P arameter s The actfstps command allows you to disable Fast Spanning Tree port parameters on a selected group or VLAN . To disable Fast Spanning Tree, enter the actstps command as shown: actfstps <groupNumber> where <groupNumber> is the number of the group in[...]
-
Page 488
Configuring Source Routing Page 17-40 Configuring Sour ce Routing The srs and src commands allow you to display and configure the source routing parameters for the selected group. SAP Filtering The Service Advertising Protocol (SAP) filter is a method for allowing the user to decide what type of source routed packets are allowed to be transmitted [...]
-
Page 489
Configuring Source Routing Page 17-41 Disabling SAP filtering To disable the SAP feature, use the srsf command as shown: 1. Enter the srsf at the system prompt. 2. The following message is displayed: SAP Filter support is ON, set it to OFF? (n) : Enter y and press <return> . 3. The following message is displayed: Remove all SAP Filter values[...]
-
Page 490
Configuring Source Routing Page 17-42 4. Press <return> . The second deny filter prompt is displayed: Output SAP Deny Filter 2 (0000): Enter the SAP value that the first deny filter should screen. Any packet matching this filter will be rejected. Excepting the default of 0000 is the same as not having a filter. 5. Press <return> . The f[...]
-
Page 491
Configuring Source Route to Transparent Bridging Page 17-43 Configuring Sour ce Route to Tr ansparent Bridging In order to provide switching between source-routed token ring networks supporting the IBM Spanning Tree, and transparently bridged networks (primarily Ethernet supporting 802.1d Spanning Tree), commands have been provided in the bridging[...]
-
Page 492
Configuring Source Route to Transparent Bridging Page 17-44 Enabling SRTB for a Gr oup The srtbcfg command allows you to display configured groups and the status of SRTB (either on or off ), and to enable or disable SRTB for a specific group. To display groups and the status of SRTB: 1. Enter the srtbcfg command at the system prompt, as shown srtbc[...]
-
Page 493
Configuring Source Route to Transparent Bridging Page 17-45 6. Once you have selected the frame type, you are returned to the menu prompt. By reenter- ing the srtbcfg command as you did in step 1, you can now see that SRTB has been acti- vated for group 1, as shown: Group 1: SRTB is ON Default Explorer: STE Ethernet Ring ID: 871(x321) Group 2: SRTB[...]
-
Page 494
Configuring Source Route to Transparent Bridging Page 17-46 Viewing the RIF T able A Routing Information Field (RIF) is stored for each MAC address learned on a token ring port. One RIF is stored for each MAC address. The maximum size of each RIF is 32 bytes (long enough to traverse 15 bridge hops) Once a RIF is learned for a MAC address, it is mai[...]
-
Page 495
Configuring Source Route to Transparent Bridging Page 17-47 Clearing the RIF T able If there is a topology change in your network, you most likely will need to clear one or more RIFs from the table so that SRTB can relearn them. You can clear specific entries for MAC addresses in the RIF table, or flush the entire table with the srtbclrrif command.[...]
-
Page 496
Configuring Source Route to Transparent Bridging Page 17-48[...]
-
Page 497
Page 18-1 18 Configuring Fr ame T r anslations An y-to-Any Switching Because the Omni Switch/Router is a LAN switch that carries frames from multiple media types on its backplane fabric, it offers the facility to switch frames from any media to any other media. For example, an Ethernet frame onto a Token Ring. This feature is referred to as Any to[...]
-
Page 498
Any-to-Any Switching Page 18-2 In order to understand why these options and limitations arise and to better understand the configuration options available, it is advisable to understand as background the theory of operation of any to any switching. This material is also required if you are trying to deter- mine the applicability of any to any switc[...]
-
Page 499
Translating the Frame Page 18-3 T ranslating the Fr ame In order to discuss these issues independent of particular media and protocols, consider that every frame, of any protocol, on any media, consists of the following parts. The Essential Parts of Frame MA C Header Consists of a source and destination address specifying the transmitting station i[...]
-
Page 500
The MAC Header Page 18-4 The MA C Header The format and values defined for the MAC header are covered in the media standards but even here a variety of choices which are dictated by the upper layer protocol can be found. Canonical ver sus Non-Canonical The first requirement of the switch transformation is the bit ordering of the address fields. For[...]
-
Page 501
The RIF Field Page 18-5 The RIF Field The same source routing standard is supported by FDDI and Token Ring so the RIF fields can be switched without problems between these media. Ethernet does not support source routing thus frames with RIF fields cannot be switched onto these media. However, if you enable “RIF Stripping” you can switch source [...]
-
Page 502
Encapsulation Page 18-6 Encapsulation Encapsulation is the biggest problem for implementing a transformation algorithm in support of any to any switching. All of the media provide a choice of more than one encapsulation and not all encapsulations are available on all media. Additionally, the methodology of these encapsulations vary from protocol to[...]
-
Page 503
Encapsulation Page 18-7 The SNAP Conv ersion The intent of the 802.2 committee is that Ethertype frames are transformed to SNAP on cross- ing from Ethernet media to 802 media and restored to Ethertype in the reverse direction. The Omni Switch/Router could follow this rule for all protocols including IP; however, this would prevent AppleTalk interwo[...]
-
Page 504
Encapsulation Page 18-8 IPX Encapsulation Tr ansformation Rules For IPX the encapsulation problems described above are compounded by the introduction of a fourth encapsulation on Ethernet media. Novell introduced a frame format when the IEEE 802.3 standards committee produced its version of Ethernet which was incompatible with Ethernet. Novell plac[...]
-
Page 505
The Network Header Page 18-9 The N etwork Header There are essentially two requirements for the any to any switching transformation function to address the network header fields: • Network Address to MAC Address Mapping In every protocol there is a mechanism for mapping global network wide addresses to the MAC addresses required in the local broa[...]
-
Page 506
The Network Header Page 18-10 Given this model of implementation a station responding with an ARP on Ethernet which was switched to FDDI would result in the same representation of the MAC address in the ARP table of the router. The router would then use the bit swapped form in the MAC address of subsequent frames to the FDDI ring and the switch wou[...]
-
Page 507
Frame Size Requirements Page 18-11 Fr ame Size Requirements The frame size requirement for the different media cause two problem areas which have to be addressed by the any to any switching transformation function. • Ethernet has a minimum frame size requirement. This requires that padding is inserted on frames switched to it which are below the [...]
-
Page 508
Frame Size Requirements Page 18-12 MTU Handling Routers address the problem of maximum frame size limitations with the notion found in many protocols of a Maximum Transmission Unit (MTU) size. Protocols use this notion in two possible ways. • PDU Fragmentation/Reassembly The router is configured with the MTU of each port. If a frame that is too l[...]
-
Page 509
Banyan Vines Page 18-13 Ban yan Vines Banyan Vines supports Ethernet, FDDI, and Token Ring networks. Each type of network generates a different frame format, so the Omni Switch/Router performs translations for frames moving from one network type to another. The Banyan Vines protocol only uses one frame format per network type—no user configuratio[...]
-
Page 510
Configuring Encapsulation Options Page 18-14 Configuring Encapsulation Options You will configure frame encapsulation based on the destination MAC address or the destina- tion switch port. Whether a frame is encapsulated based on the destination MAC or the port depends whether the frame has a unicast, multicast, or broadcast destination. Forw ardi[...]
-
Page 511
Configuring Encapsulation Options Page 18-15 “Nativ e” ver sus “Non-N ative” on Ethernet For the Ethernet one further distinction is made. If the frame received from the backplane is an Ethernet media type frame from another Ethernet switching module in the same chassis, then no encapsulation translations are applied . Such frames are refer[...]
-
Page 512
The User Interface Page 18-16 The U ser Interface This chapter documents User Interface ( UI ) commands to configure encapsulation options. For documentation on Command Line Interface ( CLI ) commands to configure encapsulation options, see the Text-Based Configuration CLI Reference Guide . ♦ Important Note ♦ In Release 4.4 and later, the Omni [...]
-
Page 513
The User Interface Page 18-17 The addvp, modvp and cr gp Commands All of these commands include in their dialogue an Output Format question for ports and a subsidiary IEEE 802.2 Pass through option. The options offered are: • a default, • Ethertype, • SNAP and • LLC. Each of these represents a set of translation options for the IP and IPX p[...]
-
Page 514
The User Interface Page 18-18 Ethernet Factory Default T ranslations For Ethernet switching module ports the factory default is set to the following: FDDI Factory Default T ranslations For FDDI switching module ports the factory default is set to the following: Ethernet Media - Default Mode No translation is performed on outbound Ethernet frames wh[...]
-
Page 515
The User Interface Page 18-19 T oken Ring Factory Default T ranslations For Token Ring switching module ports the factory default is set to the following: A TM LANE Factory Default Tr anslations For ATM LAN Emulation service ports the factory default is set to the following: T oken Ring Media - Default Mode IP of any encapsulation is encapsulated S[...]
-
Page 516
The User Interface Page 18-20 The Ethertype Option This option can only be applied to Ethernet switching module ports. It is set to the following: Ethernet Media - Ethernet II Mode No translation is performed on outbound Ethernet frames where the inbound interface was Ethernet. IP frames are transmitted as Ethernet II frames. All IPX frames are tra[...]
-
Page 517
The User Interface Page 18-21 The SNAP Option This option can be applied to all media type ports and is set to the following: In the modvp or addvp commands for FDDI and Token Ring the only choices other than default are SNAP or LLC and the default must be one of these. As the factory default is SNAP with IPX 802.2 Pass through and the SNAP does no[...]
-
Page 518
The User Interface Page 18-22 A TM LANE - SNAP Mode All IPX frames are translated to SNAP unless they are already SNAP, in which case they are forwarded as is. All Ethertype or SNAP frames from Ethernet and SNAP frames from Token Ring or FDDI are translated to SNAP or left as SNAP. The exception is Banyan Vines frames from FDDI, which are translate[...]
-
Page 519
The User Interface Page 18-23 The LLC Option This option can be applied to all media type ports and is set to the following: In the modvp or addvp commands for FDDI and Token Ring the only choices other than default are SNAP or LLC and the default must be one of these. As the factory default is SNAP with IPX 802.2 Pass through and SNAP does not imp[...]
-
Page 520
The User Interface Page 18-24 Interaction with the ne w interface If the port to which these commands are being applied has been configured with the new interface commands its encapsulation will be displayed as SWCH in the vi command output. The user is alerted to this fact in these commands by the default response to the output format question in [...]
-
Page 521
The Switch Menu Page 18-25 The Switch Menu The switch menu contains commands that allow you to set translation options discussed earlier in this chapter. It also contains commands to change the default values. To view the switch menu, enter switch at the prompt. If you are in verbose mode, the follow- ing screen is displayed. Otherwise, type a ? at[...]
-
Page 522
The Switch Menu Page 18-26 Default Ethernet Tr anslations The ethdef allows you to set up default translations for all Ethernet ports. To do so: 1. Enter ethdef at the system prompt. The following screen displays: This will reset the default translations for Ethernet media to a new value. All Ethernet ports currently set to default will inherit the[...]
-
Page 523
The Switch Menu Page 18-27 Default FDDI T ranslations The fddidef command allows you to set up default translations for all FDDI ports. To do this: 1. Enter the fddidef command at the system prompt. The following screen displays: This will reset the default translations for FDDI media to a new value. All FDDI ports currently set to default will inh[...]
-
Page 524
The Switch Menu Page 18-28 ♦ Important Note ♦ The IP Translation Options allow only SNAP ( s ). The IPX translations allow SNAP ( s ), and LLC ( 2 ) for all frame types. The Ethertype ( e ) translation is not allowed for FDDI. The Ethernet 802.3 translation ( 3 ) is allowed only on incoming Ethernet 802.3 frames, which referred to as “FDDI ra[...]
-
Page 525
The Switch Menu Page 18-29 3. You change an outgoing frame type by entering its line number, an equal sign (=) and a frame type indicator ( e , s , 2 , or 3 ). The frame type indicators represent the following frames: e Ethernet II or Ethertype s SNAP 2 802.2 or LLC 3 Ethernet 802.3 For example, if you wanted to translate incoming IPX SNAP frames t[...]
-
Page 526
The Switch Menu Page 18-30 P ort Tr anslations The swch command allows you configure translations on a port-by-port basis. Its translation options are similar to those for ethdef , fddidef , and trdef . However, instead of applying transla- tions to all ports for a particular media type, swch applies translations only to the port you specify. To sp[...]
-
Page 527
The Switch Menu Page 18-31 5. When are done changing translations, enter save to save all your settings. If you enter quit , you will exit the swch command without saving your changes. Please note that valid translation options depend on the media type of the port. Ethernet ports allow all frame translation options, but FDDI and Token Ring ports ha[...]
-
Page 528
The Switch Menu Page 18-32 If the port selected is an Ethernet based port, something like the following would be displayed: Ethernet Statistics for Ethernet port 3/4/Brg/1 Received Good Octets 0 Transmitted Good Octets 0 Received Bad Octets 0 Total Octets 0 Received Unicasts 0 Transmitted Unicasts 0 Received Multicasts 0 Transmitted Multicasts 0 Re[...]
-
Page 529
The Switch Menu Page 18-33 Transmitted Broadcasts . The number of frames transmitted on this port whose destination address is the broadcast address. Note that these statistics merely indicate the format of the destination address of frames trans- mitted/received on this port, not that the addressed device and/or devices necessarily reside on that [...]
-
Page 530
The Switch Menu Page 18-34 Received Late Collision, Transmitted Late Collisions . A late collision is a collision which occurs in a frame when more than 64 bytes have been received/transmitted. On a correctly configured network, which doesn't exceed physical limits of size, impedance, station spacing, etc., stations should always collide withi[...]
-
Page 531
The Switch Menu Page 18-35 Displaying T oken Ring Switch Statistics In Release 3.4 and later, you can display statistics for the new generation of Token Ring modules known as “Bigfoot” (e.g., TSM-CD-16W, TSX-CD-16W, and TSX-C-32W). For exam- ple, if you want to display the switch statistics for a Token Ring port on Port 1 on Slot 4, enter: swch[...]
-
Page 532
The Switch Menu Page 18-36 Rx LLC Errored Octets . The total number of bytes received in bad LLC packets. The next group of statistics are the types of packets being transmitted and received. Rx Unicast Packets . The number of packets received on this port whose destination address is a unicast format. Tx Unicast Packets . The number of packets tra[...]
-
Page 533
The Switch Menu Page 18-37 the normal ring state or ring purge state to elect a new active monitor. Claim Token Packets . The total number of claim packets transmitted by this port. The next group describe error statistics for token, MAC, and LLC packets. Internal Errors . The total number of times this port detects a recoverable internal error. Li[...]
-
Page 534
The Switch Menu Page 18-38 Received 256_511 byte Pkts . The total number of packets received on this port that were at least 256 bytes (octets) long and less than or equal to 511 bytes long. Received 512_1023 byte Pkts . The total number of packets received on this port that were at least 512 bytes (octets) long and less than or equal to 1023 bytes[...]
-
Page 535
The Switch Menu Page 18-39 Any to An y MA C Tr anslations The swchmac command allows you to view the current frame translation settings for a given MAC address. Follow these steps: 1. Enter swchmac and the following prompt displays: Enter MAC address ([XXYYZZ:AABBCC] or return for none : 2. Enter the MAC for which you want to view translations. The[...]
-
Page 536
The Switch Menu Page 18-40 Default Autoencapsulation Autoencapsulation is a technique employed by AutoTracker software to learn the protocol and encapsulation type used by a source MAC address and automatically translate frames bound to that MAC address to the appropriate encapsulation type. Normally all devices attached to a switch port receive fr[...]
-
Page 537
Translational Bridging Page 18-41 T ranslational Bridging Translational Bridging enables internetworking between FDDI, Ethernet, and Token Ring LANs. There is no standard which encompasses this. The Omni Switch/Router’s features focus on bridging of frames between media and translating the MAC and LLC headers into the appropriate “native” fra[...]
-
Page 538
Dissimilar LAN Switching Capabilities Page 18-42 Dissimilar LAN Switching Capabilities Switching traffic between like media requires no changes to the frame, whereas switching traffic between unlike media requires some level of change to the frame. To fully explain the various changes possible we need to define the portion of the frame where change[...]
-
Page 539
Dissimilar LAN Switching Capabilities Page 18-43 Switching Between Ethernet LANs A cross a T runked Backbone Frames that are switched between like media across a Trunked backbone will only be trans- lated at the egress port of the egress Omni Switch/Router. For example in the figure below, frames switched from Station A to Station B will be transla[...]
-
Page 540
Dissimilar LAN Switching Capabilities Page 18-44 Switching Between Similar LANs acr oss a Nativ e Backbone Switched traffic between similar LANs across a non-trunked or native backbone will have translations performed at each egress point. In the figure below, for traffic originating from Station A destined to Station B, point 1 represents the ingr[...]
-
Page 541
Dissimilar LAN Switching Capabilities Page 18-45 The following table shows interoperability between dissimilar LANs with two switches where the client and server are resident on like media types and the connection is switched over various LAN backbone types. This table is representative of the IP and IPX protocol only. Dissimilar LANs Backbone Toke[...]
-
Page 542
Dissimilar LAN Switching Capabilities Page 18-46[...]
-
Page 543
Page 19-1 19 Managing Gr oups and P orts In a traditional hub-based network, a broadcast domain is confined to a single network inter- face, such as Ethernet, or even a specific physical location, such as a department or building floor. In a switch-based network, such as one comprised on Omni Switch/Routers, (OmniS/Rs) a broadcast domain—or Group[...]
-
Page 544
How Ports Are Assigned to Groups Page 19-2 Ho w P orts Are Assigned to Gr oups There are two methods for assigning physical OmniS/R ports to a Group. One method is static and requires manual configuration by the network administrator; the other method is dynamic and requires only the configuration of AutoTracker rules for port assignment to occur. [...]
-
Page 545
How Ports Are Assigned to Groups Page 19-3 How Dynamic P ort Assignment W orks Initially each port is assigned to the default Group. In this example, all three ports have work- stations that belong to three different IP subnets (130.0.0.0, 138.0.0.0, and 140.0.0.0). All three ports start out in the default Group. Group Mobility examines traffic com[...]
-
Page 546
How Ports Are Assigned to Groups Page 19-4 As the illustration below shows, the three ports are each moved from the default Group to a Group with a policy that matches the subnet address of the workstation attached to the port. AutoTracker IP address policies have been set up in Groups 2, 3, and 4. The ports are moved to the Group with policies mat[...]
-
Page 547
Mobile Groups Page 19-5 Mobile Gr oups Switch ports can be dynamically assigned to mobile groups through AutoTracker policies. Support for dynamic port assignment is one of the main differences between mobile groups and non-mobile groups. AutoTracker rules are assigned directly to a mobile group. In contrast, AutoTracker rules are assigned to the V[...]
-
Page 548
Mobile Groups Page 19-6 Turning Gr oup Mobility On or Off The gmstat command turns group mobility on or off for a Group that you specify. Essentially, you can change a non-mobile group into a mobile group and a mobile group back into a non-mobile group through gmstat . The group you specify must previously have been created through the crgp command[...]
-
Page 549
Mobile Groups Page 19-7 If you decided not to turn group mobility on, you would enter n at the group mobility prompt and the following message would display: Group Mobility Status unchanged Under standing P ort Membership in Mobile Gr oups Switch ports can belong to multiple mobile groups. A port becomes a member of a mobile group as long as one of[...]
-
Page 550
Mobile Groups Page 19-8 Secondary Group Switch ports and devices may become members of multiple mobile groups. A switch port starts in its default group, which initially is also its primary group. The primary group may change if the move_from_def variable is enabled. Any subsequent mobile groups to which a port gains membership beyond the primary g[...]
-
Page 551
Mobile Groups Page 19-9 How a De vice Is Dropped fr om the Default Mobile Group (def_group) If def_group is enabled.... The device that does not match any policies becomes a member of the default group. Default Group 1 Group 3 Why enable def_gr oup? • Ensure that all network devices will be a member of at least one mobile group. If def_group is d[...]
-
Page 552
Mobile Groups Page 19-10 How a P ort’s Primary Mobile Gr oup Changes (mov e_from_def) Default/Primary Port assigned to default group 1 or another group through crgp or addvp. Mobile Group 1 If mov e_from_def is enabled.... Device on port matches poli- cy in another mobile group (3). Group 3 becomes prima- ry group. Default Group 1 Primary Group 3[...]
-
Page 553
Mobile Groups Page 19-11 How a P ort Ages Out of a Mobile Gr oup (mov e_to_def) If the port is in “optimized mode,” then the MAC does not age out and the port would stay in the mobile group even if move_to_def is enabled. Default Port assigned to default group. Mobile Group If mov e_to_def is enabled.... Why enable mo ve_to_def? • Security. M[...]
-
Page 554
Mobile Groups Page 19-12 Configuring Switch-Wide Gr oup Mobility V ariables There are several switch-wide group mobility variables that you can configure through the gmcfg command. These variables control the status of group mobility on all groups in a switch as well as the use of the default group. These variables are illustrated through diagrams[...]
-
Page 555
Mobile Groups Page 19-13 By default the def_group variable is Enabled. If you want to disable it (devices that do not meet criteria for mobile group membership will not be part of any mobile group), then you need to indicate that choice at this prompt. The prompt will always show the current status of def_group and then ask if you want to change th[...]
-
Page 556
Mobile Groups Page 19-14 Viewing P orts in a Mobile Group The vpl command lists all the Groups in the switch currently configured as mobile Groups and the ports currently assigned to those Groups. Since ports are assigned to mobile groups dynamically, this display is helpful to find out which ports the switch already sees in each group. Ports will [...]
-
Page 557
Non-Mobile Groups and AutoTracker VLANs Page 19-15 N on-Mobile Groups and A utoTr acker VLANs Non-mobile Groups are comprised of physical entities—switch ports. Groups can span multi- ple switches, but they are still made up of physical ports that you can see and touch. But just as physically-based broadcast domains are limited, entirely port-bas[...]
-
Page 558
Non-Mobile Groups and AutoTracker VLANs Page 19-16 Spanning Tr ee and Non-Mobile Gr oups Each Group uses one Spanning Tree for bridging. The OmniS/R supports both 802.1d and IBM Spanning Tree protocols. The Spanning Tree state for the port is Forwarding. Ports that are in Blocked state, or in another non-Forwarding state, will not receive frames fr[...]
-
Page 559
Group and Port Software Commands Page 19-17 Gr oup and P ort Softwar e Commands Group and Virtual Port commands are part of the VLAN menu within the User Interface. Enter- ing vlan at any prompt displays the following menu: Command VLAN Management Menu gp View the list of Groups currently defined crgp Create a Group modvl Modify a VLANs configurati[...]
-
Page 560
Creating a New Group Page 19-18 Cr eating a Ne w Group There are several steps involved in creating a new Group. Note that some steps apply only to mobile groups. These steps are as follows: 1. Enter Basic Group Information, such as the Group number and type. This section starts on page 19-19. 2. Configure the Virtual Router Port (Optional). This s[...]
-
Page 561
Creating a New Group Page 19-19 Step 1. Entering Basic Gr oup Information a. Type crgp at any prompt. b. The following prompt displays: GROUP Number (5): By default the Group number you entered or the next available Group number is displayed in parentheses. Enter the Group number or accept the number shown in paren- theses. Each Group must have a u[...]
-
Page 562
Creating a New Group Page 19-20 f. The following prompt displays: Enable MPLS? (n): Multi-Protocol Label Switching (MPLS) must be enabled if this group is going to be used for machines in the network that communicate via MPLS. Answer n at this prompt and skip ahead to Step 2. Configuring the Virtual Router Port (Optional) on page 19-21. ♦ Note ?[...]
-
Page 563
Creating a New Group Page 19-21 Step 2. Configuring the Virtual Router P ort (Optional) You can now optionally configure the virtual router port that the default VLAN in this Group will use to communicate with other VLAN s. When you define a virtual router, a virtual router port for the default VLAN in the Group is created. If you do not define a [...]
-
Page 564
Creating a New Group Page 19-22 e. The following prompt displays: Description (30 chars max): Enter a useful description for this virtual IP router port using alphanumeric characters. The description may be up to 30 characters long. Press <Enter> . f. The following prompt displays: Disable routing? (n) : Indicate whether you want to disable r[...]
-
Page 565
Creating a New Group Page 19-23 Select the default framing type for the frames that will be generated by this router port and propagated over the default VLAN to the outbound ports. Set the framing type to the encapsulation type that is most prevalent in the default VLAN . If the default VLAN contains devices using encapsulation types other than th[...]
-
Page 566
Creating a New Group Page 19-24 k. After selecting to enable IPX , the following prompt displays: IPX Network: Enter the IPX network address. IPX addresses consist of eight hex digits and you can enter a minimum of one hex digit in this field. If you enter less than eight hex digits, the system prefixes your entry with zeros to create eight digits.[...]
-
Page 567
Creating a New Group Page 19-25 o. After selecting the RIP and SAP configuration, the following prompt displays the default router framing type options: Default router framing type for : { Ethernet Media: Ethernet II (0), Ethernet 802.3 LLC (1), Ethernet 802.3 SNAP (2), Novell Ethernet 802.3 raw (3), FDDI Media: fddi SNAP (4), source route fddi SNA[...]
-
Page 568
Creating a New Group Page 19-26 q. The following prompt displays: Enter a priority level (0...7)(0): Prioritizing VLANs allows to you set a value for traffic based on the destination VLAN of packets. Traffic with the higher priority destination will be delivered first. VLAN priority can be set from 0 to 7, with 7 being the level with the most prior[...]
-
Page 569
Creating a New Group Page 19-27 Step 3. Set Up Group Mobility and U ser Authentication A mobile group offers more flexibility than a non-mobile group. With a mobile group, ports are assigned dynamically to the group based on AutoTracker policies that you configure. In a non-mobile group, ports are statically defined and AutoTracker policies are ass[...]
-
Page 570
Creating a New Group Page 19-28 Step 4. Configuring Virtual P orts You can now enter configuration parameters for each switch port to be included in this Group. These configuration parameters include the bridging mode, output format type, and administrative state. In addition, if the port you are configuring is Ethernet (10/100 Mbps), you can also[...]
-
Page 571
Creating a New Group Page 19-29 d. The virtual port configuration menu displays: Modify Ether/8 Vport 2/8 Configuration 1) Vport : 9 2) Description : 3) Bridge Mode : Auto-Switched 31) Switch Timer : 60 4) Flood Limit : 192000 5) Output Format Type : Default (IP-Eth II, IPX-802.3) 6) Ethernet 802.2 Pass Through : Yes 7) Admin, Operational Status : [...]
-
Page 572
Creating a New Group Page 19-30 Auto-Switch . The default setting for all Ethernet ports. This mode is appropriate for dedi- cated connections requiring a switch-over to bridge mode when multiple devices are detected. A port in Auto-Switch mode will start in Optimized Device Switching mode (see description above). The port will remain in Optimized [...]
-
Page 573
Creating a New Group Page 19-31 4) Flood Limit The flood limit allows you to tune a virtual port to limit the flooding of broadcast, multi- cast, and unknown destination packets. This feature is useful for controlling broadcast storms on your network. While each network is different, in general the amount of flooded traffic represents a relatively [...]
-
Page 574
Creating a New Group Page 19-32 Output Framing Type on Physical Ports Note that for Ethernet, the default output format option is Ethernet II for IP frames and 802.3 for IPX frames. You can customize your frame translation settings even further through the Switch menu. The Switch menu allows you to set translations at the frame format level (i.e., [...]
-
Page 575
Creating a New Group Page 19-33 7) Admin, Operational Status Select whether to administratively enable or disable this port. When you enable the port, the port can transmit and receive data as long as a cable is connected and no physical or operational problems exist. When you disable a port, the port will not transmit or receive data even if a cab[...]
-
Page 576
Creating a New Group Page 19-34 Step 5. Configuring AutoT racker P olicies (Mobile Groups Only) When you have completed configuring mobile group and auto-activated LANE services, you can begin configuring AutoTracker policies for this mobile group. Instructions for configuring these rules can be found in Chapter 20, “Configuring Group and VLAN P[...]
-
Page 577
Creating a WAN Routing Group Page 19-35 Cr eating a W AN Routing Group After entering basic Group information as described in Step 1. Entering Basic Group Informa- tion on page 19-19, you should have answered Yes to the following prompt: Enable WAN Routing? (n): if you want to enable WAN Routing. WAN Routing Groups are treated differently than othe[...]
-
Page 578
Creating a WAN Routing Group Page 19-36 f. The following prompt displays: IP RIP Mode {Deaf (d), Silent (s), Active (a), Inactive (i)} (s): Define the RIP mode in which the virtual router port will operate. RIP (Router Information Protocol) is a network-layer protocol that enables the default VLAN in this Group to learn and advertise routes. The RI[...]
-
Page 579
Creating a WAN Routing Group Page 19-37 k. After entering a description, the following prompt displays: IPX RIP and SAP mode {RIP and SAP active (a) RIP only active (r) RIP and SAP inactive (i)} RIP and SAP triggered (t)} (a): Select how you want the IPX protocols, RIP (router internet protocol) and SAP (service access protocol), to be configured f[...]
-
Page 580
Viewing Current Groups Page 19-38 Vie wing Current Gr oups The gp command provides information on all currently defined Groups in a switch including Group number, network address, protocol type, and encapsulation type. You can obtain information on all groups in a switch by entering: gp A screen similar to the following displays: Group Network Addr[...]
-
Page 581
Viewing Current Groups Page 19-39 A second address is displayed below the Network address. For IP, this address is the IP Subnet Mask, which is normally derived from the default VLAN IP address class. For IPX , this address is the IPX Node Address. Proto/Encaps . For each Group or VLAN listed, the top field is the Protocol supported by this virtual[...]
-
Page 582
Modifying a Group or VLAN Page 19-40 Modi fying a Group or VLAN After creating a Group (through crgp ) or VLAN ( through cratvl , see Chapters 20 and 22 ) , you can change any of their parameters through the modvl command. In addition, if you did not set up a virtual router port ( IP or IPX ) during the initial Group or VLAN configuration, you can [...]
-
Page 583
Modifying a Group or VLAN Page 19-41 Viewing Y our Changes When you enter a change at the colon prompt, the modvl screen does not normally refresh. If you want to see the current Group or VLAN settings, including any changes you made, enter a question mark ( ? ) at the colon prompt. The modvl screen will refresh. Saving Y our Changes Once you have [...]
-
Page 584
Modifying a Group or VLAN Page 19-42 Enabling IP or IPX Routing If you enable IP or IPX routing by setting the corresponding modvl lines from N to Y , then the screen automatically refreshes with additional lines for the new router port parameters. All lines are set to router defaults. The router defaults are as follows: IP Router IP Network Addres[...]
-
Page 585
Deleting a Group Page 19-43 Deleting a Gr oup You can delete a Group as long as it does not contain any virtual ports. The default Group, Group #1, cannot be deleted. To delete a Group, enter rmgp followed by the Group number you want to delete. For example, if you wanted to delete Group 5, you would enter: rmgp 5 If the Group does not contain any [...]
-
Page 586
Adding Virtual Ports Page 19-44 A dding Virtual P orts You can add virtual ports to a Group at any time after the Group is created. The addvp command allows you to add one or more ports to a Group you specify. If you have used the crgp command to add virtual ports, then you will find the addvp command fields very famil- iar. To use addvp , enter th[...]
-
Page 587
Modifying a Virtual Port Page 19-45 Modi fying a Virtual P ort You can modify a virtual port through the modvp command. The modvp command is very similar to the addvp command and the port configuration phase of the crgp command. To use modvp , enter the command, followed by the Group number for the port, and the physical slot and port number for th[...]
-
Page 588
Deleting a Virtual Port Page 19-46 Deleting a Virtual P ort You can delete a virtual port from its existing Group by using the rmvp command. When you remove a virtual port, the port is moved to the default switch Group, Group #1, and all port parameters are reset to defaults except for the port name. For example, if you configured a port with a spe[...]
-
Page 589
Viewing Information on Ports in a Group Page 19-47 Vie wing Information on P orts in a Group The via command allows you to view port attachments associated with a specified Group or all Groups in a switch. Entering via displays summary information for all virtual ports in the switch. You can also display virtual interface attachments for a specific[...]
-
Page 590
Viewing Information on Ports in a Group Page 19-48 • Rtr Virtual router port • Brg Virtual bridge port • Tnk Virtual trunk port (used for WAN ) • T10 802.10 FDDI service port • FRT Frame Relay trunk port • Lne LAN Emulation service port • CIP Classical IP service port • Vlc VLAN Clusters ( X-LANE ) service port Protocol . The bridgi[...]
-
Page 591
Viewing Information on Ports in a Group Page 19-49 Admin Status . Indicates whether the port is administratively Enabled or Disabled . When Enabled , the port can transmit and receive data as long as a cable is connected and no physical or operational problems exist. When Disabled , the port will not transmit or receive data even if a cable is conn[...]
-
Page 592
Viewing Detailed Information on Ports Page 19-50 Vie wing Detailed Information on P orts The vi command displays detailed information about virtual ports. Entering vi displays information for all virtual ports in the switch. You can also display information for only ports in a specific Group by specifying the Group ID after the vi command. For exam[...]
-
Page 593
Viewing Detailed Information on Ports Page 19-51 The Instance ( Inst ) is an identifier of this type of service within the switch. For example, if more than one virtual router port is configured in the switch, then each “instance” of a router will be given a different number. The service number ( Srvc ) is port-specific. If a port has more than[...]
-
Page 594
Viewing Detailed Information on Ports Page 19-52 Oper . Indicates the current Operational Status of the port. The port will be Active ( Active ) or Inactive ( Inactv ). If the port is Active, then the port can pass data and has a good physical connection. If it is Inactive, then it may not have a good physical connection and it is not capable of pa[...]
-
Page 595
Viewing Port Statistics Page 19-53 Vie wing P ort Statistics The vs command displays transmit and receive statistics for ports in the switch. Entering vs displays statistics for all virtual ports in the switch. You can also display statistics for only ports in a specific Group by specifying the Group ID after the vs command. For example, to view st[...]
-
Page 596
Viewing Port Statistics Page 19-54 Service Type values are as follows: • Rtr Virtual router port • Brg Virtual bridge port • Tnk Virtual trunk port (used for WAN ) • T10 802.10 FDDI service port • FRT Frame Relay trunk port • Lne LAN Emulation service port • Vlc VLAN clusters ( X-LANE ) service port • CIP Classical IP service port T[...]
-
Page 597
Viewing Port Errors Page 19-55 Vie wing P ort Error s The ve command displays port error statistics for ports in the switch. Entering ve displays error statistics for all virtual ports in the switch. You can also display errors statistics for only ports in a specific Group by specifying the Group ID after the ve command. For example, to view errors[...]
-
Page 598
Viewing Port Errors Page 19-56 The Instance ( Inst ) is an identifier of this type of service within the switch. For example, if more than one virtual router port is configured in the switch, then each “instance” of a router will be given a different number. Buffer Discards In/Out . For transmit ( Out ) and receive ( In ), the number of frames [...]
-
Page 599
Port Mirroring Page 19-57 P ort Mirroring You can set up Port Mirroring for any pair of Ethernet (10 or 10/100 Mbps) within the same switch chassis. Ethernet ports supporting port mirroring include10BaseT ( RJ-45 ), 10BaseFL (fiber), 10Base2 ( BNC ), and 10Base5 ( AUI ) connectors. When you enable port mirroring, the active, or “mirrored,” port[...]
-
Page 600
Port Mirroring Page 19-58 where <slot> is the slot number of the module containing the mirrored port, and <port> is the port number of the mirrored port. For example, if the Admin Status of a port displayed as M 3 02 then you would know this port is mirroring traffic for Port 2 on the module in Slot 3. If a cable is not attached to the [...]
-
Page 601
Port Mirroring Page 19-59 Port Mirroring Using an External RMON Probe ♦ Important Note ♦ The Mirroring Port is not accessible from the NMS device. From the NMS station, the Mirroring Port will appear disabled or down. Mirrored Port Mirroring Port RMON probe frames from the Mirroring Port appear to come from the Mirrored Port when the NMS workst[...]
-
Page 602
Port Mirroring Page 19-60 Setting Up P ort Mirroring You set up port mirroring when you add or modify a port through the addvp or modvp commands. The switch software senses the type of port you are configuring, so it will only prompt you for port mirroring when configuring an Ethernet port. Follow the steps below to set up port mirroring. 1. Start [...]
-
Page 603
Port Monitoring Page 19-61 P ort Monitoring An essential tool of the network engineer is a network packet capture device. A packet capture device is usually a PC-based computer, such as the Sniffer ® , that provides a means for understanding and measuring data traffic of a network. Understanding data flow in a VLAN - based switch presents unique c[...]
-
Page 604
Port Monitoring Page 19-62 RAM Disk System for Data Captur e Files Port monitoring uses a RAM disk for fast temporary storage of data capture files. The RAM disk has a separate directory designation of /ram . RAM -based files are created in DOS-FAT format and they are displayed in UPPERCASE . You can copy files between the /ram disk system and the [...]
-
Page 605
Port Monitoring Page 19-63 Starting a P ort Monitoring Session (pmon) You enable a port monitoring session through the pmon command. To start a session, enter pmon followed by the slot and port number that you want to monitor. For example, to moni- tor a port that is the first port in the fourth slot of the switch, you would enter pmon 4/1 You can [...]
-
Page 606
Port Monitoring Page 19-64 If Y ou Chose Dump to Screen If you selected the Dump to screen option, then a real-time synopsis of the session displays on your terminal screen. The following shows an example of this data Enter 'p' to pause, 'q' to quit. Destination | Source | Type | Data --------------------------------------------[...]
-
Page 607
Port Monitoring Page 19-65 Ending a P ort Monitoring Session After you quit a port monitoring session, the default directory changes to /ram and the current files on the RAM drive are listed. The screen below shows an example of the display at the completion of a monitoring session. Port monitoring capture done. Current capture files listed: Curren[...]
-
Page 608
Port Mapping Page 19-66 P ort Mapping The OmniS/R began as an any-to-any switching device, connecting different LAN interfaces, such as Ethernet As networks grew and the traffic on them increased, a need arose for controlling some traffic, such as broadcasts. Virtual LAN s, or VLAN s, were introduced to segment traffic such that devices could only [...]
-
Page 609
Port Mapping Page 19-67 Port communication is uni-directional. A mapping between an ingress port and an egress port can only pass data from the ingress port to the egress port. To allow traffic to flow the from the egress port to the ingress port, it is necessary to create a new mapping. This configuration restricts each port to communication only [...]
-
Page 610
Port Mapping Page 19-68 Who Can T alk to Whom? The following matrix outlines which ports can communicate with each other in the example shown on the previous page assuming all ports are part of the same group or VLAN . A port can only communicate with ports in the opposite subset within the port mapping set. Port communication is uni-directional. A[...]
-
Page 611
Port Mapping Page 19-69 Creating a P ort Mapping Set Use the pmapcr command to create a port mapping set. Follow these steps: 1. Enter pmapcr at a system prompt. 2. The following screen displays: Port Map Configuration 1. Ingress List : 2. Egress List : Enter the ingress ports and egress ports for this map set. This is done by entering the line num[...]
-
Page 612
Port Mapping Page 19-70 Adding P orts to a P ort Mapping Set You can add ports to a port map set once it has been created using the pmapmod command. Follow these steps: 1. Enter the pmapmod command at a system prompt, as shown: pmapmod <pmap id> where <pmap id> is the map set number shown when the map set was created. (To view a list of[...]
-
Page 613
Port Mapping Page 19-71 Removing P orts from a P ort Mapping Set You can remove ports to a port map set once it has been created using the pmapmod command. Follow these steps: 1. Enter the modpmap command at a system prompt, as shown: pmapmod <pmap id> where <pmap id> is the map set number shown when the map set was created. (To view a [...]
-
Page 614
Port Mapping Page 19-72 Viewing a P ort Mapping Set You can view a port mapping set using the vpmap command. Enter the pmapv command as shown: pmapv <pmap id> where <pmap id> is the map set number shown when the map set was created. For example, to modify map set 5, you would enter the following: pmapv 5 The following screen is shown: P[...]
-
Page 615
Priority VLANs Page 19-73 Priority VLANs Prioritizing VLANs allows you to set a value for traffic based on the destination VLAN of pack- ets. Traffic with the higher priority destination will be delivered first. VLAN priority can be set from 0 to 7, with 7 being the level with the most priority. The following diagram illustrates this idea: In the a[...]
-
Page 616
Priority VLANs Page 19-74 Configuring VLAN Priority To configure the priority of a VLAN: 1. Enter the prty_mod command at the system prompt, as shown: prty_mod <groupId> where <groupId> is the group number associated with the VLAN whose priority is being set. For example, to modify the priority of the VLAN for Group 2, you would enter [...]
-
Page 617
Page 20-1 20 Configuring Gr oup and VLAN P olicies AutoTracker policies subdivide network traffic based on specific criteria. AutoTracker policies can be defined by port, MAC address, protocol, network address, user-defined, port binding, DHCP port, or DHCP MAC address policy. You can define multiple policies—also referred to as “rules”—fo[...]
-
Page 618
AutoTracker Policy Types Page 20-2 A utoTr acker P olic y Types You can define a maximum of 32 AutoTracker policies of each type per Group. There is no restriction on the number of rules you can define per AutoTracker VLAN , as long as the maxi- mum number of policies for the Group is not exceeded. A port or device is included in a mobile group or [...]
-
Page 619
AutoTracker Policy Types Page 20-3 You must specify a separate binding policy for each device, but you can specify an unlimited number of such policies. Binding policies take precedence over all other AutoTracker poli- cies. DHCP Port Policies . These policies are similar to standard port policies, but apply to switch ports to which DHCP client wor[...]
-
Page 620
Defining and Configuring AutoTracker Policies Page 20-4 Defining and Configuring A utoTr acker P olicies You can define AutoTracker policies by port, MAC address, protocol, network address, user definition, or port binding. You can define multiple policies for a mobile group or AutoTracker VLAN if you wish. A port or device is included in a mobil[...]
-
Page 621
Defining and Configuring AutoTracker Policies Page 20-5 Defining a P ort P olicy After you enter the Administrative Status, the following menu displays: Select rule type: 1. Port Rule 2. MAC Address Rule 21) MAC Address Range Rule 3. Protocol Rule 4. Network Address Rule 5. User Defined Rule 6. Binding Rule 7. DHCP PORT Rule 8. DHCP MAC Rule 81) D[...]
-
Page 622
Defining and Configuring AutoTracker Policies Page 20-6 Defining a MA C Addr ess P olicy After you enter the Administrative Status, the following menu displays: Select rule type: 1. Port Rule 2. MAC Address Rule 21) MAC Address Range Rule 3. Protocol Rule 4. Network Address Rule 5. User Defined Rule 6. Binding Rule 7. DHCP PORT Rule 8. DHCP MAC Ru[...]
-
Page 623
Defining and Configuring AutoTracker Policies Page 20-7 Defining a MA C Addr ess Range P olicy After you enter the Administrative Status, the following menu displays: Select rule type: 1. Port Rule 2. MAC Address Rule 21) MAC Address Range Rule 3. Protocol Rule 4. Network Address Rule 5. User Defined Rule 6. Binding Rule 7. DHCP PORT Rule 8. DHCP [...]
-
Page 624
Defining and Configuring AutoTracker Policies Page 20-8 Defining a Protocol P olicy After you enter the Administrative Status for this mobile group or AutoTracker VLAN , the following menu displays: Select rule type: 1. Port Rule 2. MAC Address Rule 21) MAC Address Range Rule 3. Protocol Rule 4. Network Address Rule 5. User Defined Rule 6. Binding[...]
-
Page 625
Defining and Configuring AutoTracker Policies Page 20-9 If you want to define a protocol other than IP , IPX , AppleTalk, or DECN et, you can do so by specifying an Ethernet type, or by specifying source and destination SAP (service access protocol) header values, or by specifying a SNAP (sub-network access protocol) type. The following three secti[...]
-
Page 626
Defining and Configuring AutoTracker Policies Page 20-10 Protocol Speci fied by Ether-Type a. To specify a protocol by Ethernet type, enter 5 at the Select Protocol: menu. The follow- ing prompt displays: Enter the Ether-type value in hex: b. Enter the desired Ethernet type in hex. You must enter two bytes of data. For exam- ple, enter 0800 to spe[...]
-
Page 627
Defining and Configuring AutoTracker Policies Page 20-11 Defining a Netw ork Addr ess P olicy After you enter the Administrative Status for this mobile group or AutoTracker VLAN , the following menu displays: Select rule type: 1. Port Rule 2. MAC Address Rule 21) MAC Address Range Rule 3. Protocol Rule 4. Network Address Rule 5. User Defined Rule [...]
-
Page 628
Defining and Configuring AutoTracker Policies Page 20-12 Set Up an IPX Addr ess a. To specify an IPX address, enter a 2 at the Select the Network Protocol: prompt. b. The following prompt displays: Enter the IPX Network Number: Enter an IPX network number to define the network devices you want included in the mobile group or AutoTracker VLAN . IPX [...]
-
Page 629
Defining and Configuring AutoTracker Policies Page 20-13 Defining Y our Own Rules A user-defined rule enables you to include all devices in the mobile group or AutoTracker VLAN that originate frames containing a specified pattern at a specified location. Each user- defined rule requires an Offset, a Value, and a Mask; you will be prompted for each[...]
-
Page 630
Defining and Configuring AutoTracker Policies Page 20-14 For example, if you enter FFEF as the value and FFFF as the mask: Hex Binary Value= FFEF = 1111 1111 1110 1111 Mask= FFFF = 1111 1111 1111 1111 When a bit in the mask is set to 1, the corresponding bit of the value must be literal. When a bit in the mask is set to 0, the corresponding bit in [...]
-
Page 631
Defining and Configuring AutoTracker Policies Page 20-15 Defining a P ort Binding P olicy Port binding polices require devices to match two or three criteria. The criteria can be one of six combinations: 1. The device can attach to a specific switch port and use a specific MAC address and use a specific protocol (IP or IPX). 2. The device can atta[...]
-
Page 632
Defining and Configuring AutoTracker Policies Page 20-16 After you indicate you want to set up rules for this mobile Group or AutoTracker VLAN (using the cratvl command) , the following menu displays: Select rule type: 1. Port Rule 2. MAC Address Rule 21) MAC Address Range Rule 3. Protocol Rule 4. Network Address Rule 5. User Defined Rule 6. Bindin[...]
-
Page 633
Defining and Configuring AutoTracker Policies Page 20-17 4. The following prompt displays: Enter the port in the form of slot/interface: Enter the switch port to which this device must be attached. If the device is not attached to this port, it will not be included in this mobile Group or AutoTracker VLAN. You should first enter the slot for the mo[...]
-
Page 634
Defining and Configuring AutoTracker Policies Page 20-18 If you want to define a protocol other than IP , IPX , AppleTalk, or DECN et, you can do so by specifying an Ethernet type, or by specifying source and destination SAP (service access protocol) header values, or by specifying a SNAP (sub-network access protocol) type. The following three sect[...]
-
Page 635
Defining and Configuring AutoTracker Policies Page 20-19 Protocol Speci fied by Ether-Type a. To specify a protocol by Ethernet type, enter 5 at the Select Protocol: menu. The follow- ing prompt displays: Enter the Ether-type value in hex: b. Enter the desired Ethernet type in hex. You must enter two bytes of data. For exam- ple, enter 0800 to spe[...]
-
Page 636
Defining and Configuring AutoTracker Policies Page 20-20 Defining a DHCP P ort P olicy DHCP port polices simplify network configurations requiring DHCP clients and servers to be in the same mobile group or AutoTracker VLAN. You can see how DHCP port policies were used in an application example on page 20-27. DHCP port policies differ fundamentally[...]
-
Page 637
Defining and Configuring AutoTracker Policies Page 20-21 Defining a DHCP MA C Addr ess P olicy You can see how DHCP MAC address policies were used in an application example on page 20-27. After you enter the Administrative Status for this mobile group or AutoTracker VLAN , the following menu displays: Select rule type: 1. Port Rule 2. MAC Address [...]
-
Page 638
Defining and Configuring AutoTracker Policies Page 20-22 Defining a DHCP MA C Addr ess Range P olicy You can see how DHCP MAC address policies were used in an application example on page 20-27. After you enter the Administrative Status for this mobile group or AutoTracker VLAN , the following menu displays: Select rule type: 1. Port Rule 2. MAC Ad[...]
-
Page 639
Viewing Mobile Groups and AutoTracker VLANs Page 20-23 Vie wing Mobile Groups and A utoTr acker VLANs You can view the current status of all mobile groups or AutoTracker VLANs in the switch using the atvl command. Enter atvl and a table similar to the following displays. VLAN VLAN VLAN Admin Operational Group : Id Description Status Status --------[...]
-
Page 640
Viewing Policy Configurations Page 20-24 Vie wing P olicy Configur ations Typing viatrl brings up the Policy Configuration Table, which shows the policies defined for the mobile Group or VLAN specified. VLAN VLAN Rule Rule Rule Rule Group : Id Num Type Status Definition ------------------------------------------------------------------------------[...]
-
Page 641
Viewing Virtual Ports’ Group/VLAN Membership Page 20-25 Vie wing Virtual P orts’ Group/VLAN Member ship You can view the VLAN membership of each virtual interface in the switch. For physical LAN ports, the virtual interface is the same as a virtual port. However, when multiple services are set up for a physical port, then each service has a vir[...]
-
Page 642
View VLAN Membership of MAC Devices Page 20-26 Vie w VLAN Membership of MA C De vices The fwtvl command displays a table of learned MAC addresses and the VLAN membership of those MAC addresses. Follow these steps to view this table. 1. Enter fwtvl . 2. The following prompt displays: Enter Slot/Interface (return for all ports) : Enter the slot and p[...]
-
Page 643
Application Example: DHCP Policies Page 20-27 Application Ex ample: DHCP P olicies This application example shows how Dynamic Host Configuration Protocol ( DHCP ) port and MAC address policies can be used in a DHCP -based network. DHCP is built on a client-server model in which a designated DHCP server allocates network addresses and delivers confi[...]
-
Page 644
Application Example: DHCP Policies Page 20-28 DHCP Server s and Clients DHCP clients must be able to communicate with a DHCP server at initialization. The most reli- able way to ensure this communication is for the server and its associated clients to share the same VLAN or mobile group. However, if the network configuration does not lend itself to[...]
-
Page 645
Application Example: DHCP Policies Page 20-29 12345678 123456 Omni Switch/Router Client 1 DHCP Port Rule Client 2 DHCP Port Rule Client 3 DHCP Port Rule Client 4 DHCP Port Rule Client 5 DHCP Port Rule Server 1 10.15.14.16 Server 2 10.13.15.17 Router 2 Bootp Relay On Group 3 DHCP P ort and MA C Rules Router 1 No Bootp Relay Client 7 DHCP MAC Rule Cl[...]
-
Page 646
Application Example: DHCP Policies Page 20-30[...]
-
Page 647
Page 21-1 21 Inter switch Pr otocols This chapter describes Interswitch Protocols, which are used to discover adjacent switches, and track VLAN membership and retain mobile group information across switches. They include two new protocols and one existing protocol that is updated for release 4.0: • Mapping Adjacency Protocol ( XMAP ), a new proto[...]
-
Page 648
XMAP Page 21-2 XMAP The Mapping Adjacency Protocol ( XMAP ) is used to discover the topology of OmniS/Rs in a particular installation. Using this protocol, each switch determines which OmniS/Rs are adja- cent to it by sending and responding to Hello update packets. For the purposes of XMAP , adjacent switches are those that: • have a Spanning Tre[...]
-
Page 649
XMAP Page 21-3 XMAP Tr ansmission States XMAP switch ports are either in the discovery transmission state , common transmission state , or passive reception state . Ports transition to these states depending on whether or not they receive Hello responses from adjacent switches. ♦ Note ♦ All Hello packet transmissions are sent to a well-known MA[...]
-
Page 650
XMAP Page 21-4 Common Tr ansmission State In the common transmission state, ports detect adjacent switch failures or disconnects by sending Hello packets and waiting for Hello responses. Ports in this state send out Hello packets at a configurable interval (the default is 5 minutes) called the common transmission time . To avoid synchronization wit[...]
-
Page 651
Configuring XMAP Page 21-5 Configuring XMAP XMAP is active by default. In addition to disabling or enabling XMAP , you can view a list of adjacent switches or configure the timeout intervals for Hello packet transmission/reception. Enabling or Disabling XMAP To display whether or not XMAP is active or inactive, or to activate or deactivate XMAP , [...]
-
Page 652
Configuring XMAP Page 21-6 A visual illustration of these connections is shown here: XMAP Network Example The fields in xmapls table are defined as follows: VPN . The local virtual port number which is connected to an adjacent switch. Rem Switch ID . The MAC address of the MPX in the adjacent switch. Rem VPN . The remote virtual port number in the [...]
-
Page 653
Configuring XMAP Page 21-7 A message similar to the following displays: XMAP Discovery Phase Timeout Interval is 30 seconds. To change the interval, enter the command with the desired value (any value between 1 and 65535). For example: xmapdisctime 20 A message similar to the following displays: XMAP Discovery Phase Timeout Interval is 20 seconds. [...]
-
Page 654
VLAN Advertisement Protocol (VAP) Page 21-8 VLAN A dvertisement Pr otocol (V AP) The VLAN Advertisement Protocol ( VAP ) is an interswitch protocol that keeps the VLAN membership databases stored on switches in sync and enables the auto-discovery of network nodes. VAP is useful when you want all VLAN s to communicate over a backbone, but do not wan[...]
-
Page 655
VLAN Advertisement Protocol (VAP) Page 21-9 V AP and P ort P olicies One of the main purposes of VAP is to advertise the connectivity of devices attached to the switch via AutoTracker port policies. VAP eliminates the need to apply port policies to back- bones to ensure that connectivity is established and maintained. When you use port policies, al[...]
-
Page 656
GMAP Page 21-10 GMAP The Group Mobility Advertisement Protocol ( GMAP ) enables workstation users to move from port to port among interconnected switches and still retain all learned mobile group and protocol information. Using GMAP the switch sends a complete list of learned MAC addresses and associated group/protocol information to all interconne[...]
-
Page 657
GMAP Page 21-11 Configuring GMAP GMAP is inactive by default. In addition to enabling and disabling GMAP , you can configure the time between packet transmissions (when multiple packets are required for an update), the time between updates, and the length of time GMAP will retain its current information. Enabling and Disabling GMAP Use the gmapst [...]
-
Page 658
GMAP Page 21-12 Configuring the Interpacket Update Time Use the gmapupdtime command to display or change the time between sending updates. ♦ Note ♦ The switches avoid synchronization by jittering the update time by plus or minus one quarter of the config- ured interval. For example, if the default of 300 seconds is used, the jitter is plus or [...]
-
Page 659
GMAP Page 21-13 Displaying GMAP Statistics by MA C Addr ess To display GMAP statistics for all MAC addresses, use the gmapls command. The screen displays similar to the following: GMAP Table ================ MAC Address Protocol Group Src Switch ID Flags Timeout(sec) ------------------------ ------------- ----------- ------------------------ ------[...]
-
Page 660
GMAP Page 21-14[...]
-
Page 661
Page 22-1 22 Managing A utoT r acker VLANs In a large, flat, switched network, broadcast traffic can overload a network based primarily on port-based Groups. Through the use of AutoTracker VLAN s, you can control broadcast traffic such that it is forwarded only to those VLAN s where it needs to be sent. VLAN s are created within a Group to subdivid[...]
-
Page 662
The AutoTracker Menu Page 22-2 The A utoTr acker Menu All software commands for configuring AutoTracker policies and AutoTracker/multicast VLANs are in the AutoTracker menu. This menu is a submenu of the VLAN menu. You can access the AutoTracker menu by typing at any prompt. The menu displays as follows: Command Auto-Tracker Management Menu -------[...]
-
Page 663
AutoTracker VLANs Page 22-3 A utoTr acker VLANs AutoTracker VLAN s enable you to control communications between end stations in your network. You define policies that determine membership in the VLAN and AutoTracker auto- matically locates ports or devices within the Group that fit the policies and places them into the VLAN . You can define physica[...]
-
Page 664
AutoTracker VLANs Page 22-4 Network Address Policies . Network address policies enable you to define membership in the VLAN on the basis of network address criteria. For example, you can specify that all IP users with a specific subnet mask be included in the VLAN . Or, you can specify that all IPX users in a specific network address area using a c[...]
-
Page 665
AutoTracker VLANs Page 22-5 How De vices are Assigned to A utoTr acker VLANs When a broadcast frame, a multicast frame, or a unicast frame from an unknown device is received at a switching module, the frame is forwarded to the MPX for processing. Source learning logic on the MPX module examines the entire frame to determine the VLAN or VLAN s in wh[...]
-
Page 666
AutoTracker VLANs Page 22-6 Devices that Gener ate a Secondary Tr affic Type Source devices sometimes generate more than one traffic type; for example, a device could generate IP traffic primarily but also generate a secondary stream of AppleTalk. When a device generates secondary traffic that does not match any existing VLAN policy, that traffic [...]
-
Page 667
AutoTracker VLANs Page 22-7 How De vices are Assigned to A utoTr acker VLAN s (continued) Router Tr affic in IP and IPX Network A ddress VLAN s Prior to release 2.1, AutoTracker handled VLAN assignments for router traffic in IP and IPX network address VLAN s in the same manner as normal traffic. In release 2.1 and later, AutoTracker differentiates[...]
-
Page 668
AutoTracker VLANs Page 22-8 12345678 123456 VLAN 3 Network 3 Group 2 VLAN 2 Network 2 Device B Network 3 MAC address = B Device A Network 2 MAC address = A Interface for Network 2 MAC address = X Interface for Network 3 MAC address = Y ➋ ➍ Let’s say that the next transmission is a RIP update from the router interface for network 3. The source[...]
-
Page 669
AutoTracker VLANs Page 22-9 How De vices are Assigned to A utoTr acker VLAN s (continued) P ort P olicy Functionality In release 2.1 and later, AutoTracker’s VLAN port policy can be set to operate in either of two distinct modes: • In the original mode, wherein membership in all VLAN s active on a port is inherited by all devices connected to t[...]
-
Page 670
AutoTracker VLANs Page 22-10 12345678 123456 Omni Switch/Router 2 1 2 3 4 5 6 7 8 1 2 3 4 5 6 Omni Switch/Router 1 FDDI Backbone Group 1 Device D Slot 2 Port 2 Slot 2 Port 1 Device A Slot 3 Port 1 Original P ort P olicy Functionality (reg_port_rule = 1) Device Source P ort VLAN Membership A 3-1 2 and 3 B 2-1 2 C 2-2 3 D 3-1 2 and 3 Device Source P [...]
-
Page 671
AutoTracker VLANs Page 22-11 12345678 123456 Omni Switch/Router 2 1 2 3 4 5 6 7 8 1 2 3 4 5 6 Omni Switch/Router 1 FDDI Backbone Group 1 Device D Slot 2 Port 2 Slot 2 Port 1 Device A Slot 3 Port 1 Current P ort Polic y Functionality (reg_port_rule = 0) Device Source P ort VLAN Membership A 3-1 default VLAN #1 B 2-1 default VLAN #1 C 2-2 default VLA[...]
-
Page 672
AutoTracker VLANs Page 22-12 The U sefulness of P ort P olicies As has been explained – and as illustrated on page 22-10 – original port policy functionality is not well-suited to the creation of consistent VLAN membership in a multi-switch environment. Current port policy functionality – as illustrated on page 22-11 – neither contributes t[...]
-
Page 673
AutoTracker VLANs Page 22-13 So How Do I Get De vices Assigned to VLAN s Ov er a Backbone? The way to get devices assigned to VLAN s over a backbone is to define logical VLAN policies that so assign them. An example is shown on the facing page utilizing IP and IPX protocol policies. The network on the facing page uses port policies (and current por[...]
-
Page 674
AutoTracker VLANs Page 22-14 12345678 123456 Omni Switch/Router 2 1 2 3 4 5 6 7 8 1 2 3 4 5 6 Omni Switch/Router 1 FDDI Backbone Device D IP Device A IPX Slot 3 Port 1 Device Source P ort VLAN Membership A 3-1 2 B 2-1 2 C 2-2 3 D 3-1 3 Device Source P ort VLAN Membership A 2-1 2 B 3-1 2 C 3-1 3 D 2-2 3 Group 1 Slot 2 Port 1 Device B IPX Device C IP[...]
-
Page 675
AutoTracker VLANs Page 22-15 Frame Flooding in A utoTr acker VLANs Flooding occurs when a frame is received addressed to a device that is unknown to the switch or broadcast or multicast frames are received addressed to multiple users. In a typical bridged environment, the frame would be forwarded out all ports. However, this is not true with VLAN s[...]
-
Page 676
Creating AutoTracker VLANs Page 22-16 Cr eating AutoT racker VLANs You create AutoTracker VLAN s through the AutoTracker menu options. Creating an AutoTracker VLAN includes the following steps: A. Enter basic information such as the name and number for the VLAN . See Step A. Entering Basic VLAN Information on page 22-16 for instructions on this ste[...]
-
Page 677
Creating AutoTracker VLANs Page 22-17 5. The following prompt displays: Enter the Admin Status for this vlan (Enable (e) / Disable (d): Enter whether or not you want the Administrative Status for this VLAN to be enabled or disabled. Once enabled, the switch begins using the policies you defined. A disabled VLAN is still defined (name, number, polic[...]
-
Page 678
Creating AutoTracker VLANs Page 22-18 Step B . Defining and Configuring VLAN P olicies You can define AutoTracker policies by port, MAC address, protocol, network address, user definition, or port binding. You can define multiple policies for a AutoTracker VLAN if you wish. A port or device is included in a AutoTracker VLAN if it matches any one [...]
-
Page 679
Creating AutoTracker VLANs Page 22-19 Step C. Configuring the Virtual Router P ort (Optional) You can now optionally configure the virtual router port that this VLAN will use to communi- cate with other AutoTracker VLAN s. A virtual router port for the VLAN is created within the switch. If you do not define a virtual router port for this VLAN , de[...]
-
Page 680
Creating AutoTracker VLANs Page 22-20 7. The following prompt displays: Enable NHRP? (n) : Indicate whether you want to enable NHRP. 8. The following prompt displays: IP RIP Mode {Deaf (d), Silent (s), Active (a), Inactive (i)} (s): Define the RIP mode in which the virtual router port will operate. RIP (Router Information Protocol) is a network-lay[...]
-
Page 681
Creating AutoTracker VLANs Page 22-21 Default Framing Type and the Virtual Router Port 10. You can now configure IPX routing on this port. The following message displays: Enable IPX? (y) : Press <Enter> if you want to enable IPX Routing on this virtual router port. If you do not enable IPX , then this VLAN will not be able to internally route[...]
-
Page 682
Creating AutoTracker VLANs Page 22-22 13. After entering a description, the following prompt displays: IPX RIP and SAP mode {RIP and SAP active (a) RIP only active (r) RIP and SAP inactive (i)} (a): Select how you want the IPX protocols, RIP (router internet protocol) and SAP (service access protocol), to be configured for this VLAN . RIP is a netw[...]
-
Page 683
Creating AutoTracker VLANs Page 22-23 15. If you chose a Source Routing frame format in the last step (options 5, 7, 9, or b), the an additional prompt displays: Default source routing broadcast type : { ARE broadcasts(a), STE broadcasts(s)} (a) : Select how broadcasts will be handled for Source Routing. The choices are: ARE broadcasts . All Routes[...]
-
Page 684
Modifying an AutoTracker VLAN Page 22-24 Modi fying an AutoT racker VLAN After you set up a VLAN you can modify its Admin Status, description, rules, and the Admin Status of each of the rules. You use the modatvl command to modify a VLAN as follows: modatvl <Group Number>:<VLAN Number> You must specify the Group and VLAN numbers and the[...]
-
Page 685
Modifying an AutoTracker VLAN Page 22-25 Changing a VLAN’s Description 1. At the Option= prompt enter a 2 and press <Enter> . 2. The following prompt displays: Enter a new description: Type in the revised description for this VLAN . The description can be up to 30 characters long. Press <Enter> when you have completed the new descript[...]
-
Page 686
Modifying an AutoTracker VLAN Page 22-26 Changing the Admin Status for a VLAN P olicy 1. At the Option= prompt enter a 5 and press <Enter> . 2. The following menu displays: Enter rule number: The rule number is listed with other information on the VLAN just after you entered the modatvl command. Find the number corresponding to the rule you w[...]
-
Page 687
Viewing AutoTracker VLANs Page 22-27 Vie wing AutoT racker VLANs You can view the current status of all AutoTracker VLANs in the switch using the atvl command. Enter atvl and a table similar to the following displays. VLAN VLAN VLAN Admin Operational Group : Id Description Status Status --------------------------------------------------------------[...]
-
Page 688
Viewing Policy Configurations Page 22-28 Vie wing P olicy Configur ations Typing viatrl brings up the Policy Configuration Table, which shows the policies defined for the VLAN specified. VLAN VLAN Rule Rule Rule Rule Group : Id Num Type Status Definition ----------------------------------------------------------------------------------------------[...]
-
Page 689
Viewing Virtual Ports’ VLAN Membership Page 22-29 Vie wing Virtual P orts’ VLAN Membership You can view the VLAN membership of each virtual interface in the switch. For physical LAN ports, the virtual interface is the same as a virtual port. However, when multiple services are set up for a physical port, then each service has a virtual port. Ty[...]
-
Page 690
View VLAN Membership of MAC Devices Page 22-30 Vie w VLAN Membership of MA C De vices The fwtvl command displays a table of learned MAC addresses and the VLAN membership of those MAC addresses. Follow these steps to view this table. 1. Enter fwtvl . 2. The following prompt displays: Enter Slot/Interface (return for all ports) : Enter the slot and p[...]
-
Page 691
Creating a VLAN for Banyan Vines Traffic Page 22-31 Cr eating a VLAN for Bany an Vines Tr affic Banyan Vines uses a fixed encapsulation for each network interface. For this reason, it is straightforward to create a VLAN for Banyan Vines traffic. For Ethernet traffic, Banyan Vines uses Ethernet II encapsulation; Token Ring uses LLC ; FDDI uses SNAP[...]
-
Page 692
Creating a VLAN for Banyan Vines Traffic Page 22-32 8. The following prompt displays: Select Protocol: 1. IP 2. IPX 3. DECNET 4. APPLETALK 5. Protocol specified by ether-type 6. Protocol specified by DSAP and SSAP 7. Protocol specified by SNAP Enter protocol type (1): Enter a 5 to define a protocol by ether-type and press <Enter> . 9. The fol[...]
-
Page 693
Creating a VLAN for Banyan Vines Traffic Page 22-33 15. The following prompt displays Enter the DSAP value in hex: Enter bc as the destination service access protocol ( DSAP ) value and press <Enter> . 16. The following prompt displays: Enter the SSAP value in hex: Again, enter bc as the source service access protocol ( SSAP ) value and press[...]
-
Page 694
Creating a VLAN for Banyan Vines Traffic Page 22-34 22. The following prompt displays: Configure more rules for this vlan (y/n): Enter an N . You are done setting up rules for this VLAN . A prompt similar to the follow- ing displays: VLAN 1:2 created successfully 23. The following prompt displays: Enable IP (y): Enter an N . 24. The following promp[...]
-
Page 695
Page 23-1 23 Multicast VLANs Multicast VLANs enable you to control the flooding of multicast traffic in your network. For example, you can define a multicast VLAN for all users that want to receive CNN Newscasts or any other video feed or combination of feeds. You define the multicast traffic to be transmitted by specifying a multicast address. You[...]
-
Page 696
Page 23-2 How De vices are Assigned to Multicast VLANs If the recipients of the multicast traffic were defined using the port rule, each specified port is then marked as a member of the multicast VLAN . If the recipients of the multicast traffic were defined using the MAC address rule to specify the MAC addresses of the receiving devices, no action[...]
-
Page 697
Page 23-3 Frame Flooding in Multicast VLAN s Multicast traffic is flooded as follows in an environment that includes multicast VLAN s: • If the destination address is a multicast address, and • if the destination multicast address is in the filtering database, and • if the destination multicast address is a specified multicast address for a m[...]
-
Page 698
Creating Multicast VLANs Page 23-4 Cr eating Multicast VLANs You create multicast VLAN s through the AutoTracker menu options. Creating a multicast VLAN includes the following steps: A. Entering basic information such as the name and number for the multicast VLAN . See Step A. Entering Basic Information on page 23-5 for instructions on this step. B[...]
-
Page 699
Creating Multicast VLANs Page 23-5 Step A. Entering Basic Information 1. To begin setting up a multicast VLAN type crmcvl at any prompt. 2. The following prompt displays: Enter the VLAN Group id for this VLAN ( 1): Enter the number for the Group to which this multicast VLAN will belong.You can create up to 32 multicast VLAN s and up to 31 AutoTrack[...]
-
Page 700
Creating Multicast VLANs Page 23-6 Step B . Defining the Multicast Addr ess The multicast address is an address that identifies a multicast traffic stream, such as CNN News. ♦ Please Take Note ♦ The source port of the multicast traffic (i.e., the port through which multicast traffic enters the switch) can be a member of any Group. The source p[...]
-
Page 701
Creating Multicast VLANs Page 23-7 Step C. Defining the Recipients of Multicast Tr affic You can define the recipients of multicast traffic by virtual port or MAC address. You define these recipients as policies for this multicast VLAN . The available policies for recipients are Port and MAC Address. You can use both rules within a single multica[...]
-
Page 702
Creating Multicast VLANs Page 23-8 Defining Recipients By MA C Addr ess After you define the multicast address, the following menu displays: Select rule type: 1. Port Rule 2. MAC Address Rule 3. Multicast Address Rule Enter rule type (1): 1. Press 2 and <Return> . 2. The following prompt displays: Set Rule Admin Status to ((e)nable/(d)isable[...]
-
Page 703
Modifying Multicast VLANs Page 23-9 Modi fying Multicast VLANs After you set up a multicast VLAN you can modify its Admin Status, description, rules, and the Admin Status of each of the rules. You use the modmcvl command to modify a multicast VLAN as follows: modmcvl <Group Number>:<VLAN Number> You must specify the Group and multicast [...]
-
Page 704
Modifying Multicast VLANs Page 23-10 Changing a VLAN’s Description 1. At the Option= prompt enter a 2 and press <Enter> . 2. The following prompt displays: Enter a new description: Type in the revised description for this multicast VLAN . The description can be up to 30 characters long. Press <Enter> when you have completed the new de[...]
-
Page 705
Modifying Multicast VLANs Page 23-11 Changing the Admin Status for a VLAN P olicy 1. At the Option= prompt enter a 5 and press <Enter> . 2. The following menu displays: Enter rule number: The rule number is listed with other information on the multicast VLAN just after you entered the modmcvl command. Find the number corresponding to the rule[...]
-
Page 706
Modifying a Multicast Address Policy Page 23-12 Modi fying a Multicast Addr ess P olic y After you create a multicast VLAN , you can modify the multicast address policy by adding more addresses through the modmcvl command. However, you can not add an existing multi- cast address. Follow the steps outlined in Modifying Multicast VLANs on page 23-9 a[...]
-
Page 707
Viewing Multicast VLANs Page 23-13 Vie wing Multicast VLANs You can view the current status of all multicast VLAN s in the switch using the mcvl command. Type mcvl and a table similar to the following displays: VLAN VLAN VLAN Admin Operational Group : Id Description Status Status ---------------------------------------------------------------------[...]
-
Page 708
Viewing Multicast VLAN Policies Page 23-14 Vie wing Multicast VLAN P olicies You can view the current multicast VLAN policies and their status using the vimcrl command. Type vimcrl and a Policy Configuration Table displays similar to the following: VLAN VLAN Rule Rule Rule Rule Group : Id Num Type Status Definition ---------------------------------[...]
-
Page 709
Viewing the Virtual Interface of Multicast VLANs Page 23-15 Vie wing the Virtual Interface of Multicast VLANs You can view the multicast VLAN membership of each virtual interface in the switch. In most cases the virtual interface is the same as a virtual port. However, when multiple services are set up for a virtual port, then each service may be s[...]
-
Page 710
Viewing the Virtual Interface of Multicast VLANs Page 23-16[...]
-
Page 711
Page 24-1 24 A utoT r acker VLAN Application Ex amples This chapter provides specific examples of AutoTracker VLAN s in various network configura- tions. These examples illustrate basic concepts about AutoTracker and highlight issues that can arise when AutoTracker is used in different network situations. • Application Example 1 illustrates a net[...]
-
Page 712
Application Example 1 Page 24-2 Application Ex ample 1 VLAN s Based on Logical P olicies Example 1 shows a network organized logically. The network is organized according to IP networks, but this organization is achieved through the application of logical policies rather than physical segmentation. The use of logical policies provides the flexibili[...]
-
Page 713
Application Example 1 Page 24-3 Omni Switch/Router 12345678 123456 VLAN A Internal IP Router 1 2 5 .0 .0 .3 5 1 3 0 .0 .0 .2 2 IP Nnetwork 125.0.0.0 VLAN B IP Network 130.0.0.0 Group 2 P orts 1, 2, 3, and 4 IP Workstations IP Workstations 125.0.0.1 125.0.0.2 125.0.0.3 125.0.0.33 125.0.0.34 IP Workstation 130.0.0.10 130.0.0.11 130.0.0.12 IP Workstat[...]
-
Page 714
Application Example 2 Page 24-4 Application Ex ample 2 VLAN s in IPX Netw orks Example 2 illustrates the use of AutoTracker VLAN s in IPX networks – specifically, VLAN s based on IPX network address rules. IPX networks have unique characteristics that must be considered when configuring VLAN s based on network address rules. Encapsulation Type in[...]
-
Page 715
Application Example 2 Page 24-5 12345678 123456 Omni Switch/Router IPX Client VLAN Membership Client 1 both B & C initially, then either B or C when net- work number is known Client 2 both B & C initially, then either B or C when net- work number is known Client 3 D Client 4 E Client 5 F Please note that all ports in Group 3 are also member[...]
-
Page 716
Application Example 2 Page 24-6 In this example one Group was created – Group 3 – that includes all ports to which IPX serv- ers and clients are connected. Within this Group five VLAN s were created, one for each server: When the Omni Switch/Router receives frames from the five servers, each server is assigned to the appropriate VLAN and no con[...]
-
Page 717
Application Example 3 Page 24-7 Application Ex ample 3 IPX Netw ork Addr ess VLAN s and Tr anslated Frames Application Example 3 shows two IPX networks connected over a bridged FDDI ring span- ning two Omni Switch/Routers. VLAN B exists in both switches and specifies an IPX network address policy of network number 100 and Ethernet- II encapsulation[...]
-
Page 718
Application Example 4 Page 24-8 Application Ex ample 4 Routing in IPX N etworks How Routing W orks Generally AutoTracker “activates” a VLAN – and its internal router interface – when the first port is assigned to the VLAN . If a VLAN has a port policy, AutoTracker assigns the specified port(s) and activates the VLAN immediately. If a VLAN h[...]
-
Page 719
Application Example 4 Page 24-9 Important Note If you enable routing for a Group, you are actually enabling routing for that Group’s default VLAN #1. For this reason, do not enable routing for any Group in which an IPX server is a member of an IPX network address VLAN . Omni Switch/Router 12345678 123456 Group 2 Ports 1 and 2 IPX Server A IPX Net[...]
-
Page 720
Application Example 5 Page 24-10 Application Ex ample 5 Tr aver sing a Backbone Application Example 5 illustrates why port-based policies may be required to establish communications in some network situations, such as traversing a backbone. This necessity arises because, as explained in How Routing Works Generally on page 24-8, AutoTracker does not[...]
-
Page 721
Application Example 5 Page 24-11 The Solution The recommended solution is to add a port policy to VLAN D , as is shown in the figure below. A port policy can be defined in addition to any other policies defined for a VLAN . If VLAN D has a port policy that includes port 2 on Switch 1 and port 1 on Switch 2 – the ports to which the backbone is con[...]
-
Page 722
Application Example 5 Page 24-12[...]
-
Page 723
Page 25-1 25 IP Routing Intr oduction This chapter gives an overview of IP routing and includes information about configuring static routes and viewing/configuring TCP/IP protocols such as Telnet and the Routing Information Protocol ( RIP ). IP routing requires at least one virtual router port to be configured on the switch. For information about c[...]
-
Page 724
IP Routing Overview Page 25-2 IP Routing Ov erview In switching, traffic may be transmitted from one media type to another within the same broadcast domain (or group/ VLAN ). Switching happens at layer 2, the physical layer; routing happens at layer 3, the network layer. In routing, traffic may be transmitted across groups/ VLANs , and broadcast or[...]
-
Page 725
IP Routing Overview Page 25-3 Tr ansport Protocols IP is both connectionless (it routes each datagram separately) and unreliable (it does not guarantee delivery of datagrams). This means that a datagram may be damaged in transit, or thrown away by a busy router, or simply never make it to its destination. The resolution of these transit problems is[...]
-
Page 726
Setting Up IP Routing on the Switch Page 25-4 Setting Up IP Routing on the Switch IP routing is enabled on a per-port basis by creating a virtual IP router port for a group/ VLAN . The switch does not do any routing unless the virtual router port has IP routing enabled (routing is enabled by default). The steps for setting up IP routing on the swit[...]
-
Page 727
Setting Up IP Routing on the Switch Page 25-5 Step 3. Configuring Other IP Routing Features There are several optional features that may be used with IP routing. Some features are included as part of the base code and are described in this user manual. Other features are available as optional switch software and are described in separate user manua[...]
-
Page 728
The Networking Menu Page 25-6 The N etworking Menu The Networking menu contains commands that control, and are related to, the routing proto- cols that are run on the switch. To switch to, and to display, the Networking menu, enter the following commands: networking ? If you have enabled the verbose mode, you do not need to enter the question mark [...]
-
Page 729
The IP Submenu Page 25-7 The IP Submenu The ip command in the Networking menu is used to display the IP submenu. To display the IP submenu, enter the following commands: ip ? If you have enabled the verbose mode, you don’t need to enter the question mark ( ? ). A screen similar to the following displays: Command IP Menu ------------ -------------[...]
-
Page 730
Viewing the Address Translation (ARP) Table Page 25-8 Vie wing the Addr ess Tr anslation (ARP) T able The xlat command is used to access the ARP (Address Resolution Protocol) Table. This table contains a listing of IP addresses and their corresponding translations to MAC addresses (or slot/port for WAN interfaces). Submenu commands are used to add [...]
-
Page 731
Viewing the Address Translation (ARP) Table Page 25-9 Adding Entries to the ARP T able The add subcommand is used to manually add an IP address entry to the ARP Table. To be able to manage your switch over an IP network connection, you will need at least one IP address configured for the switch. Follow the steps below to add an address to the ARP T[...]
-
Page 732
Viewing the Address Translation (ARP) Table Page 25-10 Deleting Entries from the ARP T able The Delete subcommand is used to delete a “permanent” IP address from the ARP Table. Follow the steps below to delete an address from the ARP Table. 1. Enter delete . The following prompt displays: Host name or IP addr to delete: Enter the host name or a[...]
-
Page 733
Viewing the Address Translation (ARP) Table Page 25-11 Finding a Specific MA C Addr ess in the ARP T able The Ipfind subcommand is used to locate a specific MAC address in the ARP Table based on a known IP address or host name . (The Macfind subcommand, discussed above, is used to find a specific IP address based on a known MAC address). Follow th[...]
-
Page 734
Viewing IP Statistics and Errors Page 25-12 Vie wing IP Statistics and Error s The ips command is used to monitor IP datagram traffic and errors. The ips command displays cumulative IP statistics and errors. The statistics show the cumulative totals since the last time the switch was powered on or since the last reset of the switch was executed. To[...]
-
Page 735
Viewing IP Statistics and Errors Page 25-13 Fastpath Datagr ams Forwar ded (Displays for Omni S/R) The number of IP datagrams forwarded to their destination without using the MPX . Fastpath Inbound Discar ds (Displays for Omni S/R) The number of bad packets received and discarded. Typically this value should be zero. Fastpath U tilization (Displays[...]
-
Page 736
Viewing IP Statistics and Errors Page 25-14 PDU s Needing Reassembly The number of IP datagram fragments that needed to be reassembled by this switch. PDU s Successfully Reassembled The number of IP datagrams successfully reassembled by this switch. PDU s Needing Fragmentation The number of IP datagrams requiring fragmentation by this switch. Fragm[...]
-
Page 737
Viewing the IP Forwarding Table Page 25-15 Vie wing the IP Forw arding T able The ipr command is used to display the IP Forwarding Table. The entries in the table show the routes entered by a routing protocol, if the switch is running any of the supported proto- cols, and the static routes that you may have entered manually. You can also add to, or[...]
-
Page 738
Viewing the IP Forwarding Table Page 25-16 The fields on the IP Forwarding Table have the following meanings: Netw ork The destination network IP address. Mask The IP subnet mask. Ga tewa y The network address of the gateway (the router from which this address was learned). Metric The metric associated with this network. Generally, this is a RIP ?[...]
-
Page 739
Adding an IP Static Route Page 25-17 A dding an IP Static Route The aisr command is used to add IP static routes to the switch’s IP Forwarding Table. You might want to add a static route to send traffic to a router other than the one determined by the routing protocols. In order to add a static route, you will need to know the host/net IP address[...]
-
Page 740
Adding an IP Static Route Page 25-18 5. The following prompt displays: IP address of next hop : Enter the IP address of the next hop (the gateway) router to the destination IP address. The gateway address must be on the same network as one of the VLANs (that is, it must be a directly connected network). A message will confirm the creation of the st[...]
-
Page 741
Removing an IP Static Route Page 25-19 Remo ving an IP Static Route The risr command is used to remove IP static routes from the switch’s IP Forwarding Table. Follow the steps below to remove an IP static route. 1. Enter risr. The prompt that displays depends on whether routing domains are configured on the switch. For more information about rout[...]
-
Page 742
Viewing ICMP Statistics and Errors Page 25-20 Vie wing ICMP Statistics and Error s The icmps command is used to monitor ICMP activity. To display information about ICMP statistics and errors, enter the following command: icmps A screen similar to the following displays: ICMP Statistics In Out Total ICMP Messages 1 1 Redirect Messages 0 0 Echo Messa[...]
-
Page 743
Viewing ICMP Statistics and Errors Page 25-21 Addr ess Mask Messages The number of Address Mask Reply messages that were sent/received by this switch in an attempt to determine the subnet mask for a network. Addr ess Mask Reply Messages The number of Address Mask Reply messages that were sent/received by this switch. Error s The number of ICMP mess[...]
-
Page 744
Using the PING Command Page 25-22 U sing the PING Command The ping command is used to test the reachability of IP network destinations. A fast ping command ( fping ) is also available for repeating the last ping request sent from the switch. The commands sends an ICMP echo request to a destination and then waits for a reply. Follow the steps below [...]
-
Page 745
Using the PING Command Page 25-23 5. After answering the previous prompt, a screen similar to the following displays: Ping starting, hit <RETURN> to stop PING 198.206.184.18: 64 data bytes [0 ] . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . T. . . [50 ] . . . T. . . . . . . . . . . . . . . . . . . [...]
-
Page 746
Viewing UDP Statistics and Errors Page 25-24 Vie wing UDP Statistics and Error s The udps command is used to display a listing of UDP statistics and errors. The udps command displays cumulative statistics since the last time the switch was powered on or since the last reset of the switch was executed. To display information about UDP statistics and[...]
-
Page 747
Viewing the UDP Listener Table Page 25-25 Vie wing the UDP Listener T able The udpl command is used to display the UDP Listener Table. This table contains information about the switch’s UDP end-points on which a local application is currently accepting data- grams. The UDP Listener Table shows the local IP addresses for each UDP listener and the [...]
-
Page 748
Viewing RIP Statistics and Errors Page 25-26 Vie wing RIP Statistics and Error s The rips command is used to display RIP statistics and errors. This command displays cumula- tive statistics since the last time the switch was powered on, or since the last reset of the switch was executed. To display information about RIP statistics and errors, enter[...]
-
Page 749
Viewing TCP Statistics Page 25-27 Vie wing TCP Statistics The tcps command is used to monitor TCP traffic activity and check TCP configuration param- eters. To reconfigure TCP parameters, see Viewing the TCP Connection Table on page 25-29. To display information about TCP activity, enter the following command: tcps A screen similar to the following[...]
-
Page 750
Viewing TCP Statistics Page 25-28 Established Resets The number of times TCP connections have made a direct transition to the “closed” state from either the “established” state or the “closeWait” state. Currently Established The number of TCP connections for which the current state is either “established” or “closeWait”. T otal [...]
-
Page 751
Viewing the TCP Connection Table Page 25-29 Vie wing the TCP Connection T able The tcpc command is used to check the current TCP connections available in the TCP Connection Table. To display the TCP Connection Table, enter the following command: tcpc A screen similar to the following displays: TCP Connection/Listener Table Local Address/Port Remote[...]
-
Page 752
Using the TELNET Command Page 25-30 U sing the TELNET Command The telnet command is used to connect to another system. All of the standard TELNET commands are supported by the software in the switch. To initiate a TELNET session, enter the following command: telnet A screen similar to the following displays: telnet> To display a listing of the T[...]
-
Page 753
Tracing an IP Route Page 25-31 T racing an IP Route The traceroute command is used to find the IP route from the local switch to a specified IP address destination. This command displays the individual hops to the destinations as well as some timing information. When using the traceroute command, you must enter the name of the destination as part o[...]
-
Page 754
Flushing the RIP Routing Tables Page 25-32 Flushing the RIP Routing T ables The ripflush command is used to flush all entries in the RIP Routing Table. All existing routes, with the exception of static and direct routes, are removed from the table by entry of the ripflush command. To flush the RIP Routing Table, enter the following command: ripflus[...]
-
Page 755
Configuring IP RIP Filters Page 25-33 Configuring IP RIP Filter s The ipfilter command is used to add or delete an IP RIP Output or Input filter. The IP RIP Filtering feature gives you a means of controlling the operation of the IP RIP protocol. By using IP RIP filters, you can minimize the number of entries that are put into the IP Forward- ing T[...]
-
Page 756
Configuring IP RIP Filters Page 25-34 4. The following prompt displays: IP address (default: all networks) : Enter the IP address of the network that is to be allowed or blocked by the filter (or just press Enter to use the default of all networks). If you choose the default you will not be prompted for the network mask (as is shown in the next ste[...]
-
Page 757
Configuring IP RIP Filters Page 25-35 5. The following prompt displays: IP network mask (default: 255.255.255.0) : Enter the IP network mask of the network that is to be allowed or blocked by the filter (or just press Enter to use the default mask of 255.255.255.0). Note that the default mask will vary depending on the class of the IP address you e[...]
-
Page 758
Configuring IP RIP Filters Page 25-36 Deleting IP RIP Filter s Follow the steps below to delete an existing IP RIP Output or Input filter. 1. Enter ipfilter. A screen similar to the following displays: Selecting global IP filter: Add or delete entry {add(a), delete(d)} (a) : Enter d to select to delete a filter. 2. A screen similar to the following[...]
-
Page 759
Configuring IP RIP Filters Page 25-37 Displaying IP RIP Filters The ipf command is used to display a list of all existing IP RIP Output and Input filters. See Configuring IP RIP Filters on page 25-33 for complete information on creating these filters. Displaying a List of All IP RIP Filters To display the listing of all existing IP RIP filters, ent[...]
-
Page 760
Configuring IP RIP Filters Page 25-38 Displaying a List of “Global” IP RIP Filters To display a listing of just the global IP RIP filters, enter the following command: ipf global A screen similar to the following displays: Displaying global filters: GP:VL (s/p/vc) # Type Network Mask Md (Peer ID) --- -------------- ------------------ ----------[...]
-
Page 761
Viewing the IP-to-MAC Address Table Page 25-39 Vie wing the IP-to-MA C Addr ess T able The ipmac command is used to display the IP-to-Mac Address Association Table. This table contains a listing of IP addresses and their associated MAC (Media Access Control) addresses together with the slot/port from which the information was learned. The informati[...]
-
Page 762
Viewing the IP-to-MAC Address Table Page 25-40 Slot/Intf The slot number and interface number from which the IP and MAC addresses were learned. Displaying Information for a Specific IP A ddress To display the entry in the IP-to-MAC table for a specific IP address, enter the desired IP address after the command. For example, to locate the entry for[...]
-
Page 763
Enabling/Disabling Directed Broadcasts Page 25-41 Enabling/Disabling Dir ected Broadcasts An IP directed broadcast is an IP datagram that has all zeroes or all 1’s in the host portion of the destination IP address. The packet is sent to the broadcast address of a subnet to which the sender is not directly attached. The datagram is routed through [...]
-
Page 764
Path MTU Discovery Page 25-42 P ath MTU Discov ery All Gigabit Ethernet modules and all Mammoth-based Ethernet modules on the Omni Switch/Router in Release 4.0 and later support path Maximum Transmission Unit ( MTU ) discovery. In path MTU discovery, the Ethernet frame (datagram) size is set to the largest size that does not require fragmentation a[...]
-
Page 765
Page 26-1 26 UDP F orw ar ding UDP is a connectionless transport protocol that is used for applications that do not require the establishment of a session and end-to-end error checking, such as email and file transfer. This chapter describes the UDP relay function in the switch, which allows UDP broadcast packets to be forwarded across groups and V[...]
-
Page 766
Page 26-2 In non-source route environments, RIF stripping may be required if DHCP clients are token ring stations. Token ring stations may have packets with RIFs even though source routing is not enabled on the station. RIF stripping is required if there is bridging to Ethernet, FDDI , or 802.3 LANE anywhere along the path between the client and th[...]
-
Page 767
UDP Relay Configuration Screen Page 26-3 UDP Relay Configur ation Screen To configure any of the UDP relays, use the relayc command. The relayc command is listed in the IP submenu. (For more information about IP commands, see Chapter 25, “IP Routing.”) The screen display is similar to the following: UDP Relay Configuration 1) BOOTP/DHCP Enable[...]
-
Page 768
BOOTP/DHCP Relay Page 26-4 BOO TP/DHCP Relay The switch supports a UDP relay function that allows Bootstrap Protocol ( BOOTP ) and Dynamic Host Configuration Protocol ( DHCP ) packets to pass between AutoTracker Groups. ♦ Note ♦ A BOOTP / DHCP relay may be configured for authenti- cated groups as well. See BOOTP/DHCP Relay and Authentication on[...]
-
Page 769
BOOTP/DHCP Relay Page 26-5 In multiple group configurations, AutoTracker rules can be deployed to strategically support the relay function. Two types of AutoTracker IP policies are appropriate for DHCP environ- ments. The first is the IP protocol policy that puts all IP type frames into a single VLAN regard- less of network address. The second is t[...]
-
Page 770
BOOTP/DHCP Relay Page 26-6 External BOOTP Relay The BOOTP relay may be configured on a router that is external to the switch. In this applica- tion example the switched network has a single AutoTracker Group configured with multiple segments. All of the network hosts are DHCP -ready, meaning they obtain their network address from the DHCP server. T[...]
-
Page 771
BOOTP/DHCP Relay Page 26-7 Internal BOOTP/DHCP Relay The internal BOOTP/DHCP relay is configured using the UDP forwarding feature in the switch, available through the relayc command. See UDP Relay Configuration Screen on page 26-3. Example 1 This application example shows a network with two AutoTracker Groups, each with multiple segments. All netwo[...]
-
Page 772
BOOTP/DHCP Relay Page 26-8 Because the clients in group 3 are not on the same segment as the DHCP server, they must request an IP address via the BOOTP relay routing entity in the switch. When a DHCP request frame is received by the BOOTP relay entity, it will be forwarded from group 3 to group 2. All the DHCP -ready clients in group 3 must be memb[...]
-
Page 773
BOOTP/DHCP Relay Page 26-9 In this example, the VLAN defined by an IP protocol policy is used as a mechanism to group the DHCP server and associated clients . The DHCP server is local, so all clients requesting an IP address will be allocated an IP address on the same subnet. ♦ Note ♦ This configuration works if you require only one DHCP subnet[...]
-
Page 774
BOOTP/DHCP Relay Page 26-10 Forw ard Delay The amount of time (typically in seconds, but determined by the client) the BOOTP/DHCP relay will wait before forwarding a request to the server address. This delay gives a local server a chance to respond to a client before the relay forwards it further out in the network. This value may range from 1 to 6[...]
-
Page 775
NetBIOS Relays Page 26-11 N etBIOS Relays The switch supports a UDP relay function that allows Network Basic Input/Output System ( NetBIOS ) messages to be sent across groups or VLANs . Overvie w of NetBIOS NetBIOS is an applications interface that allows computers on Ethernet or token ring LANs to communicate with one another. An enhanced version [...]
-
Page 776
NetBIOS Relays Page 26-12 NetBIOS Relay Application The UDP relay function in the switch extends b-node functionality across the internet. An example application is shown here. NetBIOS Relay Application In this example, NBNS and NBDD relays should be configured to forward to VLAN 10 and VLAN 20. The VLANs must be selected for forwarding, or you can[...]
-
Page 777
NetBIOS Relays Page 26-13 Configuring NBNS Relay Each NetBIOS PC has a name unique for its local network. If you are using NetBIOS broadcast queries to resolve names and NetBIOS clients are located in different groups or VLANs , you should configure UDP relay for NBNS . The relays are enabled from the UDP Relay Configuration screen and are configu[...]
-
Page 778
NetBIOS Relays Page 26-14 Ne xt-Hop Addr esses for NBNS At least one next-hop address (or a forwarding VLAN as described in Forwarding VLANs for NBNS Relay on page 26-15) must be configured. To add a next-hop address for NBNS relay: 1. On the UDP Relay Configuration screen command, enter the following: 21=l A screen similar to the following display[...]
-
Page 779
NetBIOS Relays Page 26-15 Forw arding VLANs for NBNS Relay At least one forwarding VLAN (or a next-hop address as described in Next-Hop Addresses for NBNS on page 26-14) must be configured for NBNS relay. To select forwarding VLANs for NBNS relay: 1. On the command line of the UDP Relay Configuration screen, enter the following: 22=l A screen simil[...]
-
Page 780
NetBIOS Relays Page 26-16 Configuring NBDD Relay If you want to send NetBIOS datagrams across networks, you should enable the NBDD relay. To enable the NBDD relay, enter 3=y at the command prompt of the UDP Relay Configuration screen. The screen redisplays similar to the following: UDP Relay Configuration 1) BOOTP/DHCP Enabled : Yes 11) Server Add[...]
-
Page 781
NetBIOS Relays Page 26-17 Ne xt-Hop Addr esses for NBDD At least one next-hop address ( or a forwarding VLAN as described in Forwarding VLANs for NBDD Relay on page 26-18) must be configured for the relay. To add a next-hop address for NBDD relay: 1. At the command prompt for the UDP Relay Configuration screen, enter the following: 32=a A screen si[...]
-
Page 782
NetBIOS Relays Page 26-18 Forw arding VLANs for NBDD Relay You may select or deselect VLANs to which the NBDD relay will forward. At least one forward- ing VLAN (or a next-hop address as described in Next-Hop Addresses for NBDD on page 26-17) must be configured for the relay. To select forwarding VLANs for NBDD relay: 1. On the command line of the [...]
-
Page 783
Generic Service UDP Relay Page 26-19 Generic Service UDP Relay UDP relay may be configured for generic services. Generic services may include applications such as Trivial File Transfer Protocol ( TFTP ), Domain Name System ( DNS ), IEN-116 Name Server. You will need to know the well-known UDP port number if you want to configure these services. Gen[...]
-
Page 784
Generic Service UDP Relay Page 26-20 Forw ard to VLANs Use this parameter to list, add, or delete VLANs to which the NBNS UDP relay will forward. This default is UNSET . This value redisplays as SET when at least one VLAN is configured. Up to 32 VLANs may be configured. You can list forwarding VLANs , or add or delete VLANs from the forwarding list[...]
-
Page 785
Generic Service UDP Relay Page 26-21 Modi fying a Generic Service Use the Configured Generic Services screen to modify an existing generic service. On the Generic Services Menu, enter 41 . A screen similar to the following displays: Configured Generic Services Item State Port Number Description Servers/Vlans (1) enabled 80 TFTP 198.172. 5. 4 Enter [...]
-
Page 786
Generic Service UDP Relay Page 26-22 4. Enter d to return to the UDP Relay Configuration screen. 5. Enter s to save the changes and reinitialize the relay. Deleting a Generic Service To delete a generic service: 1. On the Generic Services Menu, enter 42 . The Configured Generic Services screen displays similar to the following: Configured Generic S[...]
-
Page 787
Viewing UDP Relay Statistics Page 26-23 Vie wing UDP Relay Statistics Use the relays command to display statistics about configured UDP relays. The relays command is listed in the IP submenu. For information about other IP commands, see Chap- ter 25, “IP Routing.” The screen display for UDP statistics is similar to the following: UDP RELAY PACK[...]
-
Page 788
Viewing UDP Relay Statistics Page 26-24[...]
-
Page 789
Page 27-1 27 IPX Routing Intr oduction This chapter gives an overview of Internetwork Packet Exchange (IPX) routing and includes information about configuring static IPX routes as well as configuring Routing Information Protocol ( RIP ) and Service Advertising Protocol ( SAP ) filters and timers. IPX is a layer 3 proto- col developed by Novell for [...]
-
Page 790
Introduction Page 27-2 IPX Routing Overvie w In IPX routing, the switch builds routing tables to keep track of optimal destinations for traf- fic it receives that is destined for remote IPX networks. The switch sends and receives rout- ing messages, or advertisements, to/from other routers in the network. When the switch receives an IPX packet, it [...]
-
Page 791
Introduction Page 27-3 Setting Up IPX Routing on the Switch IPX routing is enabled on a per-port basis by creating a virtual IPX router port for a group/ VLAN. The switch does not do any routing unless the virtual IPX router port has IPX routing enabled (routing is enabled by default). The steps for setting up IPX routing on the switch are given he[...]
-
Page 792
The IPX Submenu Page 27-4 The IPX Submenu The ipx command in the Networking menu is used to access a submenu containing all the IPX-related commands. For more information about the Networking menu, see Chapter 25, “IP Routing.” To display the IPX submenu, enter the following commands: IPX ? If you have enabled the verbose mode, you don’t need[...]
-
Page 793
Viewing the IPX Routing Table Page 27-5 Vie wing the IPX Routing T able The ipxr command is used to display the IPX Routing Table. The entries in the table show the routes entered by the IPX RIP protocol and the static routes that you may have entered manu- ally. All entries in the table are sorted by destination network. The IPX Routing Table can [...]
-
Page 794
Viewing the IPX Routing Table Page 27-6 Chg The information in this route has recently been updated, but the new information has not yet been forwarded to neighbor routers. Dir Indicates that this is a local interface (direct route) as opposed to a route to a destination network. GP:VL The first number is the Group associated with this entry; the s[...]
-
Page 795
Viewing the IPX Routing Table Page 27-7 Displaying a List of Specific IPX Routes You can limit the number of routes that are displayed by the ipxr command by using an extra argument along with the command. To find out if a route to a particular destination network is known, simply include the network number on the command line. (The examples shown[...]
-
Page 796
Viewing IPX Statistics Page 27-8 Vie wing IPX Statistics The ipxs command is used to display data on IPX statistics and errors. To display information about IPX statistics and errors, enter the following command: ipxs A screen similar to the following displays: IPX Statistics and Errors: IPX is ON IPX Input Statistics: pkts rcvd = 3280 pkts deliver[...]
-
Page 797
Viewing IPX Statistics Page 27-9 IPX Output Statistics pkts sent: The number of packets forwarded (not including fast path routed packets). pkts generated locally: The number of packets forwarded that were generated by local IPX applications (RIP and SAP). pkts discarded: The number of discarded packets. pkts with no route found: The number of pack[...]
-
Page 798
Viewing the IPX SAP Bindery Page 27-10 Vie wing the IPX SAP Bindery The ipxsap command is used to display a listing of the servers in the SAP Bindery, sorted by server name. To display a list of SAP servers, enter the following command: ipxsap A screen similar to the following displays: Displaying all (3) entries in the SAP bindery: Server Name Typ[...]
-
Page 799
Viewing the IPX SAP Bindery Page 27-11 U sing IPXSAP with Fr ame Relay or ISDN Boards The following additional column heading appears in the ipxsap display when a Frame Relay or ISDN board is installed in the switch. s/p/vc or P eer ID The Slot, Port and Virtual Connection (i.e., DLCI) identifiers or the PPP Peer ID of the inter- face on which the [...]
-
Page 800
Adding an IPX Static Route Page 27-12 A dding an IPX Static Route The aipxsr command is used to add IPX static routes to the switch’s IPX Routing Table. You might want to add a static route to send traffic from a node in an Omni Switch/Router VLAN to an external IPX network address (such as an address reached through an external network router at[...]
-
Page 801
Removing an IPX Static Route Page 27-13 Remo ving an IPX Static Route The ripxsr command is used to remove IPX static routes from the switch’s IPX Routing Table. Follow the steps below to remove an IPX static route. 1. Enter ripxsr. A screen similar to the following displays: Do you want to see the current route table? (y or n) (y) : y 2. Enter y[...]
-
Page 802
Turning the IPX Router Complex On and Off Page 27-14 T urning the IPX Router Complex On and Off The ipxoff command is used to turn off the IPX Router Complex, which disables IPX routing on the switch. To turn off IPX routing, enter the following command: ipxoff A screen similar to the following displays: IPX turned off. The ipxon command is used to[...]
-
Page 803
Flushing the IPX RIP/SAP Tables Page 27-15 Flushing the IPX RIP/SAP T ables The ipxflush command is used to flush the IPX RIP Routing and SAP Bindery Tables. Follow the steps below to flush both the IPX tables. 1. Enter ipxflush. A screen similar to the following displays: Flush tables (RIP routing and SAP bindery) in: { RIP and SAP(b), RIP only(r)[...]
-
Page 804
Using the IPXPING Command Page 27-16 U sing the IPXPING Command The ipxping command is used to test the reachability of certain types of IPX nodes. The soft- ware supports two different types of IPX pings: • Novell-defined, which can test the reachability of NetWare servers currently running the NetWare Loadable Module called IPXRTR.NLM. This typ[...]
-
Page 805
Using the IPXPING Command Page 27-17 5. The following prompt displays: Timeout (1) : Enter the number of seconds to wait for a response. The default timeout is 1. 6. The following prompt displays: Type (n for Novell, x for Xylan) (n) : Enter the type of IPX ping to be issued. The default is the Novell type. 7. After answering the previous prompt, a[...]
-
Page 806
Configuring IPX RIP/SAP Filtering Page 27-18 Configuring IPX RIP/SAP Filtering The ipxfilter command is used to add or delete an IPX RIP or SAP Output or Input filter. The IPX RIP/SAP Filtering feature give you a means of controlling the operation of the IPX RIP/ SAP protocols. By using IPX RIP/SAP filters, you can minimize the number of entries p[...]
-
Page 807
Configuring IPX RIP/SAP Filtering Page 27-19 Adding a “Global” IPX RIP/SAP Filter Follow the steps below to add a “global” IPX RIP or SAP filter. 1. Enter ipxfilter . A screen similar to the following displays: Selecting global IPX filter: Add or delete entry {add(a), delete(d)} (a) : Enter a (or just press <Enter> ) to select to add [...]
-
Page 808
Configuring IPX RIP/SAP Filtering Page 27-20 8. The following prompt displays: SAP service type (default: all services) : Enter the SAP service type (in hexadecimal format) as defined by NetWare (or press <Enter> to use the default of all services). 9. A message will confirm the addition of the filter: ipxfilter successfully added Adding an I[...]
-
Page 809
Configuring IPX RIP/SAP Filtering Page 27-21 7. The following prompt displays: IPX node mask (default: all F's) : Enter the IPX node mask (in hexadecimal format) to be used (or just press <Enter> to use the default mask of all F's). If you selected the default of “all nodes” in the previous step, this step is skipped. 8. The fol[...]
-
Page 810
Configuring IPX RIP/SAP Filtering Page 27-22 Deleting an IPX RIP/SAP Filter Follow the steps below to delete an existing IPX RIP or SAP filter. 1. Enter ipxfilter . A screen similar to the following displays: Selecting global IPX filter: Add or delete entry {add(a), delete(d)} (a) : Enter d to select to delete a filter. 2. A screen similar to the f[...]
-
Page 811
Configuring IPX RIP/SAP Filtering Page 27-23 Displaying IPX RIP/SAP Filter s The ipxf command is used to display a list of all existing IPX RIP and SAP filters. See Adding a “Global” IPX RIP/SAP Filter on page 27-19 for complete information on creating these filters. You can enter optional parameters with the ipxf command to display specific fi[...]
-
Page 812
Configuring IPX RIP/SAP Filtering Page 27-24 GP:VL (s/p/vc) or (P eer ID) The first number ( GP ) is the Group associated with this entry. The second number ( VL ) is the VLAN associated with this entry. When a filter applies to all interfaces, this field will say “global.” If an entry refers to a Frame Relay interface, column headings for slot[...]
-
Page 813
Configuring IPX RIP/SAP Filtering Page 27-25 As another example, to display a list of all global RIP Input filters, you would enter: ipxf ri global A screen similar to the following displays: Displaying all global RIP INPUT filters: GP:VL (s/p/vc) # Type Net/Mask Node/Mask Svc Md (Peer ID) ------ ------------ ---------------------- ----------------[...]
-
Page 814
Configuring IPX Serialization Packet Filtering Page 27-26 Configuring IPX Serialization P acket Filtering The ipxserialf command is used to enable and disable IPX Serialization Packet filtering on any or all WAN routing services. This feature can be used to reduce traffic on WAN links by preventing the transmission of NetWare serialization packets[...]
-
Page 815
Configuring IPX Serialization Packet Filtering Page 27-27 5. Filtering will then become active. A message will appear indicating that IPX Serialization Filtering is enabled, either on all WAN routing services or for a specific Group: IPX Serialization Filtering is now enabled on all WAN routing services Disabling IPX Serialization Filtering Follow [...]
-
Page 816
Configuring IPX Watchdog Spoofing Page 27-28 Configuring IPX W atchdog Spoofing The ipxspoof command is used to enable and disable IPX Watchdog Spoofing on any or all WAN routing services. The use of this feature is explained below: Novell’s IPX Watchdog Protocol, which is used by NetWare to maintain network node and server connections, can con[...]
-
Page 817
Configuring IPX Watchdog Spoofing Page 27-29 This example prompt asks if you want to enable spoofing on all WAN routing services. If you had entered a specific Group number, the prompt would refer to that particular Group. Enter y to enable IPX Watchdog Spoofing. 5. IPX Spoofing will then become active. A message will appear indicating that IPX Wat[...]
-
Page 818
Configuring SPX Keepalive Spoofing Page 27-30 Configuring SPX K eepalive Spoofing The spxspoof command is used to enable and disable SPX Keepalive Spoofing on any or all WAN routing services. The use of this feature is explained below: Novell’s SPX Keepalive Protocol, which is used by NetWare to maintain SPX connections between end nodes, can a[...]
-
Page 819
Configuring SPX Keepalive Spoofing Page 27-31 Enter y to proceed to enable spoofing. 4. The following prompt displays: Enable SPX Spoofing on all WAN routing services? (y or n) (n) : y This prompt requires you to verify that you want to enable spoofing in order to avoid the situation of accidental spoofing of SPX packets. This example prompt asks i[...]
-
Page 820
Controlling IPX Type 20 Packet Forwarding Page 27-32 Contr olling IPX Type 20 P acket F orw arding The ipxtype20 command is used to control the forwarding of IPX Type 20 packets. The default setting is to not forward IPX Type 20 packets. You can use the ipxtype20 command to explic- itly enable the forwarding of Type 20 packets for individual interf[...]
-
Page 821
Configuring NetWare to Minimize WAN Connections Page 27-33 Configuring N etW ar e to Minimize W AN Connections If you have access to NetWare’s control parameters, you can “fine-tune” your network to minimize traffic on WAN links such as ISDN connections or Frame Relay lines. Doing so will reduce the costs associated with each connection that[...]
-
Page 822
Configuring NetWare to Minimize WAN Connections Page 27-34 6. Novell has developed a workaround that can be used to disable the SPX Watchdog mech- anism. This workaround could be used instead of enabling the SPX Spoofing feature on your switch. SPWXDOG.NLM is a patch that is used to disable NetWare’s SPX Watchdog mechanism on 3.x and 4.x servers.[...]
-
Page 823
Configuring RIP and SAP Timers Page 27-35 Configuring RIP and SAP Timer s The standard time between broadcasts of RIP and SAP messages is 60 seconds. This default may be modified in order to alleviate network congestion or facilitate the discovery of network resources. Adding a RIP and SAP Timer 1. To adjust the time between RIP and SAP messages, [...]
-
Page 824
Configuring RIP and SAP Timers Page 27-36 Viewing RIP and SAP Timer s To view the RIP and SAP timers that have been configured through the ipxtimer command, enter the following command: ipxt A screen similar to the following displays: # Group RIP Timer (secs) SAP Timer (secs) === ====== ============== =============== 1 1 30 15 2 global 45 45 The fi[...]
-
Page 825
Configuring Extended RIP and SAP Packets Page 27-37 Configuring Extended RIP and SAP P ackets Larger RIP and SAP packets may be transmitted so that congestion in the network is reduced. Other switches and routers in the network must support larger packet size if this feature is configured on the switch. Use the ipxext command to enable or disable [...]
-
Page 826
Configuring an IPX Default Route Page 27-38 Configuring an IPX Default Route A default IPX route may be configured for packets destined for networks unknown to the switch. If RIP messages are disabled, packets can still be forwarded to a router that knows where to send them. Use the ipxdrt command to add a default route, view the status of a defau[...]
-
Page 827
Page 28-1 28 Managing W AN Switching Modules Intr oduction The Omni Switch/Router WAN Switching Modules (WSXs) are a family of modules that enable the creation of WANs by providing connectivity between geographically-distanced LANs. These modules support a variety of protocols, including Frame Relay, synchronous Point to Point Protocol (PPP), and I[...]
-
Page 828
Introduction Page 28-2 Type of Service (T oS) The Type of Service (ToS) settings allow you to prioritize voice data and voice signaling data. Since voice data is time critical, and requires steady throughput, it should be given higher priority than other forms of data. This can be done by assigning a priority value for the Voice Data and Voice Sign[...]
-
Page 829
Introduction Page 28-3 If you feel that changing the default values is imperative to the working of the network, the following table is provided to give the hexadecimal values for various settings: A bit mask is also set with the UI in hexadecimal form. The mask is used during the lookup phase of ToS and screens out the insignificant bits. For IP p[...]
-
Page 830
Introduction Page 28-4 T oS and QoS Interaction On the Omni Switch/Router and OmniSwitch, ToS policies may only be configured through WAN commands. The WAN UI/CLI commands allow a higher priority of service for voice and voice signalling data. WAN ToS policies are supported when bridging or routing; ToS policies configured through the QoS Manager a[...]
-
Page 831
Introduction Page 28-5 DTR Dial Backup Currently, a feature is available to use a dynamic ISDN call as a backup WAN connection for a primary WAN connection. The primary WAN connection is a permanent virtual circuit (PVC) with upper layer protocol of Frame Relay or PPP. The DTR Dial Backup feature will allow another synchronous serial interface to b[...]
-
Page 832
Supported Physical Interfaces Page 28-6 Supported Ph ysical Interfaces The WSX family of products support numerous physical interface (port) types. The port types available with the WSX family are: Univ ersal Serial P ort The Universal Serial Port (USP) provides connectivity to legacy synchronous serial port devices. With the addition of an adapter[...]
-
Page 833
Supported Protocols Page 28-7 Supported Pr otocols The WAN switching modules support both Frame Relay and synchronous Point-To-Point Protocol (PPP). For ISDN signalling protocols, the modules support D-channel signalling (see Chapter 32, “Managing ISDN Ports.” For more details on implementing these protocols, see Chapter 29, “Managing Frame R[...]
-
Page 834
Application Examples Page 28-8 Software in the switch allows you to configure access rate, clocking and protocol-related parameters. Additional software commands allow you to view status at the WSX board, port, or protocol level. Extensive statistics are provided at each level, including a breakdown of traffic by frame type (Ethernet, IP , IPX , or[...]
-
Page 835
Application Examples Page 28-9 Combined Fr ame Relay with ISDN Backup In a typical configuration, the WSX occupies either a slot in a switch chassis or a submodule on an OmniAccess 512. Because it is compatible with Omni Switch/Router any-to-any switching and VLAN architecture, you can switch other topologies in the LAN to Frame Relay or PPP. The W[...]
-
Page 836
Omni Switch/Router WAN Modules Page 28-10 Omni Switch/Router W AN Modules The Omni Switch/Router currently supports four Wide Area Network modules: • WSX-S-2W Provides two serial ports that support the frame relay or PPP protocol. • WSX-SC Provides 4 or 8 serial ports that support the frame relay or PPP protocol. In addition, hardware compressi[...]
-
Page 837
Cable Interfaces for Universal Serial Ports Page 28-11 Cable Interfaces for U niver sal Serial P orts The WSX automatically senses the cable type that you plug into one of its Universal Serial Ports. It can sense whether the cable type is DCE or DTE and whether it is one of the following interfaces: • RS-232 • RS-449 • RS-530 • V.35 • X.2[...]
-
Page 838
Data Compression Page 28-12 Data Compr ession Data compression allows you to get more data through the Frame Relay pipeline, further enhancing cost benefits. A typical data compression ratio on the WSX board at the hardware level is 4:1. In addition, the compression processor ( STAC 9705 ) has its own memory ( DRAM) that can store up to 100 compres[...]
-
Page 839
Loopback Detection Page 28-13 Loopback Detection Loopback Detection is a common method for Carrier Service Providers to test clients’ circuits in the event of suspected line transmission problems. For both Frame Relay and PPP, loop- back detection involves periodically transmitting a message and looking for that message to be received. When imple[...]
-
Page 840
The WAN Port Software Menu Page 28-14 The W AN P ort Softwar e Menu User interface commands for the WSX board are on a separate menu that is accessed through the wan command. The WAN Port menu is a submenu of the Interface menu. Typing wan at any system prompt displays the following menu: Command Wide Area Networking Menu ------------- ------------[...]
-
Page 841
The WAN Port Software Menu Page 28-15 Serial P ort Example In this example, port 1 on slot 3 is a serial port, using Frame-Relay. To modify serial port 3/1, enter: wpm 3/1 A screen similar to following displays: 1) Admin Status ................................................................................. UP {(U)p, (D)own} 2) Speed in BPS ......[...]
-
Page 842
The WAN Port Software Menu Page 28-16 If the interface was using PPP, the following screen would display: 1) Admin Status ................................................................................. UP {(U)p, (D)own} 2) Speed in BPS ................................................................................. 2048000 {9600, 19200, 56000, 6[...]
-
Page 843
The WAN Port Software Menu Page 28-17 Clocking This field sets the type of clocking used to clock transmit and receive data on the serial port. If the clock goes out-of-phase, you will receive errors. Note The clocking value is only relevant if the port is a physical DCE port (i.e., DCE cable plugged into the submodule port). If the submodule port [...]
-
Page 844
The WAN Port Software Menu Page 28-18 Split Clocking Split clocking, which is also known as “loop timing,” uses an additional control signal ( TXCE ) to keep the submodule and external DTE clocking synchronized. In split clocking, the external DTE takes the incoming transmit clock from the submodule and loops it back to TXCE. The submodule then[...]
-
Page 845
The WAN Port Software Menu Page 28-19 TOS for V oice Signaling Data Set the priority for voice signaling data streams. The value must be entered in hexadecimal format translated from binary, and can use either IP Precedence or Differentiated Services Code Point (DSCP). Enter 0 to disable this feature. See Type of Service (ToS) on page 28-2 above fo[...]
-
Page 846
The WAN Port Software Menu Page 28-20 Loopback Timeout Sets the transition time between proprietary messages sent over the link. These messages are analyzed to determine whether the link is in a loopback state. This only displays if the port is using Frame Relay as its encapsulation type. The valid range is 0-255. Connection Function On serial port[...]
-
Page 847
The WAN Port Software Menu Page 28-21 ISDN-BRI P ort Example In this example: port 2 on slot 3 is an ISDN-BRI port. To modify ISDN-BRI port 2/2, enter: wpm 3/2 A screen similar to following displays: 1) Admin Status ................................................................................. UP {(U)p, (D)own} 2) Speed in BPS ..................[...]
-
Page 848
The WAN Port Software Menu Page 28-22 Speed in BPS This option specifies the access rate for the Frame Relay or PPP line to the service provider. This parameter is the speed of the entire connection, not an individual virtual circuit. For example, if you have a 56 kbps line to your service provider, this field should be set to 56000. A full T1 line[...]
-
Page 849
The WAN Port Software Menu Page 28-23 You can set up the external DCE this way by configuring its DTE, or dataport, configura- tion options. Set the “Transmit Clock Source” to “External.” In this mode of operation, the transmit clock is output by the DCE device and the submodule turns it around on the external transmit clock back to the DCE[...]
-
Page 850
The WAN Port Software Menu Page 28-24 TOS for V oice Signaling Data Set the priority for voice signaling data streams. The value must be entered in hexadecimal format translated from binary, and can use either IP Precedence or Differentiated Services Code Point (DSCP). Enter 0 to disable this feature. See Type of Service (ToS) on page 28-2 above fo[...]
-
Page 851
The WAN Port Software Menu Page 28-25 If the interface was using PPP, the following screen would display: 1) Admin Status ................................................................................. UP {(U)p, (D)own} 2) Speed in BPS ................................................................................. 1544000 3) Clocking ..........[...]
-
Page 852
The WAN Port Software Menu Page 28-26 T1/E1 Starting Time Slot This field specifies the first time slot number to use on a T1 or E1 port. For a full T1 or E1 connection, specify time slot 1. For a fractional T1 or E1 connection, set this field to the starting time slot number as specified by your service provider. T1/E1 Number of Time Slots This fi[...]
-
Page 853
The WAN Port Software Menu Page 28-27 KeepAliv e Timeout The number of 100 millisecond increments between generated echo message requests. This only displays if the port is using PPP as its encapsulation type. The valid range is 0-255. Loopback Timeout Sets the transition time between proprietary messages sent over the link. These messages are anal[...]
-
Page 854
The WAN Port Software Menu Page 28-28 Viewing P arameter s for all P orts in a Single Submodule To view port parameters for all ports on a particular submodule , enter the wpview command, followed by the number of the slot. In the following three examples, the port parameters are displayed for an ISDN-BRI board, a serial board, and a T1 board. ISDN[...]
-
Page 855
The WAN Port Software Menu Page 28-29 Viewing P ort P arameter s To view port parameters, enter the following command: wpview 3/<port> where 3 is the slot number for WAN uplinks, and <port> is the port number for which you want to view information (either 1 or 2 ). The following three examples show the configuration setup screens for a [...]
-
Page 856
The WAN Port Software Menu Page 28-30 This next example displays the configuration view screen for a fractional T1 port (port 1) using PPP. To view 3/1, enter: wpview 3/1 or wpv 3/1 A screen similar to following displays: Configuration View for Slot 3, Port 1. 1) Admin Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .[...]
-
Page 857
The WAN Port Software Menu Page 28-31 TOS for Voice Data Shows the priority for voice data streams. The value must be entered in hexadecimal format translated from binary, and can use either IP Precedence or Differentiated Services Code Point (DSCP). See Type of Service (ToS) on page 28-2 above for a more detailed explanation of ToS. TOS for Voice [...]
-
Page 858
The WAN Port Software Menu Page 28-32 Univ ersal Serial P ort Example The following example displays the configuration view screen for a universal serial port (port 2). To view 3/2, enter: wpview 3/2 or wpv 3/2 If the serial port is using Frame-Relay, a screen similar to following displays: Configuration View for Slot 3, Port 2. 1) Admin Status . .[...]
-
Page 859
The WAN Port Software Menu Page 28-33 Clocking This field displays either External , Internal , or Split . For a more detailed discussion of clocking, see Clocking under Modifying a Port on page 28-14. Receive Clock Often, due to delays added to timestamps in when running through switch hardware, the receive clock time is significantly different th[...]
-
Page 860
The WAN Port Software Menu Page 28-34 DTR Pulse Width A Data Terminal Ready (DTR) Pulse is sent at the hardware level to determine a port is still synchronized with its far end connection. The Pulse Width is the number of 100 milli- second increments that the pulse lasts. This only displays if the port is using PPP as its encapsulation type. DTR Pu[...]
-
Page 861
The WAN Port Software Menu Page 28-35 ISDN-BRI P ort Example The following example displays the configuration view screen for an ISDN-BRI port (port 2). To view 3/2, enter: wpview 3/2 or wpv 3/2 A screen similar to following displays: Configuration View for Slot 3, Port 2. 1) Admin Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [...]
-
Page 862
The WAN Port Software Menu Page 28-36 TOS for Voice Data Shows the priority for voice data streams. The value must be entered in hexadecimal format translated from binary, and can use either IP Precedence or Differentiated Services Code Point (DSCP). See Type of Service (ToS) on page 28-2 above for a more detailed explanation of ToS. TOS for Voice [...]
-
Page 863
The WAN Port Software Menu Page 28-37 Deleting P orts The wpdelete command allows you to delete configuration information for a WSX port. When you delete a this information, all WAN configuration parameters for the selected port revert back to default settings. To delete a port configuration, enter the following command: wpdelete slot/port in which[...]
-
Page 864
The WAN Port Software Menu Page 28-38 Obtaining Status and Statistical Information You can obtain general and detailed WAN port statistical information on all WSX boards in the switch, a single WSX board, individual ports, and Frame Relay and PPP protocols. The wpstatus command is used to provide this information. This information includes types of[...]
-
Page 865
The WAN Port Software Menu Page 28-39 Intf Type This column indicates the physical cable type connected to this port. This cable type is automatically sensed by the WSX hardware. This column indicates the cable type and whether it is DCE or DTE . The following values may appear in this column: • V35DTE (V.35 DTE cable) • V35DCE (V.35 DCE cable)[...]
-
Page 866
The WAN Port Software Menu Page 28-40 Speed BPS This column indicates the speed, or access rate, between the WSX serial port and DSU or other physical DTE device. The speed is expressed in bits per second (bps). This speed is the total bandwidth available on the line connected to this port. Virtual circuits on this port share this bandwidth. Usuall[...]
-
Page 867
The WAN Port Software Menu Page 28-41 8-P ort WSX Board Ex ample In this example, the board in slot 5 is an 8-port WSX board. To view the status of slot 5, enter: wpstatus 5 or wps 5 This command displays a screen similar to the following: WAN Port Status for slot: 5 Admin/ Oper Intf Speed Frames Frames Octets Octets PT Status Type BPS In Out In Ou[...]
-
Page 868
The WAN Port Software Menu Page 28-42 Field Descriptions The following section explains the fields and their corresponding values. PT The port number on the WSX board for which statistics are displayed. Admin/Oper Status , Int Type , Speed Bps These columns are described in the section, Obtaining Information on All Boards in a Switch on page 28-38.[...]
-
Page 869
The WAN Port Software Menu Page 28-43 Frame Relay Ex ample In the following example, port 1 on slot 4 is configured for Frame Relay. To obtain status information for this port, enter: wpstatus 4/1 A screen similar to the following will be displayed: This command displays three (3) layers of information. The top section provides information on the p[...]
-
Page 870
The WAN Port Software Menu Page 28-44 PPP Example In the following example, port 1 on slot 4 is configured for Point-To-Point Protocol (PPP). To obtain status information for this port, enter: wpstatus 5/1 A screen similar to the following will display: /Interface/WAN % wps 5/1 WAN Port Status for slot 5, port 1: Administrative/Operation Status: ..[...]
-
Page 871
The WAN Port Software Menu Page 28-45 ♦ Note ♦ The section devoted to compressed data traffic statistics will be displayed only if the port has been configured for STAC-LZS compression. For detailed descriptions of the fields, refer to Chapter 30, “Point-to-Point Protocol.” Configuring 31 Timeslots on a W AN E1 P ort On WSX E1 ports, the u[...]
-
Page 872
The WAN Port Software Menu Page 28-46[...]
-
Page 873
Page 29-1 29 Managing Fr ame Relay The WAN Switching Module ( WSX ) family supports Frame Relay on universal serial, T1 or E1 ports. Management, data handling, compression, and multi-protocol encapsulation are compatible with current Frame Relay standards, such as RFC 1490 and FRF.9 . The WSX supports all three major DLCMI management protocols. WSX[...]
-
Page 874
Page 29-2 The WSX supports automatic detection of cable types attached to universal serial ports. It also supports three types of DLCMI management: LMI Rev. 1.0, ANSI T1.617 Annex D, and CCITT/ ITU-T Q.933 Annex A. Software in the switch allows you to configure access rate, clocking, DLCMI type, compres- sion, and congestions controls, such as the [...]
-
Page 875
Page 29-3 Back-to-Back Fr ame Relay Configurations Frame Relay switching modules may be connected “back-to-back” without an intervening Frame Relay network or switch. Such connections are made by using private leased lines, such as T1 lines, instead of public Frame Relay networks usually over large geographic distances. No special user configu[...]
-
Page 876
Universal Serial Port Cable Interfaces Page 29-4 U niver sal Serial P ort Cable Interfaces The WSX automatically senses the cable type that you plug into one of its universal serial ports. It can sense whether the cable type is DCE or DTE and whether it is one of the follow- ing interfaces: • RS-232 • RS-449 • RS-530 • V.35 • X.21 (Europe[...]
-
Page 877
Compression Page 29-5 Compr ession Data compression allows you to get more data through the Frame Relay pipeline, further enhancing cost benefits. A typical data compression ratio on the WSX board at the hardware level is 4:1. In addition, the compression processor ( STAC 9705 ) has its own DRAM that can store up to 100 virtual circuits (on a 4-por[...]
-
Page 878
Virtual Circuits and DLCIs Page 29-6 Virtual Cir cuits and DLCIs The WSX supports Permanent Virtual Circuits ( PVCs ), but not Switched Virtual Circuits ( SVCs ). Most service carriers do not currently offer SVCs . PVCs are either static (configured) or dynamic (learned). Static PVCs are user-configured and consist of Management, or Control, PVCs a[...]
-
Page 879
WSX Self-Configuration and Virtual Circuits Page 29-7 W SX Self-Configuration and Virtual Cir cuits The following diagram summarizes the self-configuration features of the WSX . This example assumes no configuration parameters are entered for the WSX . Default bridging is set up on Group 1, and no Routing or Trunking are configured. WSX Initial Po[...]
-
Page 880
Congestion Control Page 29-8 Congestion Contr ol Use of Frame Relay lines tends to be “bursty,” with heavy use at times and light use at others. During heavy periods of congestion, data may be discarded. However, Frame Relay uses several software-configurable parameters and techniques to control congestion and to avoid data loss on the network [...]
-
Page 881
Congestion Control Page 29-9 Discard Eligibility (DE) Flag The Frame Relay network keeps track of data that is eligible for discard by using a single bit within each frame. When the data rate exceeds the CIR, frames are tagged (i.e., the DE bit is set to 1). If congestion in the network nears saturation, those frames tagged with the DE bit will be [...]
-
Page 882
Congestion Control Page 29-10 Frames are shown as broken lines below the Access Rate line. The space between frames indicates the delay between the transmission of each frame. For each second, frames sent within the white zone below the diagonal Access Rate line get through. The shaded area just above the white area contains frames that are stamped[...]
-
Page 883
Congestion Control Page 29-11 Noti fication By BECN Each data link header contains a congestion control flag called BECN (Backwards Explicit Congestion Notification), which is usually pronounced “beckon.” Normally this flag is turned off. As with other WAN packet-based networks, frames in Frame Relay may build up in queues at certain points. W[...]
-
Page 884
Congestion Control Page 29-12 Noti fication By FECN Frame Relay headers also contain a congestion control bit called FECN (Forwards Explicit Congestion Notification), which is usually pronounced “Feckon.” Like BECN , the FECN bit also notifies a WSX or Bridge/Router of congestions problems. However, it is set by the Frame Relay network in fram[...]
-
Page 885
Frame Formats Supported Page 29-13 Fr ame Formats Supported Frames coming in from the Frame Relay network are not translated, but they are manipulated to be compatible for transport over the switch’s VBUS . Incoming frames must contain RFC 1490 headers. The following standard 1490 frame types are supported: • BPDU • Ethernet 802.3 • Token R[...]
-
Page 886
Bridging Services Page 29-14 Bridging Services All Frame Relay Virtual Circuits (VCs) belong to a service, whether it be a Bridge, Router, or Trunk service. By default, a virtual circuit belongs to a bridge service. No configuration is necessary for a VC to support bridging on Group 1. However, configuration is necessary for a VC to support Frame R[...]
-
Page 887
Frame Relay IP Routing Page 29-15 Fr ame Relay IP Routing Frame Relay routing is different than standard LAN IP Routing. In normal LAN IP Routing MAC addresses are used as source and destination addresses. In Frame Relay IP Routing, no MAC addresses are included in a routed frame. In fact, the only address in a routed Frame Relay frame is the DLCI [...]
-
Page 888
Frame Relay IP Routing Page 29-16 An InARP message is sent between the two routers indicating their IP addresses and associ- ated VC. Once they know each other’s IP address and the DLCI of the VC on each end of the link (the same VC may have a different DLCIs on each end), then they can begin normal rout- ing of RIP frames, etc. The Frame Relay S[...]
-
Page 889
Frame Relay IP Routing Page 29-17 If an additional Router and Subnet were added to the network and a new VC was added to connect the new location, then much of the WAN routing load would fall on the WSX attached to Subnet 1.1.1.x. Adding A New Router Raises New Questions The new WSX attached to Subnet 4.4.4.x connects to the WAN through the additio[...]
-
Page 890
Frame Relay IPX Routing Page 29-18 Fr ame Relay IPX Routing Frame Relay IPX and IP routing differ in the way they determine the address of a router at each end of a virtual circuit. Instead of using Inverse ARP , IPX uses a process called “glean- ing” to determine routing information. In gleaning, the IPX routing protocol on one end of a virtua[...]
-
Page 891
Trunking Page 29-19 T runking A trunking service must be set up for each virtual circuit that will support trunking. When trunking is set up, you specify the slot, port, DLCI , and Groups that are going to be trunked over the virtual circuit. The illustration below shows a sample trunking configuration. The WSX in Los Angeles has two trunk ports, o[...]
-
Page 892
Frame Relay Fragmentation Interleaving Page 29-20 Fr ame Relay Fragmentation Interleaving The fragmentation interleaving feature allows for the transmission of higher priority traffic to be expedited by setting a maximum frame size. If lower priority traffic exceeds the set frame size value, it is fragmented into smaller pieces less than or equal t[...]
-
Page 893
The Frame Relay Software Menu Page 29-21 The Fr ame Relay Softwar e Menu User interface commands for Frame Relay are on a separate menu that you can access through the fr command. The Frame Relay menu is a sub-menu of the Interface/WAN menu. Typing fr at any system prompt displays the following menu: Command Frame-Relay Menu -----------------------[...]
-
Page 894
Setting Configuration Parameters Page 29-22 Setting Configur ation P arameter s When you plug in a WSX board it is automatically configured with default settings. The WSX board will default the WAN port protocol to frame relay for WSX serial ports, T1 and E1 ports. Commands generic to the WSX module can be found in Chapter 49. By default the WSX f[...]
-
Page 895
Setting Configuration Parameters Page 29-23 A screen similar to the following displays: Modifying Frame Relay port for Slot 2, Port 1. 1) Description....................................…………………………....... = {Enter Up to 30 Characters} 2) Administrative Status ……………………………………..……….. = Up {(U)p, (D)o[...]
-
Page 896
Setting Configuration Parameters Page 29-24 You make changes by entering the line number for the option you want to change, an equal sign (=), and then the value for the new parameter. When you are done entering all new values, type save at the colon prompt (:) and all new parameters will be saved. The follow- ing sections describe the options you [...]
-
Page 897
Setting Configuration Parameters Page 29-25 31) LMI Procedur e Type This field specifies the Local Management Interface ( LMI ) procedure type for this Frame Relay port. You have three choices for the LMI procedure type. The letters used in the frmodify screen correspond to the following: B Bidirectional U User (the default) N Network Enter your ch[...]
-
Page 898
Setting Configuration Parameters Page 29-26 6) Error Thr eshold N392/nN2 The number of DLCMI protocol errors that will be tolerated before determining the Frame Relay line is down and all associated virtual circuits are inactive. These errors may include timeouts from STATUS ENQUIRY polls and invalid STATUS messages returned from the Frame Relay ne[...]
-
Page 899
Setting Configuration Parameters Page 29-27 10) Default Routing Group The default Group for bridging any virtual circuits (user-configured or learned from the Frame Relay network) that are not specifically assigned to a Routing service. If you set this value to 0 (the default value), then virtual circuits will not perform Routing unless specificall[...]
-
Page 900
Setting Configuration Parameters Page 29-28 13) Default Compression PRetry Count This option sets the total number of compression negotiation messages that will be sent before giving up and not running compression. You enter the time between these retries in the Default Compression PRetry Time field. The number of retries can range from 3 to 255. T[...]
-
Page 901
Setting Configuration Parameters Page 29-29 Modifying a Virtual Cir cuit To modify a virtual circuit, enter the following command: frmodify <slot>/<port>/<DLCI> where <slot> is the slot number where the WSX board is located, <port> is the port number on the WSX board, and <DLCI> is the number used to identify the[...]
-
Page 902
Setting Configuration Parameters Page 29-30 Committed Information Rate (CIR) This field sets the Committed Information Rate (CIR) for this virtual circuit. See Congestion Control on page 29-8 for further information on the CIR. ♦ Important Note ♦ The CIR that you enter must match that used by your service provider. This option should only be mo[...]
-
Page 903
Setting Configuration Parameters Page 29-31 Compression PRetry Time This option sets the number of seconds between compression negotiation messages on this virtual circuit. If compression negotiation is enabled, the WSX will send compression negotia- tion messages as many times as you indicate in the Compression PRetry Count. The time between these[...]
-
Page 904
Adding a Virtual Circuit Page 29-32 A dding a Virtual Circuit Data virtual circuits and their DLCI s are normally learned through status messages with the Frame Relay network. However, it may be convenient to pre-configure these virtual circuits before connecting to a live network. In such a case you will need to use the fradd command to set parame[...]
-
Page 905
Viewing Configuration Parameters for the WSX Page 29-33 Vie wing Configuration P ar ameter s for the WSX You can view all current parameters for a WSX port or an individual virtual circuit using the frview command. These parameters will be either the default parameters or parameters you modified using the frmodify command or network management sof[...]
-
Page 906
Viewing Configuration Parameters for the WSX Page 29-34 Viewing P ort P arameter s To view port parameters, enter the following command frview <slot>/<port> where <slot> is the slot number where the WSX board is located, and <port> is the port number on the WSX board on which you want to view information. For example, if you[...]
-
Page 907
Viewing Configuration Parameters for the WSX Page 29-35 Viewing Virtual Cir cuit P arameters To view virtual circuit parameters, enter the following command frview <slot>/<port>/<DLCI> where <slot> is the slot number where the WSX board is located, <port> is the port number on the WSX board, and <DLCI> is the num[...]
-
Page 908
Deleting Ports and Virtual Circuits Page 29-36 Deleting P orts and Virtual Circuits You can delete a WSX port or virtual circuit. When you delete a port or virtual circuit all configuration parameters revert back to default settings. You can use the frdelete command to delete: • a single virtual circuit, or • a port and all of its associated vi[...]
-
Page 909
Deleting Ports and Virtual Circuits Page 29-37 Deleting a P ort and Its Virtual Circuits You can delete a port as well as all of its associated virtual circuits. Deleting a port means that all configuration parameters on the port and all learned virtual circuits will revert back to default settings. The port is not logically deleted, and can still [...]
-
Page 910
Obtaining Status and Statistical Information Page 29-38 Obtaining Status and Statistical Information You can obtain general and detailed Frame Relay statistical information on all WSX boards in the switch, a single WSX board, individual ports, and individual virtual circuits. The frstatus command is used to provide this information. This informatio[...]
-
Page 911
Obtaining Status and Statistical Information Page 29-39 Intf Type This column indicates the physical cable type connected to this port. This cable type is auto- matically sensed by the WSX hardware. This column indicates the cable type and whether it is DCE or DTE . The following values may display in this column • V35DTE (V.35 DTE cable) • V35[...]
-
Page 912
Obtaining Status and Statistical Information Page 29-40 Clocking This field indicates the type of clocking used to clock transmit and receive data in and out of the serial port. When the clock is out-of-phase, you receive errors. If this value is set to Exter- nal, then clocking is controlled by the external DCE (a DSU or other DCE device on the ot[...]
-
Page 913
Obtaining Status and Statistical Information Page 29-41 VCs Activ e/Inactive Each port will have one or more associated virtual circuits. This column tells you the current status of Data virtual circuits. These counts do not apply to management virtual circuits. The first number is the number of active VCs and the second is the number of inactive V[...]
-
Page 914
Obtaining Status and Statistical Information Page 29-42 Information on the P orts for One WSX Boar d To obtain status information on a single WSX board, you enter the frstatus command along with the slot number for the WSX board, as follows: frstatus <slot> where <slot> is the slot number where the WSX board is installed. For example, i[...]
-
Page 915
Obtaining Status and Statistical Information Page 29-43 Information on One P ort To obtain status information on a single WSX port, you enter the frstatus command along with the slot number for the WSX board and the port number for which you want to receive infor- mation, as follows: frstatus <slot>/<port> where <slot> is the slot[...]
-
Page 916
Obtaining Status and Statistical Information Page 29-44 This command displays three (4) layers of information. The top section provides information on the physical interface. The middle section provides information on the logical, or Frame Relay, interface. The third section provides information on the virtual circuits associated with this physical[...]
-
Page 917
Obtaining Status and Statistical Information Page 29-45 Phy sical Layer Information The statistics shown in this section are taken at the physical, or serial, interface level. Administrative/Operational Status This field shows the Administrative and Operational Status of this WSX port. The status indicator before the slash refers to the Administrat[...]
-
Page 918
Obtaining Status and Statistical Information Page 29-46 Control Signal This table (which displays only for serial ports, not T1 or E1 ports) lists two or more control signals along with their current state. If a V.35 , RS-232 , RS-530 , or RS-449 cable is attached then this table lists the following signals: • DTR (Data Terminal Ready.) • RTS ([...]
-
Page 919
Obtaining Status and Statistical Information Page 29-47 Frame Relay Information The statistics shown in the section are gathered at the Frame Relay protocol level. Octets The total octets, or bytes, received (first row) and sent (second row) on this port. The third row shows the cumulative number of octets that have passed through the port (sent an[...]
-
Page 920
Obtaining Status and Statistical Information Page 29-48 Last Error Type The last type of Frame Relay DLCMI protocol error received on this port. The following list describes the error types displayed: Unknown Error An error occurred but it can not be classified into one of the stan- dard Frame Relay error types. Receive Short The receive frame was [...]
-
Page 921
Obtaining Status and Statistical Information Page 29-49 DLCI Lay er Information The information in this section of the display provides statistics on virtual circuits. Each row in this table corresponds to one virtual circuit. DLCI Num The DLCI number assigned to this virtual circuit. This value is only valid locally; the same virtual circuit on th[...]
-
Page 922
Obtaining Status and Statistical Information Page 29-50 Fragmentation Information The information in this section of the display provides statistics on fragmentation. Each row in this table corresponds to one virtual circuit. DCLI The virtual circuit that the fragmentation statistics apply to. Frag Size The maximum size of a frame if fragmentation [...]
-
Page 923
Obtaining Status and Statistical Information Page 29-51 Information on One Virtual Circuit To obtain status information on a single virtual circuit, you enter the frstatus command along with the slot number for the WSX board, the port number, and DLCI number for the virtual circuit on which you want information, as follows: frstatus <slot>/&l[...]
-
Page 924
Obtaining Status and Statistical Information Page 29-52 The Frame Relay Fragmentation Information gives a break down of the fragmented traffic received and sent by this virtual circuit, with indications if fragmentation is currently enabled and the maximum frame size. The final table provides information on compressed data on this virtual circuit. [...]
-
Page 925
Obtaining Status and Statistical Information Page 29-53 FECN Bit This value indicates the total number of frames received from the network indicating forward congestion. This occurs when the Frame Relay network sets the frame’s Forward Discard Eligibility ( FECN ) flag. These frames experienced congestion coming over the virtual circuit. Statisti[...]
-
Page 926
Resetting Statistics Counters Page 29-54 Resetting Statistics Counter s You can reset the statistics counters for a single WSX board, a WSX port, or a specific DLCI . The statistics that are cleared on those that are displayed through the frstatus commands. The frclear command is used to reset statistics. Resetting Statistics for a WSX Boar d To re[...]
-
Page 927
Managing Frame Relay Services Page 29-55 Managing Fr ame Relay Services By default, all virtual circuits on a WSX port have a Bridging service and are assigned to Group 1. The frmodify command allows you to change this default bridging service to another Group and to set up a default routing service for the port. See Setting Configuration Parame- t[...]
-
Page 928
Managing Frame Relay Services Page 29-56 An overview of each type of service and how each operates in a Frame Relay environment can be found earlier in this chapter in the following sections: • Bridging See Bridging Services on page 29-14. • Routing See Frame Relay IP Routing on page 29-15 and Frame Relay IPX Routing on page 29-18. • Trunking[...]
-
Page 929
Configuring a Bridging Service Page 29-57 Configuring a Bridging Service Frame Relay traffic is automatically bridged for Group 1 in a switch. You can alter this default through two different commands: frmodify and cas . The frmodify command allows you to change the default Bridging Group from Group 1 to another Group or to turn off bridging compl[...]
-
Page 930
Configuring a Bridging Service Page 29-58 5. You need to specify the DLCI for the virtual circuit to include in this bridging service. Only one virtual circuit may be specified for each bridging service. There is a one-to-one mapping between the Group and the virtual circuit. Enter a 4, an equal sign (=), and the DLCI number for the virtual circuit[...]
-
Page 931
Configuring a WAN Routing Service Page 29-59 Configuring a W AN Routing Service There are two main steps to configuring WAN routing for frame relay: 1. Enable and configure routing for a specific WAN Routing group with the crgp command. (Frame Relay Groups are different from other Groups as far as router configurations are concerned.) 2. Set up a [...]
-
Page 932
Configuring a WAN Routing Service Page 29-60 Step 2. Set Up a Frame Relay Routing Service You create a Frame Relay routing service using the cas command. Follow the steps below to set up a routing service. 1. Enter the cas command followed the slot number, a slash (/), the port number, and then the service number for the routing service: cas 2/3 1 [...]
-
Page 933
Configuring a WAN Routing Service Page 29-61 6. Specify the Group number to which this router port belongs. Enter a 5, an equal sign (=), and the Group number. The example below includes Group 4 in the routing service: 5=4 Press <Enter> . You must have previously configured this Group as a Frame Relay Routing Group through the crgp command. I[...]
-
Page 934
Configuring a Trunking Service Page 29-62 Configuring a T runking Service To configure a Frame Relay Trunking service, you must use the cas command. Perform the following steps: 1. Enter the cas command followed the slot number, a slash (/), the port number, and then the service number for the Trunking service: cas 2/3 1 A screen similar to the fo[...]
-
Page 935
Configuring a Trunking Service Page 29-63 5. You need to specify the DLCI for virtual circuit that will be used to trunk traffic over the Frame Relay network. Only one virtual circuit may be specified for each Trunking service. Enter a 4, an equal sign (=), and the DLCI number for the virtual circuit similar to the example below: 4=16 Press <Ent[...]
-
Page 936
Viewing Frame Relay Services Page 29-64 Vie wing Frame Relay Services You can view all Frame Relay services for an entire switch, a single WSX board, or a single WSX port. Use the vas command with the following parameters: vas <slot>/<port> <service number> The <slot>, <port> and <service number> parameters are n[...]
-
Page 937
Modifying a Frame Relay Service Page 29-65 Vport The virtual port associated with this service. For bridging services, there is a one-to-one mapping between a virtual port and a virtual circuit. For routing services, multiple virtual circuits may map to a single virtual port. For trunking services, multiple virtual ports can map to a single virtual[...]
-
Page 938
Deleting a Frame Relay Service Page 29-66 Deleting a Fr ame Relay Service You can delete a Frame Relay service using the das command as follows: 1. Enter das followed by the slot, port and service number for the Frame Relay service that you want to delete. You can obtain the service number by using the vas command. See Viewing Frame Relay Services [...]
-
Page 939
Page 30-1 30 P oint-to-P oint Pr otocol The Point-to-Point Protocol (PPP) provides a standard method for transporting multi-protocol datagrams over point-to-point links. The base protocol is specified in RFC 1661. Many other RFCs define additional capabilities for network protocol negotiation, management information databases (MIBs), and PPP operat[...]
-
Page 940
Page 30-2 Data Compression RFC 1974 specifies the use of STAC-LZS compression with PPP. Data compression allows the payload of a PPP packet, including the protocol ID, to be compressed, saving valuable bandwidth. Compression is negotiated during the Network phase using Compression Control Protocol (CCP), which includes the negotiation of a data com[...]
-
Page 941
Page 30-3 Multilink Modes of Operation Multilink PPP supports combinations of both permanent and switched connections. This results in two possible modes of operation: • permanent connection only • switched connection only Note One important thing to remember when setting up multilinks is that all links to be bundled must exist on the same slot[...]
-
Page 942
Page 30-4 On the receiving side, as low priority frames are being received they will be put into the MLPPP reassembly queue, as supported by the existing software. As complete frames are received they will be forwarded to the normal PPP processing. When high priority frames are received, since they will always be sent complete, they will immediatel[...]
-
Page 943
Page 30-5 The configuration of a T1/E1 interface is described in Chapter 33 titled “Managing T1 and E1 Ports.” The configuration of a universal serial port (USP) on a WSX-S board is described in Chapter 28 titled “Managing WAN Switching Modules.” Step 2. Configure the Operation of PPP Itself The information configured at the PPP level inclu[...]
-
Page 944
The PPP Submenu Page 30-6 The PPP Submenu The WAN menu contains a submenu, named PPP , containing commands specific to the Point- to Point-Protocol (PPP). To display the PPP menu, enter the following commands: PPP ? A screen similar to the following displays: Command PPP Menu ----------------- -------------------------------------------------------[...]
-
Page 945
Setting Global PPP Parameters Page 30-7 Setting Global PPP P arameter s The pppglobal command is used to set global configuration parameters that are used by the PPP protocol. These parameters are termed “global” because they are the default settings used by the switch to establish connections with incoming calls. These global settings are not [...]
-
Page 946
Setting Global PPP Parameters Page 30-8 Default Compression T ype Specifies the type of compression that is to be expected on incoming calls. The options are None and STAC-LZS . If you set this parameter to None and your callers are using compression, the caller’s connection request may be refused. See Data Compression on page 30-2 for a descript[...]
-
Page 947
Adding a PPP Entity Page 30-9 A dding a PPP Entity The pppadd command is used to add a PPP Entity configuration record. The PPP Entities you create are identified by numbers called Peer IDs. When you enter the pppadd command, you may enter a Peer ID number with the command like this: pppadd <ID number> Alternatively, you can enter the command[...]
-
Page 948
Adding a PPP Entity Page 30-10 A screen similar to the following will display: Adding PPP configuration record for Peer ID: 1 Enter PPP parameters: 1) Description : {Enter text up to 30 characters} 2) Administrative Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Enabled {(E)nable, (D)isable} 3) PPP Mode . . . . . . . . . . . . .[...]
-
Page 949
Adding a PPP Entity Page 30-11 Note You can add the link needed for a PPP Entity later if you decide not to do so now. The automatic execution of the linkadd command is done here only as a conve- nience to you. The fields on the pppadd configuration screen have the following meanings: Description A textual description for this PPP Entity. You can e[...]
-
Page 950
Adding a PPP Entity Page 30-12 Enabling Routing expands the menu with the following suboptions: 6) Routing Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 {1-65535 or 0 if no Routing} 60) IP Config Admin Status . . . . . . . . . . . . . . . . . . . . . . . . . Enabled {(E)nabled, (D)isabled} 61) Remote IP Address (On[...]
-
Page 951
Adding a PPP Entity Page 30-13 User ID sent to remote for Authentication Used to specify the User ID to be sent to the remote end during PAP or CHAP authentica- tion. This parameter is used only for outgoing calls. Incoming calls use the global defaults (see Setting Global PPP Parameters on page 30-7 for details). Password sent to remote for Authen[...]
-
Page 952
Adding a PPP Entity Page 30-14 Limit Maximum number of fragments to 16 This flag is set to make the interface compatible with Cisco products. When set to Yes , a PPP packet is never fragmented into more than 16 smaller packets.[...]
-
Page 953
Modifying a PPP Entity Page 30-15 Modi fying a PPP Entity The pppmodify command is used to modify the parameters of an existing PPP Entity. To modify a specific PPP Entity, for example Peer ID 1, enter the following command: pppmodify p1 A screen similar to the following displays: Modify PPP for communication to Peer ID: 1 Enter PPP parameters: 1) [...]
-
Page 954
Viewing PPP Entity Configurations Page 30-16 Vie wing PPP Entity Configurations The pppview command is used to view the configuration parameters of existing PPP Entities. Displaying the Configuration of All PPP Entities To view configuration information on all PPP Entities, enter the following command: pppview A screen similar to the following di[...]
-
Page 955
Viewing PPP Entity Configurations Page 30-17 Routing Group Indicates the VLAN Group to be used for PPP Routing of the IP and IPX protocols. A value of zero ( 0 ) indicates that this PPP Entity will not perform a routing service and will discard all routed format packets received or transmitted. Displaying the Configuration of a Speci fic PPP Enti[...]
-
Page 956
Displaying PPP Entity Status Page 30-18 Displaying PPP Entity Status The pppstatus command is used to view the operational status of one or more PPP Entities. Displaying the Status of All PPP Entities To view the operational status of all PPP Entities, enter the following command: pppstatus A screen similar to the following displays: IP IPX BCP CCP[...]
-
Page 957
Displaying PPP Entity Status Page 30-19 BCP Oper State Indicates the operational state of the Bridging Control Protocol option. Open means that the bridging operation is active. Closed means that the bridging operation has not yet reached the open state. The reasons why the state may be closed are: 1) the call has been disconnected, 2) the protocol[...]
-
Page 958
Displaying PPP Entity Status Page 30-20 IPCP Pkts IN/OUT The total number of IP Control Protocol (IPCP) packets received ( In ) and transmitted ( Out ) on this PPP connection. IPCP Pkts IN/OUT The total number of IP Control Protocol (IPCP) packets received ( In ) and transmitted ( Out ) on this PPP connection. BCP Pkts IN/OUT The total number of BC[...]
-
Page 959
Deleting a PPP Entity Page 30-21 Deleting a PPP Entity The pppdelete command is used to delete an existing PPP Entity. 1. Before you can delete a PPP Entity, you must first delete all the links associated with it. You do so using the linkdelete command (see Chapter 31 titled “WAN Links”). If you try to delete a PPP Entity that still has links a[...]
-
Page 960
Deleting a PPP Entity Page 30-22[...]
-
Page 961
Page 31-1 31 W AN Links Intr oduction This chapter describes the procedures for configuring a “WAN link” between an already created PPP Entity (see Chapter 30, Point-to-Point Protocol ) and the physical interface that will be used to carry PPP traffic. The procedures described in this chapter comprise the third and final step in the three-step [...]
-
Page 962
The Link Submenu Page 31-2 The Link Submenu The WAN menu contains a submenu named link which contains commands for creating the WAN Links needed to support the Point-to-Point Protocol (PPP) over various hardware inter- faces. WAN links can either be “fixed” (i.e., configured for a serial port or T1/E1 port), or dial- based (i.e., configured for[...]
-
Page 963
Adding a WAN Link Page 31-3 A dding a W AN Link The linkadd command is used to add link configuration records, or “WAN Links” to the switch. This command defaults to a WSX physical port (serial or Fractional T1/E1). When the linkadd command is used to create links over WSX ports, all of the parameters needed to create the link are contained on [...]
-
Page 964
Adding a WAN Link Page 31-4 Administr ative Status Sets the Administrative Status of this WAN Link. The options are “ Enabled, ” which will enabled this link and “ Disabled, ” which will disable the link but not delete it. Link Type Specifies the type of physical connection that will carry the link. The options are “ WSM Port, ” which m[...]
-
Page 965
Adding a WAN Link Page 31-5 2. You must now change the Link Type to ISDN. To do so, enter the following commands: : 3=I : ? A screen similar to the following displays: 1) Link Description : {Enter text up to 31 characters} 2) Link Administrative Status . . . . . . . . . . . . . . . . . . . . . . . . . . = Enabled {(E)nabled, (D)isabled} 3) Link Typ[...]
-
Page 966
Adding a WAN Link Page 31-6 A screen similar to the following displays: Modify ISDN call record configuration. Peer ID: 1 Link Index: 1 Type: ISDN Call Slot: 4 Port: 2 1) Link Description : Link Entry: 1, Peer ID: 1 {Enter text up to 30 characters} 2) Link Administrative Status . . . . . . . . . . . . . . . . . . . . . . . . . . = Enabled {(E)nable[...]
-
Page 967
Adding a WAN Link Page 31-7 Minimum Call Duration The minimum duration of a call, in seconds, starting from the time the call is connected until the call is disconnected. If you enable this field by entering a nonzero value, the Inactivity Timer will be disabled until the time set in the Minimum Call Duration field has passed. Maximum Call Duration[...]
-
Page 968
Adding a WAN Link Page 31-8 4. You must now enter a value in at least the Remote Phone Number field under Outgoing Calls . If you do not make an entry in this field, an error will be returned by the system when you attempt to save and exit the screen. You can also make changes to any of the other fields on this screen if they are needed to provide [...]
-
Page 969
Modifying a WAN Link Page 31-9 Modi fying a W AN Link The linkmodify command is used to modify the parameters of an existing WAN Link. Different parameters will be displayed by the command based on the type of link. The first subhead- ing ( Modifying ISDN Links ) below shows the sequence of screens when modifying a link over a WSX port. The second [...]
-
Page 970
Modifying a WAN Link Page 31-10 2. Make the desired changes to each of the fields on this screen, then enter the save command to implement your changes. The system prompt will then reappear. Modi fying WSX Links 1. To modify a WAN Link, you must enter its Link Index with the command. For example, to modify Link Index 2 which uses a WSX physical por[...]
-
Page 971
Deleting WAN Links Page 31-11 Deleting W AN Links The linkdelete command is used to delete one or more existing WAN Link records. Note Before you can delete a PPP Entity, you must first delete all WAN Links that have been associated with it. See Deleting a PPP Entity in Chapter 30 for complete information. 1. To delete an existing WAN Link, for exa[...]
-
Page 972
Viewing WAN Links Page 31-12 Vie wing W AN Links The linkview command is used to view information on existing WAN Link records. Displaying All Existing W AN Links To view information on all existing WAN Links, enter the following command: linkview A screen similar to the following displays: List of ISDN Port Type: Peer Link Link Link Link Outgoing [...]
-
Page 973
Viewing WAN Links Page 31-13 Incoming Caller ID The phone number reported by the Caller ID service, if available. P eer Speed The specified calling speed for this link. The options are 56000 and 64000 bits/second. Inactivity Timer Specifies the time period (in seconds) after which the connection will be terminated if it is not carrying useful data.[...]
-
Page 974
Viewing WAN Links Page 31-14 Example of W SX Serial or T1/E1 Link An example of a link over a WSX serial or Fractional T1/E1 port would look like this: View ISDN Link configuration. Index: 2 Link Peer ID: 3 Type: WSM port Slot: 5 Port: 2 1) Link Description : Link Entry: 1, Peer ID: 1 {Enter text up to 31 characters} 2) Link Administrative Status .[...]
-
Page 975
Displaying Link Status Page 31-15 Displaying Link Status The linkstatus command is used to display the operational status of WAN Links. Displaying Status for All W AN Links To view information on all WAN Links, enter the following command: linkstatus A screen similar to the following displays: Link Peer Idx Id Slot/Port Last Setup Time ==== ===== =[...]
-
Page 976
Displaying Link Status Page 31-16 Peer Call Address The number to which this call is connected. Zero (0) means the number is not available. Connection Time The value of “sysUpTime” (the time of day) when the call was connected. Zero (0) means the call is not currently connected. Call State The current call state. The possible entries are IDLE ([...]
-
Page 977
Displaying Link Status Page 31-17 Refused Calls The number of calls from the Peer ID that were refused, or any reason, since system start-up. Last Setup Time The value of “sysUpTime” (the time of day) when the last call to this peer was started. For ISDN, this will be the time when the setup message was received from or sent to the network. Thi[...]
-
Page 978
Displaying Link Status Page 31-18[...]
-
Page 979
Page 32-1 32 Managing ISDN P orts The WAN Switching Module for the Basic Rate Interface (WSX-BRI) supports 1 or 2 Universal Serial Ports (USP) and 1 or 2 ISDN Basic Rate Interfaces (BRI). The USPs can support Frame Relay or Point-to-Point Protocol (PPP). The BRI interface can support only PPP. The Universal Serial Port on a WSX-BRI board is operati[...]
-
Page 980
Page 32-2 “U”, “S/T” , and “R” Interfaces The ISDN specification defines a limited set of user-to-network interfaces, including reference points for the BRI access method. The following are the main BRI reference points: U Interface. The U interface is a two-wire (single pair) interface that supports full-duplex data transfer from the p[...]
-
Page 981
The ISDN Submenu Page 32-3 The ISDN Submenu The WAN menu contains a submenu, ISDN , containing commands specific to WSX-BRI ISDN ports. To switch to, and to display, the ISDN menu, enter the following commands: ISDN ? A screen similar to the following displays: Command ISDN Menu ----------------- ----------------------------------------------------[...]
-
Page 982
Modifying an ISDN Configuration Entry Page 32-4 Modi fying an ISDN Configuration Entry The isdnm command is used to modify the parameters for a selected ISDN port. These param- eters are typically provided by the telephone carrier or other service provider at the time the ISDN line is installed. 1. To modify a specific port, for example in Slot 4,[...]
-
Page 983
Deleting an ISDN Configuration Entry Page 32-5 Deleting an ISDN Configur ation Entry The isdnd command is used to delete one or more ISDN configuration entries. Deleting the configuration entry is equivalent to returning the ISDN port to its default settings. Although you cannot delete a physical ISDN port from the switch, you can remove the confi[...]
-
Page 984
Viewing an ISDN Configuration Entry Page 32-6 Vie wing an ISDN Configuration Entry The isdnv command is used to view the configuration of existing ISDN configuration entries. You can either view a configuration summary for all ISDN ports on a specified slot, or display the configuration for a single ISDN port. To view configuration information on [...]
-
Page 985
Displaying ISDN Configuration Entry Status Page 32-7 Displaying ISDN Configur ation Entry Status The isdns command is used to view the operational status of existing ISDN configuration entries. You can select to view the status of all ISDN ports, or select to display the status of a single ISDN port. Displaying Status of All ISDN P orts To view st[...]
-
Page 986
Displaying ISDN Configuration Entry Status Page 32-8 Displaying Status of a Speci fic ISDN Slot To view status information on all ISDN channels on a specific ISDN slot, for example, slot 4, enter the following command: isdns 4 A screen similar to the following displays: Status for ISDN D channel on slot: 4, Port: 1: LAPD OperStatus: Layer 1: Activ[...]
-
Page 987
Displaying ISDN Configuration Entry Status Page 32-9 Oper Status Indicates the current call control state for this interface. The possible entries are: Idle means the B Channel is idle: no call or call attempt is in progress. Connecting means a connection attempt (outgoing call) is being made. Connected means an incoming call is currently in the pr[...]
-
Page 988
Displaying ISDN Configuration Entry Status Page 32-10[...]
-
Page 989
Page 33-1 33 Managing T1 and E1 P orts T1 and E1 ports are supported on a variety of switching modules. In the Omni Switch/Router, T1 and E1 are used as standard WAN access portss. The following switching modules contain T1 or E1 ports: • WSX-FT1/E1 Ports on these modules share a common set on of physical level attributes and a common set of soft[...]
-
Page 990
T1 and E1 Overview Page 33-2 T1 and E1 Ov erview Carrier digital services were designed primarily to support digitized voice over long distances. Digital services are the primary method for carrying voice between two endpoints using two pairs of copper wire. Digital wide-area data networking uses the same digital services that were originally desig[...]
-
Page 991
The T1/E1 Menu Page 33-3 The T1/E1 Menu The commands for configuring and monitoring T1 and E1 ports are contained in the te submenu. This submenu displays as shown below and may be accessed (when in verbose mode) by entering te at a system prompt. Command T1/E1 Port Management Menu -------------- ----------------------------------------------------[...]
-
Page 992
Configuring a T1 Port Page 33-4 Configuring a T1 P ort The temod command configures a T1 port at the physical level and is generic to all such ports regardless of the logical level service, such as circuit emulation, that controls them. To configure a T1 port, enter the following command temod <slot>/<port> where <slot> is the sl[...]
-
Page 993
Configuring a T1 Port Page 33-5 If you choose the unframed format, then the framer will not look for Channel Associated Signalling ( CAS ). Data is treated as a data stream. When used in a circuit emulation applica- tion, this option must be chosen when configuring an “unstructured” circuit emulation service. Important Note You cannot use the u[...]
-
Page 994
Configuring a T1 Port Page 33-6 5) Facility Datalink Facility Datalink ( FDL ) gathers performance statistics every second and stores them in the 24- hour local statistical database. It also sends local performance statistics to the remote T1 port depending on the type of FDL chosen and the “role” of the FDL (specified in the next field). In or[...]
-
Page 995
Configuring a T1 Port Page 33-7 8) Loopback Mode The loopback configuration for this port. Loopback configurations describe the relation between the device attached to a T1 port and the framing functionality within the T1 port. Framing functionality assembles T1 frames into SuperFrames and Extended SuperFrames, depending on how the port is configur[...]
-
Page 996
Configuring an E1 Port Page 33-8 Configuring an E1 P ort The temod command configures an E1 port at the physical level and is generic to all such ports regardless of the logical level service, such as circuit emulation, that controls them. You configure the circuit emulation service that controls this port through the cemodify command. To configur[...]
-
Page 997
Configuring an E1 Port Page 33-9 2) Frame F ormat Specify the E1 frame format to be used on this port. The choices are as follows: E1 Standard E1 frame format using the framing bits in time slot 0 for framing. E1-CRC E1 frame using framing bits in both time slot 0 and CRC-4 multiframe for fram- ing. E1-MF E1 frame using framing bits in both time sl[...]
-
Page 998
Configuring an E1 Port Page 33-10 6) Tr ansmit Clock Source The source of the transmit clock. Loop timing means the receive clock (recovered from receive data) is used as the transmit clock. Local timing indicates the local clock source (generated from PLL s) is used as the transmit clock. The transmit clock source is related to the clocking mode u[...]
-
Page 999
Viewing T1/E1 Configuration and Alarm Information Page 33-11 Vie wing T1/E1 Configuration and Alarm Information You can view all current parameters and alarms for a T1 or E1 port using the tes command. These parameters will be either the default parameters or parameters you modified through the temod command or network management software. You hav[...]
-
Page 1000
Viewing T1/E1 Configuration and Alarm Information Page 33-12 LossOfSignal The port has experienced a Loss of Signal ( LOS ), or Loss of Carrier. An LOS event occurs after 175 contiguous pulse positions with no pulses (10 absent pulses on E1 ports). An LOS failure is cleared after the switch observes a single pulse. RcvLOMF This port is receiving lo[...]
-
Page 1001
Viewing T1/E1 Configuration and Alarm Information Page 33-13 Viewing Information F or a T1 P ort To view T1 port parameters, enter the following command tes <slot>/<port> where <slot> is the slot number where the board is located, and <port> is the T1 port number on the board on which you want to view information. For exampl[...]
-
Page 1002
Viewing T1/E1 Configuration and Alarm Information Page 33-14 Out of Frame Events . The total number of out of frame events that have been detected on this port. An out of frame event occurs when two or more framing errors occur within a 3 micro- second period for Extended SuperFrame signals, or when two or more errors occur out of five or fewer con[...]
-
Page 1003
Viewing T1/E1 Configuration and Alarm Information Page 33-15 Viewing Information F or an E1 P ort To view E1 port parameters, enter the following command tes <slot>/<port> where <slot> is the slot number where the board is located, and <port> is the E1 port number on the board for which you want to view information. For exam[...]
-
Page 1004
Viewing T1/E1 Configuration and Alarm Information Page 33-16 Out of Frame Events . The total number of out of frames events that have been detected on this port. An out of frame event occurs when three consecutive frame alignment signals have been received with an error. The signal will be back in frame when frame alignment signalling is normal for[...]
-
Page 1005
Viewing T1/E1 Local Statistics Page 33-17 Vie wing T1/E1 Local Statistics There are a number of commands available for viewing local T1 and E1 statistics. These commands provide statistics for the past 24 hours, the current 15-minute interval, or the past 96 15-minute intervals. The following sections describe these commands. Viewing T otal Local S[...]
-
Page 1006
Viewing T1/E1 Local Statistics Page 33-18 SEFS . Severe Errored Framing Second. A second with one or more out-of-frame errors or an AIS error. LES . Line Errored Seconds. The number of seconds during which one or more Line Code Violation errors have occurred (see also the definition of Line Code Violation below). CSS . Controlled Slip Seconds. A on[...]
-
Page 1007
Viewing T1/E1 Local Statistics Page 33-19 Viewing Local Historical Statistics The telis command allows you to display historical statistics for the past 96 15-minute inter- vals. Enter the following command telis <slot>/<port> where <slot> is the slot number where the board is located, and <port> is the port number on the bo[...]
-
Page 1008
Viewing T1 Remote Statistics Page 33-20 Vie wing T1 Remote Statistics To receive and monitor remote statistics on T1 ports you must enable the Facility Datalink ( FDL ) protocol through the temod command. These statistics will not be available if you do not enable FDL . Note Because there is no FDL standard for E1 configura- tions, remote statistic[...]
-
Page 1009
Viewing T1 Remote Statistics Page 33-21 Viewing Curr ent Remote Statistics You can view remote statistics for the current 15-minute interval on a single port by entering the following command tercs <slot>/<port> where <slot> is the slot number where the board is located, and <port> is the port number on the board on which yo[...]
-
Page 1010
Viewing T1 Remote Statistics Page 33-22 Clearing the Framer Statistics for a T1/E1 P ort The tecls command enables you to clear the accumulated physical-layer (Framer) statistics for a T1 or E1 port. To clear statistics, enter tecls <slot>/<port> where <slot> is the slot number where the board is located, and <port> is the p[...]
-
Page 1011
Page 34-1 34 Backup Services Intr oduction Backup Services are intended to be an integral part of a well-designed Wide Area Network (WAN). The purpose of a backup service is to provide an alternate route for data to take in the event of failure of the Primary port or Virtual Circuit. Initially, the primary entity may be either a physical port (any [...]
-
Page 1012
Backup Services Commands Page 34-2 Backup Services Commands Backup services provides commands to view and configure your backup services. All commands start with “bs” for “Backup Service” followed by the function desired. All backup commands may be typed in full, or a three character abbreviation may be used (e.g. bsadd or bsa may be used t[...]
-
Page 1013
Backup Services Commands Page 34-3 Adding a Backup Service With the bsadd command, you can: • Add a backup for a physical port • Back up a frame relay PVC Adding a backup for a Ph ysical P ort To add a backup service for a physical port: 1. Enter the bsadd command with no parameters, followed by <return> . /Interface/backup % bsa <retu[...]
-
Page 1014
Backup Services Commands Page 34-4 : 30=2 : 31=1 : 40=5 : ? 1) Description: Backup 1 2) Admin Status { (E)nabled, (D)isabled } : Enabled 3) Primary Type { Physical Port (1), Frame Relay PVC DLCI (2) } : Physical Port 30) Slot : 2 31) Port : 1 4) Backup Type { PPP Peer (1) } : PPP Peer 40) Peer ID : 5 5) Startup Timer Value { Time in Seconds after S[...]
-
Page 1015
Backup Services Commands Page 34-5 5) Startup Timer V alue This field sets the time after system startup to wait for the primary entity to come up. If the primary entity fails to come up within the defined time after system startup, the backup entity will be activated. Acceptable values are in the range of 0-65535 seconds. The default value is 300 [...]
-
Page 1016
Backup Services Commands Page 34-6 Backing Up a Frame Relay PVC Adding a backup service for a frame relay PVC is basically the same as for a physical port. The only differences are that you must specify Primary Type as Frame Relay , and you must specify a DLCI number. To add a backup service for a frame relay PVC: 1. Enter the bsadd command with no[...]
-
Page 1017
Backup Services Commands Page 34-7 : 3=2 1) Description : Backup 2 2) Admin Status { (E)nabled, (D)isabled } : Enabled 3) Primary Type { Physical Port (1), Frame Relay PVC (2) } : Frame Relay PVC 30) Slot : 31) Port : 32) DLCI : 4) Backup Type { PPP Peer (1) } : PPP Peer 40) Peer ID : 5) Startup Timer Value { Time in Seconds after System Startup to[...]
-
Page 1018
Backup Services Commands Page 34-8 : 30=3 : 31=3 : 32=32 : 40=1 : ? 1) Description : Backup 2 2) Admin Status { (E)nabled, (D)isabled } : Enabled 3) Primary Type { Physical Port (1), Frame Relay PVC (2) } Physical Port 30) Slot : 3 31) Port : 3 32) DLCI : 32 4) Backup Type { PPP Peer (1) } : PPP Peer 40) Peer ID : 1 5) Startup Timer Value { Time in[...]
-
Page 1019
Backup Services Commands Page 34-9 Modi fying a Backup Service With the bsmodify command, you can modify: • A backup for a physical port • A frame relay PVC. Modifying a backup for a Ph ysical P ort To modify a backup service for a physical port: 1. Enter the bsmodify command, followed by the index of the Backup service, followed by <return&[...]
-
Page 1020
Backup Services Commands Page 34-10 Modifying a Fr ame Relay PVC Backup Service To modify a backup service for a frame relay PVC: 1. First, enter the bsmodify command, followed by the index of backup service, followed by <return> , as shown in the example below: /Interface/backup % bsm b2 <return> A screen similar to that shown below wi[...]
-
Page 1021
Backup Services Commands Page 34-11 Viewing Backup Service(s) Configur ations With the bsview command, you can view the configuration of either all backup services, or a single backup service. Viewing the Configur ations of All Backup Services To view the configurations for all backup services, enter the following command, followed by <return&[...]
-
Page 1022
Backup Services Commands Page 34-12 Viewing Backup Service Statistics To view the statistics of a back service, enter the bsstatus command in the following manner: bsstatus b<backupIndex> where b<backupIndex> is the service index number assigned to the service when it was created. For example, to see the statistics for a backup service [...]
-
Page 1023
Backup Services Commands Page 34-13 Idx . The index number of the backup service. Description . Enter a description of the backup service in this field. Your description may consist of a maximum of 30 ASCII characters. Primary Type . This field shows the type of entity that will be backed up in the case of network failure. The available options are[...]
-
Page 1024
Backup Services Commands Page 34-14[...]
-
Page 1025
Page 35-1 35 T r oubleshooting This chapter provides information that will help you troubleshoot Omni Switch/Router hard- ware and software problems. The sections within this chapter describe problems or errors you may encounter during switch hardware and software installation, configuration, or operation. Subsections within these categories reflec[...]
-
Page 1026
Detecting Problems Page 35-2 This chapter lists UI error messages. Refer to the appropriate hardware chapters for a complete description of LED states. Refer to NMS online documentation for explanations of NMS error messages. Refer to Chapter 25, “ IP Routing,” for procedures to use the ping command. Refer to Chapter 36, “Running Hardware Dia[...]
-
Page 1027
Reporting Problems Page 35-3 Reporting Pr oblems In some cases, you will not be able to correct the problem that occurs (for instance, a module failure). In such cases, you should contact Alcatel Technical Support at one of the following locations: West Coast: Alcatel Technical Support 26801 West Agoura Road Calabasas, CA 91301 Telephone : 1-800-99[...]
-
Page 1028
Reporting Problems Page 35-4 Report Softwar e Details When reporting problems you should be ready to report the following software details to Alcatel Technical Support: • Software revision (e.g., 3.4.8, 4.3.2) • Whether the feature never worked or was intermittent • Bridging or routing configured • Multiple groups or VLANs configured • IP[...]
-
Page 1029
Understanding Problems Page 35-5 U nderstanding Pr oblems The following self-questions can be used to get a better idea on the nature of the problem: • Has this functionality ever worked? • What changes have occurred in the network? Was software upgraded? Were device(s) added? • Are all users affected or are the problems related to a single p[...]
-
Page 1030
Operational Problems Page 35-6 Oper ational Problems The following paragraphs describe operational problems you may encounter. Deadlocked VLAN Occasionally, a VLAN may deadlock. This may be a result of the configuration process you used when you set up the VLANs . If, for example, you have a setup with three switches, as shown in the following figu[...]
-
Page 1031
Operational Problems Page 35-7 To determine if this problem has occurred in your setup, you can use the vi command to display information about a specific port. (See Chapter 19, “Managing Groups and Ports,” for more information on the vi command.) The syntax for this command is as follows: vi <slot>/<interface> The system will show [...]
-
Page 1032
Operational Problems Page 35-8 Protocol Pr oblems You may notice an abnormal number of errors in a particular protocol. You can view proto- col errors by using the networking commands. Refer to Chapter 25, “IP Routing,” for more information on the networking commands. Probable Cause Incompatible versions of the protocol are running on stations [...]
-
Page 1033
Hardware Problems Page 35-9 Har dwar e Problems The following sections describe problems you may encounter with switch hardware. LEDs Do Not Light on All Modules You have turned on the power supply to the switch, but the LEDs on the modules do not light. Probable Cause The power supply has blown a fuse. Solution Call Alcatel Technical Support. Ambe[...]
-
Page 1034
Hardware Problems Page 35-10 TEMP LED is Amber If the TEMP LED is amber, the internal temperature of the switch has exceeded the opera- tional limit. Solution Perform the following steps: 1. Turn off the switch and wait until it has completely cooled down. 2. Check the immediate environment and ensure that the switch is not located in an area where[...]
-
Page 1035
Error Messages Page 35-11 Err or Messages This section provides error messages that you may encounter in the UI . Under standing Error Messages Error messages reflect hardware or software problems that the switch encountered during initialization, configuration, or operation. In some instances, the messages that display on the UI show the C program[...]
-
Page 1036
Error Messages Page 35-12 Serial P ort Configuration Err ors Message Corrective Action Problem deleting SLP port xxx , errno= xx Reboot the system, then use the Boot Line configuration to force SLIP down at the boot line (refer to Appendix A “The Boot Line Prompt”). Can’t modify SLIP if it’s not up! current mode= xxx Reconnect the SLIP lin[...]
-
Page 1037
Error Messages Page 35-13 Chassis Error Messages The slots in the messages within the following table are all zero based. That is, Slot 1 will be displayed as “Slot 0,” Slot 2 will be displayed as “Slot 1,” etc. Chassis Error Messages T able Message Corrective Action Problem deleting SLP port xxx , errno= xx Reboot the system, then use the [...]
-
Page 1038
Error Messages Page 35-14 Chassis Error Messages T able (Cont.) Message Corrective Action Couldn’t read chassis description, setting default Enter a new chassis description with the syscfg command. cmSavePortInfo( ) successful This message does not indicate an error.[...]
-
Page 1039
Page 36-1 36 Running Har dw ar e Diagnostics Hardware diagnostics provide you with software tools for diagnosing hardware-related problems on Omni Switch/Router switching modules. These diagnostics allow you to test switching modules off-line during network down time. The Omni Switch/Router have a variety of switching modules interconnected by a fr[...]
-
Page 1040
Page 36-2 • mvbus Mammoth VBUS Test • pcam Pseudo CAM Test • port Port Traffic Test • stress Port Stress Test (available for Ethernet modules) • submem Submodule Local Memory Test • suni SUNI Register Test • tellreg Telluride Register Test • whsreg Whistler Register Test • wsmcable WSX Cable Connection Test • xcam Alcatel CAM Of[...]
-
Page 1041
Login to Run Diagnostics Page 36-3 Login to Run Diagnostics You must log in to the diag account to access the hardware diagnostics functionality. The diag user is a superset of the admin user. The diag user can run all hardware diagnostics in addition to all of the capabilities available to the admin user. The default password for the diag user is [...]
-
Page 1042
Resetting a Switching Module Page 36-4 Resetting a Switching Module The reset command initiates a soft reset on the module in a specified slot. Conceptually, resetting a switching module with this command is similar to switching off power to the module; the module will be in the same state after a reset as it is after a power on. ♦ Notes ♦ Some[...]
-
Page 1043
Temperature Masking Page 36-5 T emperatur e Masking The maskta command provides a way of modifying the behavior of the temperature alarm to mask the effect of the temperature sensor. By masking the temperature alarm bits, you can ensure that the MPX ’s TEMP LED doesn’t signal or that it resets after a specified delay time. By default, temperatu[...]
-
Page 1044
Running Hardware Diagnostics Page 36-6 Running Har dwar e Diagnostics The test command initiates one or more test routines on a switching module that you specify. You can also optionally test all switching modules in one test session. Test status, instructions, and a summary of results are provided as output. Start a diagnostic test session using t[...]
-
Page 1045
Running Hardware Diagnostics Page 36-7 ilbstress Performs a stress test using the internal loopback at the PHY or framer interface. Packets are generated by the MPX and sent out to the port and returned through an internal loopback within the PHY or framer. The MPX verifies the packets on a bit by bit basis. See the description for stress test on p[...]
-
Page 1046
Running Hardware Diagnostics Page 36-8 stress Functional testing of physical ports with continuous full-wire traffic. The data packets are initially generated by the MPX , sent out the physical port, and looped back through external cables or wrap plugs. Once the packets are returned, modifications in the packets’ destination address allows the p[...]
-
Page 1047
Running Hardware Diagnostics Page 36-9 Sample Command Lines There are numerous ways to specify a test session through the test command. The following are some sample command lines along with a description of what they test. The following command: test all 100 vram would run the VRAM test on all the modules in the chassis that are capable of executi[...]
-
Page 1048
Running Hardware Diagnostics Page 36-10 The table below provides specific cable/plug information for Omni Switch/Router switching modules. Omni Switch/Router P ort T est Wr ap Cable/Plug Requirements Module Type Cable Type GSX-K-FM-2W Port/Stress (Full Duplex) test: Multi-mode fiber optic wrap plug with SC connectors. Port/Stress (Half Duplex) test[...]
-
Page 1049
Running Hardware Diagnostics Page 36-11 Omni Switch/Router P ort T est Wr ap Cable/Plug Requirements (cont.) Module Type Cable Type WSX-S-2W (no compression) Twisted pair 28GA serial cable with HD50-26 connectors – DCE to DTE. WSX-SC-4W Twisted pair 28GA serial cable with HD50-26 connectors – DCE to DTE. WSX-SC-8W Twisted pair 28GA serial cable[...]
-
Page 1050
Running Hardware Diagnostics Page 36-12 Sample T est Session: Ethernet Module Test sessions and results will vary among the various switching modules. This section shows the output from a test session on an ESX-C-12 . The module is in slot 3 and all tests were requested to be run one time. The command to start this test is: test 3 After you enter t[...]
-
Page 1051
Running Hardware Diagnostics Page 36-13 The module is reset, and then the rest of the tests will run. Testing Slot 3 - Ether/12 Resetting slot 3... Test In Progress: CSR Test OK1, OK2 LEDS will display the following pattern: OFF RED OFF GREEN OFF AMBER OFF - Passed Test In Progress: VRAM Test - Passed Test In Progress: CAMOFFBRD Test(1K) - Passed L[...]
-
Page 1052
Running Hardware Diagnostics Page 36-14 The tests are complete at this point. A summary of the test results and failures is displayed at the end of the test sequence. In this example, the module passed all tests except the port test. The ESX-K-C-32 module in slot 3 should have a red OK2 LED to indicate diagnostics failure. And the Failure Summation[...]
-
Page 1053
Displaying Available Diagnostic Tests Page 36-15 Displaying A vailable Diagnostic T ests The testdisp command provides the user with a display of applicable tests for a particular slot or for the entire chassis configuration. To display available diagnostic tests for a switching module, enter the testdisp command followed by the slot number for the[...]
-
Page 1054
Configuring the Diagnostic Test Environment Page 36-16 Configuring the Diagnostic T est Environment The testcfg command allows the user to tailor diagnostic testing characteristics per slot module. To configure diagnostic tests for a switching module, enter the testcfg command followed by the slot number for the module. The slot number is an integ[...]
-
Page 1055
Configuring the Diagnostic Test Environment Page 36-17 Configuring T ests for Ethernet Modules Tailoring of applicable Ethernet modules includes selection of Port Speeds and of Port Modes. To configure applicable diagnostic tests for an Ethernet 10/100 switching module in slot 3, enter: testcfg 3 The following is a sample display of the test confi[...]
-
Page 1056
Running Frame Fabric Tests on Omni Switch/Routers Page 36-18 Running Fr ame Fabric T ests on Omni Switch/Routers You can test the Omni Switch/Router Multi VBUS ( MVBUS ) backplane and the frame fabric ASIC of every switching module with the framefab command. The syntax for this command is as follows: framefab [<repeat_count> | ilb <repeat_[...]
-
Page 1057
Running Frame Fabric Tests on Omni Switch/Routers Page 36-19 Test Coverage: All Fabric Inputs/Outputs not tested: Fabric in slot 2 (ESX-C12) has 9 inputs (0-8) and 1 output (0) All inputs tested All Outputs tested Fabric in slot 3 (ESX-C12) has 9 inputs (0-8) and 1 output (0) All inputs tested All Outputs tested Fabric in slot 4 (ESX-C12) has 9 inp[...]
-
Page 1058
Running Diagnostics on an Entire Chassis Page 36-20 Running Diagnostics on an Entir e Chassis The testcfg command allows you to tailor diagnostic testing characteristics by module or for an entire chassis. (Please refer to Configuring the Diagnostic Test Environment on page 36-16 for configuring tests for a single module.) For example, to configure[...]
-
Page 1059
Running Diagnostics on an Entire Chassis Page 36-21 2) Stop on Failur e Enter 2 to halt diagnostics in an active state when a failure occurs or 1 (the default) to exit diagnostics and display the Test Summation and Failure Summation sections of the test command output. Setting this field to 2 can be used to further troubleshoot problems. However, s[...]
-
Page 1060
Diagnostic Test Cable Schematics Page 36-22 Diagnostic T est Cable Schematics The figures below and on the following pages provide information on port test cables and plugs. Ethernet Crossover Wrap Cable — Category 5 UTP Copper Cable with RJ-45 Connectors T1/E1 Crossover Wrap Cable — Category 5 UTP Copper Cable with RJ-45 Connectors ESX Wrap Pl[...]
-
Page 1061
Diagnostic Test Cable Schematics Page 36-23 BRI S/T Crossover Wrap Cable — Category 5 UTP Copper Cable with RJ-48 (RJ-45) Connectors RJ-48 (RJ-45) 1 2 3 4 5 6 7 8 RJ-48 (RJ-45) 1 2 4 3 6 5 7 8[...]
-
Page 1062
Diagnostic Test Cable Schematics Page 36-24[...]
-
Page 1063
Page A-1 A The Boot Line Pr ompt When the switch boots, it requires basic information so that it can configure itself. The switch is delivered with factory default configuration parameters that provide basic information; however, you can change or customize the configuration parameters using the Boot Line prompt. You can only access the Boot Line c[...]
-
Page 1064
Entering the Boot Prompt Page A-2 Entering the Boot Pr ompt Perform the following steps to reach the Boot prompt. 1. Connect an ASCII terminal (or computer with a terminal emulator) to the console port on the MPX . The default communication parameters are: • 9600 bps • 8 data bits • 1 stop bit • no parity • no hardware flow control (Micro[...]
-
Page 1065
Boot Prompt Basics Page A-3 Boot Pr ompt Basics To get a list of commands enter a question mark ( ? ). A screen similar to the following is shown: ? - print this list @ - boot (load and go) p - print boot params c - change boot params l - load boot file g adrs - go to adrs d adrs[,n] - display memory m adrs - modify memory f adrs, nbytes, value - f[...]
-
Page 1066
Boot Prompt Basics Page A-4 Displaying Current Configur ation (p) To display the current configuration, enter a p at the Boot prompt. A screen similar to the following will be displayed. Boot device : ffs Boot file : /flash/mpx.img Eth IP addr[:mask] : 192.168.11.1 Startup script : /flash/mpx.cmd Console params : 9600,n81c Modem params : 9600,n81 [...]
-
Page 1067
Boot Prompt Basics Page A-5 Listing A vailable Files in the Flash Memory (L) To list all of the available files in the flash memory that you could load onto the switch, enter the L command. A screen similar to the following is shown: Files available in "/flash": mpx.cmd mpm.log esx.img mpx.img mpm.cnf mpm.cfg switch.ascii [Boot]: Deleting[...]
-
Page 1068
Boot Prompt Basics Page A-6 Saving Configuration Changes (S) To save any changes to the configuration parameters, enter the S command at the prompt. The following message appears to confirm when the process is complete: Saving boot information...done [Boot]: Viewing V ersion Number (V) To view the version number of the bootstrap shell, enter the V[...]
-
Page 1069
Configuring a Switch with an MPX Page A-7 Configuring a Switch with an MPX Perform the following steps to configure an Omni Switch/Router ( MPX ). You can press Ctrl-D at any time to return to the Boot prompt. 1. At the Boot prompt, enter a lowercase c to begin configuring parameters. A prompt simi- lar to the following displays. '.' = c[...]
-
Page 1070
Configuring a Switch with an MPX Page A-8 8. You can enter an IP address for the first hop router to a remote host (if the host is on a different IP net). A screen prompt similar to the following displays. User : 9. You can enter a log-in name for a remote host. A screen prompt similar to the following displays. Remote password : 10. You can enter [...]
-
Page 1071
Configuring a Switch with an MPX Page A-9 14. To accept the default ( oxb ) and perform a normal boot, press the <Enter> key. To restore the factory-configured boot process, enter 0x1000 . The following flags should only be used for internal debugging or Customer Service diagnosis: • 0x02 Load the local system symbols. • 0x04 Do not autob[...]
-
Page 1072
Configuring a Switch with an MPX Page A-10[...]
-
Page 1073
Page B-1 B Custom Cables This appendix provides detailed information, including illustrations and pin diagrams, for the cables that can be used with Omni Switch/Router Submodules. These custom cables are available from Alcatel, but you can use the following information to manufacture them.[...]
-
Page 1074
Page B-2 V .35 DTE Cable (F or WSX-to-DCE De vice Connection) The following parts are recommended for the end of the cable connected to the WSX. • AMP 750833-1 26 Pin HD50 Connec- tor-male • AMP 750850-6 26 Pin HD50 Backshell Parts for the customer end of the cable can be of any industry-standard manufac- turer. Use of a shielded-type connector[...]
-
Page 1075
Page B-3 V .35 DCE Cable (For W SX-to-DTE De vice Connection) The following parts are recommended for the end of the cable connected to the WSX. • AMP 750833-1 26 Pin HD50 Connec- tor-male • AMP 750850-6 26 Pin HD50 Backshell Parts for the customer end of the cable can be of any industry-standard manufac- turer. Use of a shielded-type connector[...]
-
Page 1076
Page B-4 RS232 DTE Cable (F or WSX-to-DCE De vice Connection) The following parts are recommended for the end of the cable connected to the WSX. • AMP 750833-1 26 Pin HD50 Connec- tor-male • AMP 750850-6 26 Pin HD50 Backshell Parts for the customer end of the cable can be of any industry-standard manufac- turer. Use of a shielded-type connector[...]
-
Page 1077
Page B-5 RS232 DCE Cable (For W SX-to-DTE De vice Connection) The following parts are recommended for the end of the cable connected to the WSX. • AMP 750833-1 26 Pin HD50 Connec- tor-male • AMP 750850-6 26 Pin HD50 Backshell Parts for the customer end of the cable can be of any industry-standard manufac- turer. Use of a shielded-type connector[...]
-
Page 1078
Page B-6 RS530 DTE Cable (F or WSX-to-DCE De vice Connection) The following parts are recommended for the end of the cable connected to the WSX. • AMP 750833-1 26 Pin HD50 Connec- tor-male • AMP 750850-6 26 Pin HD50 Backshell Parts for the customer end of the cable can be of any industry-standard manufac- turer. Use of a shielded-type connector[...]
-
Page 1079
Page B-7 RS530 DCE Cable (For W SX-to-DTE De vice Connection) The following parts are recommended for the end of the cable connected to the WSX. • AMP 750833-1 26 Pin HD50 Connec- tor-male • AMP 750850-6 26 Pin HD50 Backshell Parts for the customer end of the cable can be of any industry-standard manufac- turer. Use of a shielded-type connector[...]
-
Page 1080
Page B-8 X.21 DTE Cable (F or WSX-to-DCE De vice Connection) The following parts are recommended for the end of the cable connected to the WSX. • AMP 750833-1 26 Pin HD50 Connec- tor-male • AMP 750850-6 26 Pin HD50 Backshell Parts for the customer end of the cable can be of any industry-standard manufac- turer. Use of a shielded-type connector [...]
-
Page 1081
Page B-9 X.21 DCE Cable (For W SX-to-DTE De vice Connection) The following parts are recommended for the end of the cable connected to the WSX. • AMP 750833-1 26 Pin HD50 Connec- tor-male • AMP 750850-6 26 Pin HD50 Backshell Parts for the customer end of the cable can be of any industry-standard manufac- turer. Use of a shielded-type connector [...]
-
Page 1082
Page B-10 RS449 DTE Cable (F or WSX-to-DCE De vice Connection) The following parts are recommended for the end of the cable connected to the WSX. • AMP 750833-1 26 Pin HD50 Connec- tor-male • AMP 750850-6 26 Pin HD50 Backshell Parts for the customer end of the cable can be of any industry-standard manufac- turer. Use of a shielded-type connecto[...]
-
Page 1083
Page B-11 RS-449 DCE Cable Assembly (For W SX-to-DTE De vice 75 Ω Connection) The following parts are recommended for the end of the cable connected to the WSX. • AMP 750833-1 26-Pin HD50 Connec- tor-male • AMP 750850-6 26-Pin HD50 Backshell Parts for the customer end of the cable can be of any industry-standard manufac- turer. Use of a shiel[...]
-
Page 1084
Page B-12 RJ-45 to DB15F Cable Assembly (For T1/E1 P ort 120 Ω Connections) The following parts are recommended for the ends of the cable: • For the switch side of the cable assembly (P1): 8-conductor RJ-45 round connector (MTP-88U or equivalent) • Parts for the customer end of the cable (P2) can be of any industry-standard manu- facturer. Us[...]
-
Page 1085
Page B-13 RJ-45 to BNC Cable Assembly (For E1 75 Ω P ort Connections) The following parts are recommended for manufacturing the cable: • For the switch side of the cable assembly (P1): 8-conductor RJ-45 round connector (MTP-88U or equivalent) • For the cable: RG-187A coaxial cable (Belden 83267 or equivalent) • For the customer end of the c[...]
-
Page 1086
Page B-14[...]
-
Page 1087
Page I-1 Index ! commands 4-26 + or - commands 17-7 ? command 4-16 , 4-25 10/100 16-1 , 16-8 10/100 command 15-4 10/100 ports 15-5 , 15-8 10/100cfg command 3-15 , 15-5 , 15-7 10/100vc command 15-8 802.1Q 15-1 , 16-1 802.2 pass through 18-17 , 19-32 A ab command 7-8 access rate 28-16 , 28-22 , 28-32 , 28-35 actfstps command 17-38 , 17-39 addprtchnl [...]
-
Page 1088
Page I-2 Index C cacheconfig command 9-33 CAM configuring 9-25 CAM threshold 11-5 camcfg command 9-25 camstat command 9-24 caplog command 10-11 cas command 16-8 , 16-11 Frame Relay bridging 29-57 Frame Relay routing 29-60 Frame Relay trunking 29-62 cats command 19-2 cb command 7-7 cd command 7-2 , 19-62 chassis grounding 1-21 chngmac command 14-6[...]
-
Page 1089
Page I-3 Index E E1 configuring 31 timeslots 28-45 fractional 28-6 framing 33-2 eb command 7-9 echo command 4-31 edit command 7-7 edit commands tutorial 7-11 , 7-12 encapsulation 18-6 IP 18-6 IPX 18-6 , 18-8 error messages 35-11 ESX-K-100C-32W 3-15 , 15-5 , 15-8 ESX-K-100FM/FS-16W 3-19 , 15-8 eth100 command 15-4 ethdef command 18-26 Ethernet 10/10[...]
-
Page 1090
Page I-4 Index control signals 29-46 Discard Eligibility 29-9 DLCI 29-6 DLCMI 29-24 errors 29-48 FECN 29-12 IP routing 29-15 IPX routing 29-18 polling 29-25 port configuration 29-22 Routing Group 29-59 self-configuration 29-7 split clocking 29-40 statistics 29-38 translations 29-13 trunking 29-19 , 29-62 viewing parameters 29-33 Virtual Circuit 2[...]
-
Page 1091
Page I-5 Index Hello messages and XMAP 21-2 help command 4-15 history command 4-26 hmstat command 11-7 hot swapping 1-11 , 1-14 , 3-7 hpstat command 11-8 hreset command 11-8 HRE-X 1-22 router register limitations 1-23 valid configurations 1-23 hre x command 9-27 hre xassign command 9-27 hre xdisplay command 9-27 hre xhashopt command 9-29 hre xutil[...]
-
Page 1092
Page I-6 Index IPX RIP/SAP Filtering adding global filters 27-19 adding specific filters 27-20 configuring NetW are for W AN links 27-33 default setting of filters 27-18 deleting filters 27-22 displaying all filters 27-23 displaying global filters 27-24 displaying specific filters 27-24 filter precedence 27-25 uses for filters 27-18 IPX[...]
-
Page 1093
Page I-7 Index load command 5-4 login accounts 4-33 , 8-2 login alert banner 4-31 logout command 4-16 lookup command 4-25 ls command 5-4 , 7-3 M MAC 17-16 , 17-17 MAC addresses configuring 14-6 restoring 14-6 MAC devices VLAN membership 20-26 , 22-30 main menu 4-15 mas command 16-12 Frame Relay 29-65 maskta command 36-5 mcvl command 23-13 MD5 12-4[...]
-
Page 1094
Page I-8 Index nisuf command 6-14 noecho command 4-31 non-Ethernet ports 19-29 Non-mobile Groups 19-1 , 19-15 ntaccess command 12-5 , 12-36 ntadmin command 12-5 , 12-33 ntconfig command 12-5 ntinfo command 12-5 , 12-15 NTP advertised precision 12-14 client/server 12-8 client/server authentication 12-9 current leap second 12-30 event timer subsyste[...]
-
Page 1095
Page I-9 Index P partition management 8-11 , 8-19 password 4-33 , 8-2 changing 8-2 path MTU discovery 25-42 ping command 25-22 pinouts Ethernet modules 3-15 W AN modules 3-22 pmapcr command 19-17 pmapdel command 19-17 pmapmod command 19-17 pmapv command 19-17 pmcfg command 19-62 pmdelete command 19-64 pmon command 19-63 pmpause command 19-64 pmstat[...]
-
Page 1096
Page I-10 Index R rb command 7-8 reboot 8-3 - see also boot re boot command 8-3 receive threshold 11-3 redundancy MPX 1-7 , 1-10 , 1-13 , 2-9 , 6-9 power supply 1-11 , 1-14 re-executing commands 4-26 reg_port_rule variable 22-9 relayc command 26-2 , 26-3 relays command 26-23 remote trunking stations 17-18 renounce command 6-14 res command 14-1 rese[...]
-
Page 1097
Page I-11 Index stc command 17-25 , 17-38 , 17-39 sts command 17-28 , 17-38 , 17-39 summary command 4-15 , 9-1 swap command 6-20 swch command 18-30 , 18-31 switch software 2-7 switc h command 4-15 , 18-25 switch menu 18-25 switch software Boot prompt 5-5 loading with FTP 5-2 loading with ZMODEM 5-4 switching modules 2-7 , 3-12 , 3-15 , 3-19 , 3-22 [...]
-
Page 1098
Page I-12 Index SNAP 18-21 T oken Ring 18-19 transmission states XMAP 21-3 transmit credit 19-31 transmit/receive threshold 11-3 traps configuring 13-2 tr def command 18-28 troubleshooting 35-1 T runcating Tree Timing description 17-35 U UDP 25-3 UDP relay 26-1 udpl command 25-25 udps command 25-24 UI T able Filtering 4-38 Filter Command 4-41 comb[...]
-
Page 1099
Page I-13 Index secondary traffic 22-6 translated frames 24-7 viewing 20-23 , 22-27 vlap command 21-9 vs command 19-53 W wan command 28-14 W AN Links accessing the LINK menu 31-2 adding a link record 31-3 deleting link records 31-11 displaying link status 31-15 modifying a link record 31-9 viewing link records 31-12 W AN modules 3-22 cables B-1 pi[...]
-
Page 1100
Page I-14 Index[...]