Sign In
Upload
Manuals
Brands
Alcatel-Lucent Manuals
Switch
OmniSwitch 6900 Series
Alcatel-Lucent OmniSwitch 6900 Series Manuals
Manuals and User Guides for Alcatel-Lucent OmniSwitch 6900 Series. We have
1
Alcatel-Lucent OmniSwitch 6900 Series manual available for free PDF download: Network Configuration Manual
Alcatel-Lucent OmniSwitch 6900 Series Network Configuration Manual (1078 pages)
OmniSwitch AOS Release 8
Brand:
Alcatel-Lucent
| Category:
Switch
| Size: 11.3 MB
Table of Contents
Table of Contents
3
About this Guide
29
Supported Platforms
29
When Should I Read this Manual
29
Who Should Read this Manual
29
How Is the Information Organized
30
What Is in this Manual
30
What Is Not in this Manual
30
Documentation Roadmap
31
Related Documentation
33
Technical Support
34
Chapter 1 Configuring Ethernet Ports
36
Ethernet Port Defaults
36
Ethernet Ports Overview
37
Configuring Ethernet Port Parameters
37
Enabling and Disabling Autonegotiation
37
Configuring Crossover Settings
37
Setting Interface Line Speed
37
Configuring Duplex Mode
38
Setting Trap Port Link Messages
38
Resetting Statistics Counters
38
Enabling and Disabling Interfaces
38
Configuring a Port Alias
39
Configuring Maximum Frame Sizes
39
Configuring Digital Diagnostic Monitoring (DDM)
39
Configuring Flood Rate Limiting
40
Configuring Flood Rate Limit Action
41
Configuring Flow Control
41
Enabling and Disabling Enhanced Port Performance (EPP)
43
Configuring Energy Efficient Ethernet (802.3Az)
45
Configuring Split-Mode
45
Configuring Beacon LED
45
Using TDR Cable Diagnostics
47
Initiating a TDR Cable Diagnostics Test
47
Displaying TDR Test Results
47
Clearing TDR Test Statistics
48
Interfaces Violation Recovery
49
Violation Shutdown and Recovery Methods
49
Interaction with Other Features
50
Configuring Interface Violation Recovery
51
Verifying the Interfaces Violation Recovery Configuration
52
Clearing Ethernet Port Violations
53
Link Monitoring
54
Monitoring Interface Errors
54
Monitoring Interface Flapping
54
Monitoring Window
55
Configuring the Wait-To-Restore Timer
55
Configuring the Wait-To-Shutdown Timer
56
Displaying Link Monitoring Information
57
Link Fault Propagation
58
Interaction with Interfaces Violation Recovery
58
Configuring Link Fault Propagation
59
LFP Application Example
60
IEEE 1588 Precision Time Protocol (PTP)
61
Enabling/Disabling PTP Time Stamping
61
MAC Security Overview
62
How It Works
62
Enabling/Disabling Macsec on an Interface
64
Chapter 2 Configuring UDLD
66
UDLD Defaults
66
Quick Steps for Configuring UDLD
67
UDLD Overview
68
UDLD Operational Mode
68
Mechanisms to Detect Unidirectional Links
69
Configuring UDLD
69
Enabling and Disabling UDLD
70
Configuring the Operational Mode
71
Configuring the Probe-Timer
71
Configuring the Echo-Wait-Timer
71
Clearing UDLD Statistics
72
Verifying the UDLD Configuration
72
In this Chapter
73
Chapter 3 Managing Source Learning
74
Source Learning Defaults
74
MAC Address Table Overview
75
Using Static MAC Addresses
75
Configuring Static MAC Addresses
76
Using Static Multicast MAC Addresses
77
Configuring Static Multicast MAC Addresses
77
Static Multicast Mac Addresses on Link Aggregate Ports
78
Configuring MAC Address Table Aging Time
79
Configuring the Source Learning Status
80
Increasing the MAC Address Table Size
81
Displaying Source Learning Information
82
Chapter 4 Configuring Vlans
83
VLAN Defaults
84
Sample VLAN Configuration
85
VLAN Management Overview
86
Creating/Modifying Vlans
86
Adding/Removing a VLAN
87
Enabling/Disabling the VLAN Administrative Status
87
Modifying the VLAN Description
87
Assigning Ports to Vlans
88
Changing the Default VLAN Assignment for a Port
88
Using 802.1Q Tagging
89
Enabling/Disabling Spanning Tree for a VLAN
91
Enabling/Disabling Source Learning
91
Configuring VLAN IP Interfaces
92
Bridging Vlans Across Multiple Switches
93
Verifying the VLAN Configuration
95
Understanding Port Output Display
95
Configuring Vlans
83
In this Chapter
83
Chapter 34 Diagnosing Switch Problems
95
Using Private Vlans
97
Private VLAN Ports
98
Quick Steps for Configuring Pvlans
98
PVLAN Management Overview
99
Creating Pvlans
100
Creating Secondary Vlans
101
Assigning Ports to Pvlans
102
Protocol Configuration Requirements for PVLAN
104
Sample PVLAN Use Case
106
Verifying the PVLAN Configuration
107
Chapter 5 Configuring High Availability Vlans
108
In this Chapter
108
High Availability Default Values
109
Quick Steps for Creating High Availability Vlans
110
High Availability VLAN Overview
111
High Availability VLAN Operational Mode
111
Traffic Flows in High Availability VLAN
112
Configuring High Availability Vlans on a Switch
113
Creating and Deleting Vlans
113
Adding and Removing Server Cluster Ports
114
Assigning and Modifying Server Cluster Mode
114
Assigning and Removing MAC Addresses
115
Application Examples
116
Example 1: Layer 2 Server Cluster
116
Example 2: Layer 3 Server Cluster
118
Example 3: Layer 3 Server Cluster with IP Multicast Address to Cluster (IGMP)
120
Displaying High Availability VLAN Status
123
Chapter 6 Configuring Spanning Tree Parameters
124
In this Chapter
125
Spanning Tree Bridge Parameter Defaults
126
Spanning Tree Port Parameter Defaults
126
Multiple Spanning Tree (MST) Region Defaults
127
Spanning Tree Overview
128
How the Spanning Tree Topology Is Calculated
128
Topology Examples
133
MST General Overview
135
How MSTP Works
135
Comparing MSTP with STP and RSTP
138
What Is a Multiple Spanning Tree Instance (MSTI)
138
What Is a Multiple Spanning Tree Region
139
What Is the Common Spanning Tree
140
What Is the Internal Spanning Tree (IST) Instance
140
What Is the Common and Internal Spanning Tree Instance
140
MST Configuration Overview
140
MST Interoperability and Migration
141
Spanning Tree Operating Modes
143
Using Flat Spanning Tree Mode
143
Using Per-VLAN Spanning Tree Mode
144
Using Per-VLAN Spanning Tree Mode with PVST
145
Omniswitch PVST+ Interoperability
146
Using Spanning Tree Configuration Commands
149
Configuring STP Bridge Parameters
149
Selecting the Spantree Protocol
150
Configuring the Bridge Priority
151
Configuring the Bridge Hello Time
152
Configuring the Bridge Max-Age Time
152
Configuring the Forward Delay Time for the Switch
153
Enabling/Disabling the VLAN BPDU Switching Status
153
Configuring the Path Cost Mode
154
Using Automatic VLAN Containment
154
Configuring STP Port Parameters
156
Enabling/Disabling Spanning Tree on a Port
157
Enabling/Disabling Loop-Guard
158
Configuring Port Priority
158
Configuring Port Path Cost
159
Configuring Port Mode
161
Mode for Link Aggregate Ports
162
Configuring Port Connection Type
163
Configuring the Edge Port Status
164
Restricting Port Roles (Root Guard)
165
Restricting TCN Propagation
165
Limiting BPDU Transmission
165
Sample Spanning Tree Configuration
166
Example Network Overview
166
Example Network Configuration Steps
167
Sample MST Region Configuration
169
Sample MSTI Configuration
171
Verifying the Spanning Tree Configuration
174
Configuring Loopback Detection
175
In this Chapter
175
LBD Defaults
176
Chapter 7 Configuring Loopback Detection
176
Quick Steps for Configuring LBD
177
LBD Overview
178
Transmission Timer
178
Remote-Origin LBD Overview
178
Interaction with Other Features
180
Spanning Tree Protocol
180
Link Aggregation
180
Configuring LBD
181
Enabling LBD
181
Enabling Remote-Origin LBD
181
Configuring the LBD Transmission Timer
182
Viewing LBD Statistics
182
Recovering a Port from LBD Shutdown
182
Configuring Autorecovery-Timer for LBD Shutdown Ports
182
LBD for Service Access Interface
182
Enabling LBD on Service-Access Interface
183
LBD Packet Processing Mechanism for LBD Service Access Ports
183
Sample Scenarios
184
Verifying the LBD Configuration
186
Chapter 8 Configuring Static Link Aggregation
187
Configuring Static Link Aggregation
188
Static Link Aggregation Default Values
188
Quick Steps for Configuring Static Link Aggregation
189
Static Link Aggregation Overview
191
Static Link Aggregation Operation
191
Relationship to Other Features
192
Configuring Static Link Aggregation Groups
192
Configuring Mandatory Static Link Aggregate Parameters
192
Creating and Deleting a Static Link Aggregate Group
193
Adding and Deleting Ports in a Static Aggregate Group
193
Removing Ports from a Static Aggregate Group
194
Modifying Static Aggregation Group Parameters
195
Modifying the Static Aggregate Group Name
195
Modifying the Static Aggregate Group Administrative State
195
Application Example
196
Displaying Static Link Aggregation Configuration and Statistics
197
Chapter 9 Configuring Dynamic Link Aggregation
198
Configuring Dynamic Link Aggregation
199
Dynamic Link Aggregation Default Values
199
Quick Steps for Configuring Dynamic Link Aggregation
200
Dynamic Link Aggregation Overview
202
Dynamic Link Aggregation Operation
202
Relationship to Other Features
204
Configuring Dynamic Link Aggregate Groups
204
Configuring Mandatory Dynamic Link Aggregate Parameters
205
Creating and Deleting a Dynamic Aggregate Group
205
Configuring Ports to Join and Removing Ports in a Dynamic Aggregate Group
206
Removing Ports from a Dynamic Aggregate Group
207
Modifying Dynamic Link Aggregate Group Parameters
208
Modifying Dynamic Aggregate Group Parameters
208
Modifying the Dynamic Aggregate Group Name
209
Modifying the Dynamic Aggregate Group Administrative State
209
Modifying the Dynamic Aggregate Group Actor System Priority
210
Modifying the Dynamic Aggregate Group Actor System ID
211
Modifying the Dynamic Aggregate Group Partner Administrative Key
211
Modifying the Dynamic Aggregate Group Partner System Priority
212
Modifying the Dynamic Aggregate Group Partner System ID
212
Modifying Dynamic Link Aggregate Actor Port Parameters
213
Modifying the Actor Port System ID
214
Modifying the Actor Port System Priority
215
Modifying Dynamic Aggregate Partner Port Parameters
216
Modifying the Partner Port System Administrative State
217
Modifying the Partner Port Administrative Key
218
Modifying the Partner Port System ID
219
Modifying the Partner Port System Priority
219
Modifying the Partner Port Administrative Status
220
Modifying the Partner Port Priority
220
Application Examples
222
Sample Network Overview
222
Link Aggregation and Spanning Tree Example
223
Link Aggregation and Qos Example
224
Displaying Dynamic Link Aggregation Configuration and Statistics
225
Configuring Dual-Home Links
227
In this Chapter
227
Dual-Home Link Active-Active Defaults
228
Chapter 10 Configuring Dual-Home Links
228
Dual-Home Link Active-Active
229
DHL Active-Active Operation
229
Protected Vlans
230
DHL Configuration Guidelines
232
Configuring DHL Active-Active
232
Dual-Home Link Active-Active Example
234
Recommended DHL Active-Active Topology
236
Unsupported DHL Active-Active Topology (Network Loops)
237
Displaying the Dual-Home Link Configuration
238
Chapter 11 Configuring ERP
239
ERP Defaults
240
ERP Overview
241
Erp Timers
242
ERP Basic Operation
243
Overlapping Protected Vlans between Erp Rings on same Node
244
Erpv2 Basic Operation
245
Interaction with Other Features
247
Quick Steps for Configuring ERP with Standard Vlans
248
Quick Steps for Configuring ERP with VLAN Stacking
249
ERP Configuration Overview and Guidelines
250
Configuring an ERP Ring
251
Adding Vlans to Ring Ports
251
Configuring an RPL Port
252
Setting the Wait-To-Restore Timer
252
Setting the Guard Timer
252
Configuring ERP with VLAN Stacking Nnis
253
Clearing ERP Statistics
254
Erpv2 Configuration Overview and Guidelines
255
Major and Sub Ring Management
255
Sample Switch Configuration
256
Sample Ethernet Ring Protection Configuration
259
Example ERP Overview
259
Example ERP Configuration Steps
260
Sample Erpv2 Ring Configuration
261
Example Erpv2 Overview
261
Configuring Shared Link
262
Configuring Switches in Main Ring
263
Configuring Secondary RPL Node
263
Configuring Switch in Sub Ring
263
Verifying the ERP Configuration
264
11 Configuring ERP
239
In this Chapter
239
Chapter 12 Configuring MVRP
265
MVRP Defaults
266
Quick Steps for Configuring MVRP
267
MRP Overview
268
MVRP Overview
268
How MVRP Works
268
Interaction with Other Features
270
Configuring MVRP
271
Enabling MVRP
271
Configuring the Maximum Number of Vlans
271
Configuring MVRP Registration
272
Configuring the MVRP Applicant Mode
273
Modifying MVRP Timers
274
Restricting VLAN Registration
275
Restricting Static VLAN Registration
275
Restricting VLAN Advertisement
276
Verifying the MVRP Configuration
277
12 Configuring MVRP
265
In this Chapter
265
Chapter 13 Configuring 802.1AB
278
802.1AB Defaults Table
279
Quick Steps for Configuring 802.1AB
280
802.1AB Overview
281
Mandatory Tlvs
281
Optional Tlvs
281
LLDP-Media Endpoint Devices
282
LLDP Agent Operation
283
LLDPDU Transmission and Reception
283
Aging Time
283
LLDP Agent Security Mechanism
284
Configuring 802.1AB
285
Configuring LLDPDU Flow
285
Enabling and Disabling Notification
285
Enabling and Disabling Management TLV
286
Enabling and Disabling 802.1 TLV
286
Enabling and Disabling 802.3 TLV
286
Enabling and Disabling MED TLV
287
Enabling and Disabling Proprietary TLV
287
Enabling and Disabling Application Priority TLV
289
Setting the Transmit Interval
290
Setting the Transmit Hold Multiplier Value
290
Setting the Reinit Delay
290
Setting the Notification Interval
290
Application Example - LLDP MED
291
Verifying 802.1AB Configuration
292
13 Configuring 802.1AB
278
In this Chapter
278
Chapter 14 14 Configuring SIP Snooping
293
In this Chapter
293
SIP Snooping Defaults
294
Parameter Description and Values
295
Quick Steps for Configuring SIP Snooping
296
SIP Snooping Overview
297
Using SIP Snooping
298
Interoperability
299
SIP Snooping Configuration Guidelines
300
Configuring Edge Port
300
Configuring Trusted SIP Server
300
Configuring SIP Snooping TCP Ports
301
Configuring SIP Snooping UDP Ports
301
Configuring the SIP Control DSCP
301
Configuring SOS Calls
301
Configuring SOS Call DSCP
301
Configuring RTCP Thresholds
302
Configuring the Logging Threshold for the Number of Calls
302
Configuring Policy Rules for SIP Snooping
302
Unsupported Topologies
303
SIP Snooping Use Case
304
SIP Snooping Limitations
307
Verifying the SIP Snooping Configuration
308
Chapter 15 Configuring IP
309
In this Chapter
309
IP Defaults
311
Quick Steps for Configuring IP Forwarding
311
IP Overview
312
IP Protocols
312
IP Forwarding
314
Configuring an IP Interface
315
Modifying an Ip Router Interface
316
Removing an Ip Router Interface
316
Configuring a Loopback0 Interface
317
Configuring an IP Managed Interface
318
Creating a Static Route or Recursive Static Route
319
Creating a Default Route
320
Configuring an IP Routed Port
320
Configuring Address Resolution Protocol (ARP)
321
Deleting a Permanent Entry from the Arp Table
322
Clearing a Dynamic Entry from the Arp Table
323
Local Proxy Arp
323
Arp Filtering
323
Distributed ARP
324
Designated-NI and Distributed ARP Management
324
Enabling/Disabling Distributed ARP
324
Verifying the Distributed ARP
325
Distributed ARP Management Example
326
IP Configuration
327
Configuring the Router Primary Address
327
Configuring the Router ID
327
Configuring the Route Preference of a Router
328
Using Route Maps
329
IP-Directed Broadcasts
334
Arp Poisoning
338
Enabling/Disabling IP Services
339
Managing IP
340
Using the Ping Command
342
Tracing an IP Route
343
Transmission Control Protocol (TCP)
344
Tunneling Operation
345
Configuring a Tunnel Interface
346
Verifying the IP Configuration
347
VRF Route Leak
348
Configuring VRF Route Leak
349
Verifying VRF Route Leak Configuration
350
Chapter 16 Configuring Multiple VRF
351
VRF Defaults
352
Quick Steps for Configuring Multiple VRF
353
Multiple VRF Overview
356
VRF Profiles
358
ASCII-File-Only Syntax
359
VRF Interaction with Other Features
361
Bgpv4
362
Webview
363
Vlans
364
Configuring VRF Instances
365
Selecting a VRF Instance
366
Assigning IP Interfaces to a VRF Instance
367
Verifying the VRF Configuration
368
Chapter 17 Configuring Ipv6
369
Ipv6 Address Notation
374
Ipv6 Address Prefix Notation
374
Autoconfiguration of Ipv6 Addresses
375
Globally Unique Local Ipv6 Unicast Addresses
376
Configured Tunnels
379
Configuring the Route Preference of a Router
387
Configuring Ipv6
388
Configuring Route Map Redistribution
388
Configuring Local Proxy Neighbor Discovery
393
Configuring Neighbor Cache Limit
393
Configuring Neighbor Unreachability Detection
394
Configuring Router Advertisement Filtering
395
Reply or Ignore Echo Requests
396
Icmpv6 Error Message Rate Limiting
396
Ipv6 EMP Interface
397
Configure Ipv6 EMP Interface
397
Verifying the Ipv6 Configuration
399
Chapter 18 Configuring Ipsec
400
In this Chapter
400
Ipsec Defaults
401
Quick Steps for Configuring an Ipsec AH Policy
402
Quick Steps for Configuring an Ipsec Discard Policy
403
Ipsec Overview
404
Encapsulating Security Payload (ESP)
404
Authentication Header (AH)
405
Ipsec on the Omniswtich
406
Securing Traffic Using Ipsec
407
Discarding Traffic Using Ipsec
408
Configuring Ipsec on the Omniswitch
409
Configuring an Ipsec Master Key
409
Configuring an Ipsec Policy
410
Enabling and Disabling a Policy
411
Assigning a Priority to a Policy
411
Assigning an Action to a Policy
412
Configuring the Protocol for a Policy
412
Verifying a Policy
412
Configuring an Ipsec Rule
413
Configuring an Ipsec SA
414
Verifying Ipsec Sa
415
Configuring Ipsec Sa Keys
415
Enabling and Disabling Default Discard Policy
418
Additional Examples
419
Configuring ESP
419
Discarding Ripng Packets
421
Verifying Ipsec Configuration
422
Chapter 19 Configuring RIP
423
In this Chapter
423
RIP Defaults
424
Quick Steps for Configuring RIP Routing
425
RIP Overview
426
RIP Version 2
427
RIP Routing
428
Loading RIP
428
Enabling RIP
429
Creating a RIP Interface
429
Enabling a RIP Interface
429
Configuring the Rip Interface Receive Option
430
Configuring the Rip Interface Metric
430
RIP Options
431
Configuring the RIP Forced Hold-Down Interval
431
Configuring the RIP Update Interval
431
Configuring the RIP Invalid Timer
432
Configuring the RIP Garbage Timer
432
Configuring the RIP Hold-Down Timer
432
Reducing the Frequency of RIP Routing Updates
432
Enabling a RIP Host Route
433
Configuring Redistribution
434
RIP Security
440
Configuring Authentication Type
440
Configuring Passwords
440
Verifying the RIP Configuration
441
Chapter 20 Configuring BFD
442
In this Chapter
442
BFD Defaults
443
Quick Steps for Configuring BFD
445
Quick Steps for Configuring BFD Support for Layer 3 Protocols
447
Configuring Bfd Support for Vrrp Track Policies
450
BFD Overview
451
Benefits of Using BFD for Failure Detection
451
How the BFD Protocol Works
451
Operational Mode and Echo Function
452
BFD Packet Formats
452
BFD Session Establishment
453
Bfd Timer Negotiation
454
Configuring BFD
455
Configuring BFD Session Parameters
455
Configuring the Bfd Transmit Time Interval
456
Configuring the Bfd Receive Time Interval
456
Configuring the Bfd Echo Interval
456
Configuring the Bfd Multiplier
457
Enabling or Disabling Bfd Status
457
Configuring BFD Support for Layer 3 Protocols
459
Configuring Bfd Support for Static Routes
472
BFD Application Example
474
Example Network Overview
474
Verifying the BFD Configuration
480
Chapter 21 Configuring DHCP Relay
481
In this Chapter
481
DHCP Relay Defaults
482
Quick Steps for Setting up DHCP Relay
483
DHCP Relay Overview
484
Dhcp
485
DHCP and the Omniswitch
485
External DHCP Relay Application
486
Internal DHCP Relay
487
DHCP Relay Implementation
488
Global DHCP
488
Per-VLAN DHCP
488
Configuring BOOTP/DHCP Relay Parameters
489
Setting the Forward Delay
489
Setting Maximum Hops
490
Setting the Relay Forwarding Option
490
Using Automatic IP Configuration
491
Enabling Automatic IP Configuration
491
Configuring UDP Port Relay
492
Enabling/Disabling UDP Port Relay
493
Specifying a Forwarding VLAN
493
How the Relay Agent Processes DHCP Packets from the Client
494
Using DHCP Snooping
496
Dhcp Snooping Configuration Guidelines
497
Enabling Dhcp Snooping
497
Configuring the Port Trust Mode
499
Configuring the Dhcp Snooping Binding Table
500
Configuring the Binding Table Timeout
501
Synchronizing the Binding Table
501
Layer 2 Dhcp Snooping
502
Quick Steps for Configuring Dhcpv6 Relay
503
Dhcpv6 Relay Overview
503
Dhcpv6 Relay Interface
503
Dhcpv6 Relay Messages
504
Dhcpv6 Relay Configuration Overview
504
Enabling the Dhcpv6 Relay Per-VRF
504
Configuring the Dhcpv6 Relay Interface
504
Configuring the Dhcpv6 Relay Destination
505
Viewing the Dhcpv6 Relay Configuration
505
Verifying the DHCP Relay Configuration
506
Chapter 22 Configuring an Internal DHCP Server
507
In this Chapter
507
DHCP Server Default Values
508
Quick Steps to Configure Internal DHCP Server
508
DHCP Server Overview
510
The DHCP Process
510
Internal DHCP Server on Omniswitch
510
Vitalqip Server
510
Interaction with Other Features
511
Virtual Router Forwarding (VRF)
511
DHCP Snooping
511
IP Interfaces
511
Vitalqip Server
511
Configuring DHCP Server on Omniswitch
512
Policy File
512
DHCP Configuration Files
513
DHCP Server Database File
516
DHCP Server Application Example
517
Verifying the DHCP Server Configuration
519
Configuration File Parameters and Syntax
520
Policy File Parameters and Syntax
531
Chapter 23 Configuring VRRP
535
In this Chapter
535
VRRP Defaults
536
Quick Steps for Creating a Virtual Router
537
VRRP Overview
538
Why Use VRRP
539
Definition of a Virtual Router
539
VRRP MAC Addresses
540
VRRP Startup Delay
540
VRRP Tracking
541
Configuring Collective Management Functionality
541
Interaction with Other Features
541
VRRP Tracking with BFD
541
VRRP Configuration Overview
542
Basic Virtual Router Configuration
542
Creating/Deleting a Virtual Router
542
Specifying an IP Address for a Virtual Router
544
Configuring the Advertisement Interval
544
Configuring Virtual Router Priority
545
Setting Preemption for Virtual Routers
546
Enabling/Disabling a Virtual Router
547
Setting VRRP Traps
547
Setting VRRP Startup Delay
548
Configuring Collective Management Functionality
548
Changing Default Parameter Values for a Virtual Router Group
549
Creating VRRP Tracking Policies
551
Associating a Tracking Policy with a Virtual Router
551
Verifying the VRRP Configuration
553
Vrrpv2 Application Example
554
Vrrpv2 Tracking Example
555
Vrrpv3 Application Example
557
Vrrpv3 Tracking Example
558
Chapter 24 Configuring Server Load Balancing
560
In this Chapter
560
Server Load Balancing Default Values
561
Quick Steps for Configuring Server Load Balancing
562
Quick Steps for Configuring a Qos Policy Condition Cluster
563
Server Load Balancing Overview
565
Server Load Balancing Cluster Identification
565
Server Load Balancing Example
566
Weighted Round Robin Distribution Algorithm
567
Server Health Monitoring
568
Configuring Server Load Balancing on a Switch
569
Enabling and Disabling Server Load Balancing
569
Configuring and Deleting SLB Clusters
570
Automatic Configuration of Slb Policy Rules
571
Assigning Servers to and Removing Servers from a Cluster
572
Modifying Optional Parameters
573
Modifying the Ping Period
573
Modifying the Ping Timeout
573
Modifying the Ping Retries
574
Modifying the Relative Weight of a Physical Server
574
Taking Clusters and Servers On/Off Line
575
Taking a Cluster On/Off Line
575
Taking a Server On/Off Line
575
Configuring SLB Probes
576
Creating SLB Probes
576
Deleting SLB Probes
576
Associating a Probe with a Cluster
577
Associating a Probe with a Server
577
Modifying SLB Probes
577
Modifying the Probe Retries
578
Configuring a Probe User Name
578
Configuring a Probe Password
578
Configuring a Probe Url
578
Modifying the Probe Status
579
Configuring a Probe Send
579
Configuring a Probe Expect
579
Displaying Server Load Balancing Status and Statistics
580
Chapter 25 Configuring IP Multicast Switching
582
In this Chapter
582
IPMS Default Values
583
Ipmsv6 Default Values
584
IPMS Overview
585
IPMS Example
585
Reserved IP Multicast Addresses
586
IP Multicast Routing
586
Igmp Version 3
587
Interaction with Other Features
588
IPMS for Shortest Path Bridging
588
VLAN and Service Domains
588
Configuring IPMS on a Switch
590
Enabling and Disabling IP Multicast Status
590
Enabling and Disabling Flooding of Unknown Multicast Traffic
591
Enabling and Disabling IGMP Querier-Forwarding
592
Configuring and Restoring the IGMP Version
593
Configuring and Removing an IGMP Static Neighbor
593
Configuring and Removing an IGMP Static Querier
594
Configuring and Removing an IGMP Static Group
595
Modifying IPMS Parameters
596
Modifying the IGMP Query Interval
596
Modifying the IGMP Last Member Query Interval
597
Modifying the IGMP Query Response Interval
598
Enabling and Disabling Zero-Based IGMP Query
598
Modifying the IGMP Router Timeout
599
Modifying the Source Timeout
600
Enabling and Disabling IGMP Querying
601
Modifying the IGMP Robustness Variable
602
Enabling and Disabling the IGMP Spoofing
603
Enabling and Disabling the IGMP Zapping
604
Limiting IGMP Multicast Groups
604
Setting the Igmp Group Limit
605
Ipmsv6 Overview
606
Ipmsv6 Example
606
Reserved Ipv6 Multicast Addresses
607
MLD Version 2
607
Configuring Ipmsv6 on a Switch
608
Enabling and Disabling Ipv6 Multicast Status
608
Enabling and Disabling Flooding of Unknown Multicast Traffic
609
Enabling and Disabling MLD Querier-Forwarding
610
Configuring and Restoring the MLD Version
610
Configuring and Removing an MLD Static Neighbor
611
Configuring and Removing an MLD Static Querier
612
Configuring and Removing an MLD Static Group
613
Modifying Ipmsv6 Parameters
614
Modifying the MLD Query Interval
614
Modifying the MLD Last Member Query Interval
615
Modifying the MLD Query Response Interval
615
Enabling and Disabling Zero-Based MLD Query
616
Modifying the MLD Router Timeout
617
Modifying the Source Timeout
618
Enabling and Disabling the MLD Querying
618
Modifying the MLD Robustness Variable
619
Enabling and Disabling MLD Spoofing
620
Enabling and Disabling the MLD Zapping
621
Limiting MLD Multicast Groups
622
IPMS Application Example
623
Ipmsv6 Application Example
625
Displaying IPMS Configurations and Statistics
627
Displaying Ipmsv6 Configurations and Statistics
628
Chapter 26 Configuring Qos
629
In this Chapter
630
Qos General Overview
631
Classification
633
How Traffic Is Classified and Marked
633
Classifying Bridged Traffic as Layer 3
634
Configuring Trusted Ports
635
Using Trusted Ports with Policies
636
Congestion Management
637
Queue Sets
637
Qset Profiles
639
Multicast and Unicast Traffic Distribution
643
Multicast Source PFC on the Omniswitch 6900
646
Omniswitcongestion Avoidance
647
WRED Profiles
647
Traffic Policing and Shaping
650
Policing
650
Shaping
650
Tri-Color Marking
650
Configuring Policy Bandwidth Policing
654
Configuring Port Bandwidth Shaping
655
Qos Policy Overview
656
How Policies Are Used
656
Policy Lists
657
Interaction with Other Features
657
Valid Policies
657
Policy Conditions
658
Policy Actions
659
Condition and Action Combinations
660
Qos Defaults
661
Global Qos Defaults
661
Qos Port Defaults
661
Queue Management Defaults
662
Policy Rule Defaults
663
Policy Action Defaults
663
Default (Built-In) Policies
664
Configuring Qos
665
Configuring Global Qos Parameters
666
Forwarding Log Events
667
Log Detail Level
667
Number of Lines in the Qos Log
667
Displaying the Qos Log
668
Forwarding Log Events to the Console
668
Setting the Statistics Interval
669
Creating Policies
670
ASCII-File-Only Syntax
671
Creating Policy Conditions
672
Creating Policy Actions
673
Creating Policy Rules
674
Configuring a Rule Validity Period
675
Disabling Rules
675
Rule Precedence
676
How Precedence Is Determined
676
Saving Rules
676
Logging Rules
676
Creating Policy Lists
677
Verifying Policy Configuration
680
Using Condition Groups in Policies
681
Creating Network Groups
682
Creating Services
683
Creating Service Groups
684
Creating MAC Groups
685
Creating Port Groups
686
Verifying Condition Group Configuration
687
Using Map Groups
688
How Map Groups Work
689
Verifying Map Group Configuration
690
Using Access Control Lists
691
Layer 3 Acls
693
Ipv6 Acls
694
Using ACL Security Features
695
Configuring a Userports Group
696
Configuring Userport Traffic Types and Port Behavior
696
Configuring Icmp Drop Rules
697
Configuring Tcp Connection Rules
697
Applying the Configuration
699
Interaction with LDAP Policies
700
Verifying the Applied Policy Configuration
701
Policy Applications
702
Basic Qos Policies
703
Redirection Policies
704
Policy Based Mirroring
705
ICMP Policy Example
706
Policy Based Routing
707
In this Chapter
711
Chapter 27 Managing Policy Servers
712
Policy Server Overview
713
Modifying Policy Servers
714
Modifying the Port Number
715
Configuring a Secure Socket Layer for a Policy Server
716
Interaction with CLI Policies
717
In this Chapter
719
Chapter 28 Configuring Access Guardian
720
Access Guardian Defaults
720
Access Guardian UNP Port Defaults
722
Access Guardian Global AAA Parameter Defaults
723
Access Guardian AAA Profile Defaults
724
Access Guardian Captive Portal Defaults
725
Access Guardian QMR Defaults
726
Quick Steps for Configuring Access Guardian
727
Access Guardian Overview
729
Device Authentication
730
Device Classification
731
Role-Based Access
732
UNP Profiles
733
UNP Ports
738
UNP Classification Rules
740
How It Works
742
Interaction with Other Features
743
Multiple VLAN Registration Protocol (MVRP)
744
Service Assurance Agent
745
Configuring Port-Based Network Access Control
748
Setting Authentication Parameters for the Switch
749
Accounting Servers
750
Configuring UNP Port-Based Functionality
755
Configuring UNP Profiles
768
Configuring the UNP Profile Mapping
771
Configuring Qos Policy Lists
778
Configuring UNP Classification Rules
782
Omniaccess Stellar AP Integration
786
Configuration Guidelines
787
Quick Steps for Configuring Omniswitch AP Discovery
789
Using Captive Portal Authentication
793
Configuration Tasks and Guidelines
794
Quick Steps for Configuring Captive Portal Authentication
795
Using Captive Portal Configuration Profiles
796
Replacing the Captive Portal Certificate
797
Logging into the Network with Captive Portal
798
Logging off the Network with Captive Portal
799
Using Guest Tunneling
800
Configuration Overview and Guidelines
801
Quick Steps for Configuring Guest Tunneling
805
Guest Tunneling Configuration Example
807
Using Quarantine Manager and Remediation
810
Access Guardian Application Examples
812
Application Example 1: Classification (Port Mobility)
813
Application Example 2: 802.1X Authentication
814
Application Example 3: Internal Captive Portal Authentication
816
Application Example 4: Supplicant/Non-Supplicant with Captive Portal Authentication
818
Application Example 5: IP Phone (LLDP Network Policy TLV Mobile Tag)
821
Application Example 6: Restricted Role (Policy List) Assignment
823
Verifying Access Guardian Users
826
Logging Users out of the Network
829
Verifying the Access Guardian Configuration
831
Bring Your Own Devices (BYOD) Overview
832
Key Components of a BYOD Solution
833
Clearpass Onboard
834
Configuring Omniswitch BYOD Support
840
BYOD Authentication Process Overview
843
Multicast Domain Name System
844
Simple Service Discovery Protocol
845
Zero Configuration Networking (Mdns and SSDP)
849
Backward Compatibility
853
BYOD Application Examples
859
Application Example 1: 802.1X — Omniswitch Configuration
860
Application Example 1: 802.1X — Clearpass Configuration
861
Application Example 2: IP Phone — Omniswitch Configuration
866
Application Example 2: IP Phone — Clearpass Configuration
867
Application Example 3: Guest — Omniswitch Configuration
870
Application Example 3: Guest — Clearpass Configuration
871
Verifying the BYOD Configuration
876
Chapter 29 Configuring Application Monitoring and Enforcement
877
In this Chapter
878
Appmon Defaults
879
Application Monitoring and Enforcement Overview
880
Application Enforcement
881
Quick Steps for Configuring Appmon
883
Application Signature File/Kit
884
Application Flow Database
885
Configuring Appmon
886
Configuration Guidelines
887
Enabling/Disabling Appmon
889
Create Auto-Groups
890
Configuring Application List
891
Configuring L3 Mode of Operation
892
Clearing Flow Table Entries
893
Configuring Logging Threshold
894
Clearing Application List
895
Verifying Appmon Configuration
896
In this Chapter
897
Chapter 30 Configuring Application Fingerprinting
898
Quick Steps for Configuring AFP
900
AFP Overview
901
Application Fingerprinting Modes
902
Using the Application REGEX Signature File
903
Application Fingerprinting Database
904
Interaction with Other Features
905
Configuring AFP
906
Enabling/Disabling AFP
907
Changing the REGEX Signature Filename
908
Defining Application REGEX Signatures and Groups
909
Configuring AFP Port Modes
912
Verifying the AFP Configuration
914
In this Chapter
915
Chapter 31 Managing Authentication Servers
916
Server Defaults
916
Quick Steps for Configuring Authentication Servers
918
Server Overview
919
RADIUS Servers
921
Radius Accounting Server Attributes
924
Configuring the RADIUS Client
925
Radius over TLS
926
TACACS+ Server
927
Configuring the TACACS+ Client
928
LDAP Servers
929
LDAP Server Details
930
Directory Entries
931
Directory Searches
932
Retrieving Directory Search Results
932
Directory Modifications
932
Directory Compare and Sort
933
The Ldap Url
933
Password Policies and Directory Servers
934
Directory Server Schema for LDAP Authentication
935
Configuring Functional Privileges on the Server
936
Ldap Accounting Attributes
937
Dynamic Logging
938
Configuring the LDAP Authentication Client
939
Creating an Ldap Authentication Server
940
Modifying an Ldap Authentication Server
940
Setting up Ssl for an Ldap Authentication Server
940
Verifying the Authentication Server Configuration
941
Chapter 32 Configuring Port Mapping
943
Quick Steps for Configuring Port Mapping
944
Creating/Deleting a Port Mapping Session
945
Enabling/Disabling a Port Mapping Session
946
Sample Port Mapping Configuration
947
Example Port Mapping Configuration Steps
948
Chapter 33 Configuring Learned Port Security
949
Learned Port Security Defaults
950
Sample Learned Port Security Configuration
951
Learned Port Security Overview
953
MAC Address Types
954
Dynamic Configuration of Authorized MAC Addresses
956
Interaction with Other Features
957
Configuring Learned Port Security
958
Configuring the LPS Learning Window
960
Configuring the Number of Bridged MAC Addresses Allowed
963
Configuring the Number of Filtered MAC Addresses Allowed
964
Selecting the Security Violation Mode
965
Displaying Learned Port Security Information
967
In this Chapter
968
Port Mirroring Overview
970
Port Monitoring Overview
971
Sflow Overview
972
Remote Monitoring (RMON) Overview
974
Switch Health Overview
975
Port Mirroring
976
What Happens to the Mirroring Port
977
Remote Port Mirroring
979
Creating a Mirroring Session
980
Unblocking Ports (Protection from Spanning Tree)
981
Configuring Port Mirroring Direction
982
Displaying Port Mirroring Status
983
Configuring Remote Port Mirroring
984
Port Monitoring
985
Configuring a Port Monitoring Session
986
Pausing a Port Monitoring Session
987
Configuring Port Monitoring Direction
988
Configuring the Capture Type
989
Sflow
990
Sampler
991
Configuring a Fixed Primary Address
992
Displaying a Sflow Sampler
993
Displaying a Sflow Agent
994
Remote Monitoring (RMON)
995
Ethernet Statistics
996
Enabling or Disabling RMON Probes
997
Displaying RMON Tables
998
Displaying Statistics for a Particular Rmon Probe
999
Sample Display for Ethernet Statistics Probe
999
Sample Display for Alarm Probe
1000
Sample Display for History Probe
1000
Displaying a List of Rmon Events
1001
Displaying a Specific Rmon Event
1001
Monitoring Switch Health
1002
Configuring Resource Thresholds
1003
Displaying Health Threshold Limits
1004
Configuring Sampling Intervals
1005
Viewing Health Statistics for the Switch
1006
Viewing Health Statistics for a Specific Interface
1007
Chapter 35 Configuring VLAN Stacking
1008
VLAN Stacking Defaults
1009
VLAN Stacking Overview
1010
How VLAN Stacking Works
1012
VLAN Stacking Services
1013
Interaction with Other Features
1014
Quick Steps for Configuring VLAN Stacking
1015
Configuring VLAN Stacking Services
1017
Configuring Svlans
1018
Configuring a VLAN Stacking Service
1019
Configuring VLAN Stacking Network Ports
1020
Configuring a VLAN Stacking Service Access Point
1022
Configuring VLAN Stacking User Ports
1023
Configuring a Service Access Point Profile
1025
Configuring a UNI Profile
1026
Associating Uni Profiles with Uni Ports
1027
Transparent Bridging
1028
VLAN Stacking Application Example
1029
VLAN Stacking Configuration Example
1030
Verifying the VLAN Stacking Configuration
1033
Chapter 36 Using Switch Logging
1034
Switch Logging Defaults
1035
Switch Logging Overview
1036
Switch Logging Commands Overview
1037
Specifying the Switch Logging Output Device
1038
Configuring the Switch Logging File Size
1039
Displaying Switch Logging Records
1040
Specifying the Switch Logging Format
1041
Chapter 37 Configuring Ethernet OAM
1042
Ethernet OAM Defaults
1043
Ethernet OAM Overview
1044
Fault Management
1046
Mip CCM Database Support
1046
Performance Monitoring
1046
Chapter 38 Configuring Service Assurance Agent
1047
Quick Steps for Configuring Ethernet OAM
1049
Configuring Ethernet OAM
1050
Configuring a Maintenance Association
1051
Configuring a Maintenance End Point
1052
Configuring Loopback
1053
Verifying the Ethernet OAM Configuration
1055
In this Chapter
1056
SAA Defaults
1057
Quick Steps for Configuring SAA
1058
Service Assurance Agent Overview
1059
Configuring an SAA ID
1060
Configuring SAA SPB Session Parameters
1061
Generating an SAA XML History File
1062
Verifying the SAA Configuration
1064
Appendix A Software License and Copyright Statements
1065
ALE USA, Inc. License Agreement
1065
Third Party Licenses and Notices
1068
Advertisement
Advertisement
Related Products
Alcatel-Lucent OmniSwitch 6800 Series
Alcatel-Lucent OmniSwitch 6850 Series
Alcatel-Lucent OmniSwitch 9000 Series
Alcatel-Lucent OmniSwitch
Alcatel-Lucent OmniSwitch 6855 Series
Alcatel-Lucent OmniSwitch 6400 Series
Alcatel-Lucent OmniSwitch AOS
Alcatel-Lucent OmniSwitch 6250-24M
Alcatel-Lucent OmniSwitch 9900 Series
Alcatel-Lucent OmniSwitch 6860 Series
Alcatel-Lucent Categories
Switch
IP Phone
Telephone
Network Router
Network Hardware
More Alcatel-Lucent Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL