Alcatel OmniSwitch 6800 Series Network Configuration Manual page 13

Hide thumbs Also See for OmniSwitch 6800 Series:
Table of Contents

Advertisement

Contents
Chapter 16
In This Chapter ..............................................................................................................16-1
VRRP Specifications .....................................................................................................16-2
VRRP Defaults ..............................................................................................................16-2
Quick Steps for Creating a Virtual Router ....................................................................16-3
VRRP Overview ............................................................................................................16-4
Interaction With Other Features ....................................................................................16-7
Configuration Overview ................................................................................................16-8
Verifying the VRRP Configuration ............................................................................16-15
VRRP Application Example .......................................................................................16-16
Chapter 17
In This Chapter ..............................................................................................................17-1
Authentication Server Specifications ............................................................................17-2
Server Defaults ..............................................................................................................17-3
Quick Steps For Configuring Authentication Servers ..................................................17-4
Server Overview ............................................................................................................17-5
OmniSwitch 6800 Series Network Configuration Guide
..................................................................................................... 16-1
Why Use VRRP? ....................................................................................................16-5
Definition of a Virtual Router ................................................................................16-5
VRRP MAC Addresses ..........................................................................................16-6
ARP Requests ..................................................................................................16-6
ICMP Redirects ...............................................................................................16-6
VRRP Startup Delay ..............................................................................................16-6
VRRP Tracking ......................................................................................................16-7
Basic Virtual Router Configuration .......................................................................16-8
Creating a Virtual Router .......................................................................................16-8
Specifying an IP Address for a Virtual Router ......................................................16-9
Configuring the Advertisement Interval ..............................................................16-10
Configuring Virtual Router Priority .....................................................................16-10
Setting Preemption for Virtual Routers ................................................................16-11
Configuring VRRP Authentication ......................................................................16-11
Enabling/Disabling a Virtual Router ....................................................................16-12
Setting VRRP Traps .............................................................................................16-13
Setting VRRP Startup Delay ................................................................................16-13
Creating Tracking Policies ...................................................................................16-14
Associating a Tracking Policy With a Virtual Router ..........................................16-14
VRRP Tracking Example .....................................................................................16-18
RADIUS Authentication Servers ...........................................................................17-3
LDAP Authentication Servers ................................................................................17-3
Backup Authentication Servers ..............................................................................17-5
Authenticated Switch Access .................................................................................17-5
Authenticated VLANs ............................................................................................17-6
Port-Based Network Access Control (802.1X) ......................................................17-7
...................................................................... 17-1
November 2004
xiii

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents