Sign In
Upload
Manuals
Brands
Nortel Manuals
Software
Web OS 10.0
Nortel Web OS 10.0 Manuals
Manuals and User Guides for Nortel Web OS 10.0. We have
1
Nortel Web OS 10.0 manual available for free PDF download: Application Manual
Nortel Web OS 10.0 Application Manual (482 pages)
Switch Software
Brand:
Nortel
| Category:
Software
| Size: 5.18 MB
Table of Contents
Table of Contents
3
A, February
19
Preface
21
What You'll Find in this Guide
21
Who Should Use this Guide
21
Typographic Conventions
23
Contacting Us
24
Part 1: Basic Switching & Routing
25
Chapter 1: Basic IP Routing
27
IP Routing Benefits
28
Routing between IP Subnets
28
Figure 1-1 the Router Legacy Network
29
Figure 1-2 Switch-Based Routing Topology
30
Example of Subnet Routing
31
Table 1-1 Subnet Routing Example: IP Address Assignments
31
Table 1-2 Subnet Routing Example: IP Interface Assignments
31
Table 1-3 Subnet Routing Example: Optional VLAN Ports
33
Defining IP Address Ranges for the Local Route Cache
35
Table 1-4 Local Routing Cache Address Ranges
35
Border Gateway Protocol (BGP)
36
Internal Routing Versus External Routing
36
Forming BGP Peer Routers
37
BGP Failover Configuration
37
Figure 1-3 Ibgp and Ebgp
37
Figure 1-4 BGP Failover Configuration Example
38
DHCP Relay
41
DHCP Overview
41
DHCP Relay Agent Configuration
42
Figure 1-5 DHCP Relay Agent Configuration
42
Chapter 2: Vlans
43
VLAN ID Numbers
44
VLAN Tagging
44
Vlans and the IP Interfaces
45
VLAN Topologies and Design Issues
45
Example 1: Multiple VLANS with Tagging Adapters
46
Figure 2-1 Example 1: Multiple Vlans with Tagging Gigabit Adapters
46
Example 2: Parallel Links with Vlans
48
A, February
48
Figure 2-2 Example 2: Parallel Links with Vlans
48
Vlans and Spanning Tree Protocol
49
Table 2-1 Ports, Trunk Groups, and Vlans
49
Bridge Protocol Data Units (Bpdus)
50
Figure 2-3 Using Multiple Instances of Spanning Tree Protocol
51
Multiple Spanning Trees
51
Figure 2-4 VLAN 3 Isolated in a Single Spanning Tree Group
52
Figure 2-5 Implementing Multiple Spanning Tree Groups
53
Table 2-2 Multiple Spanning Tree Groups Per VLAN
54
Vlans and Default Gateways
58
Segregating VLAN Traffic
58
Figure 2-6 Default Gateways Per VLAN
58
Table 2-3 Route Cache Example
59
Configuring the Local Network
60
Configuring Default Gateways Per VLAN
60
Vlans and Jumbo Frames
63
Isolating Jumbo Frame Traffic Using Vlans
63
Routing Jumbo Frames to Non-Jumbo Frame Vlans
64
Figure 2-7 Jumbo Frame Vlans
64
Chapter 3: Port Trunking
65
Overview
65
Figure 3-1 Port Trunk Group
65
Built-In Fault Tolerance
66
Statistical Load Distribution
66
Port Trunking Example
67
Figure 3-2 Port Trunk Group Configuration Example
67
Chapter 4: OSPF
69
OSPF Overview
69
Types of OSPF Areas
70
Figure 4-1 OSPF Area Types
70
Types of OSPF Routing Devices
71
Figure 4-2 OSPF Domain and an Autonomous System
71
Neighbors and Adjacencies
72
The Link-State Database
72
The Shortest Path First Tree
73
Internal Versus External Routing
73
OSPF Implementation in Web os
74
Configurable Parameters
74
Defining Areas
75
Interface Cost
77
Electing the Designated Router and Backup
77
Summarizing Routes
77
Default Routes
78
Figure 4-3 Injecting Default Routes
78
Virtual Links
79
Router ID
80
Authentication
80
Figure 4-4 OSPF Authentication
80
Host Routes for Load Balancing
82
OSPF Features Not Supported in this Release
82
A, February
82
OSPF Configuration Examples
83
Example 1: Simple OSPF Domain
84
Figure 4-5 a Simple OSPF Domain
84
Example 2: Virtual Links
86
Figure 4-6 Configuring a Virtual Link
86
Example 3: Summarizing Routes
90
Figure 4-7 Summarizing Routes
90
Example 4: Host Routes
92
Figure 4-8 Configuring OSPF Host Routes
92
Verifying OSPF Configuration
98
Chapter 5: Secure Switch Management
99
Setting Allowable Source IP Address Ranges
100
Secure Switch Management
101
Authentication and Authorization
101
Requirements
102
Figure 5-1 Authentication and Authorization: How It Works
103
RADIUS Authentication and Authorization
103
RADIUS Authentication Features in Web os
104
Table 5-1 User Access Levels
105
Web Switch User Accounts
105
Table 5-2 Web os Alteon Levels
106
Secure Shell and Secure Copy
107
Encryption of Management Messages
108
SCP Services
108
RSA Host and Server Keys
109
Radius Authentication
110
Securid Support
110
Port Mirroring
113
Figure 5-2 Monitoring Ports
113
A, February
113
Chapter 6: Server Load Balancing
117
Understanding Server Load Balancing
118
Identifying Your Network Needs
118
How Server Load Balancing Works
119
Figure 6-1: Traditional Versus SLB Network Configurations
119
Implementing Basic Server Load Balancing
121
Figure 6-2: Web Hosting Configuration Without SLB
121
Figure 6-3: Web Hosting with SLB Solutions
121
Figure 6-4: SLB Client/Server Traffic Routing
122
Network Topology Requirements
122
Figure 6-5: Example Network for Client/Server Port Configuration
123
Configuring Server Load Balancing
124
Table 6-1 Web Host Example: Real Server IP Addresses
124
Table 6-2 Web Host Example: Port Usage
126
Additional Server Load Balancing Options
128
Table 6-3 Well-Known Application Ports
128
Extending SLB Topologies
136
Proxy IP Addresses
136
Table 6-4 Proxy Example: Port Usage
137
Mapping Ports
139
Figure 6-6: Basic Virtual Port to Real Port Mapping Configuration
140
Direct Server Interaction
142
Figure 6-7: Direct Server Return
143
Figure 6-8: Mapped and Nonmapped Server Access
144
Delayed Binding
146
Figure 6-9: Dos SYN Attacks Without Delayed Binding
146
Figure 6-10 Repelling Dos SYN Attacks with Delayed Binding
147
Load Balancing Special Services
149
IP Server Load Balancing
149
FTP Server Load Balancing
150
Figure 6-11 Layer 4 DNS Load Balancing
151
Preconfiguration Tasks
152
Real Time Streaming Protocol SLB
155
Wireless Application Protocol SLB
158
Intrusion Detection System Server Load Balancing
163
WAN Link Load Balancing
166
Chapter 7: Filtering
169
Overview
170
Filtering Benefits
170
Filtering Criteria
170
Table 7-1 Well-Known Protocol Types
171
Table 7-2 Well-Known Application Ports
171
Figure 7-1: Assigning Filters According to Range of Coverage
172
Figure 7-2: Assigning Filters to Overlapping Ranges
172
Overlapping Filters
172
Stacking Filters
172
Figure 7-3: Assigning a Default Filter
173
The Default Filter
173
Figure 7-4: VLAN-Based Filtering
174
VLAN-Based Filtering
174
Filter Logs
176
Optimizing Filter Performance
176
Cache-Enabled Versus Cache-Disabled Filters
178
Table 7-3 Filtering IP Address Ranges
178
TCP Rate Limiting
179
Configuring TCP Rate Limiting Filters
180
Figure 7-5: Configuring Clients with Different Rates
180
Figure 7-6: Limiting User Access to Server
183
Tunable Hash for Filter Redirection
184
Figure 7-7: Security Topology Example
185
Filter-Based Security
185
Table 7-4 Web Cache Example: Real Server IP Addresses
186
Network Address Translation
191
Static NAT
191
Figure 7-8: Static Network Address Translation
192
Dynamic NAT
193
Figure 7-9: Dynamic Network Address Translation
193
FTP Client NAT
195
Figure 7-10 Active FTP for Dynamic NAT
195
Figure 7-11 TCP ACK Matching Network
197
Matching TCP Flags
197
Table 7-5 TCP Flags
197
A, February
201
Matching ICMP Message Types
201
Table 7-6 ICMP Message Types
201
Chapter 8: Application Redirection
203
Web Cache Redirection Environment
204
Overview
204
Figure 8-1: Traditional Network Without Web Cache Redirection
204
Additional Application Redirection Options
205
Figure 8-2: Network with Web Cache Redirection
205
Table 8-1 Web Cache Example: Real Server IP Addresses
206
RTSP Web Cache Redirection
211
IP Proxy Addresses for NAT
213
Excluding Noncacheable Sites
215
Chapter 9: Virtual Matrix Architecture
217
Chapter 10: Health Checking
219
Real Server Health Checks
221
DSR Health Checks
222
Link Health Checks
223
Configuring the Switch for Link Health Checks
223
TCP Health Checks
224
ICMP Health Checks
224
Script-Based Health Checks
225
Configuring the Switch for Script-Based Health Checks
225
Script Format
226
Scripting Guidelines
227
Script Configuration Examples
227
Application-Specific Health Checks
230
HTTP Health Checks
231
UDP-Based DNS Health Checks
233
FTP Server Health Checks
234
POP3 Server Health Checks
235
SMTP Server Health Checks
236
IMAP Server Health Checks
237
NNTP Server Health Checks
238
RADIUS Server Health Checks
239
HTTPS/SSL Server Health Checks
240
WAP Gateway Health Checks
240
LDAP Health Checks
243
ARP Health Checks
245
Failure Types
246
Service Failure
246
Server Failure
246
Chapter 11: High Availability
247
VRRP Overview
248
VRRP Components
248
Figure 11-1 Example 1: VRRP Router
250
VRRP Operation
251
Selecting the Master VRRP Router
251
Active-Standby Failover
252
Figure 11-2 Example 2: VRRP Router
252
Table 11-1 Active Standby Configuration
252
Failover Methods
253
Figure 11-3 a Non-VRRP, Hot-Standby Configuration
253
Figure 11-4 Active-Standby Redundancy
254
Figure 11-5 Active-Active Redundancy
255
Figure 11-6 Hot-Standby Redundancy
256
Synchronizing Configurations
258
Web os Extensions to VRRP
259
Virtual Server Routers
259
Figure 11-7 Active-Active High Availability
260
Table 11-2 Sharing Active-Active Failover
260
Tracking VRRP Router Priority
261
Table 11-3 VRRP Tracking Parameters
261
A, February
261
High Availability Configurations
263
Active-Standby Virtual Server Router Configuration
263
Figure 11-8 Active-Standby High-Availability Configuration
263
Active-Active VIR and VSR Configuration
265
Figure 11-9 Active-Active High-Availability Configuration
265
Active/Active Server Load Balancing Configuration
267
VRRP-Based Hot-Standby Configuration
275
Figure 11-10 Hot-Standby Configuration
275
Configuration Procedure
276
Virtual Router Deployment Considerations
277
Mixing Active-Standby and Active-Active Virtual Routers
277
Synchronizing Active/Active Failover
277
Eliminating Loops with STP and Vlans
278
Figure 11-11 Loops in Active-Active Configuration
278
Figure 11-12 Cross-Redundancy Creates Loops, but STP Resolves Them
279
Figure 11-13 Using Vlans to Create Non-Looping Topologies
279
Assigning VRRP Virtual Router ID
280
Configuring the Switch for Tracking
280
Synchronizing Configurations
282
Stateful Failover of Layer 4 and Layer 7 Persistent Sessions
283
What Happens When a Switch Fails
284
Figure 11-14 Stateful Failover Example When the Master Switch Fails
284
A, February
284
Viewing Statistics on Persistent Port Sessions
286
A, February
286
Chapter 12: Global Server Load Balancing
289
GSLB Overview
290
Benefits
290
Compatibility with Other Web os Features
290
How GSLB Works
291
Figure 12-1 DNS Resolution with Global Server Load Balancing
291
Configuring GSLB
293
Figure 12-2 GSLB Topology Example
294
Table 12-1 GSLB Example: California Real Server IP Addresses
296
Table 12-2 GSLB Example: California Alteon 180 Port Usage
297
Table 12-3 Denver Real Server IP Addresses
300
Table 12-4 Web Host Example: Alteon 180 Port Usage
301
IP Proxy for Non-HTTP Redirects
304
Figure 12-3 HTTP and Non-HTTP Redirects
304
Figure 12-4 POP3 Request Fulfilled Via IP Proxy
305
How IP Proxy Works
305
Table 12-5 HTTP Versus Non-HTTP Redirects
305
Configuring Proxy IP Addresses
307
Verifying GSLB Operation
308
Configuring Client Site Preferences
308
Figure 12-5: GSLB Proximity Tables: How They Work
309
Figure 12-6 Configuring Client Proximity Table
310
Using Border Gateway Protocol for GSLB
312
Chapter 13: Firewall Load Balancing
313
Firewall Overview
314
Figure 13-1 Typical Firewall Configuration before FWLB
314
Basic FWLB
316
Figure 13-2 Basic FWLB Topology
316
Basic FWLB Implementation
317
Figure 13-3 Basic FWLB Process
317
Configuring Basic FWLB
319
Figure 13-4 Basic FWLB Example Network
319
Figure 13-5 Four-Subnet FWLB Topology
326
Four-Subnet FWLB
326
Figure 13-6 Four-Subnet FWLB Process
327
Four-Subnet FWLB Implementation
327
Configuring Four-Subnet FWLB
329
Figure 13-7 Four-Subnet FWLB Example Network
329
Advanced FWLB Concepts
346
Free-Metric FWLB
346
Figure 13-8 Basic FWLB Example Network
346
Figure 13-9 Four-Subnet FWLB Example Network
347
Adding a Demilitarized Zone (DMZ)
349
Figure 13-10 Typical Firewall Load-Balancing Topology with DMZ
349
Firewall Health Checks
351
Chapter 14: Virtual Private Network Load Balancing
353
Virtual Private Networks
354
Overview
354
How VPN Load Balancing Works
354
Figure 14-1 Basic Network Frame Flow and Operation
355
Figure 14-2 VPN Load-Balancing Configuration Example
356
Requirements
356
VPN Load-Balancing Configuration
356
Figure 14-3 Checkpoint Rules for both VPN Devices as Seen in the Policy Editor
368
Chapter 15: Content Intelligent Switching
371
Figure 15-1 Content Intelligent Load Balancing Example
372
Overview
372
Parsing Content
373
HTTP Header Inspection
374
Buffering Content with Multiple Frames
374
Content Intelligent Server Load Balancing
375
URL-Based Server Load Balancing
375
Figure 15-2 URL-Based Server Load Balancing
376
Virtual Hosting
380
Cookie-Based Preferential Load Balancing
383
Browser-Smart Load Balancing
386
URL Hashing for Server Load Balancing
387
Figure 15-3 Balancing Nontransparent Caches
387
Header Hash Load Balancing
389
DNS Load Balancing
390
Figure 15-4 Load Balancing DNS Queries
390
Layer 7 RTSP Load Balancing
392
Content Intelligent Web Cache Redirection
394
URL-Based Web Cache Redirection
395
Figure 15-5 URL-Based Web Cache Redirection
396
HTTP Header-Based Web Cache Redirection
403
Browser-Based Web Cache Redirection
405
URL Hashing for Web Cache Redirection
406
Figure 15-6 URL Hashing for WCR
408
Layer 7 RTSP Streaming Cache Redirection
409
Exclusionary String Matching for Real Servers
410
Configuring for Exclusionary URL String Matching
410
Regular Expression Matching
412
Standard Regular Expression Characters
412
Table 15-1 Standard Regular Expression Special Characters
412
Configuring Regular Expressions
413
Content Precedence Lookup
414
Using the or and and Operators
415
Requirements
415
Figure 15-7 Content Precedence Lookup Protectors Example
415
Assigning Multiple Strings
416
Figure 15-8 Content Precedence Lookup Multiple Strings Example
416
Table 15-2 Real Server Content
416
A, February
417
Figure 15-9 Configuring Layer 7 Deny Filter
417
Chapter 16: Persistence
421
Overview of Persistence
422
Using Source IP Address
422
Using Cookies
423
Using SSL Session ID
423
Cookie-Based Persistence
424
Figure 16-1 Cookie-Based Persistence: How It Works
424
Cookie Formats
425
Permanent and Temporary Cookies
425
Client Browsers that Do Not Accept Cookies
426
Cookie Properties
426
Cookie Modes of Operation
427
Figure 16-2 Insert Cookie Mode
427
Table 16-1 Comparison Among the Three Cookie Modes
427
Figure 16-3 Passive Cookie Mode
428
Figure 16-4 Rewrite Cookie Mode
429
Configuring Cookie-Based Persistence
430
Server-Side Multi-Response Cookie Search
436
SSL Session ID-Based Persistence
437
How SSL Session ID-Based Persistence Works
437
Figure 16-5 SSL Session ID-Based Persistence
438
A, February
438
Chapter 17: Bandwidth Management
441
Figure 17-1 Bandwidth Management: How It Works
442
Overview
442
Bandwidth Policies
444
Figure 17-2 Bandwidth Rate Limits
444
Bandwidth Policy Configuration
445
Table 17-1 Bandwidth Rate Limits
445
Table 17-2 Bandwidth Policy Limits
445
Data Pacing
446
Figure 17-3 Virtual Clocks and TDT
446
Classification Criteria
447
Server Output Bandwidth Control
447
Application Bandwidth Control
447
Combinations
448
Precedence
448
Bandwidth Classification Configuration
448
Frame Discard
449
URL-Based Bandwidth Management
449
Figure 17-4 URL-Based Bandwidth Management
450
Figure 17-5 URL-Based Bandwidth Management with Web Cache Redirection
450
HTTP Header-Based Bandwidth Management
451
Figure 17-6 Cookie-Based Bandwidth Management
451
Bandwidth Statistics and History
452
Statistics Maintained
452
Statistics and Management Information Bases
452
Packet Coloring (TOS Bits) for Burst Limit
453
Operational Keys
453
Configuring Bandwidth Management
454
Additional Configuration Examples
457
Preferential Services Examples
460
Figure 17-7 Cookie-Based Preferential Services
467
Glossary
471
Index
475
Advertisement
Advertisement
Related Products
Nortel Optivity Switch
Nortel Observe
Nortel Alteon OS 42C4911
Nortel Alteon OS 40M2420
Nortel Web Center Portal
Nortel Web OS Switch Software
Nortel Option 11C Compact
Nortel Option 11C Mini
Nortel Option 11
Nortel 2070
Nortel Categories
IP Phone
Telephone
Switch
Software
Server
More Nortel Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL