Table of Contents

Advertisement

Quick Links

Matrix Switch 17.1.1.4
User Guide
22 Nov 2016

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the 17.1.1.1 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Viavi 17.1.1.1

  • Page 1 Matrix Switch 17.1.1.4 User Guide 22 Nov 2016...
  • Page 2 In the European Union, all equipment and batteries purchased from Viavi after 2005-08-13 can be returned for disposal at the end of its useful life. Viavi will ensure that all waste equipment and batteries returned are reused, recycled, or disposed of in an environmentally friendly manner, and in compliance with all applicable national and international waste legislation.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Getting Started....................7 Matrix overview..........................7 Matrix technical specifications....................9 How to connect Matrix to your network................11 How to set IPv4 network settings.....................11 How to set IPv6 network settings.................... 12 How to set the system time and date..................12 Chapter 2: Layouts.......................
  • Page 4 Chapter 5: Traffic Filters..................... 25 How to create a filter........................25 How to bind a filter to a rule....................25 How to edit a filter........................26 Understanding filters and filtering...................26 Chapter 6: User Accounts and User Groups.............. 28 How to set a user authentication scheme................28 How to authenticate locally....................
  • Page 5 How to request a new license....................51 How to re-license the appliance...................52 Chapter 14: Troubleshooting..................53 Understanding logging in Matrix....................53 How to view event logs......................53 How to send Syslog messages....................54 How to send SNMP traps.......................54 Understanding log categories....................55 Informational..........................
  • Page 6 What is the number of packets or memory buffer time for determining duplicate packets?............................78 Load Balancing..........................78 How is a conversation defined when load-balancing?..........78 Understanding load balancing after link loss..............78 Latency.............................. 78 What is the latency for Matrix?................... 78 How far back in time can I view utilization or packet error tracking?.......
  • Page 7: Chapter 1: Getting Started

    Chapter 1: Getting Started Learn how to Matrix operates and how it is installed. Then learn how to configure its network settings and set the system time. Matrix overview The Matrix is a network management switch that can filter, de-duplicate, trim and time stamp inbound traffic and replicate, aggregate, or load-balance outbound traffic before sending it to your network and security monitoring tools.
  • Page 8 Figure 1: Matrix in your network The Matrix can perform multiple operations on inbound data before it is transmitted out tool ports: Filter traffic of interest to specific analysis devices: filters are ♦ created using open source BPF Unix-based language and/or an intuitive GUI interface.
  • Page 9: Matrix Technical Specifications

    Outbound data can also be flexibly directed using: Replication (one-to-many): Copying a single inbound stream to multiple ♦ tool ports, great for transmitting identical data to distinct monitoring appliances Aggregation (many-to-one): Combining multiple streams of network ♦ traffic into a single outbound stream for more efficient tool analysis Load balancing (many-to-many): Apply dynamic routing via packet or ♦...
  • Page 10 (HTTPS) or command line interface (SSH). The left light is solid yellow when an Ethernet cable is connected. The right light blinks green with activity. GPS Time Port for attaching an optional Viavi GPS timing device. Synchronization System Port Dimensions 19 in (W) x 1.73 in (H) x 18 in...
  • Page 11: How To Connect Matrix To Your Network

    Default User/ admin/admin password Viavi uses a self-signed certificate. When connecting to the Self-signed device, your web browser may issue a warning about the site certificate being "untrusted" or that there is a problem with the "security certificate." This is a harmless message that may be ignored. You see that message because the site uses a self-signed certificate.
  • Page 12: How To Set Ipv6 Network Settings

    8. In DNS Address 1, type the IP address of a DNS server. The IPv4 address of at least one DNS server is required. If two servers are declared, the first server is used unless unreachable. 9. (Optional) In DNS Address 2, type the IP address of a DNS server. 10.
  • Page 13 GPS Uses an external GPS connected to the GPS port on the rear of the device. Only GPS Time Synchronization System appliances sold by Viavi may be used. The GPS Time Synchronization System can provide the highest resolution and accuracy.
  • Page 14: Chapter 2: Layouts

    Chapter 2: Layouts Operation of your Matrix is configured in an arrangement called a layout. The layout defines port connections, speeds, and the rules in use. You can also import and export layouts. Understanding layouts Operation of your Matrix is configured in an arrangement called a layout. The layout defines port connections, speeds, and the rules in use.
  • Page 15: How To Edit A Layout

    How to edit a layout You can edit any layout without first activating it. This ensures any changes made do not immediately affect operation of the Matrix while you edit the layout. Note: To edit the active layout (the layout currently in use), perform edits directly from the Ports page.
  • Page 16: How To Activate A Different Layout

    5. Assign at least one network port as a tool port by doing the following (repeat for more): Until you assign tool ports for use, no connections can be created between network ports and tool ports. Because you can assign and reassign network ports and tool ports at any time, do not place too much importance on finding the right number of assignments immediately.
  • Page 17: How To Export A Layout

    2. Click the Actions list. The Actions list is located near the top-right corner of the layout designer. 3. Click Import. 4. Click Browse. 5. Browse to a previously exported layout file using the dialog box and click Open. 6. Click OK. You successfully imported the layout.
  • Page 18: Chapter 3: Ingress And Egress Ports

    Chapter 3: Ingress and Egress Ports A network port is an ingress port that accepts network traffic. A tool port is an egress port that forwards network traffic to analysis tools. The connections must be made between (ingress) network ports and (egress) tool ports before rules can take effect.
  • Page 19: How To Connect Many Ports To The Same Rule

    You successfully connected a network port to a tool port. In this basic configuration, assuming the empty rule is unmodified, every packet entering the network port is forwarded to the tool port unchanged. And because the connection exists, you can now introduce packet processing in the form of rules —changing both how and what packets are forwarded to the tool port.
  • Page 20: How To Define A Tool Port

    How to define a tool port Tool ports forward post-processed traffic to the devices connected to them. You must define which physical ports are to be used as tool ports. There are no dedicated ingress and egress ports in the Matrix; all physical ports can assume either one of these roles.
  • Page 21: How To Set Port Link Speeds

    Network Port Ingress port that accepts network traffic Tool Port Egress port that forwards network traffic to tools and analyzers 4. Click OK. You successfully defined a network port. When connections are made between it and tool ports, network traffic is forwarded to tool ports. How to set port link speeds You can set the link speed of ports to better accommodate connected devices.
  • Page 22: Chapter 4: Traffic Rules

    Chapter 4: Traffic Rules Rules modify how and what packets are forwarded from network ports to tool ports. Rules contain filters and set options like trailers, load balancing, and packet deduplication, but rules only take effect when connected to ports. Understanding rules Rules modify how and what packets are forwarded from network ports to tool ports.
  • Page 23: How To Edit A Rule

    To create a rule: 1. Starting in the dashboard, click Rules. The rules and filters designer appears, where rules and filters can be created and edited. 2. Ensure the Rules tab is selected. 3. Click New. The rule opens and is ready to edit. 4.
  • Page 24: How To Apply A Rule In The Active Layout

    2. In the Layout list, select a layout. 3. Click the Actions list. The Actions list is located near the top-right corner of the layout designer. 4. Click Edit. 5. Right-click a rule. 6. In the Apply Rule submenu, click Select and click a rule. All of your created rules are in this submenu.
  • Page 25: Chapter 5: Traffic Filters

    Chapter 5: Traffic Filters Traffic filters function as a part of Matrix (page 22) and ensure only specific traffic reaches your analysis tools. How to create a filter You can choose what network traffic reaches your analysis tools. Use filters to ensure that only packets with certain characteristics are forwarded to tool ports.
  • Page 26: How To Edit A Filter

    Because a rule—not a filter—is what connects network ports to tool ports, binding a filter to a rule is simply the first step. Only after the rule is applied in a layout does the filter begin affecting the data arriving at analysis tools. The same filter can be bound to any number of rules.
  • Page 27 Filters can help your organization keep pace with the network by isolating only what is needed, whether that contains certain address ranges, protocols, or other criteria. Plus, filtering narrows the amount of data forwarded, so tools use less resources and generate less heat. Filters work within rules.
  • Page 28: Chapter 6: User Accounts And User Groups

    Chapter 6: User Accounts and User Groups Mange your users, user groups, and authentication schemes either with the Matrix or a third-party service like Active Directory, LDAP, or others. How to set a user authentication scheme You can leverage your organization's existing authentication service in the Matrix.
  • Page 29: How To Authenticate Locally

    4. Provide the information needed to connect to the authentication service. Tooltips are available by pausing your pointer on each option, and the boxes highlight any missing details after you click Accept. 5. Click Save. The Matrix now uses the selected authentication scheme for authenticating users.
  • Page 30: How To Authenticate Using Active Directory

    4. Configure the settings shown. 5. Click Save. The Matrix now uses Active Directory for authenticating users. How to authenticate using OMS Use OMS authentication to allow a Viavi Management Server to authenticate users. 1. Starting in the dashboard, click System. 2. Click Authentication.
  • Page 31: How To Change The Administrator Password

    How to change the administrator password The default admin user has full permissions and cannot be deleted. For these reasons, change the admin password as soon as possible. The admin user in the Matrix is similar to the "root" user in other products. To change the administrator password: 1.
  • Page 32: How To Import Users

    5. Click Edit. 6. Configure the settings of the user. You successfully edited a user. Any saved changes take effect immediately. How to import users You can import users from a remote authentication service. This allows users of the authentication service to become users in the Matrix appliance. To import users: 1.
  • Page 33: How To Edit A User Group

    4. Click Add. 5. Configure the settings of the group. You successfully added a user group. When user additions are made to the group, they inherit the permissions and properties of the group. How to edit a user group You can edit a user group to change the behavior of its members. Doing so is especially useful when a group requires a different permission set or to prohibit its members from logging in.
  • Page 34: Chapter 7: Replication

    Chapter 7: Replication When traffic replication is used, a single data stream is copied and forwarded to multiple tool ports. Replication is necessary for providing identical traffic to different tools. How to replicate network traffic You can replicate network traffic by connecting network ports to tool ports with load balancing disabled in the connecting rule.
  • Page 35: Understanding Network Traffic Replication

    To replicate network traffic: 1. Starting in the dashboard, click Ports. The layout designer appears, where connections between network and tool ports can be created. 2. In the Layout list, select a layout. 3. Click the Actions list. The Actions list is located near the top-right corner of the layout designer. 4.
  • Page 36: Chapter 8: Aggregation And Speed Conversion

    Chapter 8: Aggregation and Speed Conversion When link aggregation is used, traffic from multiple network ports is combined. The combined traffic can be forwarded to monitoring tools as a single stream of traffic. Speed conversion converts the speed and interface of a network link to something compatible with analysis tools.
  • Page 37: Understanding Network Link Aggregation

    3. Click the Actions list. The Actions list is located near the top-right corner of the layout designer. 4. Click Edit. 5. Use a drag-and-drop operation to connect a network port to a tool port. Successful connections are represented by lines between the ports and the appearance of an empty rule.
  • Page 38: How To Perform Speed Conversion

    Link aggregation does not automatically create link redundancy. Although link aggregation may have a role in a link redundancy strategy using the Matrix, aggregating network links does not provide any type of redundancy or high availability. However, if using the Matrix for this purpose, combining link aggregation with traffic replication (page 34) can help you forward redundant...
  • Page 39 Use speed conversion to connect slower tools to faster networks, or the opposite. Speed conversion allows network traffic to ingress the Matrix at one speed and egress to tools at a different speed. Speed conversion also provides media conversion. For example, network port traffic arriving on copper cable can leave a tool port as an optical signal.
  • Page 40: Chapter 9: Load Balancing

    Chapter 9: Load Balancing When load balancing is active, traffic becomes more evenly distributed to monitoring tools. This ensures the monitoring tools are not overwhelmed, and network visibility can be improved. How to load balance With load balancing, you can distribute network port traffic more evenly across tool ports.
  • Page 41: How To Load Balance By Packet Volume

    To load balance by network conversation: 1. Starting in the dashboard, click Rules. The rules and filters designer appears, where rules and filters can be created and edited. 2. Ensure the Rules tab is selected. 3. Click a rule from the list. The rule opens and is ready to edit.
  • Page 42: Understanding The Load Balancing Process

    Packet Packets are equally distributed to tool ports using a round- robin method. By dividing the packet volume equally, link utilization is decreased between tool ports and connected tools by a factor of how many tool ports are connected to the rule. Network conversations are severed by using this type, so ensure that any connected tools can operate effectively without intact conversations.
  • Page 43 you might need to enforce packet trimming (page 47) filtering (page 25) lower the utilization enough so that packets do not drop. Load balancing does not provide any type of redundancy or failover for your connected tools. Although you could design a layout to replicate traffic (page 34) forward it to multiple tool ports (page...
  • Page 44: Chapter 10: Packet Deduplication

    Chapter 10: Packet Deduplication Duplicate packets lower the statistical accuracy of analysis, increase network link saturation, and can interfere with tools. Packet deduplication removes duplicate packets and helps you avoid those situations. How to deduplicate packets You can remove duplicate packets that reach the Matrix. This ensures that tool ports only send unique packets to analysis tools, increasing the accuracy and efficiency of analysis.
  • Page 45: How To Enable Packet Deduplication In A Rule

    3. In the Deduplicate Ignored Fields area, select which fields to ignore. If selected, the criteria is ignored and not evaluated when determining duplicate packets. 4. Click OK You successfully directed the Matrix to identify duplicate packets according to your definition. Remember, these settings affect the deduplication behavior of the entire layout, but packet deduplication is still enabled and disabled in individual rules.
  • Page 46 inspected and all fields must be identical. Any packet that falls outside of that range is considered unique to ensure throughput for your network. Duplicate packets are tracked on a per connection basis. If two identical packets are received on two different network ports, they are tracked and one is marked as a duplicate as long as both packets pass through the same connection.
  • Page 47: Chapter 11: Packet Trimming

    Chapter 11: Packet Trimming Packet trimming limits the size of egress packets to no larger than a set value. Packets larger than the set value are reduced in size before being sent to analysis tools. How to trim packets Any time egress packet sizes must be controlled—not the volume or type— packet trimming is the solution.
  • Page 48 4. Select Packet Trim. If selected, packets larger than the Trim Length value are truncated to a specified size. Packets smaller than the Trim Length value are unchanged. 5. In the Trim Length list, click a trim length. Only the first N-bytes of each ingress packet are forwarded to tool ports. A new 4-byte CRC value is affixed to each trimmed packet.
  • Page 49: Chapter 12: Firmware

    You can upgrade the firmware to ensure maximum performance and stability of the system, and to update the documentation and tooltips. Prerequisite(s):   Viavi continually releases improvements through firmware updates. Ensure you have the latest firmware by downloading it from ftp:// ftp.networkinstruments.com/pub/Matrix/1024/firmware/.
  • Page 50 5. Click Upload. The file uploads in the background, so do not close your browser. After the upload is complete, the file is verified and unpacked. If successful, an Upgrade button appears in the menu bar. 6. Click Upgrade. The firmware upgrade has successfully started. The overall process may take up to 30 minutes to complete.
  • Page 51: Chapter 13: Licensing

    Chapter 13: Licensing Your Matrix is pre-licensed. Relicensing the device requires that you request a new license from Viavi and then import a multi-line license string. Understanding the licensing process Your Matrix is pre-licensed. Relicensing the device requires that you request a new license from Viavi and then import a multi-line license string.
  • Page 52: How To Re-License The Appliance

    System > License. Doing so makes matching license to the correct device easier later on when you receive the new licenses. You will receive an e-mail message from Viavi with the device license ID and a new license string. Save this e-mail message!
  • Page 53: Chapter 14: Troubleshooting

    Chapter 14: Troubleshooting Logging captures events that occur in the application, hardware, and its ports. These events may range from informational to critical and can be used when troubleshooting. Understanding logging in Matrix Logging captures events that occur in the application and between assets. These events may range from informational to critical.
  • Page 54: How To Send Syslog Messages

    How to send Syslog messages Syslog is widely used for message logging and separates the application generating the messages from the program that reports and analyzes them. Matrix can send messages to your Syslog server. To send log events and alarm notifications, first configure your server and recipient settings.
  • Page 55: Understanding Log Categories

    To send log events and alarm notifications, first configure your server and recipient settings. Configure your server settings: 1. From the main toolbar, choose System > System Logs > Remote Settings. 2. Select SNMP Enabled. 3. Configure the options. For details, use the information in SNMP trap settings (page 55).
  • Page 56: Informational

    Parameter Description fatal Fatal message. These messages indicate an imminent issue that should be corrected immediately, such as during updating the firmware or resetting the system defaults. Contact your support staff. Example: Unable to apply firmware update! <STRING> is a variable and may be a: word or words (for example, user name, host name, filter) or a number (for example, port number, version number, group ID).
  • Page 57 failed to import <STRING> groups failed to import <STRING> users failed to update group <STRING> <STRING> fault cleared. Firmware status server listening on port: <STRING> Firmware update succeeded. Rebooting system! Firmware upgrade process complete. Flash partition <STRING> attempt #<STRING> Flash partition <STRING> succeeded FPGA tunnel listening on port <STRING>...
  • Page 58: Warning

    saved layout (<STRING>) Scp process finished Scp process started Select canceled, most likely due to interrupt Select failed, most likely due to signal interrupt Setting <STRING> power loss run state to <STRING> Setting <STRING> power to OFF Setting <STRING> power to ON Shared Memory Size: <STRING>...
  • Page 59 Couldn't remove entry in file <STRING> because an entry with id <STRING> doesn't Couldn't replace entry in file <STRING> because an entry with id <STRING> doesn't Creating new layout ID for layout (<STRING>), layout ID not found on system Did not receive OK command after file transfer Error compiling <STRING>...
  • Page 60: Error

    Unable to get socket address: <STRING> - <STRING>. Using default values. Unable to hash user password Unable to iterate users from BaseDN=<STRING>, Filter=<STRING>: <STRING> - <STRING Unable to locate command in CLI command description file (<STRING>): <STRING> - < Unable to lock HWApi mutex Unable to lock mutex! Unable to open CLI command description file (<STRING>): <STRING>...
  • Page 61 Can not set time before Jan 1, 2000 Canceling firmware update Cannot apply firmware because no valid firmware is available. Cannot begin firmware update because an update is already in progress. Cannot begin firmware update due to insufficient memory. Cannot begin firmware upload because an upload is already in progress. Cannot cancel firmware upload because an upload is not in progress.
  • Page 62 Error initializing HwApi Error initializing LDAP: <STRING> - <STRING> Error initializing LicenseSec library! Error initializing mutex Error initializing TLS connection with client Error initializing TLS context Error initializing TLS for firmware status Error loading command definitions Error mapping memory Error moving pending layout to active layout: <STRING> - <STRING> Error opening file <STRING>...
  • Page 63 Fatal error, unable to open SPI slave pin! Fatal error, unable to read WS_PPS: <STRING> - <STRING> Fatal error, unable to read WS_SLAVE: <STRING> - <STRING> FILTER_BUFFER_SIZE should be changed by <STRING> Firmware update is not valid, aborting. Firmware update status socket accept error Firmware upgrade in progress, interface not available.
  • Page 64 Ping: recvfrom error Ping: select() Ping: sendto error Ping: unable to open ICMP socket! Port <STRING> is over-subscribed and has dropped packets read() error Received flash file <STRING>, length = <STRING> RootFS image size is larger than rootfs partition. Image Size: <STRING> bytes, Pa select() error Session manager not initialized SHA1 Hash failed for section (<STRING>)
  • Page 65 Unable to decrypt TACACS+ shared secret Unable to erase memory block <STRING>(<STRING>-<STRING>) - <STRING>:<STRING> Unable to erase partition <STRING> - <STRING>:<STRING> Unable to find queue match for RequestId: <STRING> Unable to generate unique ID for layout '<STRING>' Unable to get board serial Unable to get clock time - aborting LongPollThread Unable to get network addresses: <STRING>...
  • Page 66 Unable to read properties from license: <STRING> Unable to read time config file <STRING>: <STRING> - <STRING> Unable to reallocate memory Unable to release semaphore Unable to reload log configuration Unable to reload logging configuration, restart may be necessary: <STRING> - <STR Unable to reload time configuration Unable to rename layout <STRING>...
  • Page 67: Fatal

    Username larger than <STRING> bytes Validate: error reading partition <STRING> - <STRING>:<STRING> Validate: SHA1 Checksum failed for partition <STRING> Fatal Fatal messages indicate a serious problem that must be addressed before continuing. Error initializing operation list Error initializing Session Manager Error initializing URI Tree Invalid type type: <STRING>, expected: <STRING>...
  • Page 68: Chapter 15: Service And Repairs

    Chapter 15: Service and Repairs Learn how to handle sensitive data before and after repairs or how to transfer your settings to another appliance. How to handle sensitive data before and after repairs You can prepare a Matrix to be sent out for repairs by backing up the system data and then wiping the Matrix of its data.
  • Page 69: How To Create A Backup File

    How to create a backup file You can back up your configuration settings so that restoring them is possible at a later time or date. Tip! Logs are not included in your backups. You can back up system logs using System > Backup > Download Logs. To create a backup: 1.
  • Page 70: How To Factory Reset A Disconnected Matrix

    2. Click Backup. 3. Click Factory Reset. This erases all user settings including the appliance license. Please ensure you have the appliance license available before performing this operation. After erasing, the Matrix will reboot automatically. After reboot it will take approximately 4 minutes to initialize the file system before the UI will be available.
  • Page 71: How To Transfer Settings To A Different Matrix

    4. Navigate to and select the backup file you created earlier. 5. Click Upload. Your backup has been restored, and your data and configuration settings have been applied. Because the backup does not include your license, you should now re-license your appliance (page 52).
  • Page 72: How To Restore The Backup File

    Log files are not backed up. This can be accomplished by using System > Backup > Download Logs. Caution: The contents of a Matrix backup can contain sensitive network and user information. Network configuration (IPv4 and Packet trailer configuration (group IPv6) and host name ID and box ID) System clock source (browser time,...
  • Page 73: How To Re-License The Appliance

    System > License. Doing so makes matching license to the correct device easier later on when you receive the new licenses. You will receive an e-mail message from Viavi with the device license ID and a new license string. Save this e-mail message!
  • Page 74: How To Decommission A Matrix

    How to decommission a Matrix If you wish to decommission a Matrix—permanently removing it from your network infrastructure—you should also remove sensitive information and data from it. This can be accomplished with a factory reset. Removing data from the Matrix can be accomplished in one of two ways. If the Matrix is accessible on your network, you can perform a factory ♦...
  • Page 75: Chapter 16: Faq

    Chapter 16: FAQ Read answers to common questions or unique situations. SFPs Which transceivers are supported? Any SFP or SFP+ from a quality manufacturer is supported. Does Matrix support 10/100/1000 Copper SFPs? Yes, but can only link down to 100 Mb. Does Matrix support 10 Gb copper interfaces? No, there is no 10 Gb copper link support.
  • Page 76: Does Matrix Regenerate An Optical Signal

    For details, see How to set IPv6 network settings (page 12). What time sync options are supported? IEEE 1588 (PTP), NTP, and Viavi GPS. For more details, see How to set the system time and date (page 12). What third party databases for user authentication are supported? LDAP, Active Directory, RADIUS, TACACS+, OMS, and Local user authentication.
  • Page 77: Snmp

    browser you see an “invalid credentials” error message even though you provide a valid user name and password. The browser has corrupted the cookie that the product uses, potentially because of one or more of your browser’s plugins. It’s also possible that cached files, in addition to the cookie, are the cause.
  • Page 78: What Is The Time Gap Used To Identify Duplicate Packets

    ♦ TOC/TC in Pair header ♦ What is the time gap used to identify duplicate packets? It depends on the port speed and the number of packets seen. Each port has a certain amount of memory it uses to store packets and look for duplicates. What is the number of packets or memory buffer time for determining duplicate packets? It is 6000 packets or 0.6 seconds, whichever comes first.
  • Page 79: How Far Back In Time Can I View Utilization Or Packet Error Tracking

    How far back in time can I view utilization or packet error tracking? About one hour. For more details, see How to deduplicate packets (page 44). Latency Chapter 16: FAQ...
  • Page 80: Index

    Index groups add 32 Active Directory 30 delete 33 admin account 31 edit 33 aggregation 36 authentication 28 Active Directory 30 LDAP 29 IEEE-1588 12 local 29 info  55, 56 OMS 30 information 56 RADIUS 30 informational  55, 56 TACACS+ 30 invalid credentials 76 IP address 76 IPv4 11...
  • Page 81 RADIUS 30 replication 34 restore backup  70, 72 rules apply  23, 24 create 22 edit 23 settings transfer 71 SFP 78 SNMP  55, 56, 58, 60, 67 SNMP trap  55, 56, 58, 60, 67 speed conversion 38 Syslog  55, 56, 58, 60, 67 system time 12 TACACS+ 30 technical specifications 9...

Table of Contents