Page 1
Matrix Switch 17.1.1.4 User Guide 22 Nov 2016...
Page 2
In the European Union, all equipment and batteries purchased from Viavi after 2005-08-13 can be returned for disposal at the end of its useful life. Viavi will ensure that all waste equipment and batteries returned are reused, recycled, or disposed of in an environmentally friendly manner, and in compliance with all applicable national and international waste legislation.
Table of Contents Chapter 1: Getting Started....................7 Matrix overview..........................7 Matrix technical specifications....................9 How to connect Matrix to your network................11 How to set IPv4 network settings.....................11 How to set IPv6 network settings.................... 12 How to set the system time and date..................12 Chapter 2: Layouts.......................
Page 4
Chapter 5: Traffic Filters..................... 25 How to create a filter........................25 How to bind a filter to a rule....................25 How to edit a filter........................26 Understanding filters and filtering...................26 Chapter 6: User Accounts and User Groups.............. 28 How to set a user authentication scheme................28 How to authenticate locally....................
Page 5
How to request a new license....................51 How to re-license the appliance...................52 Chapter 14: Troubleshooting..................53 Understanding logging in Matrix....................53 How to view event logs......................53 How to send Syslog messages....................54 How to send SNMP traps.......................54 Understanding log categories....................55 Informational..........................
Page 6
What is the number of packets or memory buffer time for determining duplicate packets?............................78 Load Balancing..........................78 How is a conversation defined when load-balancing?..........78 Understanding load balancing after link loss..............78 Latency.............................. 78 What is the latency for Matrix?................... 78 How far back in time can I view utilization or packet error tracking?.......
Chapter 1: Getting Started Learn how to Matrix operates and how it is installed. Then learn how to configure its network settings and set the system time. Matrix overview The Matrix is a network management switch that can filter, de-duplicate, trim and time stamp inbound traffic and replicate, aggregate, or load-balance outbound traffic before sending it to your network and security monitoring tools.
Page 8
Figure 1: Matrix in your network The Matrix can perform multiple operations on inbound data before it is transmitted out tool ports: Filter traffic of interest to specific analysis devices: filters are ♦ created using open source BPF Unix-based language and/or an intuitive GUI interface.
Outbound data can also be flexibly directed using: Replication (one-to-many): Copying a single inbound stream to multiple ♦ tool ports, great for transmitting identical data to distinct monitoring appliances Aggregation (many-to-one): Combining multiple streams of network ♦ traffic into a single outbound stream for more efficient tool analysis Load balancing (many-to-many): Apply dynamic routing via packet or ♦...
Page 10
(HTTPS) or command line interface (SSH). The left light is solid yellow when an Ethernet cable is connected. The right light blinks green with activity. GPS Time Port for attaching an optional Viavi GPS timing device. Synchronization System Port Dimensions 19 in (W) x 1.73 in (H) x 18 in...
Default User/ admin/admin password Viavi uses a self-signed certificate. When connecting to the Self-signed device, your web browser may issue a warning about the site certificate being "untrusted" or that there is a problem with the "security certificate." This is a harmless message that may be ignored. You see that message because the site uses a self-signed certificate.
8. In DNS Address 1, type the IP address of a DNS server. The IPv4 address of at least one DNS server is required. If two servers are declared, the first server is used unless unreachable. 9. (Optional) In DNS Address 2, type the IP address of a DNS server. 10.
Page 13
GPS Uses an external GPS connected to the GPS port on the rear of the device. Only GPS Time Synchronization System appliances sold by Viavi may be used. The GPS Time Synchronization System can provide the highest resolution and accuracy.
Chapter 2: Layouts Operation of your Matrix is configured in an arrangement called a layout. The layout defines port connections, speeds, and the rules in use. You can also import and export layouts. Understanding layouts Operation of your Matrix is configured in an arrangement called a layout. The layout defines port connections, speeds, and the rules in use.
How to edit a layout You can edit any layout without first activating it. This ensures any changes made do not immediately affect operation of the Matrix while you edit the layout. Note: To edit the active layout (the layout currently in use), perform edits directly from the Ports page.
5. Assign at least one network port as a tool port by doing the following (repeat for more): Until you assign tool ports for use, no connections can be created between network ports and tool ports. Because you can assign and reassign network ports and tool ports at any time, do not place too much importance on finding the right number of assignments immediately.
2. Click the Actions list. The Actions list is located near the top-right corner of the layout designer. 3. Click Import. 4. Click Browse. 5. Browse to a previously exported layout file using the dialog box and click Open. 6. Click OK. You successfully imported the layout.
Chapter 3: Ingress and Egress Ports A network port is an ingress port that accepts network traffic. A tool port is an egress port that forwards network traffic to analysis tools. The connections must be made between (ingress) network ports and (egress) tool ports before rules can take effect.
You successfully connected a network port to a tool port. In this basic configuration, assuming the empty rule is unmodified, every packet entering the network port is forwarded to the tool port unchanged. And because the connection exists, you can now introduce packet processing in the form of rules —changing both how and what packets are forwarded to the tool port.
How to define a tool port Tool ports forward post-processed traffic to the devices connected to them. You must define which physical ports are to be used as tool ports. There are no dedicated ingress and egress ports in the Matrix; all physical ports can assume either one of these roles.
Network Port Ingress port that accepts network traffic Tool Port Egress port that forwards network traffic to tools and analyzers 4. Click OK. You successfully defined a network port. When connections are made between it and tool ports, network traffic is forwarded to tool ports. How to set port link speeds You can set the link speed of ports to better accommodate connected devices.
Chapter 4: Traffic Rules Rules modify how and what packets are forwarded from network ports to tool ports. Rules contain filters and set options like trailers, load balancing, and packet deduplication, but rules only take effect when connected to ports. Understanding rules Rules modify how and what packets are forwarded from network ports to tool ports.
To create a rule: 1. Starting in the dashboard, click Rules. The rules and filters designer appears, where rules and filters can be created and edited. 2. Ensure the Rules tab is selected. 3. Click New. The rule opens and is ready to edit. 4.
2. In the Layout list, select a layout. 3. Click the Actions list. The Actions list is located near the top-right corner of the layout designer. 4. Click Edit. 5. Right-click a rule. 6. In the Apply Rule submenu, click Select and click a rule. All of your created rules are in this submenu.
Chapter 5: Traffic Filters Traffic filters function as a part of Matrix (page 22) and ensure only specific traffic reaches your analysis tools. How to create a filter You can choose what network traffic reaches your analysis tools. Use filters to ensure that only packets with certain characteristics are forwarded to tool ports.
Because a rule—not a filter—is what connects network ports to tool ports, binding a filter to a rule is simply the first step. Only after the rule is applied in a layout does the filter begin affecting the data arriving at analysis tools. The same filter can be bound to any number of rules.
Page 27
Filters can help your organization keep pace with the network by isolating only what is needed, whether that contains certain address ranges, protocols, or other criteria. Plus, filtering narrows the amount of data forwarded, so tools use less resources and generate less heat. Filters work within rules.
Chapter 6: User Accounts and User Groups Mange your users, user groups, and authentication schemes either with the Matrix or a third-party service like Active Directory, LDAP, or others. How to set a user authentication scheme You can leverage your organization's existing authentication service in the Matrix.
4. Provide the information needed to connect to the authentication service. Tooltips are available by pausing your pointer on each option, and the boxes highlight any missing details after you click Accept. 5. Click Save. The Matrix now uses the selected authentication scheme for authenticating users.
4. Configure the settings shown. 5. Click Save. The Matrix now uses Active Directory for authenticating users. How to authenticate using OMS Use OMS authentication to allow a Viavi Management Server to authenticate users. 1. Starting in the dashboard, click System. 2. Click Authentication.
How to change the administrator password The default admin user has full permissions and cannot be deleted. For these reasons, change the admin password as soon as possible. The admin user in the Matrix is similar to the "root" user in other products. To change the administrator password: 1.
5. Click Edit. 6. Configure the settings of the user. You successfully edited a user. Any saved changes take effect immediately. How to import users You can import users from a remote authentication service. This allows users of the authentication service to become users in the Matrix appliance. To import users: 1.
4. Click Add. 5. Configure the settings of the group. You successfully added a user group. When user additions are made to the group, they inherit the permissions and properties of the group. How to edit a user group You can edit a user group to change the behavior of its members. Doing so is especially useful when a group requires a different permission set or to prohibit its members from logging in.
Chapter 7: Replication When traffic replication is used, a single data stream is copied and forwarded to multiple tool ports. Replication is necessary for providing identical traffic to different tools. How to replicate network traffic You can replicate network traffic by connecting network ports to tool ports with load balancing disabled in the connecting rule.
To replicate network traffic: 1. Starting in the dashboard, click Ports. The layout designer appears, where connections between network and tool ports can be created. 2. In the Layout list, select a layout. 3. Click the Actions list. The Actions list is located near the top-right corner of the layout designer. 4.
Chapter 8: Aggregation and Speed Conversion When link aggregation is used, traffic from multiple network ports is combined. The combined traffic can be forwarded to monitoring tools as a single stream of traffic. Speed conversion converts the speed and interface of a network link to something compatible with analysis tools.
3. Click the Actions list. The Actions list is located near the top-right corner of the layout designer. 4. Click Edit. 5. Use a drag-and-drop operation to connect a network port to a tool port. Successful connections are represented by lines between the ports and the appearance of an empty rule.
Link aggregation does not automatically create link redundancy. Although link aggregation may have a role in a link redundancy strategy using the Matrix, aggregating network links does not provide any type of redundancy or high availability. However, if using the Matrix for this purpose, combining link aggregation with traffic replication (page 34) can help you forward redundant...
Page 39
Use speed conversion to connect slower tools to faster networks, or the opposite. Speed conversion allows network traffic to ingress the Matrix at one speed and egress to tools at a different speed. Speed conversion also provides media conversion. For example, network port traffic arriving on copper cable can leave a tool port as an optical signal.
Chapter 9: Load Balancing When load balancing is active, traffic becomes more evenly distributed to monitoring tools. This ensures the monitoring tools are not overwhelmed, and network visibility can be improved. How to load balance With load balancing, you can distribute network port traffic more evenly across tool ports.
To load balance by network conversation: 1. Starting in the dashboard, click Rules. The rules and filters designer appears, where rules and filters can be created and edited. 2. Ensure the Rules tab is selected. 3. Click a rule from the list. The rule opens and is ready to edit.
Packet Packets are equally distributed to tool ports using a round- robin method. By dividing the packet volume equally, link utilization is decreased between tool ports and connected tools by a factor of how many tool ports are connected to the rule. Network conversations are severed by using this type, so ensure that any connected tools can operate effectively without intact conversations.
Page 43
you might need to enforce packet trimming (page 47) filtering (page 25) lower the utilization enough so that packets do not drop. Load balancing does not provide any type of redundancy or failover for your connected tools. Although you could design a layout to replicate traffic (page 34) forward it to multiple tool ports (page...
Chapter 10: Packet Deduplication Duplicate packets lower the statistical accuracy of analysis, increase network link saturation, and can interfere with tools. Packet deduplication removes duplicate packets and helps you avoid those situations. How to deduplicate packets You can remove duplicate packets that reach the Matrix. This ensures that tool ports only send unique packets to analysis tools, increasing the accuracy and efficiency of analysis.
3. In the Deduplicate Ignored Fields area, select which fields to ignore. If selected, the criteria is ignored and not evaluated when determining duplicate packets. 4. Click OK You successfully directed the Matrix to identify duplicate packets according to your definition. Remember, these settings affect the deduplication behavior of the entire layout, but packet deduplication is still enabled and disabled in individual rules.
Page 46
inspected and all fields must be identical. Any packet that falls outside of that range is considered unique to ensure throughput for your network. Duplicate packets are tracked on a per connection basis. If two identical packets are received on two different network ports, they are tracked and one is marked as a duplicate as long as both packets pass through the same connection.
Chapter 11: Packet Trimming Packet trimming limits the size of egress packets to no larger than a set value. Packets larger than the set value are reduced in size before being sent to analysis tools. How to trim packets Any time egress packet sizes must be controlled—not the volume or type— packet trimming is the solution.
Page 48
4. Select Packet Trim. If selected, packets larger than the Trim Length value are truncated to a specified size. Packets smaller than the Trim Length value are unchanged. 5. In the Trim Length list, click a trim length. Only the first N-bytes of each ingress packet are forwarded to tool ports. A new 4-byte CRC value is affixed to each trimmed packet.
You can upgrade the firmware to ensure maximum performance and stability of the system, and to update the documentation and tooltips. Prerequisite(s): Viavi continually releases improvements through firmware updates. Ensure you have the latest firmware by downloading it from ftp:// ftp.networkinstruments.com/pub/Matrix/1024/firmware/.
Page 50
5. Click Upload. The file uploads in the background, so do not close your browser. After the upload is complete, the file is verified and unpacked. If successful, an Upgrade button appears in the menu bar. 6. Click Upgrade. The firmware upgrade has successfully started. The overall process may take up to 30 minutes to complete.
Chapter 13: Licensing Your Matrix is pre-licensed. Relicensing the device requires that you request a new license from Viavi and then import a multi-line license string. Understanding the licensing process Your Matrix is pre-licensed. Relicensing the device requires that you request a new license from Viavi and then import a multi-line license string.
System > License. Doing so makes matching license to the correct device easier later on when you receive the new licenses. You will receive an e-mail message from Viavi with the device license ID and a new license string. Save this e-mail message!
Chapter 14: Troubleshooting Logging captures events that occur in the application, hardware, and its ports. These events may range from informational to critical and can be used when troubleshooting. Understanding logging in Matrix Logging captures events that occur in the application and between assets. These events may range from informational to critical.
How to send Syslog messages Syslog is widely used for message logging and separates the application generating the messages from the program that reports and analyzes them. Matrix can send messages to your Syslog server. To send log events and alarm notifications, first configure your server and recipient settings.
To send log events and alarm notifications, first configure your server and recipient settings. Configure your server settings: 1. From the main toolbar, choose System > System Logs > Remote Settings. 2. Select SNMP Enabled. 3. Configure the options. For details, use the information in SNMP trap settings (page 55).
Parameter Description fatal Fatal message. These messages indicate an imminent issue that should be corrected immediately, such as during updating the firmware or resetting the system defaults. Contact your support staff. Example: Unable to apply firmware update! <STRING> is a variable and may be a: word or words (for example, user name, host name, filter) or a number (for example, port number, version number, group ID).
Page 57
failed to import <STRING> groups failed to import <STRING> users failed to update group <STRING> <STRING> fault cleared. Firmware status server listening on port: <STRING> Firmware update succeeded. Rebooting system! Firmware upgrade process complete. Flash partition <STRING> attempt #<STRING> Flash partition <STRING> succeeded FPGA tunnel listening on port <STRING>...
saved layout (<STRING>) Scp process finished Scp process started Select canceled, most likely due to interrupt Select failed, most likely due to signal interrupt Setting <STRING> power loss run state to <STRING> Setting <STRING> power to OFF Setting <STRING> power to ON Shared Memory Size: <STRING>...
Page 59
Couldn't remove entry in file <STRING> because an entry with id <STRING> doesn't Couldn't replace entry in file <STRING> because an entry with id <STRING> doesn't Creating new layout ID for layout (<STRING>), layout ID not found on system Did not receive OK command after file transfer Error compiling <STRING>...
Unable to get socket address: <STRING> - <STRING>. Using default values. Unable to hash user password Unable to iterate users from BaseDN=<STRING>, Filter=<STRING>: <STRING> - <STRING Unable to locate command in CLI command description file (<STRING>): <STRING> - < Unable to lock HWApi mutex Unable to lock mutex! Unable to open CLI command description file (<STRING>): <STRING>...
Page 61
Can not set time before Jan 1, 2000 Canceling firmware update Cannot apply firmware because no valid firmware is available. Cannot begin firmware update because an update is already in progress. Cannot begin firmware update due to insufficient memory. Cannot begin firmware upload because an upload is already in progress. Cannot cancel firmware upload because an upload is not in progress.
Page 63
Fatal error, unable to open SPI slave pin! Fatal error, unable to read WS_PPS: <STRING> - <STRING> Fatal error, unable to read WS_SLAVE: <STRING> - <STRING> FILTER_BUFFER_SIZE should be changed by <STRING> Firmware update is not valid, aborting. Firmware update status socket accept error Firmware upgrade in progress, interface not available.
Page 64
Ping: recvfrom error Ping: select() Ping: sendto error Ping: unable to open ICMP socket! Port <STRING> is over-subscribed and has dropped packets read() error Received flash file <STRING>, length = <STRING> RootFS image size is larger than rootfs partition. Image Size: <STRING> bytes, Pa select() error Session manager not initialized SHA1 Hash failed for section (<STRING>)
Page 65
Unable to decrypt TACACS+ shared secret Unable to erase memory block <STRING>(<STRING>-<STRING>) - <STRING>:<STRING> Unable to erase partition <STRING> - <STRING>:<STRING> Unable to find queue match for RequestId: <STRING> Unable to generate unique ID for layout '<STRING>' Unable to get board serial Unable to get clock time - aborting LongPollThread Unable to get network addresses: <STRING>...
Page 66
Unable to read properties from license: <STRING> Unable to read time config file <STRING>: <STRING> - <STRING> Unable to reallocate memory Unable to release semaphore Unable to reload log configuration Unable to reload logging configuration, restart may be necessary: <STRING> - <STR Unable to reload time configuration Unable to rename layout <STRING>...
Username larger than <STRING> bytes Validate: error reading partition <STRING> - <STRING>:<STRING> Validate: SHA1 Checksum failed for partition <STRING> Fatal Fatal messages indicate a serious problem that must be addressed before continuing. Error initializing operation list Error initializing Session Manager Error initializing URI Tree Invalid type type: <STRING>, expected: <STRING>...
Chapter 15: Service and Repairs Learn how to handle sensitive data before and after repairs or how to transfer your settings to another appliance. How to handle sensitive data before and after repairs You can prepare a Matrix to be sent out for repairs by backing up the system data and then wiping the Matrix of its data.
How to create a backup file You can back up your configuration settings so that restoring them is possible at a later time or date. Tip! Logs are not included in your backups. You can back up system logs using System > Backup > Download Logs. To create a backup: 1.
2. Click Backup. 3. Click Factory Reset. This erases all user settings including the appliance license. Please ensure you have the appliance license available before performing this operation. After erasing, the Matrix will reboot automatically. After reboot it will take approximately 4 minutes to initialize the file system before the UI will be available.
4. Navigate to and select the backup file you created earlier. 5. Click Upload. Your backup has been restored, and your data and configuration settings have been applied. Because the backup does not include your license, you should now re-license your appliance (page 52).
Log files are not backed up. This can be accomplished by using System > Backup > Download Logs. Caution: The contents of a Matrix backup can contain sensitive network and user information. Network configuration (IPv4 and Packet trailer configuration (group IPv6) and host name ID and box ID) System clock source (browser time,...
System > License. Doing so makes matching license to the correct device easier later on when you receive the new licenses. You will receive an e-mail message from Viavi with the device license ID and a new license string. Save this e-mail message!
How to decommission a Matrix If you wish to decommission a Matrix—permanently removing it from your network infrastructure—you should also remove sensitive information and data from it. This can be accomplished with a factory reset. Removing data from the Matrix can be accomplished in one of two ways. If the Matrix is accessible on your network, you can perform a factory ♦...
Chapter 16: FAQ Read answers to common questions or unique situations. SFPs Which transceivers are supported? Any SFP or SFP+ from a quality manufacturer is supported. Does Matrix support 10/100/1000 Copper SFPs? Yes, but can only link down to 100 Mb. Does Matrix support 10 Gb copper interfaces? No, there is no 10 Gb copper link support.
For details, see How to set IPv6 network settings (page 12). What time sync options are supported? IEEE 1588 (PTP), NTP, and Viavi GPS. For more details, see How to set the system time and date (page 12). What third party databases for user authentication are supported? LDAP, Active Directory, RADIUS, TACACS+, OMS, and Local user authentication.
browser you see an “invalid credentials” error message even though you provide a valid user name and password. The browser has corrupted the cookie that the product uses, potentially because of one or more of your browser’s plugins. It’s also possible that cached files, in addition to the cookie, are the cause.
♦ TOC/TC in Pair header ♦ What is the time gap used to identify duplicate packets? It depends on the port speed and the number of packets seen. Each port has a certain amount of memory it uses to store packets and look for duplicates. What is the number of packets or memory buffer time for determining duplicate packets? It is 6000 packets or 0.6 seconds, whichever comes first.
How far back in time can I view utilization or packet error tracking? About one hour. For more details, see How to deduplicate packets (page 44). Latency Chapter 16: FAQ...
Need help?
Do you have a question about the 17.1.1.1 and is the answer not in the manual?
Questions and answers