Alcatel Omni Switch/Router User Manual

Alcatel switch/router release 4.5
Hide thumbs Also See for Omni Switch/Router:
Table of Contents

Advertisement

Part No. 060166-10, Rev. C
March 2005
Omni Switch/Router

User Manual

Release 4.5
www.alcatel.com

Advertisement

Table of Contents
loading

Summary of Contents for Alcatel Omni Switch/Router

  • Page 1: User Manual

    Part No. 060166-10, Rev. C March 2005 Omni Switch/Router ™ User Manual Release 4.5 www.alcatel.com...
  • Page 3 page iii...
  • Page 4 page iv...
  • Page 5: Table Of Contents

    Omni Switch/Router Distributed Switching Fabric ......1-3 Omni Switch/Router Fabric Capacity ....... 1-4 Omni Switch/Router Applications and Configurations .
  • Page 6 MPX Redundancy Commands ........2-10 3 Omni Switch/Router Switching Modules Required Image Files .
  • Page 7 4 The User Interface ..........4-1 Overview of Command Interfaces .
  • Page 8 Table of Contents Multiple User Sessions ..........4-33 Listing Other Users .
  • Page 9 Synchronizing Configuration Data ........6-16 Synchronizing Image Files ......... 6-16 Loading a File From the Primary MPX .
  • Page 10 Table of Contents Secure Switch Access ..........8-4 Configuring the Secure Switch Access Filter Database .
  • Page 11 Duplicate MAC Address Support ........9-30 Multicast Claiming .
  • Page 12 Table of Contents NTP Information Menu ......... . .12-15 Display List of Peers the Server Knows About .
  • Page 13 15 Managing Ethernet Modules Overview of Omni Switch/Router Ethernet Modules ..... . 15-1 Kodiak Ethernet Modules ........15-3 The Ethernet Management Menus .
  • Page 14 Table of Contents 16 Managing 802.1Q Groups IEEE 802.1Q Sections Not Implemented ......16-2 Application Example ......... . 16-3 Single vs.
  • Page 15 Configuring Fast Spanning Tree ........17-34 Truncating Tree Timing &...
  • Page 16 Table of Contents MTU Handling ..........18-12 IP Fragmentation .
  • Page 17 19 Managing Groups and Ports How Ports Are Assigned to Groups ........19-2 Static Port Assignment .
  • Page 18 Table of Contents Port Mirroring ..........19-57 How Port Mirroring Works .
  • Page 19 Viewing Policy Configurations ........20-24 Viewing Virtual Ports’...
  • Page 20 Table of Contents Routing Between AutoTracker VLANs ......22-15 Creating AutoTracker VLANs ........22-16 Step A.
  • Page 21 25 IP Routing ........... 25-1 Introduction .
  • Page 22 Table of Contents Displaying IP RIP Filters ........25-37 Displaying a List of All IP RIP Filters .
  • Page 23 27 IPX Routing ..........27-1 Introduction .
  • Page 24 Combined Frame Relay with ISDN Backup ......28-9 Omni Switch/Router WAN Modules ........28-10 Cable Interfaces for Universal Serial Ports .
  • Page 25 29 Managing Frame Relay Back-to-Back Frame Relay Configurations ......29-3 Universal Serial Port Cable Interfaces ....... . . 29-4 “Physical”...
  • Page 26 Table of Contents Managing Frame Relay Services ........29-55 Configuring a Bridging Service .
  • Page 27 Viewing WAN Links ..........31-12 Displaying All Existing WAN Links .
  • Page 28 Table of Contents 34 Backup Services Introduction ........... 34-1 Backup Services Commands .
  • Page 29 Port Tests ..........36-9 Omni Switch/Router Port Test Wrap Cable/Plug Requirements ..36-10 Sample Test Session: Ethernet Module .
  • Page 30 Table of Contents A The Boot Line Prompt Entering the Boot Prompt ......... . A-2 Boot Prompt Basics .
  • Page 31: Omni Switch/Router Chassis And Power Supplies

    OmniSwitch module whereas the Omni Switch/Router module. Omni Switch/Router has a distributed switching fabric. In a 9-slot chassis operating at full duplex, Omni Switch/Router offers an aggregate 22 Gigabit per second (Gbps) distributed switching fabric. In addition, Omni Switch/Router offers new high density switching modules, including auto-sensing 10/100 Ethernet modules that offer high speed network connections to servers and desktops.
  • Page 32: Omni Switch/Router User Interface (Ui) Software

    Currently, Omni Switch/Router switching modules consist of Gigabit Ethernet modules, auto- sensing Ethernet modules, Fast 10/100 Ethernet modules, 10 Mbps Ethernet modules, modules, and Voice Over IP ( VOIP Modules,” for documentation. Omni Switch/Router modules require the use of an Omni Switch/Router chassis (see Omni Switch/Router Chassis and Power Supplies on page 1-7).
  • Page 33: Omni Switch/Router Distributed Switching Fabric

    ❹ Traditional Shared Memory Architecture In contrast, Omni Switch/Router switches use a distributed switching fabric. As shown in the figure below, data enters the input port and crosses the switching fabric only once before exiting the appropriate output port. Compared to the shared memory architecture, only half as much bandwidth is required since data just crosses the switching fabric once.
  • Page 34: Omni Switch/Router Fabric Capacity

    Switch/Router modules, the Omni Switch/Router architecture provides up to a 22 Gbps distributed switching fabric. As shown in the figure below, an OmniS/R-9 with an eight (8) Omni Switch/Router switching modules provides 22 Gbps of switching capacity. An an OmniS/R-5 with an Gbps of switching capacity, while an OmniS/R-3 with an Switch/Router switching modules provides 7 Gbps of switching capacity.
  • Page 35: Omni Switch/Router Applications And Configurations

    The servers each have dedicated Gigabit Ethernet connections to Omni Switch/Router modules on the first floor. The Omni Switch/Router chassis on the first floor is connected to the network on the second floor via a Gigabit Ethernet link to the OmniStack on the second floor.
  • Page 36: Omni Switch/Router As The Central Backbone Switch/Router And In The Wiring Closet

    Omni Switch/Router as the Central Backbone Switch/Router and in the Wiring Closet The figure below shows Omni Switch/Router chassis used in the wiring closet and as a network backbone switch/router connecting the wiring closets and server farm. On the third floor, an Omni Switch/Router chassis connects a mixture of 10BaseT and 100BaseTx worksta- tions with an auto-sensing Ethernet module.
  • Page 37: Omni Switch/Router Chassis And Power Supplies

    (See Chapter 3, “Omni Switch/Router Switching Modules,” for more information on hot swapping switching modules.) There are three (3) different versions of the Omni Switch/Router chassis. The OmniS/R-3, a three-slot version, is documented in OmniS/R-3 on page 1-8. The OmniS/R-5, a five-slot version, is documented in OmniS/R-5 on page 1-10.
  • Page 38: Omnis/R-3

    Omni Switch/Router Chassis and Power Supplies OmniS/R-3 The OmniS/R-3 chassis features three slots for an (contact your Alcatel sales representative for information on module availability). Slots are numbered from 1 to 3 starting with the topmost slot. A built-in power supply is located on the right side of the chassis, and a fan cooling system is located on the left side of the chassis.
  • Page 39: Omnis/R-3 Chassis Technical Specifications

    Heat Generation Temperature Operating Range Humidity Altitude Agency Listings Omni Switch/Router Chassis and Power Supplies 5.25” (13.34 cm) high, 17.13” (43.51 cm) wide, 13.00” (33.02 cm) deep 18 lb. (8.18 kg), fully populated with modules and power supplies. Up to 7 Gbps (aggregate) switching fabric capacity 85-270 VAC, 47 to 63 Hz, auto-ranging and auto-sensing 3.8 Amps at 100/115 VAC...
  • Page 40: Omnis/R-5

    Omni Switch/Router Chassis and Power Supplies OmniS/R-5 The OmniS/R-5 chassis has five slots for an Slots are numbered from 1 to 5 starting with the topmost slot. Slots for two power supplies are located at the bottom of the chassis.
  • Page 41 If one should fail, the remaining power supply automatically takes up the load without any disruption to the operation. See Chapter 1, “Omni Switch/Router Chassis and Power Supplies,” for more information on installing and removing power supplies.
  • Page 42: Omnis/R-5 Technical Specifications

    Omni Switch/Router Chassis and Power Supplies Total Module Slots Total Slots for Switching Modules Physical Dimensions Weight Switching Backplane Voltage Range Current Draw Watts (Output) Current Provided Temperature Operating Range Humidity Altitude Heat Generation Agency Listings Page 1-12 OmniS/R-5 Technical Specifications 12.25”...
  • Page 43: Omnis/R-9 And Omnis/R-9P

    Chapter 2, “The Omni Switch/Router information on the Omni Switch/Router Chassis and Power Supplies The OmniS/R-9 ; you cannot install a switching are installed, one of them must be installed in Slot 1...
  • Page 44 Omni Switch/Router Chassis and Power Supplies The OmniS/R-9 and OmniS/R-9P provide bays for two power supplies. The power supplies are self-enclosed to allow safe hot-insertion and hot-removal. When two power supplies are installed, they share the electrical load. If one should fail, the remaining power supply automatically takes up the load without any disruption to the operation.
  • Page 45: Omnis/R-9 Technical Specifications

    IEC 801-4, 1988 VCCI V-3/94.04 (Class A & Class B) EN 61000-4-2: 1995 EN 61000-4-3: 1995 EN 61000-4-4: 1995 EN 61000-4-5: 1995 EN 61000-4-6: 1996 EN 61000-4-8: 1993 EN 61000-4-11: 1994 ENV 50204: 1996 Omni Switch/Router Chassis and Power Supplies Page 1-15...
  • Page 46: Omnis/R-9P Technical Specifications

    Omni Switch/Router Chassis and Power Supplies Total Module Slots Total Slots for Switching Modules Physical Dimensions Weight Switching Backplane Voltage Range Current Draw Watts (Output) Current Provided Temperature Operating Range Humidity Altitude Heat Generation Agency Listings Page 1-16 OmniS/R-9P Technical Specifications 24.50”...
  • Page 47: Omnis/R-9P-48V Technical Specifications

    1000-4-2 (EN61000-4-2, per EN50082-1, 1992); EN55024 IEC 1000-4-3 (EN61000-4-3, per EN50082-1, 1992); IEC 1000-4-4 (EN61000-4-4) Level 4; IEC 1000-4-5 (EN61000-4-5) Level 4; IEC 1000-4-6 (EN61000-4-6); IEC 1000-4-8 (EN61000-4-8); IEC 1000-4-11 (EN61000-4-11); ENV 50204: 1996. Omni Switch/Router Chassis and Power Supplies Page 1-17...
  • Page 48: Omni Switch/Router Power Requirements

    1-10 for the OmniS/R-5 and OmniS/R-9 and OmniS/R-9P on page 1-13 for the OmniS/R-9 and OmniS/R-9P. For power consumption and FCC compliance information for Omni Switch/Router VoIP modules, consult your VoIP User Manual. It is possible, but not recommended, to have a...
  • Page 49 WAN module with 1 serial and 1 T1 or E1 port WSX-FT1-SC-2W WAN module with 2 serial and 2 T1 or E1 ports WSX-FE1-SC-2W WAN module with 2 serial and 2 T1 or E1 ports Omni Switch/Router Chassis and Power Supplies 3.75 auto-Sensing 10/100 Ethernet 10.25 9.75 5.25 4.75...
  • Page 50 Omni Switch/Router Chassis and Power Supplies Module Power Requirements with an HRE-X MPX-L3 Management Processor Module. ESX-K-100C-32W-L3 Advanced module with thirty-two (32) RJ-45 ports. ESX-FM-24W-L3 10 Mbps Ethernet module with twenty-four (24) fiber VF-45 ports ESX-K-100FM/FS- Advanced Fast Ethernet (100 Mbps) module 16W-L3 with sixteen (16) fiber MT-RJ ports.
  • Page 51: Grounding A Chassis

    Omni Switch/Router Chassis and Power Supplies Grounding a Chassis Omni Switch/Routers have two grounding screw holes on the back of the chassis. These holes use 10-32 screws and are approximately 1 inch apart. In addition, these holes do not have paint and are surrounded by a small paint-free rectangular section, which provides for a good connection contact.
  • Page 52: The Omni Switch/Router Hardware Routing Engine (Hre-X)

    If a frame needs to be routed, the the appropriate routing information. has the following restrictions: HRE-X • You must have Release 3.4.4 software, or later, on your Omni Switch/Router. • Do not install an HRE-X • Do not install an...
  • Page 53: Valid Hre-X Configurations

    ) utilize at least one of these registers for their operation. This leads to a restriction M013 of the combination of these features that can be supported on an Omni Switch/Router at any given time. ATM and M013 are not supported in Release 4.5.
  • Page 54: Connecting A Dc Power Source To An Omnis/R-Ps5-Dc375

    Connecting a DC Power Source to an OmniS/R-PS5-DC375 Connecting a DC Power Source to an OmniS/R-PS5-DC375 The OmniS/R-5 can use a DC power supply called the OmniS/R-5-DC375. This power supply contains a female power connector as shown in the figure below. This supply requires the use of 12 gauge wire.
  • Page 55 Opening Wire Bay on Screw-Style Connector 5. Insert the appropriate wire lead into the open circular hole. The silkscreen above each hole indicates which power lead—negative (-), positive (+), or ground (GND)—to plug into which hole. The lead you insert must match the lead attached to the 48-volt power source (i.e., negative to negative, positive to positive, ground to ground).
  • Page 56 Connecting a DC Power Source to an OmniS/R-PS5-DC375 7. Repeat Steps 4 through 6 for the remaining two wire leads. Be sure that the end of each lead attaches to the same power source that you connected to on the power supply (i.e., negative to negative, positive to positive, ground to ground).
  • Page 57: Connecting A Dc Power Source To An Omnis/R-Ps9-Dc725

    Connecting a DC Power Source to an OmniS/R-PS9-DC725 The OmniS/R-9P can use a DC power supply called the OmniS/R-PS9-DC725. This power supply contains a female power connector as shown in the figure below. This supply requires the use of 10 gauge wire. A clamp inside each connector keeps the power wire tightly in place during operation.
  • Page 58: Installing Dc Power Source Wire Leads

    Connecting a DC Power Source to an OmniS/R-PS9-DC725 Installing DC Power Source Wire Leads These instructions describe how to connect your 3-wire DC power source to the power connector on your DC power supply. A small flat-tip screwdriver and a wire stripper are required for this procedure.
  • Page 59 GND/(+)/(-) Inserting the Wire Lead Into the Circular Hole 6. Close the wire bay door. Use the small screwdriver (from Step 4a) to tighten the screw above the wire bay into which you inserted the wire lead. The wire lead should be securely attached inside the connector.
  • Page 60: Replacing Power Supplies (9-Slot Chassis)

    Replacing Power Supplies (9-Slot Chassis) Replacing Power Supplies (9-Slot Chassis) If a power supply ever needs to be replaced in an Omni Switch/Router 9-slot Chassis (e.g., OmniS/R-9 or OmniS/R-9p), it is strongly recommended that power supplies not be mixed, except under the conditions and exceptions shown in the following table.
  • Page 61: The Omni Switch/Router Mpx

    If you have a single installed in Slot 1. With the optional , which is described in Chapter 1, “Omni Switch/Router Chassis and HRE-X Power Supplies,” you can increase routing performance to 1.5 million packets per second. Flash Memory...
  • Page 62 Amber. If you do, file corruption may result and you will not be able to restart the switch. Omni Switch/Router Management Processor Module (MPX) Status LEDs Page 2-2 blinks . This label will indicate the Ethernet management port type. It...
  • Page 63 Omni Switch/Router Management Processor Module (MPX) Features The MPX module includes one row of LEDs for the Ethernet manage- ment port. (Activity). On Green when data is transmitted or received on the Ethernet management port. (Link Status/Disabled). On Green continuously when a good cable connection exists.
  • Page 64: Mpx Serial And Ethernet Management Ports

    MPX Serial and Ethernet Management Ports MPX Serial and Ethernet Management Ports You can gain access to switch management software through one of the two serial ( ports on the or the Ethernet management port. The two serial ports are configured with 9-pin “D”...
  • Page 65: Ethernet Management Port

    Ethernet Management Port also supports an out-of-band Ethernet port for high-speed uploads and switch management functions. With this port, you can access the Omni Switch/Router over a network via Telnet or You can use the Boot prompt to configure an you can use the command, which is described in Chapter 6, “Configuring Manage-...
  • Page 66: Configuring Mpx Serial Ports

    MPX Serial and Ethernet Management Ports MPX-T MPX-FL Configuring MPX Serial Ports The serial communications parameters for the two following: • 9600 bits per second (bps) • 8 data bits • 1 stop bit • no parity • no hardware flow control (Windows 95) Each serial port supports serial data rates of must remove the default baud rate shunt (E1), which fixes the baud rate at 9600 bps, before you can change the baud rate.
  • Page 67: Flash Memory And Omni Switch/Router Software

    Image files (those with the contain executable code for different switching modules and software features. The following table lists Omni Switch/Router image files that may be present in memory along with the module(s) or feature with which the file is used.
  • Page 68: Flash Memory Guidelines

    Not all image files in flash memory are required—only those that must be used with the switching modules in your Omni Switch/Router. You can remove any files that are not required for your Omni Switch/Router configuration by using the...
  • Page 69: Mpx Redundancy

    MPX Redundancy In order to provide greater reliability, Omni Switch/Router supports two primary/secondary redundant configuration. If the primary over without any operator intervention. Do not install any version of the MPM 1G MPM II . Installing an cause physical damage. If you want to configure an...
  • Page 70: Mpx Redundancy Commands

    MPX Redundancy Redundant Configuration Fallback Software Fallback None The primary has the ability to transfer files to and from the secondary tion where the secondary desirable to update the configuration file of the secondary. It is therefore the default not to update the configuration file on the secondary if the secondary is running an earlier version of software.
  • Page 71: Omni Switch/Router Switching Modules

    WSX-S-2W • WSX-SC-4W/8W • WSX-FT1/E1-SC-1W/2W • WSX-BRI-SC-1W/2W Voice Over IP Modules Voice Over ) modules for the Omni Switch/Router are listed below and are docu- VOIP mented in the VoIP User Manual. • VSX-A • VSX-VSD Switching Modules modules. o Important Note o...
  • Page 72 Layer 3 switching from 1.5 to 12.0 million packets per second HRE-X (Mpps) in a fully loaded chassis. See Chapter 1, “Omni Switch/Router Chassis and Power Supplies,” for more information on the Omni Switch/Router switching modules require an .
  • Page 73: Required Image Files

    Required Image Files See the table below for the required images files for the must load the image file (or files) listed for the corresponding module or it will not run. mpx.img, fpx.img ESX-K-100C-32W esx.img ESX-K-100FM/FS-16W esx.img GSX-K-FM/FS/FH-2W esx.img VSX-VSA vsx.img, text_cfg.img, vsmboot.asc VSX-VSD vsx.img, text_cfg.img, vsmboot.asc...
  • Page 74: Installing A Switching Module

    Switch Module Page 3-4 modules, Slots 1 and 2 are reserved for the o Anti-Static Warning o s should face outward. In a 9-slot Omni Switch/Router, the Slide Card In Card Guides . Addi- MPXs...
  • Page 75 2. Once the module is in the slot, close the two card ejectors (one on each end of the module) by pressing them in toward the module until they snap into place. 3. Use a standard screwdriver to tighten the two screw fasteners to secure the module inside the chassis.
  • Page 76: Removing A Switching Module

    Installing a Switching Module Removing a Switching Module To remove a switching module, follow the instructions below. If you are “hot swapping” the modules (i.e., removing and inserting while power is on), see Hot Swapping a Switching Module on page 3-7. Before handling a switching module, free your hands of static by wearing a grounding strip, or by grounding yourself properly.
  • Page 77: Hot Swapping A Switching Module

    Hot Swapping a Switching Module You may remove and insert switching modules while the switch is running. This technique is referred to as “hot swapping.” When you hot swap, you must replace the module with the same module type as the one you removed. For example, if you remove an module you must replace it with another You cannot hot swap a module into a previously empty slot.
  • Page 78 Hot Swapping a Switching Module 4. Carefully remove the switching module from the chassis and put it in a safe place. (See Removing a Switching Module on page 3-6 for instructions on removing a switching module.) The MPX’s green. In addition, the swap time will reset to its original value. (For example, if you set the swap time to 15 minutes in step 1, you will have 15 minutes again, regardless of how much time has elapsed.) Removing or inserting the switching module while the...
  • Page 79: Diagnostic Tests

    Diagnostic Tests 9. If the hot swapping mode has not timed out, enter at the system prompt. Something like the following will then be displayed. Diagnostic Tests All switching modules are subjected to extensive power-on diagnostics during the Power-On Self-Test cycle ( ).
  • Page 80: Handling Fiber And Fiber Optic Connectors

    Handling Fiber and Fiber Optic Connectors Handling Fiber and Fiber Optic Connectors Using fiber is extremely simple, but a few important rules should always be followed: Step 1. Use Premium Grade Jumper Cables with Duplex SC Connectors There are many brands of fiber optic jumper cables, with a wide range of quality between each manufacturer.
  • Page 81 2. Keeping your thumb pressed on the cloth-forwarding lever, press the optical plug ferrule endface against the cleaning cloth and drag the plug down toward your body (there should be arrows on the top of the tool that indicate the proper wiping direction). The connector is now clean.
  • Page 82: Gigabit Ethernet Modules

    Gigabit Ethernet Modules Gigabit Ethernet Modules Gigabit Ethernet connections can be used as network backbones or in a wiring closet. The following Omni Switch/Router Gigabit Ethernet modules are available: • GSX-K-FM/FS/FH-2W This module is described and illustrated in the following sections.
  • Page 83: Gsx-K-Fm/Fs/Fh-2W Technical Specifications

    GSX-K-FM/FS/FH-2W Technical Specifications Number of ports Connector Type Standards Supported 802-3z, 1000Base-LX, and 1000Base-SX Data Rate 1 Gigabit per second (full duplex) Maximum Frame Size 1,518 bytes MAC Addresses Supported 8,192 Connections Supported 1000Base-LX or 1000Base-SX connection to backbone or server Cable Supported Multimode and single mode Output Optical Power...
  • Page 84 Gigabit Ethernet Modules . This label indicates that the module contains an optical transceiver. This Gigabit Ethernet module includes one row of LEDs for each port. The LEDs for a given port dis- play in the row labeled with the port number.
  • Page 85: Auto-Sensing 10/100 Ethernet Modules

    Auto-Sensing 10/100 Ethernet Modules Alcatel’s Omni Switch/Router 10/100 Ethernet modules can be used to connect networks with a mix of 10 Mbps and 100 Mbps workstations or as a network backbone. The following Omni Switch/Router 10/100 and Fast Ethernet modules are available: •...
  • Page 86 Auto-Sensing 10/100 Ethernet Modules The 32 ports may connect to unshielded or shielded twisted pair ( RJ-45 K-100C-32W Technical Specifications on page 3-17 for more information). Each port may connect to a single high-speed device or a hub serving multiple devices. The can be used in the wiring closet with a mix of 100 Mbps Ethernet devices and 10 Mbps Ether- net devices that are transitioning to higher speed connections.
  • Page 87: Esx-K-100C-32W Technical Specifications

    ESX-K-100C-32W Technical Specifications Number of ports Connector Type RJ-45 Standards Supported IEEE 802.3; IAB RFCs 826, 894 Data Rate 10 or 100 Mbps (full or half duplex) Maximum Frame Size 1,518 bytes MAC Addresses Supported ESX-K-100C-32W: 1,024 ESX-K-100C-32W4: 4,096 Connections Supported 10BaseT hub or device 100BaseTx hub or device Cable Supported...
  • Page 88 Auto-Sensing 10/100 Ethernet Modules (Hardware Status). On Green when the module has passed diag- nostic tests successfully. On Amber when the hardware has failed diag- nostics or if the corresponding image file for the module is not in flash memory. (Software Status).
  • Page 89: Fast (100 Mbps) Ethernet Modules

    Fast (100 Mbps) Ethernet Modules Alcatel’s Omni Switch/Router Fast Ethernet modules can be used to connect networks with 100 Mbps workstations or as a network backbone. The following Omni Switch/Router Fast Ethernet modules are available: • Advanced switching module with sixteen (16) Fast Ethernet (100...
  • Page 90: Esx-K-100Fm/Fs-16W Technical Specifications

    Fast (100 Mbps) Ethernet Modules ESX-K-100FM/FS-16W Technical Specifications Number of ports Connector Type Standards Supported Data Rate Maximum Frame Size MAC Addresses Supported Connections Supported Cable Supported Optical output power Optical receiver sensitivity Cable Distance Current Draw Page 3-20 MT-RJ IEEE 802.3;...
  • Page 91 . This label indicates that the module contains an optical transceiver). Each LED corresponds to a port on the module. When an LED is on Green continuously, a good cable connection exists. The LED will blink Green when traffic is trans- mitted or received on the port.
  • Page 92: Wan Modules

    WAN Modules WAN Modules The Omni Switch/Router currently supports the following Wide Area Network ( modules: • WSX-S-2W • WSX-SC • WSX-FT1/E1-SC • WSX-BRI-SC All of these modules are described and illustrated in the sections beginning on page 3-27. switching module is actually a submodule, or daughtercard, that attaches to an Omni...
  • Page 93: Wan Bri Port Specifications (S/T Interface)

    WAN BRI Port Specifications (S/T Interface) Not Used Not Used Rcv + from TE Rcv - from TE Xmt + from TE Xmt - from TE Not Used Not Used WAN BRI Port Specifications (U Interface) Not Used Not Used Xmt to /Rcv from Network Xmt to /Rcv from Network Not Used...
  • Page 94: Wan T1/E1 Port Specifications

    WAN Modules Page 3-24 WAN T1/E1 Port Specifications Rx_Ring Rx_Tip Chassis GND Tx_Ring Tx_Tip Chassis GND Chassis GND (A jumper is provided for connecting Pins 7 and 8 to the chassis ground, if required.) Chassis GND (A jumper is provided for connecting Pins 7 and 8 to the chassis ground, if required.) WAN Serial Port Numbering...
  • Page 95: Wan Serial Port Specifications

    WAN Serial Port Specifications Shield Shield Signal Ground -- Transmitted TD(A) Data TD(B) Received Data DCE RD(A) RD(B) Transmit Clock DCE TC(A) TC(B) Receive Clock TC(A) TC(B) Ext. Transmit XC(A) Clock XC(B) Request To RS(A) Send RS(B) Clear To Send CS(A) CS(B) Data Set Ready DCE...
  • Page 96 WAN Modules Shield Signal Ground -- Transmitted Data Received Data DCE Transmit Clock DCE Receive Clock Ext. Transmit Clock Request To Send Clear To Send Data Set Ready DCE Data Terminal Ready Data Carrier Detect Local Loopback DTE Remote Loopback Ring Indicator Test Mode Cable Type 4...
  • Page 97: Wsx-S-2W

    WSX-S-2W supports two (2) serial ports, which can provide access rates from 9.6 Kbps to WSX-S-2W 2 Mbps. The also supports three types of clocking (internal, external, and split). See WSX-S-2W WSX-S-2W Technical Specifications on page 3-27 for more information. WSX-S-2W sion.
  • Page 98 WAN Modules (Status). On Green con- tinuously when the port con- nection is operational. Off when the port is disabled or the cable is detached. Blink- ing On/Off if cable is attached but receive control data is detected as down. This LED also blinks during initialization, diagnostics, or when invalid data is being...
  • Page 99: Wsx-Sc

    WSX-SC supports 4 or 8 serial ports, each of which can provide access rates from 9.6 WSX-SC Kbps to 2 Mbps. The 4-port version is referred to as the referred to as the . The WSX-SC-8W types of clocking (internal, external, and split). See WSX-SC Technical Specifications on page 3-30 for more information.
  • Page 100: Wsx-Sc Technical Specifications

    WAN Modules Number of ports Connector Type Protocols Supported Data Rates Supported Compression Clocking Virtual Circuits Supported MAC Addresses Supported Connections Supported Cable Supported Power Consumption Page 3-30 WSX-SC Technical Specifications 4 or 8 High-density 26-pin shielded serial Frame Relay and Point-to-Point (PPP) 9.6, 19.2, 56, 64, 128, 256, 512, 768, 1024, 1536, 2048 Kbps Hardware-based using STAC 9705...
  • Page 101 The module includes one row of LEDs for each port. The LEDs for a given port are located in the row labeled with the port number. If the WSX module includes a total of eight ports, then the module con- tains two sets of four rows of LEDs.
  • Page 102: Wsx-Ft1/E1-Sc

    WAN Modules WSX-FT1/E1-SC module contains one or two WSX-FT1/E1-SC ports use RJ-48C version is referred to as the WSX-FT1-SC; t run either Frame Relay or the Point-to-Point Protocol ( Specifications on page 3-33 for more information. This module includes an integrated such as a , or a T1/E1...
  • Page 103: Wsx-Ft1/E1-Sc Technical Specifications

    WSX-FT1/E1-SC Technical Specifications Number of ports 1 or 2 T1 or E1 ports 1 or 2 Universal Serial ports Connector Types T1/E1: RJ-48C Serial: High-density, 26-pin shielded Standards Supported RFCs 1406, 1213, 1659 Frame Formats T1: Superframe, Extended Superframe, Unframed E1: E1, E1-CRC, E1-MF, E1-CRC-MF, Unframed Line Coding T1: B8ZS or AMI...
  • Page 104 WAN Modules This module includes one set of LEDs for each port. The LEDs for a given port are located above the port. If the WSX module includes four ports, then the module con- tains two sets of LEDs. The second set of LEDs are located above the third and fourth ports.
  • Page 105: Wsx-Fe1-Sc Cabling/Jumper Settings

    WAN Modules WSX-FE1-SC Cabling/Jumper Settings supports both twisted pair (120 Ohm) and coaxial (75 Ohm) cable types. The WSX-FE1-SC default is 120 Ohm. You must set a pair of jumpers ( ) on the back of the board to correspond to the type of cable you are using. For more detailed information on the types of cables to use with this module, see Appendix B, “Custom Cables.”...
  • Page 106: Wsx-Bri-Sc

    WAN Modules WSX-BRI-SC ISDN Basic Rate Interface WAN serial port and one (1) 1 serial port and 1 and 2 ports is referred to as the on page 3-37 for more information. The serial port on a WSX-BRI-SC module. A WSX-SC serial cable types ( RS-232...
  • Page 107: Wsx-Bri-Sc Technical Specifications

    WSX-BRI-SC Technical Specifications Number of ports 1 or 2 pairs of a serial port and an ISDN Basic Rate Interface (BRI) port Serial Connector Type High-density 26-pin shielded serial BRI Connector Type RJ-45 Protocols Supported Point-to-Point Protocol (PPP); Frame Relay (sup- ported on the serial port only) Data Rates Supported 2 “B”...
  • Page 108 WAN Modules The WSX-BRI module includes one set of LEDs for each port. The LEDs for a given port are located in the set labeled with the port number. If the HSX module contains two WSX- BRI daughter cards, the second set of ports (one Serial and one BRI) are numbered as Ports 3 and 4 respectively, and include their own...
  • Page 109 Jumper Configuration for the “U” Interface (this is how the board is shipped) Part Number and Serial Number label The small labels next to the jumper pins at J13, J14, and J16 indicate which pins must be bridged to set the BRI port to either the “U”...
  • Page 110 WAN Modules Page 3-40...
  • Page 111: The User Interface

    They are the User Interface ( Interface ( ). Prior to software Release 4.4, the switch automatically booted up in the mode. In Release 4.4 and later, the Omni Switch/Router is factory-configured to boot up in mode. Command interface generically refers to any mecha- nism resident in the software that allows a user to change switch configurations or to display statistics.
  • Page 112: Changing Between The Cli And Ui Modes

    Overview of Command Interfaces Changing Between the CLI and UI Modes Once you log on to the switch, the following screen displays. You must press the to start the command interface. After you press At this point, you are in the the commands described in the Text-Based Configuration CLI Reference Guide.
  • Page 113: Exit The Command Interface

    Overview of Command Interfaces Exit the Command Interface To exit your current session with the switch from the or the mode, type either at the prompt, then press . Your session is immediately terminated. o Note o If you forget which command interface mode you are in, type the character.
  • Page 114: Ui To Cli Command Cross Reference

    UI to CLI Command Cross Reference The chapters in this Users Guide are organized around the into menus and sub-menus. Even though the Omni Switch/Router software has been changed to boot up in the mode, the Users Guide conforms to its original design. The commands are fully documented in the Text-Based Configuration CLI Reference Guide.
  • Page 115: Basic Switch Management Table

    Basic Switch Management Table “The User Interface” 5, “Installing Switch Software” “Configuring Management Processor Modules” “Managing Files” 8, “Switch Security” UI to CLI Command Cross Reference No PM Support Unsupported GF-Ftp GF-File GF-File GF-CD GF-System GF-System GF-System GF-FTP GF-LS 18-User GF-RM GF-System 18-User...
  • Page 116: Network Management Commands

    UI to CLI Command Cross Reference Basic Switch Management Table (continued) “Switch-Wide Parameters” “Switch Logging” 11, “Health Statistics” Network Management Commands The table on page 4-6 summarizes the commands supported in the Chapters 12 through 14. 12, “Network Time Protocol” “Configuring SNMP”...
  • Page 117: Layer Ii Switching Commands

    Layer II Switching Commands The table on page 4-7 summarizes the features supported in the 15 through 18. “Managing Ethernet Modules” 16, “Managing 802.1Q Groups” “Configuring Bridging Parameters” “Configuring Frame Translations” Layer II Switching Table All commands used to create, delete, modify and view a service, plus the message command are supported.
  • Page 118: Groups, Vlans, Policies Commands

    UI to CLI Command Cross Reference Groups, VLANs, Policies Commands The table beginning on page 4-8 summarizes the features supported in the Chapters 19 through 24. “Managing Groups and Ports” “Group and VLAN Policies” “InterSwitch Protocols” Page 4-8 Groups, VLANs, Policies Table Unsupported Unsupported and the...
  • Page 119: Managing Autotracker Vlans

    Group, VLANs, Policies Table (continued) “Managing AutoTracker VLANs” “Multicast VLANs” “AutoTracker VLAN Examples” UI to CLI Command Cross Reference Unsupported 6-Group 6-Group GF-System Page 4-9...
  • Page 120: Routing Commands

    UI to CLI Command Cross Reference Routing Commands The table beginning on page 4-10 summarizes the features supported in the Chapters 25 through 27. All IP Routing commands are “IP Routing” supported in the CLI. ”UDP Forwarding” “IPX Routing” Page 4-10 Routing Table All IP Routing commands are supported in the CLI.
  • Page 121: Wan Access Commands

    WAN Access Commands The table beginning on page 4-11 summarizes the features supported in the Chapters 28 through 34. 28, “WAN Switching Modules” “Managing Frame Relay” “Point-to-Point Protocol (PPP)” UI to CLI Command Cross Reference WAN Access Table continued on next page... and the 10-WAN 10-WAN...
  • Page 122 UI to CLI Command Cross Reference “WAN Links” “Managing ISDN Ports” “Managing T1 and E1 Ports” 34, “Backup UI commands only. Services” Page 4-12 WAN Access Table (continued) Unsupported 10-WAN 10-WAN 10-WAN No PM Support...
  • Page 123: Troubleshooting Diagnostics Commands

    Troubleshooting Diagnostics Commands The table beginning on page 4-13 summarizes the features supported in the Chapters 35 and 36 and Appendices A and B. Troubleshooting/Diagnostics Table “Troubleshoot- ing” “Running Hardware Diagnostics” “Boot Line Prompt” No UI commands in this “Custom Appendix.
  • Page 124: User Interface Menu

    User Interface Menu User Interface Menu This menu provides a top-level view of all the form of sub-menus. Within each sub-menu there is a set of commands and/or another sub-menu. Although the commands are grouped in a sub-menu structure, any command may be entered from any sub- menu.
  • Page 125: Main Menu Summary

    Main Menu Summary These menus, their sub-menus, and sub-options are described in this manual. The following provides a brief overview of each item on this main menu. . Contains options for downloading system software, listing software files, copying files, editing files, and deleting files. This menu is fully described in Chapter 7, “Managing Files.” .
  • Page 126: General User Interface Guidelines

    Telnet. You can have up to four simultaneous connections to an Omni Switch/Router. For Release 4.4 and later, the default for switch monitoring and configuration is the CLI mode. If you are using a login account with...
  • Page 127: Quitting A Command

    If you cannot see a or if you do not get the command prompt after the completion of a command, press the regain the prompt. Quitting a Command Many of the commands give you a list of parameters to change. With most commands you can enter in if you want to exit the command without making changes.
  • Page 128: Configuring The System Prompt

    General User Interface Guidelines Configuring the System Prompt submenu is listed under the system menu. The system prompt. The prompt can be made up of literal information, system variable informa- tion, or a combination of the two. Literal information means that the prompt will reflect exactly what you type at the submenu.
  • Page 129: Configuring More Mode For The User Interface

    General User Interface Guidelines Configuring More Mode for the User Interface Enabling More Mode The more mode allows you to specify the maximum number of lines that will be scrolled to your workstation’s display. However, before you can specify the maximum number of lines that can be displayed, you must first verify that the more mode is enabled.
  • Page 130 General User Interface Guidelines A screen similar to the following will be displayed. Type , followed by the maximum number of lines to be displayed, and press . (The value may range from 0 to 2147483647.) For example: After you press , the screen will be redrawn.
  • Page 131 Disabling More Mode To disable more mode, type at the user prompt and press A screen similar to the following will be displayed. Next, type at the submenu prompt and press that more mode is now set to Type at the submenu prompt and press The switch’s table filtering feature cannot be used when the tion on UI table filtering, refer to UI Table Filtering...
  • Page 132: Setting Verbose/Terse Mode For The User Interface

    General User Interface Guidelines Setting Verbose/Terse Mode for the User Interface Enabling Verbose Mode When verbose mode is enabled, you are not required to enter a question mark in order to view the switch’s configuration menus. Instead, menus are displayed automatically. For exam- ple, if verbose mode is enabled and you enter at the user prompt, the Summary menu will be displayed automatically, as shown below: The switch’s default verbose mode setting is...
  • Page 133 General User Interface Guidelines Disabling Verbose Mode Although the command is no longer supported as of Release 4.1, disabling verbose mode via the submenu is the command equivalent. When verbose mode is disabled, configuration menus will not be displayed automatically. To display a current menu when verbose mode is disabled, you must type a question mark ( ) and then press To disable verbose mode, type at the user prompt and press...
  • Page 134: Configuring The Auto Logout Time

    General User Interface Guidelines Configuring the Auto Logout Time When the switch detects no user activity on the cally logs the user out of the system. By default, this automatic logout occurs after 4 minutes of console inactivity. You can configure the automatic logout to range from 1 minute to 35,791,394 minutes.
  • Page 135: Viewing Commands

    Viewing Commands If at any time you are not sure of the commands available, enter of the commands in the current sub-menu. Following each list of commands is a list of sub- menus. You can go directly to any sub-menu in the list. You can specify whether the full menu will be displayed when you enter a command for a menu or sub-menu and the amount of information you receive when you run the help command.
  • Page 136: Command History And Re-Executing Commands

    General User Interface Guidelines Command History and Re-Executing Commands command displays up to 50 commands numbered in order with the most recently executed command listed last. The following is a typical example of the In the example above, the executed most recently. If you want to re-execute the last command, enter two exclamation points ( ).
  • Page 137 General User Interface Guidelines In addition, you can re-execute a command by entering an exclamation point ( ) followed by the first character(s) of the most recently executed command. In the example at the begin- ning of this section, entering would re-execute the command.
  • Page 138: Abbreviating Ip Addresses

    General User Interface Guidelines Abbreviating IP Addresses The Omni Switch/Router software provides the user with a more concise way to enter the dotted decimal format of a 32-bit net interpretation. Several examples of abbreviated The first column of the table lists examples of abbreviated column shows how the system interprets the abbreviated address.
  • Page 139 General User Interface Guidelines This abbreviated address format can be used with the commands. For example, to ping the address 198.0.0.2, you can abbreviate this address by entering at the system prompt. After you answer a few prompts (see Chapter 25, “ Routing”...
  • Page 140: User Interface Display Options

    User Interface Display Options User Interface Display Options The System menu several commands to configure help information, character display, and the system prompt for the at the system prompt to enter the System menu. Press the question mark ( ) to see the System menu commands, as shown below.
  • Page 141: Setting Echo/Noecho For User Entry

    Setting Echo/NoEcho for User Entry You can determine whether your entries will appear by enabling the echo for user entries. The default is to echo all characters. To enable the echo, enter at the system prompt. Everything you enter will be displayed. For example, if you enter at the system prompt, it will be displayed on your terminal, as shown in the example below.
  • Page 142: Creating A New Banner

    User Interface Display Options Creating a new Banner Three steps are required to change the login banner. They are listed here. • Create a text file containing the new banner in the switch’s flash directory. • Add the • Enable the feature by executing the To create the text file containing your banner you may use the edit buffer sub-menu.
  • Page 143: Login Accounts

    Telnet, and one connection can be made to the modem port if you are connecting to an Omni Switch/Router. For software Releases 4.4 and later, more than one login account with write privileges can be active at the same time.
  • Page 144: Listing Other Users

    Multiple User Sessions Listing Other Users To display all the users currently logged on to the switch, type at the system prompt. The following is an example of the display shown where two Telnet sessions are logged in, one as You can also display information about just your session by typing at the system prompt.
  • Page 145: Communicating With Other Users

    Communicating with Other Users If you want to send a message to another user, enter number. If you wanted to send a message to a user connected on the console port (session 0), you would enter at the system prompt. The switch would then display Everything you type now will by sent to the user connected on the console port until you press or enter...
  • Page 146 Multiple User Sessions For example, to end the session of the user connected to the console port (session 0) and let him finish his current command, you would enter at the system prompt. The system would then display something similar to the following: The user losing the write privilege would see something similar to the following: After the user with the session being killed has finished his work, he will be logged off.
  • Page 147: Advanced Kill Command Options

    Advanced Kill Command Options You can also kill the session of a user immediately by adding the parameter the session number of the user. This option will kill the user’s session before he can finish his current command. In addition, this option will end the user’s sessions without waiting for him to press .
  • Page 148: Ui Table Filtering (Using Search And Filter Commands)

    UI Table Filtering (Using Search and Filter Commands) UI Table Filtering (Using Search and Filter Commands) The amount of information displayed in networks. Common tables. The user can locate specific information in these large tables through the prompt. prompt appears whenever the maximum number of table entries designated by the command has been reached (the table exceeds 22 lines, and the lines, the following message appears:...
  • Page 149: The Search Command

    The Search Command Starting from the page being displayed, the Search command ( ) searches all lines of a for a specified text pattern (up to 80 characters). The first line containing the pattern is brought to the top of the page, followed by any remaining lines in the table. Searches cannot be limited to a specific column or heading.
  • Page 150: Renewing A Search

    UI Table Filtering (Using Search and Filter Commands) 2. Type at the prompt, enter the text pattern for the desired Press . A screen similar to the following will be displayed: Note that the line containing information for the specified MAC address ( appears at the top of the screen, followed by any remaining lines in the the last line of the Renewing a Search...
  • Page 151: The Filter Command

    The Filter Command The Filter command filters unwanted information from a lines containing a specified text pattern (up to 80 characters). Once the Filter command has been executed, the Filter mode remains active until the end of the or until the user exits the current Like the Search command, the Filter command cannot be limited to a specific column or heading.
  • Page 152: Combining Search And Filter Commands

    UI Table Filtering (Using Search and Filter Commands) 2. Type at the prompt, enter the desired text pattern (remember to type the text pattern exactly as it would appear in the Press . A screen similar to the following will be displayed: Note that only those lines containing Lane services are now displayed on the screen.
  • Page 153 1. Type and press . A table similar to the following will be displayed: Note that, because the information in the table exceeds the lines, the prompt appears at the bottom of the screen. 2. Use the Filter command to display all contain .
  • Page 154: Using Wildcards With Search And Filter Commands

    UI Table Filtering (Using Search and Filter Commands) 3. In order to further refine your results, you can now combine the Search and Filter commands. In this example, you will search for IP addresses beginning this, enter at the Filter mode’s Press .
  • Page 155 Single Characters A question mark ( ) is used as a wildcard for a single character in a text pattern. For exam- ple, the Search pattern will locate the first line in a table containing then the remaining text pattern If you use a wildcard at the Search command and the resulting page still exceeds the maximum number of table entries designated by the...
  • Page 156 UI Table Filtering (Using Search and Filter Commands) Page 4-46...
  • Page 157: Installing Switch Software

    • Client - The Omni Switch/Router can also be an connecting a terminal to the switch and using the set of face. You can also do this through a telnet session.
  • Page 158: Using Ftp Server

    Using FTP Server Using FTP Server The Omni Switch/Router is an load software to and from the switch. Consult the manual that came with your ware package. The following are general instructions on how to 1. You will need to configure the the Getting Started Guide that came with your switch.
  • Page 159: Using Ftp Client

    Using FTP Client The User Interface contains several on a system. Follow the steps below to start the UNIX 1. Log on to the switch and type Getting Started Guide that came with your switch. 2. The system will prompt for a host. It saves the last host name or one you want, press 3.
  • Page 160: Using Zmodem

    Using ZMODEM Using ZMODEM Normally you use port. A transfer can take several minutes. There are generally two situations which ZMODEM would require you to use the serial port to load software: • You do not have access to an running, you can use the File commands to load software.
  • Page 161: Using Zmodem With The Boot Line Prompt

    Using ZMODEM With the Boot Line Prompt If you encounter the situation where you have deleted some or all of the files in your switch, you may need to load files through the boot line prompt. This load procedure is done before the switch has booted.
  • Page 162 Using ZMODEM The [boot] Prompt The [boot] prompt has its own set of commands that are built into the switch. You do not need to have files or software loaded to use this set of commands. You can perform many of the functions that the reload software in order to get the switch up and running.
  • Page 163 Starting a ZMODEM Transfer at the [boot] Prompt 1. Type to change boot parameters. You will be changing the boot device to tell the system to load files from a 2. Type at this prompt. You will be prompted for more parameters. Just hit accept the defaults.
  • Page 164 Using ZMODEM Page 5-8...
  • Page 165: Configuring Management Processor Modules

    6 Configuring Management The management processor module ( the Omni Switch/Router by providing access to the User Interface ( user configuration information, downloading switching module software, managing basic bridge functions, maintaining basic routing functions, and managing the agent. Switching modules are dependent on the receiving initialization and configuration information.
  • Page 166: Changing Serial Port Communication Parameters

    Changing Serial Port Communication Parameters Changing Serial Port Communication Parameters The serial communications parameters for the two ing: • 9600 bits per second (bps) • 8 data bits • 1 stop bit • no parity To change the serial port configuration parameters, follow the steps below: 1.
  • Page 167: Changing Port Speed When Communication With The Switch Lost

    Enter the port mode and press connection and down for a modem connection. You can also configure the port for SLIP. If you are configuring the modem port, you should plan the mode configuration care- fully. See Configuring the Modem Port on page 6-3 for further information. You cannot configure the console port as an auxiliary port ( 9.
  • Page 168: Configuring Slip

    Changing Serial Port Communication Parameters This configuration does not allow you to use the console port as an optional access method since it is configured down. Using a cross-over cable, you could access the modem port through an attached PC. If you could not use the modem port for some reason, you would have to reboot the switch to get back, or—if the cable connection were the problem—use a cross-over cable to connect through a PC.
  • Page 169: Configuring The Ethernet Management Port

    Configuring the Ethernet Management Port To configure the Ethernet management port, you use the command, enter at the system prompt. A screen similar to the following will be displayed. The question mark option ( ) and the mation on using this command. The You make changes by entering the line number for the option you want to change, an equal sign ( ), and then the value for the new parameter.
  • Page 170 Configuring the Ethernet Management Port 2) IP Address Enter an address for the Ethernet management port in dotted decimal or hexadecimal nota- tion (the default is address to at the prompt. This other 3) Subnet Mask Enter an subnet mask in dotted decimal or hexadecimal notation (the default is ).
  • Page 171: Ethernet Management Ports And Redundant Management Processor Modules

    Ethernet Management Ports and Redundant Management Processor Modules Ethernet Management Ports and Redundant Management Processor Modules If redundant both have Ethernet management ports ( MPXs have the same address if automatic file synchronization is enabled. If both plugged into the same subnet, the network.
  • Page 172 Ethernet Management Ports and Redundant Management Processor Modules 12. Enter at the prompt to save the 13. Enter at the prompt to make the management module that was originally the primary one primary again. Page 6-8 address.
  • Page 173: The Mpm Command/Menu

    The MPM Command/Menu command has two functions: displaying the entering the menu. Displaying the menu is described in MPM Menu Commands on page 6-9. Displaying MPX Redundancy You can display the number of configuration of the switch by entering at the system prompt. The following is a typical example of the message that displays when you enter for a switch without a redundant The following is a typical example of the message that displays when you enter...
  • Page 174: Using Mpm Commands With Software Release 3.2 And Later

    The MPM Command/Menu All of the menu commands, except for the you have redundant MPXs commands shown below. All of the commands are described in the sections that follow. Using MPM Commands with Software Release 3.2 and Later In Release 3.2 and later, the commands in the flash directory.
  • Page 175: Listing The Secondary Mpx Files

    Listing the Secondary MPX Files command lists the files in the secondary command; however, it lists files in the secondary enter at the system prompt. The following is a typical example. command lists every file in the secondary bytes), creation date, and creation time. The three-letter file name suffix indicates the type of file which includes configuration ( file suffix can be changed for both the primary and secondary which is described in Setting the Load Suffix on page 6-14.
  • Page 176: Replacing A File On The Secondary Mpx

    Replacing a File on the Secondary MPX Replacing a File on the Secondary MPX command replaces a file on the secondary , which is described in Removing a File from the Secondary MPX on page 6-13, and , which is described in Transferring a File to the Secondary MPX on page 6-11. To use this command, enter directory, another slash ( ), and the name of the file you want to replace.
  • Page 177: Removing A File From The Secondary Mpx

    Removing a File from the Secondary MPX command removes (deletes) a file from the flash memory of the secondary To use this command, enter directory, another slash ( ), and the name of the file you want to remove. You can only remove a single file with the command.
  • Page 178: Giving Up Control To The Secondary Mpx

    Giving Up Control to the Secondary MPX Giving Up Control to the Secondary MPX command tells the primary . It does this by issuing a request to the secondary logged into the primary use the command, which is described in Gaining Control from the Primary MPX on page 6-18.
  • Page 179: Setting Automatic Config Synchronization

    Setting Automatic Config Synchronization command sets the automatic configuration synchronization to Enabled or Disabled. If it is Enabled, then the synchronization automatically. This means that when the configuration file ( updated in the primary , it will automatically be updated in the secondary the two in sync.
  • Page 180: Synchronizing Configuration Data

    Synchronizing Configuration Data Synchronizing Configuration Data command copies the configuration files ( to the secondary synchronization is on. For example, to copy the configuration file from the primary the secondary , you would enter at the system prompt. Something similar to the following will be displayed. See Setting Automatic Config Synchronization on page 6-15 for information on setting auto- matic config synchronization.
  • Page 181: Loading A File From The Primary Mpx

    Loading a File From the Primary MPX Loading a File From the Primary MPX command loads a file from the primary and copies it into the secondary . This command is only available and can only be run from a secondary .
  • Page 182: Gaining Control From The Primary Mpx

    Gaining Control from the Primary MPX Gaining Control from the Primary MPX command tells the secondary It does this by issuing a request to the primary into the secondary command, which is described in Giving Up Control to the Secondary MPX on page 6- network down times since it could cause network inter- ruptions.
  • Page 183: Resetting A Secondary Mpx

    Resetting a Secondary MPX command initiates a soft reset on the secondary secondary with this command is similar to switching off power to the module; the will be in the same state after a reset as it is after a power on. To reset a secondary , enter at the system prompt.
  • Page 184: Displaying And Setting The Swap State

    If not, the system may halt or restart. While the swap state is on, performance may decrease. Therefore, the swap state should only be turned on when you want to hot swap modules. See Chapter 3, “Omni Switch/Router Switching Modules,” for instructions on hot swapping a switching module.
  • Page 185: Disabling The Swap Mode

    Displaying and Setting the Swap State Disabling the Swap Mode Normally, the swap mode will timeout and no user intervention is required. However, you can manually turn the swap mode off. This function is particularly useful since the perfor- mance of the switch can be adversely affected if the swap mode is enabled. To turn the swap mode off immediately, enter at the system prompt.
  • Page 186 Displaying and Setting the Swap State Page 6-22...
  • Page 187: Managing Files

    Depending on the model type and configuration, an Alcatel switch has anywhere from 8 or of usable flash memory. This memory is used to store files, including executable files (used to operate switching modules), configuration files, and switch usage log files. Through the User Interface ( ), you can load, copy, and delete any of these files types.
  • Page 188: Displaying The Current Directory

    Displaying the Current Directory Displaying the Current Directory To display the switch’s current directory, enter at the system prompt. The working directory will be the sponding directory information will be displayed: Configuration and Log File Generation , and in flash memory during the boot process; you do not have to load them. If you remove the configuration files ( default configuration settings will be deleted at the next boot sequence.
  • Page 189: Listing Switch Files

    Listing Switch Files You can use the command to list the files in the primary command, enter at the system prompt. A screen similar to the following will be displayed. command lists all the files in the current working directory of the primary memory, followed by its size (in bytes), creation date, and creation time.
  • Page 190: Deleting Switch Files

    Deleting Switch Files Deleting Switch Files You can use the command to delete files in the primary command, enter , followed by the name of the file you want to delete. For example, to delete the file , you would enter at the UI prompt.
  • Page 191: Deleting All Image Files

    Deleting All Image Files You can use the command to delete all executable (image) files. The files deleted by command include the files (the factory default is all files ending with the You should only use the network down times and when you are connected to the switch through the serial port.
  • Page 192: Copying System Files

    Copying System Files Copying System Files You can use the command to copy files. This is particularly useful if you want to make backups of important files. To use this command, enter nal file you want to copy, and then by the name that you wish to give the duplicate file. For example, to make a duplicate of the file at the system prompt.
  • Page 193: Editing Text Files

    Editing Text Files The commands in the Edit sub-menu (also called the Text Buffer or Edit Buffer) are used to create new text files and to modify existing text files. To enter the edit sub-menu, enter at the system prompt. If verbose mode is enabled, the following list of commands will be displayed automatically.
  • Page 194: Loading An Ascii File Into The Text Buffer

    Editing Text Files Loading an ASCII File into the Text Buffer You can use the command to load—or read—an existing Edit buffer’s memory. To use this command, enter For example, to edit the at the system prompt. You can load a binary file into the Edit buffer but you will not be able to edit it.
  • Page 195: Deleting A Line Of Text From The Text Buffer

    Deleting a Line of Text from the Text Buffer You can use the command to delete a specific line in the text buffer. To use this command, enter , followed by line number of the line of text you want delete, which is shown by the command.
  • Page 196: Creating A File Name For The Text Buffer

    Editing Text Files Creating a File Name for the Text Buffer If no file name has been created for the text buffer, the following message is displayed when- ever the command is executed: Use the command to create a name for the text buffer. To use this command, enter followed by the name you wish to give the text buffer.
  • Page 197: Real-World Examples

    Real-World Examples As noted on page 10-7, when you edit text files, you will normally use several of the Edit sub- menu commands to produce the results you want. The following two examples, Real-World Example 1 and Real-World Example 2, are actual multi-command procedures that you may encounter as you work with your switch.
  • Page 198: Real-World Example 2

    Real-World Examples Real-World Example 2 Page 7-12...
  • Page 199: System Menu

    System Menu System Menu The System menu contains two commands, , for checking and deleting all files in the flash memory. To access the System menu, enter at the prompt. If verbose mode is enabled, the following list of commands will be displayed automatically. If verbose mode is disabled, press the question mark ( ) to display the following list of commands.
  • Page 200: Checking The Flash File System

    Checking the Flash File System Checking the Flash File System command performs a file system check of flash memory, which consists of the flash file system. All image files are stored in flash memory and loaded into system memory when the switch boots up.
  • Page 201: Creating A New File System

    Creating a New File System command removes a complete flash file system and all files within it, replacing it with a new empty flash file system. Use this command when you want to reload all files in the file system, or in the unlikely event that the flash file system becomes corrupted. To create a new file system and re-initialize the flash memory, enter at the system prompt.
  • Page 202 Creating a New File System Page 7-16...
  • Page 203: Switch Security

    8 Switch Security Commands listed in the Security menu are for configuring system security parameters such as the password and logout time. The menu also provides a command for rebooting the switch. Enter at the prompt to enter the Security menu. Press to see the following list of commands: , and commands are described in this chapter.
  • Page 204: Changing Passwords

    Changing Passwords Changing Passwords provides three types of login accounts by default—Administrator, User and Diag- switch nostics. The Administrator login provides full The login name for the Administrator account is account is and provides the global family, and to all command families plus a command for running switching module tests. The login name for Diagnostics is The initial password for all three accounts is passwords for the...
  • Page 205: Rebooting The Switch

    Rebooting the Switch command should only be executed during network down time and when no data is being transmitted across the network. Also, you should ensure that all configuration infor- mation has been saved first. Note that the logins. Rebooting the switch will disconnect a Telnet connec- tion to the User Interface and will interrupt the network connections on the switching modules.
  • Page 206: Secure Switch Access

    Secure Switch Access Secure Switch Access Secure Switch Access is a filtering program that prevents unauthorized access to the switch by allowing you to define a list of filters and filter points. For Secure Switch Access, filters are lists of source traffic that are allowed onto the switch. Filter points operate on that include , Telnet, filter points is enabled, all filters configured for that protocol are applied to incoming traffic...
  • Page 207 Secure Switch Access Create This option allows you to create a new filter in the secure access database. The following is a sample display: After you have created a filter, the information is automatically saved in the secure access database, and the submenu re-displays.
  • Page 208 Secure Switch Access Modify This option allows you to modify information about an existing secured access filter. Enter the name of the filter you wish to modify, as follows: The filter’s existing information will display. For example: To change a value, type in the new value at the prompt. If you do not wish to modify a particular field, press and the existing user information will remain unchanged.
  • Page 209: Configuring Secure Access Filter Points

    Configuring Secure Access Filter Points command allows you to view the list of secure access filter points, to enable/ disable security globally or for a specific IP protocol filter point, and to define a filter list for each filter point. To use this command, enter: A screen similar to the following displays: If security is enabled for a filter point and there are no names defined on its list, then the filter point is essen-...
  • Page 210 Secure Switch Access 1) FTP Security Indicates whether or not secure access is enabled for File Transfer Protocol ( switch. means secure access is enabled for list have authorization. and all users can access the switch through 2) Telnet Security Indicates whether or not secure access is enabled for Telnet service on the switch.
  • Page 211: Enabling/Disabling Security Parameters

    7) One-touch Security Configures the same value for all secure access protocols. all secure access filter points. value configured for individual security parameters overrides the global setting. If you wish to set a different value for followed by an equal sign ( ) and the new value. 71) One-touch Filter List Configures a single filter list for all security filter points.
  • Page 212: Viewing Secure Access Violations Log

    Secure Switch Access Viewing Secure Access Violations Log command displays a log of all secure access violations. To log access violations on the switch, use the command. For more information on the command, see Chapter 10, “Switch Logging.” To view the secure access violations log, enter The following is a sample display: Descriptions of the fields are as follows: .
  • Page 213: Managing User Login Accounts

    Managing User Login Accounts Prior to software release 4.4, the switch provided security in the form of privilege control for individual login accounts by allocating each user accounts ware release 4.4 contains a partition management feature that enhances the privilege capabil- ity with an authorization scheme based on the functional capacity assigned to each user.
  • Page 214: Default Accounts

    Managing User Login Accounts Default Accounts Initially each switch is preconfigured with three default logins ( Chapter 4, “The User Interface,” for more information about login accounts. If you are logged into an account with the login accounts as described in this section. You may also create new user accounts. At least one at all times.
  • Page 215: Adding A User Account Using The Cli Command Mode

    Adding a User Account Using the CLI Command Mode To add a user account from the trative privileges. Enter the following at the command prompt. user_name where user_name is the new user login account name and user_password is the new user login account password.
  • Page 216 Managing User Login Accounts User Write Privileges To assign privileges to a user account, you must be logged into an account with leges to the family of commands. Enter the following command at the system prompt. USER userId where userId indicates the name assigned to the user account for which you want to assign privileges.
  • Page 217 Managing User Login Accounts Miscellaneous CLI Privileges Commands The following is a list of privileges-related commands. For more details on these commands and other commands, refer to the Text-Based Configuration CLI Reference Guide. • To create a new user login account, use the following command: user_name user-password where user_name is the new user login account name and user-password is the new user...
  • Page 218: Assigning Account Privileges Using The Ui Command Mode

    Managing User Login Accounts Assigning Account Privileges Using the UI Command Mode When you add a new user login account, the account has permission to log in and to log out. If you want the new account to have additional privileges you must add them separately. To add privileges to a user account, you must be logged into an account with administrative privileges.
  • Page 219 Managing User Login Accounts This screen displays the default privileges for a new user login account. Note that the default privileges give the new user neither read nor write permission. To grant privileges to the user account, enter a number from 1 to 5 as indicated in the display. To set privileges for a WRITE single family of commands, enter...
  • Page 220: Command Family Table

    Managing User Login Accounts The global family contains commands that apply globally to the switch rather than to individ- ual applications or services. Privileges for global family commands can be set on an individ- ual command basis or altogether so the privilege applies to the whole global family. If you want to set privileges for the global commands, you must enter 6, 7 or 8 when the screen prompt displays the following: To give the user account the privilege to set all global commands, enter the numeral 8.
  • Page 221: Global Family Table

    Global Family Table For example, if you wanted to assign the user account the privilege to use the define command, enter the number 6 as shown here. The following will display. If you enter 1, all the command families will display and the global family will be shown as follows: After you set the user account privileges, the switch displays the current configuration.
  • Page 222: Modifying A User Account

    Managing User Login Accounts Modifying a User Account You can use the logged into a user account with administrative privileges. 1. At the system prompt enter the displays: 2. Enter the name assigned to the user account you want to modify. A screen similar to the following displays where the account name is TechPubs1.
  • Page 223: Configuring Switch-Wide Parameters

    9 Configuring Switch-Wide Parameters The switch provides commands to display and configure parameters on a switch-wide basis. These commands are grouped into two menus: the Summary menu and the System menu. Descriptions for commands in the Summary menu begin below; descriptions for commands in the System menu begin on page 9-5.
  • Page 224: Displaying The Mib-Ii System Group Variables

    A screen similar to the following will be displayed. The fields displayed by the . The specific type of chassis, which can be an OmniSwitch, OmniAccess, or Omni Switch/Router. This field is set by the ing System Information on page 9-23. . The This value helps you locate Alcatel-specific variables in the .
  • Page 225: Displaying The Chassis Summary

    Displaying the Chassis Summary To display the chassis summary information, enter at the system prompt. A screen similar to the following will be displayed. The fields displayed by the . The description of the specific type of chassis or device. .
  • Page 226: Displaying Current Router Interface Status

    Displaying Current Router Interface Status Displaying Current Router Interface Status To display current interface status information, enter at the system prompt. A screen similar to the following will be displayed. The fields displayed by the . A number, in sequence, that has been assigned to the virtual router port. .
  • Page 227: System Menu

    System Menu The System menu contains commands to view or set system-specific parameters. To access this menu, enter at the prompt to enter the System menu. If you are not in verbose mode, press a question mark ( ) and then press below.
  • Page 228: Displaying Basic System Information

    Displaying Basic System Information Displaying Basic System Information To display basic information on the switch, enter at the system prompt. The following display is a typical example. The fields displayed by the . The description of the specific type of chassis or device. .
  • Page 229 . The number of times this switch has been reset since the last cold start. command will also display the number of , their location in chassis, and which one is the MPXs primary and which one is the secondary. In addition, it also displays whether automatic configuration synchro- nization is enabled.
  • Page 230: Setting The System Date And Time

    Setting the System Date and Time Setting the System Date and Time command allows you to set the local date, time, and time zone. Additionally, you can set the system clock to run on Universal Time Coordinate ( can also configure Daylight Savings Time ( time, time zone, and at the System prompt.
  • Page 231 3) Timezone This parameter specifies the time zone for the switch and sets the system clock to run on time (or Greenwich Mean Time). Additionally, if Daylight Savings Time is enabled (see option below), the clock automatically sets up default time zone.
  • Page 232 Setting the System Date and Time Abbr. Name NZST New Zealand ZP11 No standard name AEST Australia East Guam ACST Australia Central Time Japan Korea AWST Australia West Time China, Manila, Philippines Bangkok No standard name No standard name No standard name Moscow Eastern...
  • Page 233 Timezone and DST Parameters Con’t Abbr. Name Hours from Greenwich +0:00 Mean Time West Africa -1:00 No standard -2:00 name No standard -3:00 name Newfound- -3:30 land April at 2:00 a.m. Atlantic Stan- -4:00 dard Time April at 2:00 a.m. Eastern Stan- -5:00 dard Time...
  • Page 234 Setting the System Date and Time 4) Daylight Savings Time active Enables and disables To disable , enter: is disabled, options 41-49 will not be displayed. 41) DST Start Month Indicates which month of the year the sequential number of the month (January=1, February=2, . . . December=12). For exam- ple, if you want to begin in April, you would enter the line number for ( ) and the month, as follows:...
  • Page 235 46) DST End Week Indicates which week in a month sequential number of the week. The possible values are 1st (1), 2nd (2), 3rd (3), 4th (4), and Last. For example, if you want the line number for 47) DST End Day Indicates which day of the week tial number of the day (Sunday=1, Monday=2, .
  • Page 236: Viewing Slot Data

    Viewing Slot Data Viewing Slot Data You can view slot table information by entering the particular slot, enter the information for slot 1, enter at the system prompt. You can also view information on all slots in the switch at the same time in a table.
  • Page 237: Viewing System Statistics

    Viewing System Statistics command displays statistics related to system, power, and environment. To view these parameters, enter at the system prompt. A screen similar to the following will be displayed. The fields displayed by the . The time since the last boot that the system has been running, displayed in days, hours, minutes, and seconds (to the nearest hundredth).
  • Page 238: Clearing System Statistics

    Clearing System Statistics Clearing System Statistics You may want to clear statistics for a specific module, port or service for dialogistic or accounting purposes. To clear switch statistics enter at the system prompt. A screen similar to the following will display. As indicated in the prompt, you can clear all statistics from a module by entering the slot number as shown here: This entry will clear all statistics for the module located in slot 3.
  • Page 239: Viewing Task Utilization Statistics

    Viewing Task Utilization Statistics command displays the task utilization statistics of the switch. To display the task utilization statistics, enter at the system prompt. The is an optional sample period of 1 to 60 seconds. You must enter the if you want to enter the The default number for is 5 seconds.
  • Page 240 Viewing Task Utilization Statistics . Priority of the specified task. . Current status of the specified task. . Program Counter. The program counter identifies the routing code as it enters the stack. . Stack pointer. The stack pointer points to the code being loaded when the status is taken. .
  • Page 241: Viewing Memory Utilization

    Viewing Memory Utilization The leak monitor diagnostic utility is used to display information about memory utilization. This utility requires the use of three UI commands: You may want to log this operation to a text file to make it easier to view the data. To start the utility, enter at the system prompt.
  • Page 242: Viewing Mpx Memory Statistics

    Viewing MPX Memory Statistics Viewing MPX Memory Statistics command displays the memory is currently being used and help determine if memory problems exist, such as memory exhaustion. To view the at the system prompt. A screen similar to the following will be displayed. The fields displayed by the .
  • Page 243: Checking The Flash File System

    Checking the Flash File System command performs a file system check of flash memory, which consists of the flash file system. Image files are stored in flash memory and loaded into system memory when the switch boots up. It also provides diagnostics in the case of file corruption. To perform a file system check of flash memory, enter at the system prompt.
  • Page 244: Creating A New File System

    Creating a New File System Creating a New File System command removes a complete flash file system and all files within it. It then creates a new flash file system, which is empty. You can use this command when you want to reload all files in the file system from a readily-accessible backup device or in the unlikely event that the flash file system becomes corrupted.
  • Page 245: Configuring System Information

    Configuring System Information You can enter or modify a description of a switch, its location, and a contact person. Although this information is not required, you may find it helpful in managing the switch. To enter or modify the switch descriptions, perform the following steps. 1.
  • Page 246: Viewing Cam Information

    Viewing CAM Information Viewing CAM Information command displays information and usage about the content addressable memory ) on each switching module in the chassis. To view this at the system prompt. Something similar to the following will be displayed. The fields displayed by the .
  • Page 247: Configuring Cam Distribution

    4 K or 8 K of For example, if all the switching modules in a fully-loaded 9-slot chassis have 4 K would exceed the 31.25 K limit. In this configuration, the Omni Switch/Router would subtract 256 K of available...
  • Page 248 Configuring CAM Distribution A message similar to the following will display: 3. The new configuration will take effect after you reboot the system. For this reason, you may want to configure the for all modules in this system. Reboot the system and check the updated configurations through the command.
  • Page 249: Configuring The Hre-X Router Port

    Configuring the HRE-X Router Port Configuring the HRE-X Router Port Various services in the switch use the router port registers. The registers are allo- HRE-X cated as the services are loaded at startup. The submenu contains five commands for use with the Hardware Routing Engines ( s).
  • Page 250 Configuring the HRE-X Router Port For example, to assign register 3 to the Classical service enter at the system prompt. A screen similar to the following is displayed. As indicated on the screen, the register assignment will not take effect until the switch is rebooted.
  • Page 251: Configuring And Displaying The Hre-X Hash Table

    Configuring and Displaying the HRE-X Hash Table s use a hardware implemented hash table to route packets for transmission. The HRE-X switch employs a default hash function that works well in a broad range of data environ- ments. In rare cases, you may want to change the hash table configuration to optimize it for your particular data flow.
  • Page 252: Duplicate Mac Address Support

    Duplicate MAC Address Support Duplicate MAC Address Support When the switch sees the same Duplicate Address), it assumes the original network device moved. The switch sends a trap notifying network management of this station move event. It sends one trap for a device move within the same Group and another trap for a device move outside of the home Group.
  • Page 253 If your network supports duplicate impact due to the following reasons: • A address is usually stored only in the nation address is located. If duplicate then the same address may have to be stored in the modules, not just the module that originally learned the address. •...
  • Page 254: Multicast Claiming

    Multicast Claiming Multicast Claiming Multicast claiming can be enabled for networks with heavy multicast traffic. When enabled, multicast claiming frees the to the switching modules. When multicast claiming is enabled, the switch “claims” destination multicast addresses and places them in the You can enable multicast claiming by adding the following line to the You can use the command to make this change.
  • Page 255: Saving Configurations

    Saving Configurations Under normal conditions, configurations you make using the UI are written into cache and automatically saved into the switch’s flash memory. In this case, it is not necessary to issue a special command to save your configurations. When you use the UI to enter multiple configu- rations, periodically the switch will display the following message.
  • Page 256 Saving Configurations To determine whether you are in the cache configuration mode, enter the command. If cache config is operational the following message will display one of the follow- ing messages. To turn off the cache configuration mode, enter the following command at the system prompt.
  • Page 257: 10 Switch Logging

    Logging Overview Whether you are troubleshooting, configuring, or simply monitoring the switch, you may find it useful to view a history of various switch activities. The Logging submenu contains a list of commands for viewing and configuring logging on the system. To enter the logging submenu, enter at the system prompt.
  • Page 258: Configuring The Syslog Parameters

    Configuring the Syslog Parameters Configuring the Syslog Parameters Syslog messages are messages generated by individual processes in the switch. These messages contain information for conditions that range from debugging to emergency error conditions. command allows you to control how these messages will be handled. You can designate what kinds of messages you will see and where the messages will be sent.
  • Page 259 Default facility code The facility code is used to identify which sub-system generated the syslog message. Note that this code is used only as a default for tasks that do not have a facility code. See the table below for a list of the facility codes. The default is LOG_KERN Messages generated by the kernel LOG_USER...
  • Page 260 Configuring the Syslog Parameters LOG_EMERG LOG_ALERT LOG_CRIT LOG_ERR LOG_WARNING LOG_NOTICE LOG_INFO LOG_DEBUG Override internals This field will force all syslog messages to use the default priority mask specified instead of their own predefined priority masks. Display internals This field allows the user to display the task log level. Enter menu below.
  • Page 261 Configuring the Syslog Parameters Log Task ID Determines whether or not you want to see the task that can be included in the syslog message. Use Task Name This allows the user to display descriptive task names for syslog messages (see the sub-menu above) instead of numeric codes.
  • Page 262: Configuring Switch Logging

    Configuring Switch Logging Configuring Switch Logging Switch logging is a feature that allows you to activate and configure the logging of various types of switch information. Once you activate logging for a specific facility through the switch logging command, you may also decide whether the log output should display on the console, be saved to a file, or be both displayed and saved to a file.
  • Page 263 3) Flash File Logging Flash file logging records debug information from the code that manages the switch logging feature itself (previously called “flash file system logging”). To enable flash file logging, enter . To disable flash file logging, enter saved in the mpm.log file, but flash file logging messages may be displayed on the console by entering .
  • Page 264 Configuring Switch Logging In addition to enabling or disabling each type of logging, you can also specify whether to output the log to a file or to the console: Output to File Set to ( ) to store the log messages in the mpm.log file. Set to ing log messages to this file.
  • Page 265: Displaying The Command History Entries In The Mpm Log

    Displaying the Command History Entries in the MPM Log command displays a list commands executed since User Interface (UI) facility logging was activated by the page 10-6). To display this data, enter at the system prompt. The following is a sample display. The fields displayed by the .
  • Page 266: Displaying The Connection Entries In The Mpm Log

    Displaying the Connection Entries in the MPM Log Displaying the Connection Entries in the MPM Log command displays a list of connections made since console event, logging was activated by the page 10-6). To display this data, enter at the system prompt. A screen similar to the following will be displayed. The fields displayed by the .
  • Page 267: Displaying Screen (Console) Capture Entries In The Mpm Log

    Displaying Screen (Console) Capture Entries in the MPM command displays the screen capture entries in the mpm.log file. (Note: This feature is not yet implemented.) In order to view screen capture entries through this command, you must first enable the Screen Capture log facility through the (see Configuring Switch Logging on page 10-6).
  • Page 268 Displaying Screen (Console) Capture Entries in the MPM Log . Displays screen capture entries for the user logged in from the second telnet session. . Displays screen capture entries for the user logged in from the third telnet session. . Displays screen capture entries for the user logged in from the fourth telnet session.
  • Page 269: Displaying Debug Entries In The Mpm Log

    Displaying Debug Entries in the MPM Log command displays the debug entries in the mpm.log file. (Note: Currently there are no facilities using debugging.) Below is a sample display of the command. The fields displayed by the . The task that generated the debug message. .
  • Page 270 Displaying Secure Access Entries in the MPM Log Page 10-14...
  • Page 271: 11 Health Statistics

    The health statistics feature monitors the consumable resources of a switch, and provides a single integrated source for Network Management Software ( obtaining statistics on switch performance. With the health statistics, the user can set specific threshold levels for consumable resources in the switch. Such resources include bandwidth capacity, usage, and is exceeded, a notification is sent to the...
  • Page 272: Setting Resource Thresholds

    Setting Resource Thresholds Setting Resource Thresholds The health statistics software operates by monitoring set threshold levels on consumable resources. When a resource exceeds a set level, a trap is generated and sent. These threshold levels are set for the entire switch (or device) by using the old level for a switch’s consumable resources, enter the prompt.
  • Page 273: Setting Bandwidth Thresholds

    Setting Bandwidth Thresholds Bandwidth is a measure of the amount of traffic a switch can handle for receiving, sending, and on the backplane. The health statistics allow you to sent a percentage of available band- width, at which an trap is generated to alert the network administrator that the thresh- SNMP old has been exceeded.
  • Page 274: Setting Miscellaneous Thresholds

    Setting Resource Thresholds Backplane Threshold The backplane threshold sets a percentage of total backplane bandwidth of the switch, module, or port. When backplane usage exceeds this percentage, an When “U-turn” switching (i.e., data enters a module port and is transmitted from a port on the same module) is employed, the backplane threshold reading will not be correct.
  • Page 275 Setting Resource Thresholds CAM Threshold (MPM/HRE or NI) The CAM threshold sets a percentage of the total amount of space available for storing the cache tables. Cache tables maintain associations between received addresses and the ports they were received on. For the switch level, the threshold separately monitors the and the daughtercard (if it is installed)
  • Page 276: Setting The Sampling Interval

    View Switch-Level Statistics Setting the Sampling Interval The sampling interval is the time interval between polls of the switch’s consumable resources to see if it is performing within the set thresholds. To set the amount of time between polls: 1. Enter at a system prompt.
  • Page 277: View Module-Level Statistics

    For field descriptions of the device resources column, see Setting Bandwidth Thresholds on page 11-3 and Setting Miscellaneous Thresholds on page 11-4 above. When calculating percentages, the health statistics cannot display less than one percent. If a single packet is sent through a port, for example, the receive resource usage is represented as one percent.
  • Page 278: View Port-Level Statistics

    View Port-Level Statistics For descriptions of the statistics, see View Switch-Level Statistics on page 11-6. the module level statistics display, and therefore are not shown. View Port-Level Statistics To view port-level statistics, type the where is the slot number and slot 3, enter the following: The following screen is displayed: Statistics are displayed as percentages of the total resource capacity, and represent data taken...
  • Page 279: 12 Network Time Protocol

    12 Network Time Protocol Introduction The Network Time Protocol ( ) is used to synchronize the time of a computer client or server to another server or reference time source, such as a radio or satellite receiver. It provides client time accuracies within a millisecond on s, and up to a few tens of millisec- onds on s relative to a primary server synchronized to Coordinated Universal Time (...
  • Page 280: Stratum

    Stratum Stratum is the term used to define the relative proximity of a node in a network to a time source (such as a radio clock). Stratum 1 is the server connected to the time source itself. (In most cases the time source and the stratum 1 server are in the same physical location.) An client or server connected to a stratum 1 source would be stratum 2.
  • Page 281 Servers Client/ Servers Clients Servers 1a and 1b receive time information from, or synchronize with, a as a radio clock. (In most cases, these servers would not be connected to the same source, though it is shown this way for simplicity.) Servers 1a and 1b become stratum 1 servers and are peered with each other, allowing them to check each other.
  • Page 282: Ntp And Authentication

    When planning your network, it is helpful to use the following general rules: • It is usually not a good idea to synchronize a local time server with a peer (in other words, a server at the same stratum), unless the latter is receiving time updates from a source that has a lower stratum then from where the former is receiving time updates.
  • Page 283: Network Time Protocol Management Menu

    Network Time Protocol Management Menu Network Time Protocol Management Menu To access the management menu, connect to a switch via a console or telnet session and enter at the system prompt. If you are in verbose mode, or enter a question mark (?) at the prompt, the following screen is displayed: .
  • Page 284: Ntp Configuration Menu

    NTP Configuration Menu NTP Configuration Menu To view the configuration menu, enter the you are in verbose mode the tion mark ( ) at the prompt to display this menu: The main menu options are shown in the change menus. A switch can be configured to act as an receives updates from an while and...
  • Page 285 NTP Configuration Menu Field Descriptions The following section describes the fields displayed using the command. 1) Response timeout This field sets the timeout period for responses to server queries. Server queries come from the server responsible for providing this client with time information.
  • Page 286: Configuring An Ntp Client/Server

    NTP Configuration Menu Configuring an NTP Client/Server A switch can be configured to act both as a client and a server. If you want to run both the client and server portions of the 1. Enter the command as shown, at the system prompt: The following menu appears: 2.
  • Page 287: Configuring Client/Server Authentication

    Field Descriptions The following section describes the expanded menu options. 61) Client limit This field allows you to set a specific number of clients that are allowed to make requests of the server during a specified time period. Setting this field to clients to connect to the server.
  • Page 288 NTP Configuration Menu 2. Adjust the configurable variables for this number, and equal sign, and a new value at the system prompt, as shown: For example, to change the 3. Enable authentication by entering a , and equal sign (=), and a key file name at the prompt, as shown: Startup Configuration menu expands to display new options.
  • Page 289 NTP Configuration Menu Field Descriptions The following section describes the expanded menu options. 31) Configuration info authentication key The number of the key in the key file used to authenticate configuration information. Config- uration information sets configuration parameters. For more information on the key file, see NTP and Authentication on page 12-4.
  • Page 290: Configuring A New Peer Association

    NTP Configuration Menu Configuring a New Peer Association When you have configured the peer association for the switch. An compare and check time information sent from the switch, and in turn send time information to the switch. To configure a new peer, enter the where is the either the domain name or IP address of the peer machine.
  • Page 291: Configuring A New Server

    Configuring a New Server For the switch to synchronize its time, you must specify a server, or servers, from which the switch receives time information. This is done with the To add a synchronization server to a switch, use the command that follows: where is the either the domain name or IP address of the server.
  • Page 292: Unconfigure Existing Peer Associations

    NTP Configuration Menu For example, to add broadcast address 1.1.1.1 with a key identifier of 5, using version 3 of , and a minimum poll time of 16 seconds, you would enter the following: When you have finished press new server. Unconfigure Existing Peer Associations You can remove server, peer, or reference clock associations for this switch using the command.
  • Page 293: Ntp Information Menu

    NTP Information Menu To view the configuration menu, enter the are using verbose mode, the tion mark ( ) at the prompt to display this menu: The main menu options are shown in the change menus. Display List of Peers the Server Knows About command is used to display a brief list of all switch (servers, peers, etc.).
  • Page 294: Display Peer Summary Information

    NTP Information Menu The mode of the switch in relation to the remote asso- ciation is determined when you create the association. See NTP Configuration Menu on page 12-6 for more information on creating Display Peer Summary Information command displays a more detailed version of the display a list of peers that includes summary information, enter the system prompt.
  • Page 295: Display Alternate Peer Summary Information

    Field Descriptions The following sections describe the fields displayed using the . The address of the remote association. . The local interface address assigned by , then the local address has yet to be determined. . The stratum level of the remote peer. If this number is synchronized.
  • Page 296: Display Detailed Information For One Or More Peers

    NTP Information Menu Display Detailed Information for One or More Peers command allows you to view detailed associations of this switch. To view detailed command in the following manner: where is the either the domain name or example, to show information for a peer with A screen similar to the following is displayed: It is possible to display information from more than one remote association by adding more addresses when entering the...
  • Page 297 . The advertised precision of this association, which is a number from -4 to -20. For information on setting the advertised precision, see Configuring an NTP Client on page 12-6 and Set the Server’s Advertised Precision on page 12-14. . The status of leap second insertion for this association. Leap seconds are seconds that are added to the timestamp of an values are: No warning.
  • Page 298: Print Version Number

    NTP Information Menu . This counter lists what flags have been configured for this information about setting flags, see Set a System Flag (Auth, Bclient, Monitor, Stats) on page 12-35. . This is the local time, in timestamp format, when the local clock was last updated.
  • Page 299: Display Local Server Information

    Display Local Server Information command is used to display information about the local switch’s implementation . To view local switch prompt. A screen similar to the following is shown: Field Descriptions The following section explains the fields shown using the address of the switch.
  • Page 300 NTP Information Menu . This is the local time at which the local clock was last set or corrected. . This counter lists what flags have been configured for this entity. For more information about setting flags, see Set a System Flag (Auth, Bclient, Monitor, Stats) on page 12-35.
  • Page 301: Ntp Statistics Menu

    NTP Statistics Menu To view the Statistics Menu, enter the in verbose mode the configuration menu is displayed. Otherwise, enter a question mark ( ) at the prompt to display this menu: The main menu options are shown in the change menus.
  • Page 302: Display Server Statistics Associated With Particular Peer(S)

    NTP Statistics Menu Field Descriptions The following section describes the fields displayed using the . The number of seconds the local switch. . The number of seconds since the last time the local . The number of the data of the packet. .
  • Page 303 NTP Statistics Menu Field Descriptions The following section describes the fields displayed using the command. . The address of the host whose statistics you are viewing. . The local interface address assigned by to the remote association. If this address is , then the local address has yet to be determined.
  • Page 304: Display Loop Filter Information

    NTP Statistics Menu Display Loop Filter Information The loop filter is used to control and correct the phase of timestamps as processed by the local clock. The loop filter examines timestamps sent to and from the local clock and can adjust them to account for natural wander and jitter.
  • Page 305: Display I/O Subsystem Statistics

    . The number of times the switch sent an ured NTP association. . The number of new . The number . The number of peer tables hashed to the index. Display I/O Subsystem Statistics command allows you to view general statistics on received and transmitted packets for this switch.
  • Page 306: Display Event Timer Subsystem Statistics

    NTP Statistics Menu Display Event Timer Subsystem Statistics command allows you to view significant switch. To view significant screen similar to the following is displayed: Field Descriptions The following section describes the fields displayed using the . The number of seconds since the last reset of .
  • Page 307: Display Packet Count Statistics From The Control Module

    It is possible to reset the statistics for more than one than one address to the command. For example, to reset statistics for a peer with IP address 1.1.1.4 and a peer with IP address 1.1.1.5, you would enter: A brief message is displayed confirming the command. Display Packet Count Statistics from the Control Module In a comprehensive network-management environment, facilities should exist to perform routine...
  • Page 308: Display The Current Leap Second State

    NTP Statistics Menu . The number of the added time offset parameter appeared to be incorrect. This can occur if an becomes unsynchronized and generates false timestamp information. . The number of packets received where the version number of undefinable. This is usually caused by packet corruption. .
  • Page 309: Turn The Server's Monitoring Facility On Or Off

    . A scheduled leap second insertion less than a month away. . A scheduled leap second insertion less than a day away. . A scheduled leap second insertion less than two hours away. . The date of the last leap second insertion. Turn the Server's Monitoring Facility On or Off The Server Monitoring Facility keeps track of all On, it is possible to display a list of all...
  • Page 310 NTP Statistics Menu Field Descriptions The following section describes the fields displayed using the . The . The port the association was learned on and on which the association communicates with the switch. This is the switch interface port. . The local interface address for this association as created by the tion on the switch.
  • Page 311: Ntp Administration Menu

    NTP Administration Menu To view the Administration Menu, enter the you are using verbose mode the question mark ( ) at the prompt to display this menu: The main menu options are shown in the change menus. Set the Primary Receive Timeout command allows you to specify the number of milliseconds the server waits for a response to queries before the operation times out.
  • Page 312: Specify The Host Whose Ntp Server We Talk To

    NTP Administration Menu Specify the Host Whose NTP Server We Talk To command specifies the name of the This can be a domain name or an To change the server for the switch, enter the where is the either the domain name or to configure the switch to use an To view the current with no address.
  • Page 313: Set Key Type To Use For Authenticated Requests (Des|Md5)

    Set Key Type to Use for Authenticated Requests (DES|MD5) supports two types of encryption: authenticate information and configuration requests, you must specify which type of encryption to use. To specify an encryption type enter the where is either or MD5. For example, to set the key type to MD5, you would enter: To view the currently specified key type, enter the prompt, and press...
  • Page 314: Ntp Access Control Menu

    NTP Access Control Menu NTP Access Control Menu To view the Access Control Menu, enter the you are using verbose mode the question mark ( ) at the prompt to display this menu: The main menu options are shown in the change menus.
  • Page 315: Change The Control Message Authentication Key Id

    Change the Control Message Authentication Key ID There are two types of messages an control. Control messages attempt to change the configuration of the ion. It is possible to change the authentication key identifier for control messages sent from the switch to another entity.
  • Page 316: Remove One Or More Key Id's From The Trusted List

    NTP Access Control Menu Remove One or More Key ID's from the Trusted List The trusted list in the key file is a list of all keys that are considered authentic and uncompro- mised. Messages from an is possible to remove a key from the trusted list. To remove a key ID from the trusted list, enter the where is the new key...
  • Page 317: Create Restrict Entry/Add Flags To Entry

    Create Restrict Entry/Add Flags to Entry It is possible to place restriction flags on specific tion flags prevent messages or information coming from the switch. To create a restriction flag, enter the where is the address of the is the specific flag you want to place on the entity. For example to put an restriction on an entity with address 1.1.1.1 and a subnet mask of 255.255.0.0, enter the following: The following is a list of possible restriction flags that can be used:...
  • Page 318: View The Server's Restrict List

    NTP Access Control Menu View the Server's Restrict List command allows you to view a list of all the configured restrictions for the switch. To view a list of configured restriction, enter the prompt. A screen similar to the following appears: Field Descriptions The following section describes the fields displayed with the .
  • Page 319: Remove Flags From A Restrict Entry

    Remove Flags from a Restrict Entry It is possible to place restriction flags on specific tion flags prevent messages or information coming from the switch. To remove a restriction flag from an where is the address of the is the specific flag you want to remove from the entity. For example, to remove restriction from an entity with address 1.1.1.1 and a subnet mask of 255.255.0.0, enter the following: Delete a Restrict Entry...
  • Page 320: Display The Traps Set In The Server

    NTP Access Control Menu Display the Traps Set in the Server command allows you to view a list of trap receivers set for the server. To view the trap list, enter the following is shown: Field Descriptions The following section describes the fields shown with the .
  • Page 321: Snmp (Simple Network Management Protocol)

    13 SNMP (Simple Network Management Protocol) Introduction Simple Network Management Protocol ( ) is an application layer protocol that allows SNMP network devices to exchange management information. works by sending messages, SNMP called protocol data units ( ), to network devices. Network administrators use PDUs SNMP monitor network performance and to solve network problems.
  • Page 322: Configuring Snmp Parameters And Traps

    Configuring SNMP Parameters and Traps Configuring SNMP Parameters and Traps command allows you to configure to network management stations. The delete parameters. The SNMP information about the networking menu, see Chapter 25, “IP Routing.” To configure parameters, enter the following command: A screen similar to the following displays: •...
  • Page 323 3) Set Community Name The Set Community Name variable is a password (up to 16 characters) that enables stations to read and write objects through which allows all NMS stations read access to readable objects. If you want to specify a Set Community Name password, enter a , an equal sign ( ), and the new Set Community Name.
  • Page 324: Configuring A New Network Management Station

    Configuring SNMP Parameters and Traps 6) Broadcast Traps When broadcast traps are enabled, the switch transmits traps to all NMS stations in the default group. If you enable this parameter, unicast traps (see option 6 below) will automatically be disabled. The default for broadcast traps is following command: The following prompt displays: Enter the...
  • Page 325 Here is a sample configuration for setting a combination of traps. Bit Configurations for Setting Traps word 0 (4 bytes) 00 00 00 00 To set a combination of trap types, add the hex values of the bits as follows: Trap Type tempAlarm risingAlarm...
  • Page 326 Configuring SNMP Parameters and Traps e. The following prompt displays: Select whether or not this Network Management Station has special access. If you enter , this will have administrative privileges such as modifying, deleting, or adding to other trap entries as well as its own. Without special access, an own entry.
  • Page 327 Configuring SNMP Parameters and Traps Please note that any additional entries must have a unique address. Repeat steps b through f to continue configuring additional entries. Once you save your configura- tion and re-enter the command at the prompt, the screen refreshes to include the entry.
  • Page 328: Viewing Snmp Statistics

    Configuring SNMP Parameters and Traps Viewing SNMP Statistics command is used to display activities since the last time the switch was powered on, or since the last Reset was executed. It also displays a list of the current traps. command is listed on the networking menu, see Chapter 25, “IP Routing.”...
  • Page 329 Bad Type Discards The total number of entries discarded because the request type was not recognized. SNMP ASN Parse Errors The total number of ASN.1 decoding received Messages. SNMP Too Big Errors The total number of delivered to the SNMP PDUs error-status field of ‘tooBig’.
  • Page 330 Configuring SNMP Parameters and Traps Get Next Requests The total number of SNMP col entity. Set Requests The total number of SNMP switch protocol entity. SNMP Get Responses The total number of SNMP col entity. Authentication Trap Enables Indicates whether the SNMP ure traps.
  • Page 331: Trap Tables

    Trap Tables Trap Tables The following table is a summary list of the supported SNMP traps and their values. Trap or Mask Name Object ID Hex Value Page Position Page 13-11...
  • Page 332 Trap Tables Trap or Mask Name Object ID Hex Value Page Position Page 13-12...
  • Page 333 Trap Tables Trap or Mask Name Object ID Hex Value Page Position Page 13-13...
  • Page 334 Trap Tables Trap or Mask Name Object ID Hex Value Page Position Page 13-14...
  • Page 335: Snmp Standard Traps

    SNMP Standard Traps This section lists the standard traps that are defined within signify events as they occur on common network devices. The following information on traps is provided in the tables. The object name of the trap as it is defined in the corresponding MIB (Management Information Base).
  • Page 336 Trap Tables Trap Object ID Description The sending protocol entity is re-initializing itself such that neither the agent’s configuration nor the protocol entity implementation may be altered. Bit Position (Word 0) Hex Value (Word 0) Trap Text Variable Descrip- tions Trap Object ID Description...
  • Page 337 Trap Object ID Description The sending protocol entity recognizes that one of the communication links represented in the agent’s configuration has come up. Bit Position (Word 0) Hex Value (Word 0) Trap Text Variable Descrip- tions Port Index . The physical port number that identifies where the communica- tion link has come up.
  • Page 338 Trap Tables Trap Object ID Description An EGP neighbor for whom the sending protocol entity was an EGP peer has been marked down and the peer relationship no longer exists. Bit Position (Word 0) Hex Value (Word 0) Trap Text Variable Descrip- tions...
  • Page 339 Trap Object ID Description This trap indicates that the specified circuit has gone down. Bit Position (Word 0) Hex Value (Word 0) Variable Description Trap Object ID Description This trap indicates that the specified circuit has come up. Bit Position (Word 0) Hex Value (Word 0)
  • Page 340 Trap Tables Trap Object ID Description A bridge’s configured ports either transitioned from Learning state to For- warding state or from Forwarding state to Blocking state. This trap will not be sent if a newRoot trap was sent for the same transition. Bit Position (Word 0) Hex Value...
  • Page 341 Trap Object ID Description Either a permanent existing was modified. Bit Position (Word 0) Hex Value (Word 0) Trap Text Variable Descrip- tions was added or deleted at this Port Index . The port number of this ATM interface. Valid values range from 0 to 2147483647.
  • Page 342 Trap Tables Trap Object ID Description Either a permanent existing Bit Position (Word 0) Hex Value (Word 0) Trap Text Variable Descrip- tions Operational Status operational status of the VCC. The following integers are valid values: unknown end2endUp end2endDown localUpEnd2endUnknown localDown Page 13-22 was added or deleted at this...
  • Page 343 Trap Object ID Description The value of an Ethernet statistical variable (i.e., a member of the Ether- net statistics group as defined by RFC 1757) has exceeded its rising threshold. The variable’s rising threshold and whether it will generate an trap for this condition are configured by a network management SNMP station running...
  • Page 344 Trap Tables Trap Object ID Description The value of an Ethernet statistical variable (i.e., a member of the Ether- net statistics group as defined by threshold. The variable’s falling threshold and whether it will generate an trap for this condition are configured by a network management SNMP station running Bit Position...
  • Page 345 Trap Type Object ID Description The value of an instance dsx3LineStatus changed. Bit Position (Word 0) Hex Value (Word 1) Trap Text Variable Descrip- tions DSX3 Line Status . The line status of the interface. It contains loopback, failure, received alarm, and trans- mitted alarm information.
  • Page 346 Trap Tables Trap Object ID Description The value of an instance dsx1LineStatus changed. Bit Position (Word 0) Hex Value (Word 1) Trap Text Variable Descrip- tions DSX1 Line Status the interface. It contains loopback, failure, received alarm, and trans- mitted alarm information. Valid values range from 1 to 8191.
  • Page 347: Extended Traps

    Extended Traps This section lists Alcatel-specific traps. These extended traps are generated specifically by Alcatel switch devices. Trap Type Object ID Description The temperature sensor(s) have detected a temperature in the chassis that exceeds the threshold. These sensors are physically located on the module, but can detect temperature changes throughout the chassis.
  • Page 348 Trap Tables Trap Type Object ID Description A module was either inserted or removed from the chassis. In some cases, this trap may also be generated when a module is reset. Bit Position (Word 1) Hex Value (Word 1) Trap Text Variable Descrip- tions...
  • Page 349 Trap Type Object ID Description A power supply was either inserted or removed from the chassis, or there is a problem with the power supply. This trap is also generated when a power supply is switched on or off. Bit Position (Word 1) Hex Value (Word 1)
  • Page 350 Trap Tables Trap Type Object ID Description A chassis controller ( Bit Position (Word 1) Hex Value (Word 1) Trap Text Variable Descrip- tions Page 13-30 ) lost or gained the state of the master. Slot . The slot number of the MPX that has lost or gained master control.
  • Page 351 Trap Type Object ID Description A login attempt for the User Interface (UI) failed due to an incorrect login ID or an invalid password. Three (3) consecutive unsuccessful attempts will trigger this alarm. Bit Position (Word 1) Hex Value (Word 1) Trap Text Variable Descrip-...
  • Page 352 Trap Tables Trap Type Object ID Description Data from a ent from the port where the frame previously was received although they both ports belong to the same VLAN. Bit Position (Word 1) Hex Value (Word 1) Trap Text Variable Descrip- tions Page 13-32...
  • Page 353 Trap Type Object ID Description A physical, logical, or virtual port was enabled. These ports may be enabled through the physical port, any associated logical and virtual ports will also be enabled. And if you enable a logical port, such as an ated virtual ports will be enabled.
  • Page 354 Trap Tables Trap Type Object ID Description A physical, logical, or virtual port was disabled. These ports may be dis- abled through the ical port, any associated logical and virtual ports will also be disabled. And if you disable a logical port, such as an tual ports will also be disabled.
  • Page 355 Trap Type Object ID Description The physical port detected jabber (i.e., the port has transitioned through enable/disable states more than 50 times in the past 200 ms). Jabber may be produced by a bad port connection, such as a faulty cable. Bit Position (Word 1) Hex Value...
  • Page 356 Trap Tables Trap Type Object ID Description The port configuration is different from the previous configuration. Typi- cally this trap is generated when a ferent type (i.e., Ethernet for Bit Position (Word 1) Hex Value (Word 1) Trap Text Variable Descrip- tions Physical Instance...
  • Page 357 Trap Type Object ID Description A Group was either created or deleted through the Bit Position (Word 1) Hex Value (Word 1) Trap Text Variable Descrip- tions Group number that has been created or deleted. . The Group number Administrative Status .
  • Page 358 Trap Tables Trap Type Object ID Description was either created or deleted through the VLAN Bit Position (Word 1) Hex Value (Word 1) Trap Text Variable Descrip- tions Page 13-38 Group number . The Group num- ber to which this VLAN belongs. Administrative status .
  • Page 359 Trap Type Object ID Description The specified port has moved from a Group or has had its configuration changed. Bit Position (Word 1) Hex Value (Word 1) Trap Text Variable Descrip- tions Slot number the module that contains this port. .
  • Page 360 Trap Tables Trap Object ID Description The specified module has been either reset or reloaded. A reload may occur during a firmware download. Bit Position (Word 1) Hex Value (Word 1) Trap Text Variable Descrip- tions Operational State ed. The following integers are valid values: Unknown state.
  • Page 361 Trap Type Object ID Description A potentially fatal error occurred in the system. Bit Position (Word 1) Hex Value (Word 1) Trap Text Variable Descrip- tions Event Trap Type identifies the specific error that occurred in the system. The fol- lowing integers are valid values: 10 Unspecified Log Event 11 Log file full...
  • Page 362 Trap Tables Trap Type Object ID Description Bit Posi- tion (Word Hex Value (Word 1) Trap Text Variable Descrip- tions Trap Type Object ID Description table is full upon insertion. Bit Position (Word 1) Hex Value (Word 1) Trap Text Variable Descrip- tions...
  • Page 363 Trap Type Object ID Description A specified port changed. Bit Posi- tion (Word Hex Value (Word 1) Trap Text Variable Descrip- tions S l o t n u m b e r where this ASM module is located. Trap Type Object ID Description state for the specified port changed.
  • Page 364 Trap Tables Trap Type Object ID Description The specified Bit Position (Word 1) Hex Value (Word 1) Trap Text Variable Descrip- tions Slot Number where this ASM module is located. Port Number module where this VCC was created or deleted. Page 13-44 was created or deleted.
  • Page 365 Trap Type Object ID Description The specified tion, etc.) was created or deleted. Bit Position (Word 1) Hex Value (Word 1) Trap Text Variable Descrip- tions Slot Number . The slot number where this ASM module is located. Port Number .
  • Page 366 Trap Tables Trap Type Object ID Description Frame Relay Bit Position (Word 1) Hex Value (Word 1) Trap Text Variable Descrip- tions Page 13-46 was created. DLCI S l o t n u m b e r . The slot number where this Frame Relay module is located.
  • Page 367 Trap Type Object ID Description Frame Relay was deleted. DLCI Bit Position (Word 1) Hex Value (Word 1) Trap Text Variable Descrip- tions S l o t n u m b e r where this Frame Relay module is located. Port number Frame Relay module where the DLCI was deleted.
  • Page 368 Trap Tables Trap Type Object ID Description Frame Relay Bit Position (Word 1) Hex Value (Word 1) Trap Text Variable Descrip- tions Page 13-48 changed to active state. DLCI Slot Number . The slot number where this Frame Relay module is located.
  • Page 369 Trap Type Object ID Description Frame Relay changed to inactive state. DLCI Bit Position (Word 1) Hex Value (Word 1) Trap Text Variable Descrip- tions Slot Number where this Frame Relay module is located. . The slot number Port Number .
  • Page 370 Trap Tables Trap Type Object ID Description The specified port was placed into manual mode forwarding as its default setting. Bit Position (Word 1) Hex Value (Word 1) Trap Text Variable Descrip- tions Page 13-50 Port number number on the module. Slot Number .
  • Page 371 Trap Type Object ID Description The specified FDDI Bit Position (Word 1) Hex Value (Word 1) Trap Text Variable Descrip- tions physical port changed from wrap configuration state. SMT Index . A unique value for each SMT (Station Management Station). The value for each SMT must remain constant at least from one re-initialization of the entity’s network management system to...
  • Page 372 Trap Tables Trap Type Object ID Description The switch detected a duplicate Bit Position (Word 2) Hex Value (Word 2) Trap Text Variable Descrip- tions Port Number on the module of the reporting station from which the trap was sent. Slot Number .
  • Page 373 Trap Type Object ID The switch detected a duplicate Description ports. Bit Position (Word 2) Hex Value (Word 2) Trap Text Variable Descrip- tions address of one of its own router MAC Address . The router port’s MAC address for S l o t which the last duplicate .
  • Page 374 Trap Tables Trap Type Object ID At least one of the user-specified thresholds was exceeded. Description Bit Position (Word 2) Hex Value (Word 2) Trap Text Variable Descrip- tions Trap Type Object ID Description At least one of the user-specified thresholds was exceeded during the previous cycle and none of them are exceeded in the current cycle.
  • Page 375 Trap Type Object ID At least one of the device-level threshold crossing was detected. Description Bit Position (Word 2) Hex Value (Word 2) Trap Text Variable Descrip- tions Trap Type Object ID Description At least one module-level threshold crossing was detected. Bit Position (Word 2) Hex Value...
  • Page 376 Trap Tables Trap Type Object ID Description XMAP Bit Position (Word 2) Hex Value (Word 2) Trap Text Variable Descrip- tions Page 13-56 turned on or off. Port Number number of the port that most recently changed. Reason . The reason for the last port status change. The following integers are valid values: No trap was sent.
  • Page 377 Trap Type Object ID turned on or off. Description XMAP Bit Position (Word 2) Hex Value (Word 2) Trap Text Variable Descrip- tions Operating State . The XMAP’s operating state. The follow- ing integers are valid values: inactive active Page 13-57 Trap Tables...
  • Page 378 Trap Tables Trap Type Object ID Indicates the last authenticated Description Bit Position (Word 2) Hex Value (Word 2) Trap Text Variable Descrip- tions MAC Address MAC address to make a n a u t h e n t i c a t i o n attempt.
  • Page 379 Trap Type Object ID is unable to update the forwarding database to reflect information Description GMAP in its internal database. Bit Position (Word 2) Hex Value (Word 2) Trap Text Variable Descrip- tions MAC Address . The last MAC address for which a GMAP change was not applied.
  • Page 380 Trap Tables Trap Type Object ID Either the bus line’s status changed (active or inactive) or clock switching Description occurred. Bit Position (Word 2) Hex Value (Word 2) Trap Text Variable Descrip- tions Bus Line the status change occurred. The fol- lowing integers are valid values: Page 13-60 Operating State...
  • Page 381 Trap Type Object ID A configured binding rule was violated. Description Bit Position (Word 2) Hex Value (Word 2) Trap Text Variable Descrip- tions Group ID VLAN for which this rule is config- ured. Protocol for which this binding is configured. MAC Address .
  • Page 382 Trap Tables Trap Type Object ID An entry in the mpcStatisticsTable reached the threshold value. Description Bit Position (Word 2) Hex Value (Word 2) Trap Text Variable Descrip- tions Page 13-62 MPC Index . A unique number that identi- fies a conceptual row in the mpcConfig- Table.
  • Page 383 Trap Type Object ID (Link Error Rate) flag on a port changed from Description Bit Position (Word 3) Hex Value (Word 3) Trap Text Variable Descrip- tions CLEAR SMT Index . A unique value for each SMT (Station Management). The value for each SMT must remain constant at least from one re-initialization of the enti- ty’s network management sys-...
  • Page 384 Trap Tables Trap Type Object ID (Link Confidence Test) flag on a port incremented. Description Bit Position (Word 3) Hex Value (Word 3) Trap Text Variable Descrip- tions Port Index . A unique value for each port within a given SMT, which is the same as the corre- sponding resource index in SMT.
  • Page 385 Trap Type Object ID The statisticsNum value of the mpcStatisticsTable reached the threshold Description value. Bit Position (Word 2) Hex Value (Word 2) Variables Trap Text Variable Descrip- tions MPC Index . A unique number that identifies a conceptual row in the mpcConfigTable.
  • Page 386 Trap Tables Trap Type Object ID The established shortcut path either closed or failed to complete the Description path. Bit Position (Word 2) Hex Value (Word 2) Variables Trap Text Variable Descrip- tions Control Direct VCI VCI that identifies the VCC at the point where it connects to a LANE client.
  • Page 387 Trap Type Object ID The retry time exceeded the Description Bit Position (Word 2) Hex Value (Word 2) Variables Trap Text Variable Descrip- tions Destination Address . The destination internet- work layer address. -p5 time. MPC Index . A unique number that identi- fies a conceptual row in the mpcConfig- Table.
  • Page 388 Trap Tables Trap Type Object ID The sending agent has transitioned from “Backup” state to “Master” state. Description Bit Position (Word 2) Hex Value (Word 2) Trap Text Variable Descrip- tions Page 13-68 Interface Index Number . A unique value that identifies the sending agent.
  • Page 389 Trap Type Object ID A packet was received from a router whose authentication key or authen- Description tication type conflicts with this router’s authentication key or type. Bit Position (Word 2) Hex Value (Word 2) Trap Text Variable Descrip- tions Packet Source IP of an inbound VRRP packet.
  • Page 390 Trap Tables Trap Type Object ID The specified connection is in the VC-AIS state. Description Bit Position (Word 3) Hex Value (Word 3) Variables Trap Text Variable Descrip- tions Page 13-70 Slot Number . The slot number for the specified connection. Port Number .
  • Page 391 Trap Type Object ID The specified connection is in the VC-RDI state. Description Bit Position (Word 3) Hex Value (Word 3) Variables Trap Text Variable Descrip- tions Slot Number . The slot number for the specified connection. Port Number . The port number for the specified connection.
  • Page 392 Trap Tables Trap Type Object ID The specified connection is in the VC-LOC state. Description Bit Position (Word 3) Hex Value (Word 3) Variables Trap Text Variable Descrip- tions Page 13-72 Slot Number . The slot number for the specified connection. Port Number .
  • Page 393 Trap Type Object ID The specified connection is in the Unsuccessful Loopback state. Description Bit Position (Word 3) Hex Value (Word 3) Variables Trap Text Variable Descrip- tions . The virtual circuit identifier for the specified connection. . The virtual path identifier for the specified connection.
  • Page 394 Trap Tables Trap Type Object ID The specified VP connection is in the VP-AIS state. Description Bit Position (Word 3) Hex Value (Word 3) Variables Trap Text Variable Descrip- tions Page 13-74 Slot Number . The slot number for the specified connection. Port Number .
  • Page 395 Trap Type Object ID The specified VP connection is in the VP-RDI state. Description Bit Position (Word 3) Hex Value (Word 3) Variables Trap Text Variable Descrip- tions Slot Number . The slot number for the specified connection. Port Number .
  • Page 396 Trap Tables Trap Type Object ID The specified VP connection is in the VP-LOC state. Description Bit Position (Word 3) Hex Value (Word 3) Variables Trap Text Variable Descrip- tions . The virtual circuit identifier for the specified connection. Page 13-76 Slot Number .
  • Page 397 Trap Type Object ID The specified VP connection is in the unsuccessful loopback state. Description Bit Position (Word 3) Hex Value (Word 3) Variables Trap Text Variable Descrip- tions Slot Number . The slot number for the specified connection. Port Number .
  • Page 398 Trap Tables Trap Object ID Description An account event is generated to signal that a new accounting file is available on the switch Bit Position (Word 3) Hex Value (Word 3) Variable Description Trap Object ID Description This alarm is generated when the filling level exceeds the first threshold. It signals that the switch changes over to the alternate collection device.
  • Page 399 Trap Type Object ID Description This event is generated when the filling level goes below the first thresh- old. This event is for information only. Bit Position (Word 3) Hex Value (Word 3) Variable Description Trap Object ID Description This alarm is generated when the filling level exceeds the second thresh- old.
  • Page 400 Trap Tables Trap Object ID Description This event is generated when the filling level is lowered below the sec- ond threshold. Bit Position (Word 3) Hex Value (Word 3) Variable Description Trap Object ID Description This event is generated when the filling level exceeds the third threshold. It signals that the switch is now in congestion.
  • Page 401 Trap Object ID Description This event is generated when the filling level goes below the third threshold. Bit Position (Word 3) Hex Value (Word 3) Variable Description Trap Type Object ID Description This alarm is generated when the TCP connection establishment fails with both the primary and the secondary collection devices.
  • Page 402 Trap Tables Trap Object ID Description This alarm is generated when too many files are awaiting collection. Bit Position (Word 3) Hex Value (Word 3) Variable Description Trap Type Object ID Description A fantrayEvent trap occurs when a problem condition is recognized on a chassis fan tray.
  • Page 403 Trap Type Object ID A LDP peer is identified by the LDP hello mechanism and a peer entry is Description created. Bit Position (Word 3) Hex Value (Word 3) Variables Trap Text Variable Descrip- tions EntityId . The identification number assigned to the new entity.
  • Page 404 Trap Tables Trap Type Object ID An LDP peer is lost and the peer entry is deleted. Description Bit Position (Word 3) Hex Value (Word 3) Variables Trap Text Variable Descrip- tions EntityId number of the deleted entity. Page 13-84 .
  • Page 405 Trap Type Object ID An LDP session with the peer is established and a session entry is cre- Description ated. Bit Position (Word 3) Hex Value (Word 3) Variables Trap Text Variable Descrip- tions EntityId . The identification number assigned to the new- entity.
  • Page 406 Trap Tables Trap Type Object ID An LDP session with the peer is lost and the session entry is deleted. Description Bit Position (Word 3) Hex Value (Word 3) Variables Trap Text Variable Descrip- tions EntityId . The identification number of the deleted entity.
  • Page 407 Trap Tables Trap Type Object ID A trap message is sent to a network manager when a LEC status changes. Description Bit Position (Word 2) Hex Value (Word 3) Variables Page 13-87...
  • Page 408 Trap Tables Trap Text Variable E L A N N a m e Descrip- ELAN whose status changed to tions generate this trap. State List 10. invalid requester id 11. invalid LAN destination 12. invalid ATM address 13. no configuration 14.
  • Page 409: Dns Resolver And Rmon

    Introduction This chapter describes commands related to the Domain Name Server ( remote network monitoring ( configure router port The commands for these features are available from the Networking submenu, which is described in Chapter 25, “IP Routing.” Configuring the DNS Resolver The Names Submenu command takes you to the Names submenu.
  • Page 410 Configuring the DNS Resolver To enable the resolver function, enter . A screen similar to the following then displays: The prompts allow you to enter a Domain Name and up to three Domain Name Servers (identified by their IP addresses). •...
  • Page 411: Remote Network Monitoring (Rmon)

    Remote Network Monitoring (RMON) Remote Network Monitoring ( Omni Switch/Router. consists of “probes” and “events.” There are two commands in RMON the Networking menu, vate probes and events. Be aware that you cannot create probes from within the switch’s User Interface;...
  • Page 412: Monitoring Probes

    Remote Network Monitoring (RMON) The Alarm probe attempts to prevent a flood of alarms from being generated by fluctuating values. It does so by continuously comparing the upper and lower limits. What this means is that the first time either an upper or lower limit is exceeded, an alarm will be generated. However, if the variable moves back inside the limit, then out again, another alarm will not be generated unless the opposite limit is exceeded.
  • Page 413: Monitoring Events

    Remote Network Monitoring (RMON) Time Time since the last change in status. System Resources Amount of memory that has been allocated to this probe. To see the detail for each of the probes enter the command followed by the entry number as shown below.
  • Page 414: Configuring Router Port Mac Addresses

    Configuring Router Port MAC Addresses Configuring Router Port MAC Addresses You can use the ) for a group that has an enter followed by the number of the group you want to modify (the default group number is ). You must add for information on editing system files.
  • Page 415: 15 Managing Ethernet Modules

    This chapter documents User Interface ( net modules. For documentation on Command Line Interface ( Ethernet modules, see the Text-Based Configuration CLI Reference Guide. In Release 4.4 and later, the Omni Switch/Router is factory-configured to boot up in Interface) mode, rather than in mode.
  • Page 416 VF-45 Gigabit Ethernet modules on the OmniSwitch and Omni Switch/Router use fiber tors. Refer to Chapter 3, “Omni Switch/Router Switching Modules,” for information on Omni Switch/Router Ethernet hardware. Three Generations of Modules Ethernet modules in Release 3.1 and later contained advanced chip technology referred to as “Mammoth.”...
  • Page 417: Kodiak Ethernet Modules

    If the original cabling problem has not been corrected, the link may become partitioned again. In this event, normal operation will be enabled when the problem has been corrected. Overview of Omni Switch/Router Ethernet Modules Software Commands...
  • Page 418: The Ethernet Management Menus

    The Ethernet Management Menus The Ethernet Management Menus the physical interface sub-menu, which appears similar to the following display: sub-menu contains commands for early generation Fast Ethernet modules. The sub-menu has commands for Kodiak Ethernet modules. When you enter menu. This sub-menu displays as follows: In Release 4.5 and later, early-generation Ethernet modules are no longer supported.
  • Page 419: Configuring 10/100 Auto-Sensing Ports

    (10 or 100 Mbps) and the link mode (full or half-duplex) on 10/100 Ethernet ports on modules on the Omni Switch/Router. ESX-K-100C-32W Follow these steps to configure a 10/100 port: 1.
  • Page 420: Connecting Kodiak Modules To Non-Auto-Negotiating Links

    Configuring 10/100 Auto-Sensing Ports 6. Since you have enabled auto-negotiation, the port will automatically sense the line speed of the connection. You can also further enable auto-negotiation for the link mode. When the following prompt displays: select whether you want the port to auto-sense the duplex mode ( want the port to default to half-duplex mode ( for half-duplex.
  • Page 421: Configuring Kodiak Ethernet Ports

    (full or half-duplex) for ports on newer Kodiak Ethernet modules. This procedure describes how to configure Ethernet modules on the Omni Switch/Router. Follow these steps to configure a Kodiak Ethernet port: 1. Enter at the system prompt and press 2.
  • Page 422: Viewing Configurations For 10/100 Ethernet Modules

    Viewing Configurations for 10/100 Ethernet Modules Viewing Configurations for 10/100 Ethernet Modules command allows you to view the current status of newer Ethernet modules (see Kodiak Ethernet Modules on page 15-3). These modules support 100 Mbps, or 1000 Mbps Ethernet. Ethernet 10/100 the attached device.
  • Page 423: Omnichannel

    OmniChannel OmniChannel OmniChannel allows you to increase the bandwidth of Fast backbones by combining the capacity of up to four (4) Fast Ethernet ports into one channel. The combined channel oper- ates within Spanning Tree as one virtual port, and can provide up to 800 Mbps (in full-duplex mode) of bandwidth.
  • Page 424: The Server Channel Feature

    For ESX-K Series Kodiak-based Ethernet boards, you can create an OmniChannel that connects to a server instead of another Omni Switch/Router. The intention of the Server Channel is to give the user the option to increase the bandwidth between a server and Omni Switch/Router for more client request support.
  • Page 425: Server Channel Limitations

    Otherwise, enter the desired channel number and press 3. The following prompt displays: If the far end of the link is another Omni Switch/Router, you need to create an OmniChannel. Select and proceed to the next step. If the far end of the link is a server, select to create a Server Channel.
  • Page 426 OmniChannel If the port you enter is already part of another OmniChannel, then it cannot be used in a second OmniChannel. The following message displays for those ports that are already part of another OmniChannel: 5. The following prompt displays: Enter the other ports that will be used in this OmniChannel.
  • Page 427: Adding Ports To An Omnichannel

    Adding Ports to an OmniChannel After you create an OmniChannel with the ports to the same channel as long as the channel contains less than 4 ports. You use the command to add ports to an OmniChannel. Follow these steps: 1.
  • Page 428: Deleting Ports From An Omnichannel

    OmniChannel Deleting Ports from an OmniChannel You can delete ports from an OmniChannel using the steps: 1. Enter 2. The following prompt displays: Enter the channel number on which you want to delete ports. You can check the current port assignments for a given OmniChannel by using the described in Viewing OmniChannel Parameters on page 15-14.
  • Page 429 OmniChannel 3. A screen similar to the following displays: The following sections describe the variables in this table. . The identification number assigned to this OmniChannel during the configuration procedure. . The physical slot and port number for all ports included in the OmniChannel. The slot number is listed first, then a slash (/), and the port number on the Ethernet module.
  • Page 430 OmniChannel Page 15-16...
  • Page 431: Managing 802.1Q Groups

    OmniChannel. See Single vs. Multiple Spanning Tree on page 16-4 for infor- mation on single and multiple spanning tree. Support for in the Omni Switch/Router allows you to set up port-based groups that 802.1Q interoperate with -compliant equipment from other networking vendors.
  • Page 432: Ieee 802.1Q Sections Not Implemented

    IEEE 802.1Q Sections Not Implemented Some portions of the 802.1Q specification have not yet been implemented in the Omni Switch/Router. These include the following: • The tunneling of non-canonical 802.5 frames is not supported, since the Alcatel Omni S/R handles such traffic by frame translations. This tunneling mode of operation involves the Token Ring Encapsulation Flag in the 802.1Q header.
  • Page 433: Application Example

    Application Example The following diagram illustrates a simple 1 2 3 4 5 6 7 8 1 2 3 4 5 6 In the above diagram, the PC devices (endstations) need to be segmented into different . The switch port to which each device attaches is assigned to an 802.1Q group 802.1Q VLANs (Group 2 for endstations A, B, E, and F, and Group 3 for endstations C, D, G, and H).
  • Page 434: Single Vs. Multiple Spanning Tree

    No traffic can pass over the connected ports. Release 4.1 (and later) of the Omni Switch/Router allows for multiple spanning tree instances on a single port. Put another way, a port can be part of separate spanning trees, with no impact on packet delivery.
  • Page 435 while VLAN 2 traffic is allowed to pass. The reverse is true for Switch 1 and Switch 3 (i.e., VLAN 2 traffic is blocked, while VLAN 1 traffic is allowed to pass). Service commands are used in Ethernet modules to assign groups to 10/100 and Gigabit ports. , and commands create, delete, modify, and view trunk services created to handle 802.1Q traffic over an Ethernet backbone.
  • Page 436 Since spanning tree is group based, the physical port in the above diagram participates in three spanning tree instances: one for untagged traffic and two for 802.1Q tagged traffic. Both types of frames can now pass through the same port. Since a trunk is a service, and Alcatel switches have a 16 (10/100) or 15 (Gigabit) services per port limit, only 15 or 14...
  • Page 437: Assigning An 802.1Q Group To A Port

    Assigning an 802.1Q Group to a Port Previous versions of the Omni Switch/Router (version 4.0 and earlier) only allowed for single spanning tree configured 802.1Q groups using the commands. These commands were invalidated in the 4.1 release and replaced by the , and service commands.
  • Page 438 Assigning an 802.1Q Group to a Port Configuring 802.1Q on 10/100 Ethernet Ports Use the command to assign the steps below. 1. Enter at the system prompt, as shown: where is the slot of the module, and to the group. For example, to add port 3 on slot 5, you would enter: 2.
  • Page 439 The following sections describe the parameters shown in the screen on the preceding page. Description A textual description (up to thirty characters) for the service created when adding the port to a group. Group ID The number of the group to which the port is to be added. A simple identifier that is added to number between 1 and 4094.
  • Page 440 Assigning an 802.1Q Group to a Port For example, suppose that Port 3/1 is assigned to be in Group 2, and to use single spanning tree. If the port were to be assigned to another group, it would automatically set itself to use single spanning tree for that group as well.
  • Page 441 Configuring 802.1Q on Gigabit Ethernet Ports Use the command to assign the steps below. 1. Enter at the system prompt, as shown: where is the slot of the module, and to the group. For example, to add port 3 on slot 5, you would enter: 2.
  • Page 442: Modifying 802.1Q Groups

    Modifying 802.1Q Groups Modifying 802.1Q Groups 802.1Q groups for both 10/100 and Gigabit Ethernet ports can be modified using the command. The procedure is slightly different in each case. The screens for the change, depending on whether you have a legacy Ethernet board or a Kodiak ASIC-based Ethernet board.
  • Page 443 The ESX-K and GSX-K modules can also remap incom- ing priority on an ingress port. If priority remapping has been configured, the new priority will be carried across the backplane. The priority information is used to queue the packet, and is sent out in the packet if the egress port is tagged.
  • Page 444: Modifying 802.1Q Groups For Gigabit Ethernet Ports

    Modifying 802.1Q Groups Modifying 802.1Q Groups for Gigabit Ethernet Ports To modify the configuration of an shown: where is the slot number of the module on the switch, the service was created, and ple, to modify service instance 1 on port 5 of slot 2, enter: 802.1Q If this is a legacy Ethernet module, the screen appears as shown: If this is a Kodiak ASIC-based module, the screen appears as shown:...
  • Page 445 Remember to save the changes to the service by entering finished. To find the instance of a port service, use the Port on page 16-16 for more information. Tags (field number ) do not apply if proprietary tagging is used on this port. at the system prompt when command.
  • Page 446: Viewing 802.1Q Groups In A Port

    Viewing 802.1Q Groups in a Port Viewing 802.1Q Groups in a Port To view which ports use which as shown: where is the slot number of the module on the switch and where the service was created. For example, to view an enter: A screen similar to the following is displayed: As a variation of this command, it is possible to enter...
  • Page 447: Viewing 802.1Q Statistics For 10/100 Ports

    Viewing 802.1Q Statistics for 10/100 Ports Viewing 802.1Q Statistics for 10/100 Ports command provides a display of statistics for groups assigned to 10/100 ports. 802.1Q Enter the command, as shown: where is the slot number of the module on the switch, is the port number where the service was created, and is the number of the group that the port belongs to.
  • Page 448: Deleting 802.1Q Groups From A Port

    Deleting 802.1Q Groups from a Port Deleting 802.1Q Groups from a Port 802.1Q groups for both 10/100 and Gigabit Ethernet ports can be deleted using the command. The procedure is slightly different in each case. To delete an group from a 10/100 port using single spanning tree, use the 802.1Q command, as shown: where...
  • Page 449 This chapter describes how to configure and maintain bridging parameters. Bridges are devices that interconnect LANs using one (or more) of the available standards such as trans- parent bridging, source route bridging, or source route to transparent bridging. Bridges prima- rily operate at Layer 2 of the OSI reference model, which controls data flow, transmission errors, physical addressing, and access to physical medium.
  • Page 450 This chapter describes the commands used for configuring various bridging commands for the above mentioned protocols, as well as diagnostic, spanning tree and fast spanning tree information. In Release 4.4 and later, the Omni Switch/Router is factory-configured to boot up in Interface) mode, rather than in mode.
  • Page 451: Configuration Overview

    Configuration Overview Configuration Overview When configuring bridging parameters, you will need to perform at least some of the following steps: Step 1. Select a group The bridging menu commands operate only on the currently selected group (or, for certain commands, VLAN). You can select a group with the command.
  • Page 452: Bridge Management Menu

    Bridge Management Menu Bridge Management Menu To view the Bridge Management Menu, enter the are in verbose mode, the following table appears outlining the commands available to you. If you are not in verbose mode, enter a Menu. Details on commands included in the Bridge Management Menu commands are given in the following sections: ing or viewing, and include the •...
  • Page 453 . These commands allow you to view bridge forward tables, create and view static address tables, display bridge port statistics, view MAC address information, view remote trunking stations, and view the domain bridge mapping table. Commands in this section include information, see: •...
  • Page 454 Bridge Management Menu . These commands allow you to configure and view Fast Spanning Tree for a specific group or VLAN, and include the commands. Information is also included on configuring the Truncating Tree Timing and Speedy Tree Protocol features. For more information, see: •...
  • Page 455: Selecting A Default Group

    Selecting a Default Group Most commands in the Bridge Management Menu allow you to specify a group when entering the command at the system prompt. If you do not specify a group when entering a command, the bridge operations are performed on the currently selected group. You can view the current groups in the switch by entering To select a group, enter the...
  • Page 456: Bridging Commands

    Bridging Commands Bridging Commands The Bridge Management menu provides several commands that are useful in pinpointing problems in the network. The commands allow you to lookup specific MAC addresses and where they were learned, create and view static bridge addresses, view information on remote trunking stations, view MAC address statistics for a group or a port, or look up infor- mation on domain mappings.
  • Page 457 Field Descriptions The following section explains the fields displayed with the . The slot number ( ), interface (port) number ( ), type of service ( service instance ( ). For example, a bridge service on port 1 of slot 3 would be: Services provide connection options for switches in a LAN, between LANs, or in a WAN.
  • Page 458 Bridging Commands Configuring a Static Bridge Address You can configure static bridge address information by entering the bridge address is a fixed MAC address bridge that does not change or age out. To configure a static MAC address follow these steps: 1.
  • Page 459: Modifying A Static Bridge Address

    Field Descriptions The following section describes the fields in the A number assigned to the row to identify a previously created static bridge address, when modifying the address. The canonical MAC address for this static bridge. The slot number, interface (port) number, type of service, and service instance.
  • Page 460: Deleting A Static Bridge Address

    Bridging Commands 2. To modify an entry, use the index number for the specific static bridge address (listed in the leftmost column), the column letter for the column you want to change, an equal sign, and a new value. For example, to change the from number), a (the column letter for...
  • Page 461: Displaying Static Bridge Addresses

    Bridging Commands Displaying Static Bridge Addresses You can view static bridge address information by entering the command. To display the information, enter the command as follows: where is the number of the group for which you want to view static bridge MAC addresses.
  • Page 462: Displaying Bridge Port Statistics

    Bridging Commands Displaying Bridge Port Statistics You can display statistics on bridge ports with the tics enter the command as follows: where statistics. For example, to view statistics for Group 1, you would enter the following: This command will display a table similar to the following: As a variation on this command, you can enter This will display the port statistics for the currently selected group.
  • Page 463 Bridging Commands Field descriptions The following section describes the fields displayed in the above table. . The number of frames that were not transmitted because the forwarding database is full. The forwarding database holds all known MAC address for this bridge and is used to learn the next hop MAC address for the packet(s) in question.
  • Page 464: Address

    Bridging Commands Displaying Media Access Control (MAC) Information for a Specific MAC address Media Access Control (MAC) information for the switch can be examined by using the command. You can view specific MAC address information, or choose a slot and view all MAC addresses associated with the selected slot.
  • Page 465: Addresses

    Displaying Media Access Control (MAC) Information for all MAC addresses Media Access Control (MAC) information for the switch can be examined by using the command. You can view all MAC addresses associated with the selected slot. To view MAC information for all addresses: 1.
  • Page 466: Clear Statistics Of Bridge Mac Addresses

    Bridging Commands Field Descriptions The following section describes the fields displayed using the . The slot number of the switch to which the MAC address statistics apply. . The number of MAC addresses that have been discarded on this slot due to the CAM being full.
  • Page 467: View The Domain Bridge Mapping Table

    2. The following prompt is shown: Enter the slot and station (port) number for the local switch for which you wish to view remote trunking services. For example, to list the trunking station at port 1 of slot 3, you would enter: If you do not enter a specific slot and station, the system automatically sends information on all services for the remote trunking stations associated with this group.
  • Page 468 Bridging Commands 3. A screen similar to the following is shown: Field Descriptions The fields displayed by the The destination MAC address learned from a domain bridge port. The destination MAC’s group number. The time, in seconds, since the destination MAC address was last seen. The slot and interface number on this switch where the destination MAC address was learned.
  • Page 469: Setting Flood Limits

    Setting Flood Limits The flood limit is the number of bytes per second of flooded data that may be transmitted on a port on a group. This limit is a mechanism for controlling broadcast storms on the network. The default flood limit for a port, regardless of the media type, is 192,000 bytes per second. You can change this default by configuring the flood limit on a per port or a per Group basis.
  • Page 470: Displaying Group Flood Limits

    Setting Flood Limits Displaying Group Flood Limits command allows you to view the current flood limits set for groups. The limits are set using the command. To display flood limits for all Groups, enter where For example, to set the flood limit on Group 2 you would specify: A message similar to following is shown: A value will only be displayed for a Group on which As a variation of this command, you can enter...
  • Page 471: Configuring Spanning Tree

    Configuring Spanning Tree Spanning Tree is an algorithm developed to help prevent the occurrence of broadcast storms in a network. A packet can be broadcast multiple times in a network if the network is physi- cally configured with loops. If packets are broadcast to all ports (or flooded) in an attempt to deliver the data, networks with physical loops will rebroadcast packets repeatedly and cause a network to become severely congested.
  • Page 472 Configuring Spanning Tree • IBM SRT bridges send an IEEE-style STE RIF over Token Ring networks. The Omni Switch/Router does not support this frame, and any frame of this type received by the switch is discarded. • The OmniSwitch/Router does not support using the same Functional Address (FA) for both data and spanning tree frames.
  • Page 473 Configuring Spanning Tree Parameters command allows you to configure parameters for the spanning tree, and enable or disable the Fast Spanning Tree feature for a VLAN. To configure these parameters: 1. Enter the command as follows: where is the number of the group in the switch for which you are config- uring spanning tree.
  • Page 474 Configuring Spanning Tree 4. The following prompt is displayed asking whether you would like to use the Fast Spanning Tree feature: Enter to leave Fast Spanning Tree disabled, or . Answering Yes ( ) changes the setting of Fast Spanning Tree to the status not currently in use for this Group.
  • Page 475 8. The following prompt is displayed allowing you to set the Bridge Forward Delay: Enter the as a number between 4 and 30, or press the default listed in parenthesis. This time value controls how fast a port changes its spanning state when moving toward the Forwarding state.
  • Page 476: Configuring Spanning Tree Parameters

    Configuring Spanning Tree Display Spanning Tree Bridge Parameters command allows you to display spanning tree bridge parameters. To display spanning tree parameters, enter the where spanning tree bridge parameters. For example, to view parameters for Group 2, you would enter: A screen similar to the following is displayed: As a variation of this command, you can enter group.
  • Page 477 The bridge identifier of the root of the spanning tree as determined by the spanning tree protocol. It is created by concatenating the root bridge MAC address. The cost of the path to the root bridge as seen from this bridge. Cost represents the distance of the group from the root bridge, in number of hops.
  • Page 478 Configuring Spanning Tree Configuring Spanning Tree Port Parameters commands allows you to configure port parameters (as opposed to bridge parame- ters) for spanning tree. To configure port parameters 1. Enter the command as shown: where configure spanning tree port parameters. For example, to configure parameters for Group 1, you would enter: As a variation of this command, you can enter the group.
  • Page 479 Field Descriptions The following section explains the fields displayed by the Index A number assigned as an identifier for the port. Slot/Intf/Service/Inst The slot number ( ), interface (port) number ( instance ( ). For example, a bridge service on port 1 of slot 3 would be: Services provide connection options for switches in a LAN, between LANs, or in a WAN.
  • Page 480: Displaying Spanning Tree Port Parameters

    Configuring Spanning Tree Manual Mode Allows you to manually set the state for each port (forwarding or blocking) or defer the port’s state configuration to the spanning tree protocol, which will either be IEEE 802.1d or IBM. This column is especially helpful if you are using the IBM Spanning Tree protocol with non- Token Ring (e.g., FDDI or Ethernet) ports that do not support this IBM Spanning Tree.
  • Page 481 Field Descriptions The following section explains the fields displayed by the . The slot and interface (port) number of the port. . The service type and instance of the service connected to the port. The value (from 0 to 256) of the priority of the port, 0 being the highest priority. The port's current state as defined by application of the spanning tree protocol.
  • Page 482: Configuring Fast Spanning Tree

    Configuring Fast Spanning Tree Configuring Fast Spanning Tree The Fast Spanning Tree (Rapid Reconfiguration) feature is designed to help provide an 802.1D standards-based method of quick recovery in the event of link, port and device failures in an Ethernet local area network. By automatically identifying and utilizing alternative secondary links, Fast Spanning Tree can rapidly converge backup connections between network devices within as little as 1 second.
  • Page 483: Truncating Tree Timing & Speedy Tree Protocol

    Truncating Tree Timing & Speedy Tree Protocol Two additional enhancements are also included with the Fast Spanning Tree feature for improved performance: Truncating Tree Timing and Speedy Tree Protocol. Truncating Tree Timing Truncating Tree Timing allows Designated Ports attached to Point-to-Point links to change to Forwarding mode faster, by utilizing two extra bits in the Configuration communication between neighboring bridges.
  • Page 484: Displaying Fast Spanning Tree Port Parameters

    Configuring Fast Spanning Tree Displaying Fast Spanning Tree Port Parameters command allows you to view the current Fast Spanning Tree port parameters on a selected group or VLAN where Fast Spanning Tree port parameters. For example, to view parameters for Group 1, enter: If Fast Spanning Tree is not enabled (default), a screen similar to the following will appear: As a variation on this command, you can enter a group number.
  • Page 485 Configuring Fast Spanning Tree The port’s current role as defined by application of the fast spanning tree protocol. The values include: The port has been disabled. The Root Port on a Bridge has the best path to the Root Bridge, and connects the Bridge to the Root Bridge.
  • Page 486: Enabling Fast Spanning Tree Port Parameters

    Configuring Fast Spanning Tree Enabling Fast Spanning Tree Port Parameters command allows you to activate Fast Spanning Tree port parameters on a selected group or VLAN where Fast Spanning Tree port parameters. For example, to view parameters for Group 1, enter: If Fast Spanning Tree is not enabled (default), a screen similar to the following will appear: To enable the Fast Spanning Tree feature, enter at the prompt.
  • Page 487: Disabling Fast Spanning Tree Port Parameters

    Disabling Fast Spanning Tree Port Parameters command allows you to disable Fast Spanning Tree port parameters on a selected group or . To disable Fast Spanning Tree, enter the VLAN where is the number of the group in the switch for which you want to view Fast Spanning Tree port parameters.
  • Page 488: Configuring Source Routing

    Configuring Source Routing Configuring Source Routing commands allow you to display and configure the source routing parameters for the selected group. SAP Filtering The Service Advertising Protocol (SAP) filter is a method for allowing the user to decide what type of source routed packets are allowed to be transmitted out of the switch. When the filters are configured, they examine the DSAP (destination) and SSAP (source) fields in an outgoing packet, compare them to the filter values to see if they match, and then either allows or blocks packet transmission.
  • Page 489: Configuring Sap Filtering

    Disabling SAP filtering To disable the SAP feature, use the 1. Enter the at the system prompt. 2. The following message is displayed: Enter and press 3. The following message is displayed: Enter a to remove the configured filters, or an .
  • Page 490: Viewing Sap Filtering

    Configuring Source Routing 4. Press . The second deny filter prompt is displayed: Enter the SAP value that the first deny filter should screen. Any packet matching this filter will be rejected. Excepting the default of 5. Press . The first permit filter prompt is displayed: Enter the SAP value that the first permit filter should screen.
  • Page 491: Configuring Source Route To Transparent Bridging

    Configuring Source Route to Transparent Bridging In order to provide switching between source-routed token ring networks supporting the IBM Spanning Tree, and transparently bridged networks (primarily Ethernet supporting 802.1d Spanning Tree), commands have been provided in the bridging menu to enable Source Route to Transparent Bridging (SRTB) on a configured group basis.
  • Page 492: Enabling Srtb For A Group

    Configuring Source Route to Transparent Bridging Enabling SRTB for a Group command allows you to display configured groups and the status of SRTB (either ), and to enable or disable SRTB for a specific group. To display groups and the status of SRTB: 1.
  • Page 493: Disabling Srtb For A Group

    6. Once you have selected the frame type, you are returned to the menu prompt. By reenter- ing the command as you did in step 1, you can now see that SRTB has been acti- vated for group 1, as shown: The ring ID and default explorer frame are shown as well.
  • Page 494: Viewing The Rif Table

    Configuring Source Route to Transparent Bridging Viewing the RIF Table A Routing Information Field (RIF) is stored for each MAC address learned on a token ring port. One RIF is stored for each MAC address. The maximum size of each RIF is 32 bytes (long enough to traverse 15 bridge hops) Once a RIF is learned for a MAC address, it is maintained until the MAC address is aged out of the CAM.
  • Page 495: Clearing The Rif Table

    Clearing the RIF Table If there is a topology change in your network, you most likely will need to clear one or more RIFs from the table so that SRTB can relearn them. You can clear specific entries for MAC addresses in the RIF table, or flush the entire table with the entry in the RIF table: 1.
  • Page 496 Configuring Source Route to Transparent Bridging Page 17-48...
  • Page 497: Configuring Frame Translations

    Frame Translations Any-to-Any Switching Because the Omni Switch/Router is a LAN switch that carries frames from multiple media types on its backplane fabric, it offers the facility to switch frames from any media to any other media. For example, an Ethernet frame onto a Token Ring. This feature is referred to as Any to Any Switching.
  • Page 498 This material is also required if you are trying to deter- mine the applicability of any to any switching to a protocol not described in the reference material. In Release 4.4 and later, the Omni Switch/Router is factory-configured to boot up in Interface) mode, rather than in mode.
  • Page 499: Translating The Frame

    Translating the Frame Translating the Frame In order to discuss these issues independent of particular media and protocols, consider that every frame, of any protocol, on any media, consists of the following parts. The Essential Parts of Frame MAC Header Consists of a source and destination address specifying the transmitting station in the broad- cast domain and the intended recipient(s), as well as other media specific fields.
  • Page 500: The Mac Header

    The FDDI and 802.5 Token Ring media allow for the use of small 16 bit addresses or full 48 bit addresses. The Omni Switch/Router only supports 48 bit MAC address LANs thus abbrevi- ated address based protocols cannot be supported.
  • Page 501: The Rif Field

    Source Route Termination by Proxy Not Supported The Omni Switch/Router will not therefore allow RIF based frames onto Ethernet media unless RIF Stripping is enabled. Ethernet frames are allowed onto rings if they support transparent bridging, i.e. the port is configured as either Transparent or Source Route/Transparent.
  • Page 502: Encapsulation

    2. The switch performs a single transformation and the user must configure all end-stations and routers to use this single choice made by the switch. The Omni Switch/Router uses the first approach for IP and IPX as the dominant protocols in the market. It uses the second approach for all other protocols.
  • Page 503: The Snap Conversion

    Ethernet media to 802 media and restored to Ethertype in the reverse direction. The Omni Switch/Router could follow this rule for all protocols including IP; however, this would prevent AppleTalk interworking between Ethernet and FDDI. The Omni Switch/Router explicitly checks for the AppleTalk protocol.
  • Page 504: Ipx Encapsulation Transformation Rules

    Worse, multiple encapsulations can be found on a single media to create multiple logical networks over a single physical broadcast domain. The Omni Switch/Router therefore allows configuration of the encapsulation transformations of IPX frames. Before transmission of a frame occurs the switch determines first the current encapsulation of the frame.
  • Page 505: The Network Header

    The Network Header There are essentially two requirements for the any to any switching transformation function to address the network header fields: • Network Address to MAC Address Mapping In every protocol there is a mechanism for mapping global network wide addresses to the MAC addresses required in the local broadcast domain.
  • Page 506: Address Mapping In Ipx

    ARP table as is when sending to Token Ring ports. To achieve any to any switching with IP it is therefore necessary for the Omni Switch/Router to be sensitive to ARP frames and to bit swap the MAC addresses in the body of the ARP when switching a frame between Token Ring and FDDI or Ethernet.
  • Page 507: Frame Size Requirements

    IPX were found to be tolerant of this extra byte whereas Token Ring implementations would not work with it present. By adopting the single IPX stripping strat- egy of using the IPX header length these problems are avoided thus the Omni Switch/Router unconditionally strips all padding from IPX frames.
  • Page 508: Mtu Handling

    ICMP generation but just silently drops IP frames which can’t be fragmented. The IP router in the Omni Switch/Router does honor this protocol and support ICMP. It is only the any to any switching which doesn’t because it is not a router and may not even have an IP address with which to respond.
  • Page 509: Banyan Vines

    This proto- col uses Ethernet II frames on Ethernet, SNAP frames on FDDI, and IEEE 802.2 (LLC) frames on Token Ring. The Omni Switch/Router uses these frame formats when translating Banyan Vines frames.
  • Page 510: Configuring Encapsulation Options

    Configuring Encapsulation Options Configuring Encapsulation Options You will configure frame encapsulation based on the destination MAC address or the destina- tion switch port. Whether a frame is encapsulated based on the destination MAC or the port depends whether the frame has a unicast, multicast, or broadcast destination. Forwarding versus Flooding Such frames will be handled in two ways: •...
  • Page 511: Native" Versus "Non-Native" On Ethernet

    “Native” versus “Non-Native” on Ethernet For the Ethernet one further distinction is made. If the frame received from the backplane is an Ethernet media type frame from another Ethernet switching module in the same chassis, then no encapsulation translations are applied. Such frames are referred to as Native frames. If the frame is of an Ethernet media type but was put onto the backplane by some other type of switching module, for example, the frame came from a FDDI card via a trunk port, or from the MPX via routing, then encapsulation translations are applied.
  • Page 512: The User Interface

    This chapter documents User Interface ( For documentation on Command Line Interface ( options, see the Text-Based Configuration CLI Reference Guide. In Release 4.4 and later, the Omni Switch/Router is factory-configured to boot up in Interface) mode, rather than in mode.
  • Page 513: The Addvp, Modvp And Crgp Commands

    Ethertype for Ethernet ports and SNAP for FDDI and Token Ring ports. The translation of all other protocol types and encapsulations is fixed by the Omni Switch/Router. Thus AppleTalk is never translated and Ethertype/SNAP based protocols follow the IP option.
  • Page 514: Ethernet Factory Default Translations

    The User Interface Ethernet Factory Default Translations For Ethernet switching module ports the factory default is set to the following: No translation is performed on outbound Ethernet frames where the inbound interface was Ethernet. IP frames of any encapsulation are transmitted as Ethernet II frames.
  • Page 515: Token Ring Factory Default Translations

    Token Ring Factory Default Translations For Token Ring switching module ports the factory default is set to the following: Token Ring Media - Default Mode IP of any encapsulation is encapsulated SNAP IPX encapsulations are encapsulated SNAP except for IEEE 802.2 which is forwarded as is.
  • Page 516: The Ethertype Option

    The User Interface The Ethertype Option This option can only be applied to Ethernet switching module ports. It is set to the following: No translation is performed on outbound Ethernet frames where the inbound interface was Ethernet. IP frames are transmitted as Ethernet II frames. All IPX frames are transmitted as Ethernet II frames.
  • Page 517: The Snap Option

    The SNAP Option This option can be applied to all media type ports and is set to the following: Ethernet Media - SNAP Mode No translation is performed on outbound Ethernet frames where the inbound interface was Ethernet. IP frames are transmitted as SNAP frames. All IPX frames are transmitted as SNAP frames.
  • Page 518 The User Interface ATM LANE - SNAP Mode All IPX frames are translated to SNAP unless they are already SNAP, in which case they are forwarded as is. All Ethertype or SNAP frames from Ethernet and SNAP frames from Token Ring or FDDI are translated to SNAP or left as SNAP. The exception is Banyan Vines frames from FDDI, which are translated to Ethertype.
  • Page 519: The Llc Option

    The LLC Option This option can be applied to all media type ports and is set to the following: No translation is performed on outbound Ethernet frames where the inbound interface was Ethernet. IP frames are transmitted as Ethernet II frames. All IPX frames are transmitted as IEEE 802.2 (LLC) frames.
  • Page 520: Interaction With The New Interface

    The User Interface IPX frames are translated to 802.2 LLC. All other SNAP frames from FDDI, Token Ring, and Ethernet SNAP are translated to Ethertype. However, Appletalk ARP SNAP frames from Token Ring and FDDI are left as SNAP; Banyan Vines frames from FDDI are trans- lated to Ethertype.
  • Page 521: The Switch Menu

    The Switch Menu The switch menu contains commands that allow you to set translation options discussed earlier in this chapter. It also contains commands to change the default values. To view the switch menu, enter ing screen is displayed. Otherwise, type a Menu: The commands above and their operations are described in the sections below.
  • Page 522: Default Ethernet Translations

    The Switch Menu Default Ethernet Translations allows you to set up default translations for all Ethernet ports. To do so: 1. Enter at the system prompt. The following screen displays: 2. Press at the defaults. The current settings for Ethernet ports are displayed, in a screen similar to the following: There are six frame types for which you can set translation options.
  • Page 523: Default Fddi Translations

    Default FDDI Translations command allows you to set up default translations for all FDDI ports. To do this: 1. Enter the command at the system prompt. The following screen displays: 2. Press at the defaults. The current settings for FDDI ports are displayed, in a screen similar to the following: There are six frame types for which you can set translation options.
  • Page 524: Default Token Ring Translations

    The Switch Menu The IP Translation Options allow only SNAP ( ). The IPX translations allow SNAP ( ), and LLC ( ) for all frame types. The Ethertype ( ) translation is not allowed for FDDI. The Ethernet 802.3 translation ( ) is allowed only on incoming Ethernet 802.3 frames, which referred to as “FDDI raw.”...
  • Page 525 3. You change an outgoing frame type by entering its line number, an equal sign (=) and a frame type indicator ( , , , or ). The frame type indicators represent the following frames: Ethernet II or Ethertype SNAP 802.2 or LLC Ethernet 802.3 For example, if you wanted to translate incoming IPX SNAP frames to LLC frame, then...
  • Page 526: Port Translations

    The Switch Menu Port Translations command allows you configure translations on a port-by-port basis. Its translation options are similar to those for tions to all ports for a particular media type, specify. To specify translation for a single port: 1. Start the command by entering it at the prompt as shown: where is the board on which the port is located and...
  • Page 527: Displaying Ethernet Switch Statistics

    5. When are done changing translations, enter , you will exit the Please note that valid translation options depend on the media type of the port. Ethernet ports allow all frame translation options, but FDDI and Token Ring ports have limitations. See Default FDDI Translations on page 18-27 and Default Token Ring Translations on page 18-28 for more information on media limitations.
  • Page 528 The Switch Menu If the port selected is an Ethernet based port, something like the following would be displayed: The fields displayed by the option of the The first group of statistics are the numbers of bytes transmitted and received. These are useful in working out bandwidth usage by the port.
  • Page 529 . The number of frames transmitted on this port whose destination address is the broadcast address. Note that these statistics merely indicate the format of the destination address of frames trans- mitted/received on this port, not that the addressed device and/or devices necessarily reside on that port.
  • Page 530 . The Omni Switch/Router restricts traffic above the normal Level 2 filtering by applying VLAN rules. Frames which are dropped because of VLAN rules are counted here.
  • Page 531: Displaying Token Ring Switch Statistics

    Displaying Token Ring Switch Statistics In Release 3.4 and later, you can display statistics for the new generation of Token Ring modules known as “Bigfoot” (e.g., TSM-CD-16W, TSX-CD-16W, and TSX-C-32W). For exam- ple, if you want to display the switch statistics for a Token Ring port on Port 1 on Slot 4, enter: at the system prompt.
  • Page 532 The Switch Menu . The total number of bytes received in bad LLC packets. The next group of statistics are the types of packets being transmitted and received. . The number of packets received on this port whose destination address is a unicast format.
  • Page 533 the normal ring state or ring purge state to elect a new active monitor. . The total number of claim packets transmitted by this port. The next group describe error statistics for token, MAC, and LLC packets. . The total number of times this port detects a recoverable internal error. .
  • Page 534 The Switch Menu least 256 bytes (octets) long and less than or equal to 511 bytes long. least 512 bytes (octets) long and less than or equal to 1023 bytes long. least 1024 bytes (octets) long and less than or equal to 2047 bytes long. least 2048 bytes (octets) long and less than or equal to 4095 bytes long.
  • Page 535: Any To Any Mac Translations

    Any to Any MAC Translations command allows you to view the current frame translation settings for a given MAC address. Follow these steps: 1. Enter and the following prompt displays: 2. Enter the MAC for which you want to view translations. The following prompt displays: 3.
  • Page 536: Default Autoencapsulation

    The Switch Menu Default Autoencapsulation Autoencapsulation is a technique employed by AutoTracker software to learn the protocol and encapsulation type used by a source MAC address and automatically translate frames bound to that MAC address to the appropriate encapsulation type. Normally all devices attached to a switch port receive frames translated according to the trans- lation options defined for that port.
  • Page 537: Translational Bridging

    VLAN associated with the frame’s destination, the frame is dropped. Translations across Trunks The Omni Switch/Router sends frames onto the trunk in the same format as the original LAN type. Any required translation is done at the destination switch.
  • Page 538: Dissimilar Lan Switching Capabilities

    Media Specific fields and MAC address fields are different for Token Ring, FDDI, and Ether- net. For Token Ring and FDDI, the switch generates MAC addresses in non-canonical format, where Ethernet generates MAC addresses in canonical format. The Omni Switch/Router will perform media translations which means the media specific, source MAC and destination MAC will be changed for each frame which changes media.
  • Page 539: Switching Between Ethernet Lans Across A Trunked Backbone

    Frames that are switched between like media across a Trunked backbone will only be trans- lated at the egress port of the egress Omni Switch/Router. For example in the figure below, frames switched from Station A to Station B will be translated at point 4, where point 4 is the egress port of Switch 2.
  • Page 540: Switching Between Similar Lans Across A Native Backbone

    Dissimilar LAN Switching Capabilities Switching Between Similar LANs across a Native Backbone Switched traffic between similar LANs across a non-trunked or native backbone will have translations performed at each egress point. In the figure below, for traffic originating from Station A destined to Station B, point 1 represents the ingress (input) port of Switch 1. Like- wise, point 2 represents the egress (output) port of Switch 1, point 3 represents the ingress (input) port of Switch 2 and the point 4 represents the egress (output) port of Switch 2.
  • Page 541 The following table shows interoperability between dissimilar LANs with two switches where the client and server are resident on like media types and the connection is switched over various LAN backbone types. This table is representative of the IP and IPX protocol only. Token Ring to Token Ring FDDI to FDDI...
  • Page 542 Dissimilar LAN Switching Capabilities Page 18-46...
  • Page 543: Managing Groups And Ports

    Ethernet and physical ports. An unconfigured Omni Switch/Router contains one Group, or broadcast domain. It also contains one default Virtual Network, or Group, Group #1, and its default VLAN contain all physical ports in the switch. When a...
  • Page 544: How Ports Are Assigned To Groups

    How Ports Are Assigned to Groups How Ports Are Assigned to Groups There are two methods for assigning physical OmniS/R ports to a Group. One method is static and requires manual configuration by the network administrator; the other method is dynamic and requires only the configuration of AutoTracker rules for port assignment to occur.
  • Page 545: How Dynamic Port Assignment Works

    How Dynamic Port Assignment Works Initially each port is assigned to the default Group. In this example, all three ports have work- stations that belong to three different ports start out in the default Group. Group Mobility examines traffic coming from OmniS/R ports. Three mobile groups are defined on the switch and each uses a different IP policy.
  • Page 546 How Ports Are Assigned to Groups As the illustration below shows, the three ports are each moved from the default Group to a Group with a policy that matches the subnet address of the workstation attached to the port. AutoTracker IP address policies have been set up in Groups 2, 3, and 4. The ports are moved to the Group with policies matching the subnet of the workstation.
  • Page 547: Mobile Groups

    Mobile Groups Switch ports can be dynamically assigned to mobile groups through AutoTracker policies. Support for dynamic port assignment is one of the main differences between mobile groups and non-mobile groups. AutoTracker rules are assigned directly to a mobile group. In contrast, AutoTracker rules are assigned to the VLANs within a non-mobile group.
  • Page 548: Turning Group Mobility On Or Off

    Mobile Groups Turning Group Mobility On or Off command turns group mobility on or off for a Group that you specify. Essentially, you can change a non-mobile group into a mobile group and a mobile group back into a non-mobile group through through the command.
  • Page 549: Understanding Port Membership In Mobile Groups

    If you decided not to turn group mobility on, you would enter and the following message would display: Understanding Port Membership in Mobile Groups Switch ports can belong to multiple mobile groups. A port becomes a member of a mobile group as long as one of its attached devices matches the policy criteria for that group.
  • Page 550 Mobile Groups Secondary Group Switch ports and devices may become members of multiple mobile groups. A switch port starts in its default group, which initially is also its primary group. The primary group may change if the move_from_def variable is enabled. Any subsequent mobile groups to which a port gains membership beyond the primary group are “secondary”...
  • Page 551: How A Device Is Dropped From The Default Mobile Group (Def_Group)

    How a Device Is Dropped from the Default Mobile Group (def_group) Default Group 1 If def_group is enabled... Default Group 1 Group 3 The device that does not match any policies becomes a member of the default group. Why enable def_group? •...
  • Page 552: How A Port's Primary Mobile Group Changes (Move_From_Def)

    Mobile Groups How a Port’s Primary Mobile Group Changes (move_from_def) If move_from_def is enabled... Default Group 1 Primary Group 3 Device on port matches poli- cy in another mobile group (3). Group 3 becomes prima- ry group. Helpful Hints: • Reduces broadcasts to the default group. •...
  • Page 553: How A Port Ages Out Of A Mobile Group (Move_To_Def)

    How a Port Ages Out of a Mobile Group (move_to_def) Default Mobile Group Port assigned to default group. If move_to_def is enabled... Default Primary Mobile Group Group 2 Secondary Group 3 Port will be removed from other groups when attached devices age out of filtering database.
  • Page 554 Mobile Groups Configuring Switch-Wide Group Mobility Variables There are several switch-wide group mobility variables that you can configure through the command. These variables control the status of group mobility on all groups in a switch as well as the use of the default group. These variables are illustrated through diagrams on pages 19-9 to 19-11.
  • Page 555 Mobile Groups By default the def_group variable is Enabled. If you want to disable it (devices that do not meet criteria for mobile group membership will not be part of any mobile group), then you need to indicate that choice at this prompt. The prompt will always show the current status of def_group and then ask if you want to change that status.
  • Page 556: Viewing Ports In A Mobile Group

    Mobile Groups Viewing Ports in a Mobile Group command lists all the Groups in the switch currently configured as mobile Groups and the ports currently assigned to those Groups. Since ports are assigned to mobile groups dynamically, this display is helpful to find out which ports the switch already sees in each group.
  • Page 557: Non-Mobile Groups And Autotracker Vlans

    Non-Mobile Groups and AutoTracker VLANs Non-mobile Groups are comprised of physical entities—switch ports. Groups can span multi- ple switches, but they are still made up of physical ports that you can see and touch. But just as physically-based broadcast domains are limited, entirely port-based Groups can also be limiting.
  • Page 558: Spanning Tree And Non-Mobile Groups

    Non-Mobile Groups and AutoTracker VLANs Spanning Tree and Non-Mobile Groups Each Group uses one Spanning Tree for bridging. The OmniS/R supports both 802.1d and Spanning Tree protocols. The Spanning Tree state for the port is Forwarding. Ports that are in Blocked state, or in another non-Forwarding state, will not receive frames from the router port.
  • Page 559: Group And Port Software Commands

    Group and Port Software Commands Group and Port Software Commands Group and Virtual Port commands are part of the menu within the User Interface. Enter- VLAN at any prompt displays the following menu: menu commands are divided into four sets of commands. The first set, at the top of VLAN the menu beginning with , contains commands that create, modify, delete, and view...
  • Page 560: Creating A New Group

    Creating a New Group Creating a New Group There are several steps involved in creating a new Group. Note that some steps apply only to mobile groups. These steps are as follows: 1. Enter Basic Group Information, such as the Group number and type. This section starts on page 19-19.
  • Page 561: Step 1. Entering Basic Group Information

    Step 1. Entering Basic Group Information a. Type at any prompt. b. The following prompt displays: By default the Group number you entered or the next available Group number is displayed in parentheses. Enter the Group number or accept the number shown in paren- theses.
  • Page 562 Creating a New Group f. The following prompt displays: must be enabled if this group is going to be used for Multi-Protocol Label Switching (MPLS) machines in the network that communicate via MPLS. Answer at this prompt and skip ahead to Step 2. Configuring the Virtual Router Port (Optional) on page 19-21. o Note o MPLS is not supported in Release 4.5 and later.
  • Page 563 Step 2. Configuring the Virtual Router Port (Optional) You can now optionally configure the virtual router port that the default will use to communicate with other port for the default VLAN in the Group is created. If you do not define a virtual router, no virtual router port is created and the default unable to communicate with other Use caution when setting up routing on the default...
  • Page 564 Creating a New Group e. The following prompt displays: Enter a useful description for this virtual IP router port using alphanumeric characters. The description may be up to 30 characters long. Press f. The following prompt displays: Indicate whether you want to disable routing in the group. You can enable routing later through the g.
  • Page 565 Select the default framing type for the frames that will be generated by this router port and propagated over the default encapsulation type that is most prevalent in the default devices using encapsulation types other than those defined here, the switching modules must translate those frames, which slows throughput.
  • Page 566 Creating a New Group k. After selecting to enable Enter the network address. a minimum of one hex digit in this field. If you enter less than eight hex digits, the system prefixes your entry with zeros to create eight digits. The following prompt displays: Enter a useful description for this virtual The description may be up to 30 characters long.
  • Page 567 o. After selecting the router framing type options: Select the default framing type for the frames that will be generated by this router port and propagated over the default encapsulation type that is most prevalent in the default devices using encapsulation types other than those defined here, the switching modules must translate those frames, which slows throughput.
  • Page 568 Creating a New Group q. The following prompt displays: Prioritizing VLANs allows to you set a value for traffic based on the destination VLAN of packets. Traffic with the higher priority destination will be delivered first. VLAN priority can be set from 0 to 7, with 7 being the level with the most priority. Modifying and displaying a group’s priority is described in Priority VLANs on page 19-73.
  • Page 569: Step 3. Set Up Group Mobility And User Authentication

    Step 3. Set Up Group Mobility and User Authentication A mobile group offers more flexibility than a non-mobile group. With a mobile group, ports are assigned dynamically to the group based on AutoTracker policies that you configure. In a non-mobile group, ports are statically defined and AutoTracker policies are assigned to indi- vidual VLANs within the Group.
  • Page 570 Creating a New Group Step 4. Configuring Virtual Ports You can now enter configuration parameters for each switch port to be included in this Group. These configuration parameters include the bridging mode, output format type, and administrative state. In addition, if the port you are configuring is Ethernet (10/100 Mbps), you can also configure port mirroring.
  • Page 571 Creating a New Group d. The virtual port configuration menu displays: Descriptions for each of the fields in this display follow. To change any default value, enter the line number for item, an equal sign (=), and then the value for the parameter. Enter to save all configured settings and move onto the next step in the group creation process.
  • Page 572 Creating a New Group . The default setting for all Ethernet ports. This mode is appropriate for dedi- cated connections requiring a switch-over to bridge mode when multiple devices are detected. A port in Auto-Switch mode will start in Optimized Device Switching mode (see description above).
  • Page 573 4) Flood Limit The flood limit allows you to tune a virtual port to limit the flooding of broadcast, multi- cast, and unknown destination packets. This feature is useful for controlling broadcast storms on your network. While each network is different, in general the amount of flooded traffic represents a relatively small percentage of network traffic.
  • Page 574 Creating a New Group The Output Format Type you set for each port deter- mines the type of frames that devices attached to that port receive. Note that for Ethernet, the default output format option is Ethernet II for IP frames and 802.3 for IPX frames.
  • Page 575 Creating a New Group 7) Admin, Operational Status Select whether to administratively enable or disable this port. When you enable the port, the port can transmit and receive data as long as a cable is connected and no physical or operational problems exist.
  • Page 576: Configuring Mobile Groups

    Creating a New Group Step 5. Configuring AutoTracker Policies (Mobile Groups Only) When you have completed configuring mobile group and auto-activated LANE services, you can begin configuring AutoTracker policies for this mobile group. Instructions for configuring these rules can be found in Chapter 20, “Configuring Group and VLAN Policies.” Please refer to that chapter for instructions on configuring each policy type.
  • Page 577: Creating A Wan Routing Group

    Creating a WAN Routing Group After entering basic Group information as described in Step 1. Entering Basic Group Informa- tion on page 19-19, you should have answered Yes to the following prompt: if you want to enable Routing. Groups, as described earlier. The following steps complete the configuration of the Routing Group.
  • Page 578 Creating a WAN Routing Group f. The following prompt displays: Define the mode in which the virtual router port will operate. Protocol) is a network-layer protocol that enables the default and advertise routes. The . The default setting shown in parentheses. mation from other routing information concerning the default in their routing tables.
  • Page 579 Creating a WAN Routing Group k. After entering a description, the following prompt displays: Select how you want the protocols, (router internet protocol) and (service access protocol), to be configured for the default in this Group. is a network- VLAN layer protocol that enables this to learn routes.
  • Page 580: Viewing Current Groups

    Viewing Current Groups Viewing Current Groups command provides information on all currently defined Groups in a switch including Group number, network address, protocol type, and encapsulation type. You can obtain information on all groups in a switch by entering: A screen similar to the following displays: You can also get information on a specific Group by entering number.
  • Page 581 A second address is displayed below the Network address. For IP, this address is the IP Subnet Mask, which is normally derived from the default address is the Node Address. . For each Group or VLAN virtual router port. Possible values in the field are: (Classical Group with router).
  • Page 582: Modifying A Group Or Vlan

    Modifying a Group or VLAN Modifying a Group or VLAN After creating a Group (through can change any of their parameters through the set up a virtual router port ( set one up with . To use this command, enter number to change.
  • Page 583: Viewing Your Changes

    Viewing Your Changes When you enter a change at the colon prompt, the you want to see the current Group or question mark ( ) at the colon prompt. The Saving Your Changes Once you have entered all your modifications and you want to save them, type colon prompt.
  • Page 584: Enabling Ip Or Ipx Routing

    Modifying a Group or VLAN Enabling IP or IPX Routing If you enable screen automatically refreshes with additional lines for the new router port parameters. All lines are set to router defaults. The router defaults are as follows: IP Router IP Network Address IP Subnet Mask IP Broadcast Address...
  • Page 585: Deleting A Group

    Deleting a Group You can delete a Group as long as it does not contain any virtual ports. The default Group, Group #1, cannot be deleted. To delete a Group, enter you want to delete. For example, if you wanted to delete Group 5, you would enter: If the Group does not contain any virtual ports, then a confirmation message displays: If the Group still contains virtual ports, then a message similar to the following displays: You must first remove the Group’s virtual ports before the Group can be removed.
  • Page 586: Adding Virtual Ports

    Adding Virtual Ports Adding Virtual Ports You can add virtual ports to a Group at any time after the Group is created. The command allows you to add one or more ports to a Group you specify. If you have used the command to add virtual ports, then you will find the iar.
  • Page 587: Modifying A Virtual Port

    Modifying a Virtual Port You can modify a virtual port through the similar to the command and the port configuration phase of the , enter the command, followed by the Group number for the port, and the physical slot and port number for the port: You can specify only one port at a time.
  • Page 588: Deleting A Virtual Port

    Deleting a Virtual Port Deleting a Virtual Port You can delete a virtual port from its existing Group by using the remove a virtual port, the port is moved to the default switch Group, Group #1, and all port parameters are reset to defaults except for the port name. For example, if you configured a port with a special flood limit and customized translation settings and you then removed the port, you would lose those port settings.
  • Page 589: Viewing Information On Ports In A Group

    Viewing Information on Ports in a Group Viewing Information on Ports in a Group command allows you to view port attachments associated with a specified Group or all Groups in a switch. Entering displays summary information for all virtual ports in the switch. You can also display virtual interface attachments for a specific Group by specifying the Group ID after the command.
  • Page 590 Viewing Information on Ports in a Group • Virtual router port • Virtual bridge port • Virtual trunk port (used for • 802.10 FDDI • Frame Relay trunk port • LAN Emulation service port • Classical IP service port • Clusters ( VLAN .
  • Page 591 Viewing Information on Ports in a Group . Indicates whether the port is administratively . When the port can transmit and receive data as long as a cable is connected and no physical or operational problems exist. When , the port will not transmit or receive data even if a cable is connected and the physical connection is operational.
  • Page 592: Viewing Detailed Information On Ports

    Viewing Detailed Information on Ports Viewing Detailed Information on Ports command displays detailed information about virtual ports. Entering displays information for all virtual ports in the switch. You can also display information for only ports in a specific Group by specifying the Group ID after the ple, to view information only for ports in Group 6, you would enter The same type of information is displayed for a single Group as is displayed for all Groups.
  • Page 593 The Instance ( ) is an identifier of this type of service within the switch. For example, if more than one virtual router port is configured in the switch, then each “instance” of a router will be given a different number. The service number ( more than one service configured on it, then each service will be identified by a different service number.
  • Page 594 Viewing Detailed Information on Ports . Indicates the current Operational Status of the port. The port will be Active ( Inactive ( ). If the port is Active, then the port can pass data and has a good physical connection. If it is Inactive, then it may not have a good physical connection and it is not capable of passing data at this time.
  • Page 595: Viewing Port Statistics

    Viewing Port Statistics Viewing Port Statistics command displays transmit and receive statistics for ports in the switch. Entering displays statistics for all virtual ports in the switch. You can also display statistics for only ports in a specific Group by specifying the Group ID after the command.
  • Page 596 Viewing Port Statistics Service Type values are as follows: • Virtual router port • Virtual bridge port • Virtual trunk port (used for • 802.10 FDDI • Frame Relay trunk port • Emulation service port • clusters ( VLAN • Classical IP service port The Instance ( ) is an identifier of this type of service within the switch.
  • Page 597: Viewing Port Errors

    Viewing Port Errors command displays port error statistics for ports in the switch. Entering displays error statistics for all virtual ports in the switch. You can also display errors statistics for only ports in a specific Group by specifying the Group ID after the example, to view errors only for ports in Group 6, you would enter You can also display error statistics for a specific port by entering the slot and port number after the...
  • Page 598 Viewing Port Errors The Instance ( ) is an identifier of this type of service within the switch. For example, if more than one virtual router port is configured in the switch, then each “instance” of a router will be given a different number. .
  • Page 599: Port Mirroring

    Port mirroring is supported on Omni Switch/Router chassis for Ethernet (10 or 10/100 Mbps) ports only. An Ethernet port can only be mirrored by one other Ethernet port. A mirroring port can only mirror one port at a time.
  • Page 600: Using Port Mirroring With External Rmon Probes

    Port Mirroring where is the slot number of the module containing the mirrored port, and port number of the mirrored port. For example, if the Admin Status of a port displayed as then you would know this port is mirroring traffic for Port 2 on the module in Slot 3. If a cable is not attached to the Mirrored port, port mirroring will not take place.
  • Page 601 — RMON probe frames from the Mirroring Port appear to come from the Mirrored Port when the NMS workstation receives them. Workstation ˜ Management frames from the NMS workstation are sent to the Mirrored Port. Workstation Port Mirroring Using an External RMON Probe The Mirroring Port is not accessible from the NMS device.
  • Page 602: Setting Up Port Mirroring

    Port Mirroring Setting Up Port Mirroring You set up port mirroring when you add or modify a port through the commands. The switch software senses the type of port you are configuring, so it will only prompt you for port mirroring when configuring an Ethernet port. Follow the steps below to set up port mirroring.
  • Page 603: Port Monitoring

    Port Monitoring An essential tool of the network engineer is a network packet capture device. A packet capture device is usually a PC-based computer, such as the Sniffer understanding and measuring data traffic of a network. Understanding data flow in a based switch presents unique challenges primarily because traffic takes place inside the switch, especially on dedicated devices.
  • Page 604: Ram Disk System For Data Capture Files

    Port Monitoring RAM Disk System for Data Capture Files Port monitoring uses a has a separate directory designation of and they are displayed in You can copy files between the tion, files in the disk system are retrievable via file system are accessible by using the off or reboot the switch, any files saved in the drive will be lost.
  • Page 605: Starting A Port Monitoring Session (Pmon)

    Starting a Port Monitoring Session (pmon) You enable a port monitoring session through the followed by the slot and port number that you want to monitor. For example, to moni- tor a port that is the first port in the fourth slot of the switch, you would enter You can only monitor Ethernet 10BaseT ports.
  • Page 606: If You Chose Dump To Screen

    Port Monitoring If You Chose Dump to Screen If you selected the your terminal screen. The following shows an example of this data Each line in the display represents a packet. The destination MAC address, source MAC address, protocol type and actual packet data are shown. The amount of data shown is configured through the packet.
  • Page 607: Ending A Port Monitoring Session

    Ending a Port Monitoring Session After you quit a port monitoring session, the default directory changes to files on the drive are listed. The screen below shows an example of the display at the completion of a monitoring session. Viewing Port Monitoring Statistics (pmstat) command displays the statistics gathered for the current or most recent port moni- toring session.
  • Page 608: Port Mapping

    Port Mapping Port Mapping The OmniS/R began as an any-to-any switching device, connecting different such as Ethernet As networks grew and the traffic on them increased, a need arose for controlling some traffic, such as broadcasts. Virtual segment traffic such that devices could only engage in switched communication with other devices in the same VLAN Some applications today require a further degree of traffic segmentation than that provided by...
  • Page 609: The Details Of Port Mapping

    Port communication is uni-directional. A mapping between an ingress port and an egress port can only pass data from the ingress port to the egress port. To allow traffic to flow the from the egress port to the ingress port, it is necessary to create a new mapping. This configuration restricts each port to communication only with the other four ports in the opposite port mapping subset within the same group.
  • Page 610: Who Can Talk To Whom?

    Port Mapping Who Can Talk to Whom? The following matrix outlines which ports can communicate with each other in the example shown on the previous page assuming all ports are part of the same group or VLAN. A port can only communicate with ports in the opposite subset within the port mapping set. *Read table from right (ingress ports) to left only.
  • Page 611: Creating A Port Mapping Set

    Creating a Port Mapping Set Use the command to create a port mapping set. Follow these steps: 1. Enter at a system prompt. 2. The following screen displays: Enter the ingress ports and egress ports for this map set. This is done by entering the line number, an equal sign, and the port (or ports) to be added.
  • Page 612: Adding Ports To A Port Mapping Set

    Port Mapping Adding Ports to a Port Mapping Set You can add ports to a port map set once it has been created using the Follow these steps: 1. Enter the where is the map set number shown when the map set was created. (To view a list of all existing map sets, see Viewing a Port Mapping Set on page 19-72.) For example, to modify map set 5, you would enter the following: 2.
  • Page 613: Removing Ports From A Port Mapping Set

    Removing Ports from a Port Mapping Set You can remove ports to a port map set once it has been created using the command. Follow these steps: 1. Enter the command at a system prompt, as shown: where is the map set number shown when the map set was created. (To view a list of all existing map sets, see Viewing a Port Mapping Set on page 19-72.) For example, to modify map set 5, you would enter the following: 2.
  • Page 614: Viewing A Port Mapping Set

    Port Mapping Viewing a Port Mapping Set You can view a port mapping set using the shown: where is the map set number shown when the map set was created. For example, to modify map set 5, you would enter the following: The following screen is shown: As a variation of this command, enter the This will display all port mapping sets configured for this switch.
  • Page 615: Priority Vlans

    Priority VLANs Prioritizing VLANs allows you to set a value for traffic based on the destination VLAN of pack- ets. Traffic with the higher priority destination will be delivered first. VLAN priority can be set from 0 to 7, with 7 being the level with the most priority. The following diagram illustrates this idea: Client 1 1 2 3 4 5 6 7 8...
  • Page 616: Viewing Vlan Priority

    Priority VLANs Configuring VLAN Priority To configure the priority of a VLAN: 1. Enter the where is the group number associated with the VLAN whose priority is being set. For example, to modify the priority of the VLAN for Group 2, you would enter the following: The following prompt is shown: 2.
  • Page 617 Configuring Group and VLAN AutoTracker policies subdivide network traffic based on specific criteria. AutoTracker policies can be defined by port, port, or address policy. You can define multiple policies—also referred to as DHCP DHCP MAC “rules”—for a mobile Group or an AutoTracker Group or AutoTracker VLAN define rules based on...
  • Page 618: Autotracker Policy Types

    AutoTracker Policy Types AutoTracker Policy Types You can define a maximum of 32 AutoTracker policies of each type per Group. There is no restriction on the number of rules you can define per AutoTracker mum number of policies for the Group is not exceeded. A port or device is included in a mobile group or AutoTracker You can define the following types of rules: .
  • Page 619 AutoTracker Policy Types You must specify a separate binding policy for each device, but you can specify an unlimited number of such policies. Binding policies take precedence over all other AutoTracker poli- cies. . These policies are similar to standard port policies, but apply to switch ports to which DHCP client workstations are attached.
  • Page 620: Defining And Configuring Autotracker Policies

    Defining and Configuring AutoTracker Policies Defining and Configuring AutoTracker Policies You can define AutoTracker policies by port, definition, or port binding. You can define multiple policies for a mobile group or AutoTracker if you wish. A port or device is included in a mobile group or AutoTracker VLAN if it matches any one rule.
  • Page 621 Defining a Port Policy After you enter the Administrative Status, the following menu displays: 1. Press . If this is a VLAN in a non-mobile Group refer to Chapter 19 for a detailed explanation of the two ways port policies may be configured. As of the current release, the MAC Address Range Rule and DHCP MAC Range are not supported.
  • Page 622 Defining and Configuring AutoTracker Policies Defining a MAC Address Policy After you enter the Administrative Status, the following menu displays: 1. Enter and press 2. The following prompt displays: Indicate whether or not you want to enable the Administrative Status for this rule. Type to enable or to disable.
  • Page 623 Defining a MAC Address Range Policy After you enter the Administrative Status, the following menu displays: 1. Enter and press 2. The following prompt displays: Indicate whether or not you want to enable the Administrative Status for this rule. Type to enable or to disable.
  • Page 624 Defining and Configuring AutoTracker Policies Defining a Protocol Policy After you enter the Administrative Status for this mobile group or AutoTracker following menu displays: 1. Press and press 2. The following prompt displays: Indicate whether or not you want to enable this rule. Type you enable the rule, the mobile group or AutoTracker membership of devices.
  • Page 625 If you want to define a protocol other than by specifying an Ethernet type, or by specifying source and destination access protocol) header values, or by specifying a type. The following three sections describe how to specify these protocol types. If you are not specifying one of these special protocol types, continue with Step 4 below.
  • Page 626 Defining and Configuring AutoTracker Policies Protocol Specified by Ether-Type a. To specify a protocol by Ethernet type, enter at the ing prompt displays: b. Enter the desired Ethernet type in hex. You must enter two bytes of data. For exam- ple, enter 0800 to specify specified Ethernet type will be members of the mobile group or AutoTracker c.
  • Page 627 Defining a Network Address Policy After you enter the Administrative Status for this mobile group or AutoTracker following menu displays: 1. Press and press 2. The following prompt displays: Indicate whether or not you want to enable the Administrative Status for this rule. Type to enable or to disable.
  • Page 628 Defining and Configuring AutoTracker Policies Set Up an IPX Address a. To specify an b. The following prompt displays: Enter an network number to define the network devices you want included in the mobile group or AutoTracker can enter a minimum of one hex digit in this field. If you enter less than eight hex digits, the system prefixes your entry with zeros to create eight digits.
  • Page 629 Defining Your Own Rules A user-defined rule enables you to include all devices in the mobile group or AutoTracker that originate frames containing a specified pattern at a specified location. Each user- VLAN defined rule requires an Offset, a Value, and a Mask; you will be prompted for each of these values.
  • Page 630 Defining and Configuring AutoTracker Policies For example, if you enter When a bit in the mask is set to 1, the corresponding bit of the value must be literal. When a bit in the mask is set to 0, the corresponding bit in the value is ignored and can be either a 0 or a 1.
  • Page 631 Defining a Port Binding Policy Port binding polices require devices to match two or three criteria. The criteria can be one of six combinations: 1. The device can attach to a specific switch port and use a specific MAC address and use a specific protocol (IP or IPX).
  • Page 632 Defining and Configuring AutoTracker Policies After you indicate you want to set up rules for this mobile Group or AutoTracker , the following menu displays: command) 1. Enter a 6 and press 2. The following prompt displays: Indicate whether or not you want to enable the Administrative Status for this rule. Type to enable or to disable.
  • Page 633 4. The following prompt displays: Enter the switch port to which this device must be attached. If the device is not attached to this port, it will not be included in this mobile Group or AutoTracker first enter the slot for the module, then a slash ( ), then the port number. If you selected binding policy 1 or 5, then continue with step 5.
  • Page 634 Defining and Configuring AutoTracker Policies If you want to define a protocol other than , AppleTalk, or et, you can do so DECN by specifying an Ethernet type, or by specifying source and destination (service access protocol) header values, or by specifying a (sub-network access protocol) SNAP type.
  • Page 635 Protocol Specified by Ether-Type a. To specify a protocol by Ethernet type, enter at the ing prompt displays: b. Enter the desired Ethernet type in hex. You must enter two bytes of data. For exam- ple, enter 0800 to specify specified Ethernet type will be members of the mobile group or AutoTracker c.
  • Page 636 Defining and Configuring AutoTracker Policies Defining a DHCP Port Policy DHCP port polices simplify network configurations requiring DHCP clients and servers to be in the same mobile group or AutoTracker VLAN. You can see how DHCP port policies were used in an application example on page 20-27. DHCP port policies differ fundamentally from standard port policies.
  • Page 637 Defining a DHCP MAC Address Policy You can see how DHCP MAC address policies were used in an application example on page 20-27. After you enter the Administrative Status for this mobile group or AutoTracker following menu displays: 1. Enter and press 2.
  • Page 638 Defining and Configuring AutoTracker Policies Defining a DHCP MAC Address Range Policy You can see how DHCP MAC address policies were used in an application example on page 20-27. After you enter the Administrative Status for this mobile group or AutoTracker following menu displays: 1.
  • Page 639: Viewing Mobile Groups And Autotracker Vlans

    Viewing Mobile Groups and AutoTracker VLANs You can view the current status of all mobile groups or AutoTracker using the command. Enter The Group to which this AutoTracker when first creating an AutoTracker . An identification number that you assigned when you created this not display in this column for mobile groups.
  • Page 640: Viewing Policy Configurations

    Viewing Policy Configurations Viewing Policy Configurations Typing brings up the Policy Configuration Table, which shows the policies defined for the mobile Group or VLAN The Group to which this AutoTracker specified when first creating the . An identification number that you assigned when you created this virtual value will not display in this column for mobile groups.
  • Page 641: Viewing Virtual Ports' Group/Vlan Membership

    Viewing Virtual Ports’ Group/VLAN Membership You can view the membership of each virtual interface in the switch. For physical VLAN ports, the virtual interface is the same as a virtual port. However, when multiple services are set up for a physical port, then each service has a virtual port. Type and a Virtual Interface Table displays similar to the one that follows.
  • Page 642: View Vlan Membership Of Mac Devices

    View VLAN Membership of MAC Devices View VLAN Membership of MAC Devices command displays a table of learned those addresses. Follow these steps to view this table. 1. Enter 2. The following prompt displays: Enter the slot and port for which you want to view can also press 3.
  • Page 643: Application Example: Dhcp Policies

    Application Example: DHCP Policies This application example shows how Dynamic Host Configuration Protocol ( address policies can be used in a model in which a designated DHCP tion parameters to dynamically configured clients. Since clients initially have no DHCP presents a problem. AutoTracker determines VLAN from source devices.
  • Page 644: Dhcp Servers And Clients

    Application Example: DHCP Policies DHCP Servers and Clients clients must be able to communicate with a DHCP able way to ensure this communication is for the server and its associated clients to share the same or mobile group. However, if the network configuration does not lend itself to VLAN this solution (as the Production and clients can communicate through a router with Bootp relay enabled.
  • Page 645: Dhcp Port And Mac Rules

    Branch DHCP and the clients in VLAN DHCP the Production VLAN Application Example: DHCP Policies Omni Switch/Router Group 3 Test VLAN Subnet 10.15.X.X DHCP Port Rules Production VLAN Subnet 10.15.128.X DHCP Port Rules Branch VLAN Subnet 10.13.X.X...
  • Page 646 Application Example: DHCP Policies Page 20-30...
  • Page 647: Interswitch Protocols

    21 Interswitch Protocols This chapter describes Interswitch Protocols, which are used to discover adjacent switches, and track membership and retain mobile group information across switches. They VLAN include two new protocols and one existing protocol that is updated for release 4.0: •...
  • Page 648: Xmap

    • do not have any switch between them on the Spanning Tree path that has XMAP versions of In the illustration here, all switches are on the Spanning Tree path. Omni Switch/Router A and Omni Switch/Router C have Switch/Router A is adjacent to Omni Switch/Router C and vice versa. If Omni Switch/Router B enables , the adjacency changes.
  • Page 649: Xmap Transmission States

    XMAP Transmission States switch ports are either in the discovery transmission state, common transmission state, XMAP or passive reception state. Ports transition to these states depending on whether or not they receive Hello responses from adjacent switches. All Hello packet transmissions are sent to a well-known address (0020DA000003).
  • Page 650: Common Transmission State

    XMAP Common Transmission State In the common transmission state, ports detect adjacent switch failures or disconnects by sending Hello packets and waiting for Hello responses. Ports in this state send out Hello packets at a configurable interval (the default is 5 minutes) called the common transmission time.
  • Page 651: Configuring Xmap

    Configuring XMAP is active by default. In addition to disabling or enabling XMAP adjacent switches or configure the timeout intervals for Hello packet transmission/reception. Enabling or Disabling XMAP To display whether or not XMAP the following command: A screen displays similar to the following: Enter to change the current state, or press similar to the following displays:...
  • Page 652 Configuring XMAP A visual illustration of these connections is shown here: OSR A ( LOCAL VPN 1 VPN 3 VPN 4 The fields in table are defined as follows: . The local virtual port number which is connected to an adjacent switch. .
  • Page 653 A message similar to the following displays: To change the interval, enter the command with the desired value (any value between 1 and 65535). For example: A message similar to the following displays: Configuring the Common Transmission Time Use the command to view or change the time between sending Hello update packets in the common transmission state.
  • Page 654: Vlan Advertisement Protocol (Vap)

    VLAN Advertisement Protocol (VAP) VLAN Advertisement Protocol (VAP) Advertisement Protocol ( VLAN membership databases stored on switches in sync and enables the auto-discovery of network nodes. is useful when you want all want locally connected devices to receive all backbone traffic. In order for a switch to participate in ware configuration command.
  • Page 655: Vap And Port Policies

    VAP and Port Policies One of the main purposes of switch via AutoTracker port policies. bones to ensure that connectivity is established and maintained. When you use port policies, all devices heard through a port will become a member of the across backbones is not efficient because all devices learned over the backbone would be placed in the same since they would be attached to the same port.
  • Page 656: Gmap

    GMAP GMAP The Group Mobility Advertisement Protocol ( port to port among interconnected switches and still retain all learned mobile group and protocol information. Using and associated group/protocol information to all interconnected switches in the network. Update and retention times are configurable. A switch that receives a updates its internal GMAP updates.
  • Page 657: Enabling And Disabling Gmap

    Configuring GMAP is inactive by default. In addition to enabling and disabling GMAP the time between packet transmissions (when multiple packets are required for an update), the time between updates, and the length of time Enabling and Disabling GMAP Use the command to display or change the state of following displays: Enter...
  • Page 658 GMAP Configuring the Interpacket Update Time Use the command to display or change the time between sending updates. The switches avoid synchronization by jittering the update time by plus or minus one quarter of the config- ured interval. For example, if the default of 300 seconds is used, the jitter is plus or minus 75 seconds.
  • Page 659: Displaying Gmap Statistics By Mac Address

    Displaying GMAP Statistics by MAC Address To display statistics for all GMAP displays similar to the following: To limit the display, specify the Fields in this table are defined as follows: . The address of the local end station. . The group(s) to which the .
  • Page 660 GMAP Page 21-14...
  • Page 661 22 Managing AutoTracker In a large, flat, switched network, broadcast traffic can overload a network based primarily on port-based Groups. Through the use of AutoTracker such that it is forwarded only to those s are created within a Group to subdivide network traffic based on specific criteria. The VLAN criteria you use to define a VLAN...
  • Page 662: The Autotracker Menu

    The AutoTracker Menu The AutoTracker Menu All software commands for configuring AutoTracker policies and AutoTracker/multicast are in the AutoTracker menu. This menu is a submenu of the AutoTracker menu by typing The commands on the AutoTracker menu can be roughly divided into two halves. The first half of commands—listed from VLANs created inside non-mobile groups).
  • Page 663: Autotracker Vlans

    AutoTracker VLANs AutoTracker s enable you to control communications between end stations in your VLAN network. You define policies that determine membership in the matically locates ports or devices within the Group that fit the policies and places them into VLAN You can define physical policies or logical policies (or combinations thereof) to determine membership in AutoTracker...
  • Page 664: The Default Vlan

    AutoTracker VLANs on the basis of network address criteria. VLAN For example, you can specify that all . Or, you can specify that all VLAN encapsulation type be included in the If you define network address and port or protocol rules in the same address rules will take precedence over the port and protocol rules should any conflict arise.
  • Page 665: How Devices Are Assigned To Autotracker Vlans

    If source devices are automatically dropped when they do not match any following message would display: command applies to all Groups in an Omni Switch/Router and it is only applicable if there is at least one AutoTracker rule configured. for processing. Source...
  • Page 666 IP VLAN s and no problem VLAN . This IP VLAN For this reason, it is advisable to Omni Switch/Router 1 2 3 4 5 6 7 8 1 2 3 4 5 6 Group 2 when they do not VLAN...
  • Page 667 How Devices are Assigned to AutoTracker Router Traffic in IP and IPX Network Address VLAN s Prior to release 2.1, AutoTracker handled network address s in the same manner as normal traffic. In release 2.1 and later, VLAN AutoTracker differentiates router traffic from normal traffic and can distinguish traffic that is routed through a router from traffic that is generated by a router.
  • Page 668 2. The router interface for net- VLAN work 3 is now a member of network 2! Frame from Network 2, address Y Omni Switch/Router 1 2 3 4 5 6 7 8 1 2 3 4 5 6 VLAN 2 and VLAN updates to both.
  • Page 669: Port Policy Functionality

    For these reasons, the Omni Switch/Router now ships with new port policy functionality (although, as explained, you can revert the switch to original port policy functionality if you wish).
  • Page 670 AutoTracker VLANs Original Port Policy Functionality (reg_port_rule = 1) Omni Switch/Router 1 VLAN 2 port rules Ports 2-1 (Device B) and 3-1 (Devices A & D) Slot 2 Port 1 Device B Because 3-1 (slot 3 port 1) on switch 1, the backbone port, is...
  • Page 671 Current Port Policy Functionality (reg_port_rule = 0) Omni Switch/Router 1 Group 1 VLAN 2 port rules Ports 2-1 (no devices) and 3-1 (no devices) Slot 2 Port 1 Slot 3 Port 1 Device B With current port poli- cy functionality, VLAN are not active, or “carried...
  • Page 672 AutoTracker VLANs The Usefulness of Port Policies As has been explained – and as illustrated on page 22-10 – original port policy functionality is not well-suited to the creation of consistent Current port policy functionality – as illustrated on page 22-11 – neither contributes to nor participates in assignments.
  • Page 673 So How Do I Get Devices Assigned to VLAN s Over a Backbone? The way to get devices assigned to that so assign them. An example is shown on the facing page utilizing policies. The network on the facing page uses port policies (and current port policy function- ality) to assign the backbone port to the backbone from these VLAN...
  • Page 674 AutoTracker VLANs An Example of VLAN Assignment Using Logical Policies and Current Port Policy Functionality ( reg_port_rule = 0) Omni Switch/Router 1 VLAN 2 Protocol rule: (assigns devices A & B) Port rule: 3-1 (assigns no devices) Slot 2 Port 1...
  • Page 675: Frame Flooding In Autotracker Vlans

    Frame Flooding in AutoTracker VLANs Flooding occurs when a frame is received addressed to a device that is unknown to the switch or broadcast or multicast frames are received addressed to multiple users. In a typical bridged environment, the frame would be forwarded out all ports. However, this is not true with s as s segment the network into smaller broadcast domains.
  • Page 676: Creating Autotracker Vlans

    Creating AutoTracker VLANs Creating AutoTracker VLANs You create AutoTracker AutoTracker includes the following steps: VLAN A. Enter basic information such as the name and number for the Basic VLAN Information on page 22-16 for instructions on this step. B. Define policies that define membership in the ing VLAN Policies on page 22-18 for instructions on this step.
  • Page 677 5. The following prompt displays: Enter whether or not you want the Administrative Status for this disabled. Once enabled, the switch begins using the policies you defined. A disabled is still defined (name, number, policies intact), but the switch keeps the VLAN disabled.
  • Page 678: Step C. Configuring The Virtual Router Port (Optional)

    Creating AutoTracker VLANs Step B. Defining and Configuring VLAN Policies You can define AutoTracker policies by port, definition, or port binding. You can define multiple policies for a AutoTracker wish. A port or device is included in a AutoTracker example, you can define rules based on ports, rules based on on protocol in the same AutoTracker exercise extreme care when you do so and make sure that you understand the consequences of your definitions.
  • Page 679 Step C. Configuring the Virtual Router Port (Optional) You can now optionally configure the virtual router port that this cate with other AutoTracker VLAN switch. If you do not define a virtual router port for this only be able to communicate with devices in other You will have the choice of configuring steps below: 1.
  • Page 680 Creating AutoTracker VLANs 7. The following prompt displays: Indicate whether you want to enable NHRP. 8. The following prompt displays: Define the mode in which the virtual router port will operate. Protocol) is a network-layer protocol that enables this mode can be set to one of the following: .
  • Page 681 AutoTracker VLAN addresses consist of eight hex digits and you can enter router port using alphanumeric characters. Creating AutoTracker VLANs Omni Switch/Router 12345678 123456 The Default Router Framing Type deter- mines the type of frame transmitted...
  • Page 682 Creating AutoTracker VLANs 13. After entering a description, the following prompt displays: Select how you want the access protocol), to be configured for this enables this to learn routes. VLAN services, such as print and files services, to advertise themselves. The choices are: .
  • Page 683 Creating AutoTracker VLANs 15. If you chose a Source Routing frame format in the last step (options 5, 7, 9, or b), the an additional prompt displays: Select how broadcasts will be handled for Source Routing. The choices are: . All Routes Explorer, the default setting. Broadcasts are transmitted over every possible path on inter-connected source-routed rings.
  • Page 684: Modifying An Autotracker Vlan

    Modifying an AutoTracker VLAN Modifying an AutoTracker VLAN After you set up a VLAN Status of each of the rules. You use the You must specify the Group and example, to modify the After entering a valid The first half of the display shows the current configuration of this sample shows a VLAN a Protocol Rule has been set up, but this rule has not been enabled.
  • Page 685 Changing a VLAN’s Description 1. At the prompt enter a 2. The following prompt displays: Type in the revised description for this long. Press when you have completed the new description. The system returns to the , or quit modifying the VLAN VLAN Adding More Policies for This VLAN...
  • Page 686: Deleting An Autotracker Vlan

    Modifying an AutoTracker VLAN Changing the Admin Status for a VLAN Policy 1. At the prompt enter a 2. The following menu displays: The rule number is listed with other information on the command. Find the number corresponding to the rule you want to change and enter it at this prompt and press 3.
  • Page 687: Viewing Autotracker Vlans

    Viewing AutoTracker VLANs You can view the current status of all AutoTracker command. Enter and a table similar to the following displays. The Group to which this AutoTracker when first creating an AutoTracker . An identification number that you assigned when you created this A textual description that you entered to describe a or modified it through The Administrative Status for the...
  • Page 688: Viewing Policy Configurations

    Viewing Policy Configurations Viewing Policy Configurations Typing brings up the Policy Configuration Table, which shows the policies defined for specified. VLAN The Group to which this AutoTracker specified when first creating the . An identification number that you assigned when you created this virtual .
  • Page 689: Viewing Virtual Ports' Vlan Membership

    Viewing Virtual Ports’ VLAN Membership You can view the membership of each virtual interface in the switch. For physical VLAN ports, the virtual interface is the same as a virtual port. However, when multiple services are set up for a physical port, then each service has a virtual port. Type and a Virtual Interface Table displays similar to the one that follows.
  • Page 690: View Vlan Membership Of Mac Devices

    View VLAN Membership of MAC Devices View VLAN Membership of MAC Devices command displays a table of learned those addresses. Follow these steps to view this table. 1. Enter 2. The following prompt displays: Enter the slot and port for which you want to view can also press 3.
  • Page 691: Creating A Vlan For Banyan Vines Traffic

    Creating a VLAN for Banyan Vines Traffic Banyan Vines uses a fixed encapsulation for each network interface. For this reason, it is straightforward to create a VLAN uses Ethernet II encapsulation; Token Ring uses describes how to create a VLAN create a Banyan Vines VLAN 1.
  • Page 692 Creating a VLAN for Banyan Vines Traffic 8. The following prompt displays: Enter a to define a protocol by ether-type and press 9. The following prompt displays: 10. Enter as the Ether-type value for Ethernet II encapsulation. 11. The following prompt displays: Enter a .
  • Page 693 15. The following prompt displays Enter as the destination service access protocol ( 16. The following prompt displays: Again, enter as the source service access protocol ( 17. The following prompt displays: Enter a . You still need to set up a rule for 18.
  • Page 694 Creating a VLAN for Banyan Vines Traffic 22. The following prompt displays: Enter an . You are done setting up rules for this ing displays: 23. The following prompt displays: Enter an . 24. The following prompt displays: Enter an . The Banyan Vines traffic Page 22-34 .
  • Page 695: Multicast Vlans

    Multicast enable you to control the flooding of multicast traffic in your network. For VLANs example, you can define a multicast any other video feed or combination of feeds. You define the multicast traffic to be transmitted by specifying a multicast address. You define the recipients of the multicast traffic by specifying ports and/or specific members of a multicast consist of the ports specified to...
  • Page 696: How Devices Are Assigned To Multicast Vlans

    How Devices are Assigned to Multicast VLANs If the recipients of the multicast traffic were defined using the port rule, each specified port is then marked as a member of the multicast If the recipients of the multicast traffic were defined using the addresses of the receiving devices, no action is taken until a frame is received from one of those devices.
  • Page 697 VLAN table is for informational purposes only—it is not available as a UI command. VLAN in common with the desti- VLAN VLANs multicast address in Omni Switch/Router VLAN 12345678 10 spec- VLAN 123456 Group 3 Ports 1 – 6 Port 3...
  • Page 698: Creating Multicast Vlans

    Creating Multicast VLANs Creating Multicast VLANs You create multicast VLAN includes the following steps: A. Entering basic information such as the name and number for the multicast A. Entering Basic Information on page 23-5 for instructions on this step. B. Defining the multicast address. You define one or more multicast addresses that define the multicast stream(s) for the multicast on page 23-6 for instructions on this step.
  • Page 699: Step A. Entering Basic Information

    Step A. Entering Basic Information 1. To begin setting up a multicast 2. The following prompt displays: Enter the number for the Group to which this multicast up to multicast s and up to 31 AutoTracker VLAN 3. The following prompt displays: Enter the number that will identify this multicast Up to 32 multicast s may belong to the same Group.
  • Page 700 Creating Multicast VLANs Step B. Defining the Multicast Address The multicast address is an address that identifies a multicast traffic stream, such as News. The source port of the multicast traffic (i.e., the port through which multicast traffic enters the switch) can be a member of any Group.
  • Page 701 Step C. Defining the Recipients of Multicast Traffic You can define the recipients of multicast traffic by virtual port or these recipients as policies for this multicast Port and Address. You can use both rules within a single multicast you might want to flood multicast traffic to all devices attached to one switch port, but only a few devices attached to other switch ports.
  • Page 702 Creating Multicast VLANs Defining Recipients By MAC Address After you define the multicast address, the following menu displays: 1. Press 2. The following prompt displays: Indicate whether or not you want to enable this rule. Type you enable the rule, the multicast you disable the rule, then this rule will not be used in assigning devices to this multicast , but the parameters you set up for the multicast VLAN...
  • Page 703: Modifying Multicast Vlans

    Modifying Multicast VLANs After you set up a multicast VLAN Admin Status of each of the rules. You use the as follows: You must specify the Group and multicast colon. For example, to modify multicast After entering a valid The first half of the display shows the current configuration of this multicast ple, this sample shows multicast cast is Enabled and a Port Rule has been set up and it is enabled.
  • Page 704: Step C. Defining The Recipients Of Multicast Traffic

    Modifying Multicast VLANs Changing a VLAN’s Description 1. At the prompt enter a 2. The following prompt displays: Type in the revised description for this multicast characters long. Press The system returns to the multicast , or quit modifying the multicast VLAN Adding More Policies for This VLAN 1.
  • Page 705: Deleting A Multicast Vlan

    Changing the Admin Status for a VLAN Policy 1. At the prompt enter a 2. The following menu displays: The rule number is listed with other information on the multicast entered the command. Find the number corresponding to the rule you want to change and enter it at this prompt and press 3.
  • Page 706: Modifying A Multicast Address Policy

    Modifying a Multicast Address Policy Modifying a Multicast Address Policy After you create a multicast more addresses through the cast address. Follow the steps outlined in Modifying Multicast VLANs on page 23-9 and the steps for Adding More Policies for This VLAN on page 23-10. Continue with the procedure below.
  • Page 707: Viewing Multicast Vlans

    Viewing Multicast VLANs You can view the current status of all multicast Type and a table similar to the following displays: The Group to which this multicast when first creating a multicast . An identification number that you assigned when you created this multicast A textual description that you entered to describe a multicast you created or modified it through ters.
  • Page 708: Viewing Multicast Vlan Policies

    Viewing Multicast VLAN Policies Viewing Multicast VLAN Policies You can view the current multicast Type and a Policy Configuration Table displays similar to the following: The Group to which this multicast when first creating a multicast . An identification number that you assigned when you created this multicast .
  • Page 709: Viewing The Virtual Interface Of Multicast Vlans

    Viewing the Virtual Interface of Multicast VLANs You can view the multicast VLAN cases the virtual interface is the same as a virtual port. However, when multiple services are set up for a virtual port, then each service may be split into one or more instances. Type and a Virtual Interface Table displays similar to the one that follows.
  • Page 710 Viewing the Virtual Interface of Multicast VLANs Page 23-16...
  • Page 711: Autotracker Vlan Application Examples

    24 AutoTracker VLAN This chapter provides specific examples of AutoTracker tions. These examples illustrate basic concepts about AutoTracker and highlight issues that can arise when AutoTracker is used in different network situations. • Application Example 1 illustrates a network organized according to logical policies and explains the benefits of a logical network organization.
  • Page 712: Application Example 1

    Application Example 1 Application Example 1 s Based on Logical Policies VLAN Example 1 shows a network organized logically. The network is organized according to networks, but this organization is achieved through the application of logical policies rather than physical segmentation. The use of logical policies provides the flexibility of moving users from segment to segment and preserving their original reconfiguring AutoTracker or the workstations.
  • Page 713 The switch’s filtering data- base identifies the port through which this reached. The frame sent by workstation 125.0.0.1 to workstation 130.0.0.11 is correctly transmitted to port 2. Application Example 1 Omni Switch/Router 12345678 123456 Port 4 Workstation...
  • Page 714: Application Example 2

    VLAN Assignment in IPX Networks The close relationship between encapsulation type and network number in the main reason AutoTracker’s network number and an encapsulation type. The Omni Switch/Router assigns devices to network address s as follows: VLAN •...
  • Page 715: Ipx Vlan Assignment At Bootup

    B & C initially, then either B or C when net- work number is known both B & C initially, then either B or C when net- work number is known Application Example 2 Omni Switch/Router 12345678 123456 Client 1 Ethernet- Port 6 encap...
  • Page 716 When the Omni Switch/Router receives frames from the five servers, each server is assigned to the appropriate VLAN appropriate framing specified – so that traffic can route between the When a client workstation boots up and queries for a server, the Omni Switch/Router assigns the client to the appropriate encapsulation, encapsulation, or...
  • Page 717: Application Example 3

    FDDI second encapsulation policy for s, because trunked frames are not translated. VLAN Omni Switch/Router 1 With this configuration, a frame sent from the workstation connected to and transmitted to Switch 2 over the could not be assigned to and thus could not be sent to the Server.
  • Page 718: Application Example 4

    Group 2 – one of which is default the presence of the internal cies. When Server A is connected to the Omni Switch/Router on port 1, the Server is assigned to 2 (per the network address policy) and port 1 becomes a member of VLAN 2.
  • Page 719 Ethernet- encap VLAN VLAN Network 20 Network 30 Ethernet- encap Ethernet- Port 1 Port 2 Server A Server B Network 20 Network 30 Ethernet- encap Ethernet- Application Example 4 server is a Omni Switch/Router 12345678 123456 encap encap Page 24-9...
  • Page 720: Application Example 5

    Omni Switch/Routers in which three 10.10.10.0), VLAN D both Omni Switch/Routers, but has no assigned devices. Routing is enabled for all three s. A backbone connects port 2 on Omni Switch/Router 1 to port 1 on Omni Switch/ VLAN Router 2. When workstation 10.10.10.1 transmits a frame...
  • Page 721 Switch 1 and Switch 2. Traffic (i.e., routing information) can then flow between Switch 1 and Switch 2 over the backbone. Switch 1 will be aware of network 30 and Switch 2 will be aware of network 10. Omni Switch/Router 1 Internal Router VLAN address 20.20.20.0...
  • Page 722 Application Example 5 Page 24-12...
  • Page 723: Ip Routing

    125.0.0.2 25 IP Routing that do not have router ports with routing VLANs or some other routing protocol. Internal IP Router Group 2 130.0.0.0 140.0.0.14 140.0.0.15 130.0.0.11 130.0.0.12 with virtual VLANs Omni Switch/Router 12345678 123456 Group 3 140.0.0.0 Page 25-1...
  • Page 724: Ip Routing Overview

    Hardware Routing Engine (HRE) or HRE-X is installed. The HRE or HRE-X significantly improves routing performance. See Chapter 1, “Omni Switch/Router Chas- sis and Power Supplies,” ” for information about the HRE-X. On the Omni S/R, IP routing has...
  • Page 725: Transport Protocols

    Transport Protocols IP is both connectionless (it routes each datagram separately) and unreliable (it does not guarantee delivery of datagrams). This means that a datagram may be damaged in transit, or thrown away by a busy router, or simply never make it to its destination. The resolution of these transit problems is to use a layer 4 transport protocol: •...
  • Page 726: Setting Up Ip Routing On The Switch

    Setting Up IP Routing on the Switch Setting Up IP Routing on the Switch IP routing is enabled on a per-port basis by creating a virtual IP router port for a group/ The switch does not do any routing unless the virtual router port has IP routing enabled (routing is enabled by default).
  • Page 727 Step 3. Configuring Other IP Routing Features There are several optional features that may be used with IP routing. Some features are included as part of the base code and are described in this user manual. Other features are available as optional switch software and are described in separate user manuals. The features are listed here: •...
  • Page 728: The Networking Menu

    The Networking Menu The Networking Menu The Networking menu contains commands that control, and are related to, the routing proto- cols that are run on the switch. To switch to, and to display, the If you have enabled the verbose mode, you do not need to enter the question mark ( ). A screen similar to the following displays: The commands in this menu are described throughout this manual as follows: •...
  • Page 729: The Ip Submenu

    The IP Submenu The IP Submenu command in the Networking menu is used to display the IP submenu. To display the IP submenu, enter the following commands: If you have enabled the verbose mode, you don’t need to enter the question mark ( ). A screen similar to the following displays: This chapter describes all of the above commands with the exception of , and...
  • Page 730: Viewing The Address Translation (Arp) Table

    Viewing the Address Translation (ARP) Table Viewing the Address Translation (ARP) Table command is used to access the contains a listing of IP addresses and their corresponding translations to slot/port for interfaces). Submenu commands are used to add entries to the table, to delete them, show all the entries currently in the table, to flush “temporary”...
  • Page 731: Adding Entries To The Arp Table

    Adding Entries to the ARP Table subcommand is used to manually add an IP address entry to the ARP Table. To be able to manage your switch over an IP network connection, you will need at least one IP address configured for the switch. Follow the steps below to add an address to the ARP Table.
  • Page 732: Deleting Entries From The Arp Table

    Viewing the Address Translation (ARP) Table Deleting Entries from the ARP Table subcommand is used to delete a “permanent” IP address from the ARP Table. Follow the steps below to delete an address from the ARP Table. 1. Enter The following prompt displays: Enter the host name or address that you wish to delete.
  • Page 733 Finding a Specific MAC Address in the ARP Table subcommand is used to locate a specific MAC address in the ARP Table based on a known IP address or host name. (The specific IP address based on a known MAC address). Follow the steps below to display a specific MAC address in the ARP Table.
  • Page 734: Viewing Ip Statistics And Errors

    To display information about IP statistics and errors, enter the following command: The Omni Switch/Router (OmniS/R) includes fastpath code that enhances the speed of IP routing. Fastpath statistics are included on the IP Statistics and Errors screen:...
  • Page 735 Viewing IP Statistics and Errors Fastpath Datagrams Forwarded (Displays for Omni S/R) The number of IP datagrams forwarded to their destination without using the Fastpath Inbound Discards (Displays for Omni S/R) The number of bad packets received and discarded. Typically this value should be zero.
  • Page 736 Viewing IP Statistics and Errors PDUs Needing Reassembly The number of IP datagram fragments that needed to be reassembled by this switch. PDUs Successfully Reassembled The number of IP datagrams successfully reassembled by this switch. PDUs Needing Fragmentation The number of IP datagrams requiring fragmentation by this switch. Fragments created The number of IP datagram fragments that have been generated as a result of fragmentation by this switch.
  • Page 737: Viewing The Ip Forwarding Table

    Viewing the IP Forwarding Table Viewing the IP Forwarding Table command is used to display the IP Forwarding Table. The entries in the table show the routes entered by a routing protocol, if the switch is running any of the supported proto- cols, and the static routes that you may have entered manually.
  • Page 738 Viewing the IP Forwarding Table The fields on the IP Forwarding Table have the following meanings: Network The destination network IP address. Mask The IP subnet mask. Gateway The network address of the gateway (the router from which this address was learned). Metric The metric associated with this network.
  • Page 739: Adding An Ip Static Route

    Adding an IP Static Route command is used to add IP static routes to the switch’s IP Forwarding Table. You might want to add a static route to send traffic to a router other than the one determined by the routing protocols. In order to add a static route, you will need to know the host/net IP address and the gate- way IP address which will be used to route traffic to the external IP address.
  • Page 740 Adding an IP Static Route 5. The following prompt displays: Enter the IP address of the next hop (the gateway) router to the destination IP address. The gateway address must be on the same network as one of the (that is, it must VLANs be a directly connected network).
  • Page 741: Removing An Ip Static Route

    Removing an IP Static Route command is used to remove IP static routes from the switch’s IP Forwarding Table. Follow the steps below to remove an IP static route. 1. Enter The prompt that displays depends on whether routing domains are configured on the switch.
  • Page 742: Viewing Icmp Statistics And Errors

    Viewing ICMP Statistics and Errors Viewing ICMP Statistics and Errors command is used to monitor ICMP activity. To display information about ICMP statistics and errors, enter the following command: A screen similar to the following displays: The following field descriptions pertain to both the “in” and “out” statistics: Total ICMP Messages The total number of ICMP messages which this switch received or attempted to send out.
  • Page 743 Viewing ICMP Statistics and Errors Address Mask Messages The number of Address Mask Reply messages that were sent/received by this switch in an attempt to determine the subnet mask for a network. Address Mask Reply Messages The number of Address Mask Reply messages that were sent/received by this switch. Errors The number of ICMP messages this switch sent/received but was unable to process because something was wrong (for example, a checksum failure).
  • Page 744: Using The Ping Command

    Using the PING Command Using the PING Command command is used to test the reachability of IP network destinations. A fast ping command ( ) is also available for repeating the last ping request sent from the switch. The commands sends an ICMP Follow the steps below to issue an IP ping request.
  • Page 745 5. After answering the previous prompt, a screen similar to the following displays: This screen shows the progress of the ping operation as it is taking place. The numbers in the square brackets indicate how many packets have been transmitted for that row. The periods to the right of the brackets represent packets as they are exchanged between the switch and the device owning the IP address entered for the ping.
  • Page 746: Viewing Udp Statistics And Errors

    Viewing UDP Statistics and Errors Viewing UDP Statistics and Errors command is used to display a listing of UDP statistics and errors. The command displays cumulative statistics since the last time the switch was powered on or since the last reset of the switch was executed. To display information about UDP statistics and errors, enter the following command: A screen similar to the following displays: The fields on this screen have the following meanings:...
  • Page 747: Viewing The Udp Listener Table

    Viewing the UDP Listener Table Viewing the UDP Listener Table command is used to display the UDP Listener Table. This table contains information about the switch’s UDP end-points on which a local application is currently accepting data- grams. The UDP Listener Table shows the local IP addresses for each UDP listener and the local port number for this listener.
  • Page 748: Viewing Rip Statistics And Errors

    Viewing RIP Statistics and Errors Viewing RIP Statistics and Errors command is used to display RIP statistics and errors. This command displays cumula- tive statistics since the last time the switch was powered on, or since the last reset of the switch was executed.
  • Page 749: Viewing Tcp Statistics

    Viewing TCP Statistics Viewing TCP Statistics command is used to monitor TCP traffic activity and check TCP configuration param- eters. To reconfigure TCP parameters, see Viewing the TCP Connection Table on page 25-29. To display information about TCP activity, enter the following command: A screen similar to the following displays: The fields on this screen have the following meanings: Round Trip Algorithm Used...
  • Page 750 Viewing TCP Statistics Established Resets The number of times TCP connections have made a direct transition to the “closed” state from either the “established” state or the “closeWait” state. Currently Established The number of TCP connections for which the current state is either “established” or “closeWait”.
  • Page 751: Viewing The Tcp Connection Table

    Viewing the TCP Connection Table Viewing the TCP Connection Table command is used to check the current TCP connections available in the TCP Connection Table. To display the TCP Connection Table, enter the following command: A screen similar to the following displays: The fields on this screen have the following meanings: Local Address/Port The local IP address for this TCP connection and the local port for this TCP connection.
  • Page 752: Using The Telnet Command

    Using the TELNET Command Using the TELNET Command command is used to connect to another system. All of the standard commands are supported by the software in the switch. To initiate a session, enter the following command: TELNET A screen similar to the following displays: To display a listing of the A screen similar to the following displays: Enter the desired commands to establish and conduct your...
  • Page 753: Tracing An Ip Route

    Tracing an IP Route command is used to find the IP route from the local switch to a specified IP address destination. This command displays the individual hops to the destinations as well as some timing information. When using the the destination as part of the command line.
  • Page 754: Flushing The Rip Routing Tables

    Flushing the RIP Routing Tables Flushing the RIP Routing Tables command is used to flush all entries in the RIP Routing Table. All existing routes, with the exception of static and direct routes, are removed from the table by entry of the command.
  • Page 755: Configuring Ip Rip Filters

    Configuring IP RIP Filters command is used to add or delete an IP RIP Output or Input filter. The IP RIP Filtering feature gives you a means of controlling the operation of the IP RIP protocol. By using IP RIP filters, you can minimize the number of entries that are put into the IP Forward- ing Table as well as improve overall network performance by eliminating unnecessary traffic.
  • Page 756 Configuring IP RIP Filters 4. The following prompt displays: Enter the IP address of the network that is to be allowed or blocked by the filter (or just press to use the default of all networks). If you choose the default you will not be prompted for the network mask (as is shown in the next step).
  • Page 757: Ip Rip Filter Precedence

    5. The following prompt displays: Enter the IP network mask of the network that is to be allowed or blocked by the filter (or just press to use the default mask of 255.255.255.0). Note that the default mask will vary depending on the class of the IP address you entered above. 6.
  • Page 758: Deleting Ip Rip Filters

    Configuring IP RIP Filters Deleting IP RIP Filters Follow the steps below to delete an existing IP RIP Output or Input filter. 1. Enter A screen similar to the following displays: Enter to select to delete a filter. 2. A screen similar to the following displays: This screen contains a list of the existing IP RIP filters.
  • Page 759: Displaying Ip Rip Filters

    Displaying IP RIP Filters command is used to display a list of all existing IP RIP Output and Input filters. See Configuring IP RIP Filters on page 25-33 for complete information on creating these filters. Displaying a List of All IP RIP Filters To display the listing of all existing IP RIP filters, enter the following command: A screen similar to the following displays: This screen contains a list of the existing IP RIP filters.
  • Page 760: Displaying A List Of "Global" Ip Rip Filters

    Configuring IP RIP Filters Displaying a List of “Global” IP RIP Filters To display a listing of just the global IP RIP filters, enter the following command: A screen similar to the following displays: Displaying a List of Specific IP RIP Filters To display a listing of IP RIP filters for a specific interface, you can specify other parameters along with the command.
  • Page 761: Viewing The Ip-To-Mac Address Table

    Viewing the IP-to-MAC Address Table command is used to display the IP-to-Mac Address Association Table. This table contains a listing of IP addresses and their associated MAC (Media Access Control) addresses together with the slot/port from which the information was learned. The information in this table is learned from ARP (Address Resolution Protocol) messages received on “leaf”...
  • Page 762: Flushing Entries From The Table

    Viewing the IP-to-MAC Address Table Slot/Intf The slot number and interface number from which the IP and MAC addresses were learned. Displaying Information for a Specific IP Address To display the entry in the IP-to-MAC table for a specific IP address, enter the desired IP address after the command.
  • Page 763: Enabling/Disabling Directed Broadcasts

    Enabling/Disabling Directed Broadcasts Enabling/Disabling Directed Broadcasts An IP directed broadcast is an IP datagram that has all zeroes or all 1’s in the host portion of the destination IP address. The packet is sent to the broadcast address of a subnet to which the sender is not directly attached.
  • Page 764: Path Mtu Discovery

    Path MTU Discovery Path MTU Discovery All Gigabit Ethernet modules and all Mammoth-based Ethernet modules on the Omni Switch/Router in Release 4.0 and later support path Maximum Transmission Unit ( discovery. In path that does not require fragmentation anywhere along the path from a source host to its desti- nation.
  • Page 765: Udp Forwarding

    is a connectionless transport protocol that is used for applications that do not require the establishment of a session and end-to-end error checking, such as email and file transfer. This chapter describes the to be forwarded across groups and you to use nonroutable protocols in a routing environment. (For information about IP rout- ing, see Chapter 25, “IP Routing.”) BOOTP the switch.
  • Page 766: Udp Relay Hardware/Software Support

    UDP Relay Hardware/Software Support The UDP forwarding feature has the following hardware/software support: • relay is supported on any Omni Switch/Router (OmniS/R). • To relay DHCP requests from authentication clients in a default group to a DHCP server in an authenticated group, the command described in this chapter.
  • Page 767: Udp Relay Configuration Screen

    UDP Relay Configuration Screen To configure any of the relays, use the the IP submenu. (For more information about IP commands, see Chapter 25, “IP Routing.”) The screen display is similar to the following: Use the UDP Relay Configuration screen to enable any of the relays and display more config- uration options for enabled relays.
  • Page 768: Bootp/Dhcp Relay

    BOOTP/DHCP Relay BOOTP/DHCP Relay The switch supports a Dynamic Host Configuration Protocol ( BOOTP cated groups as well. See BOOTP/DHCP Relay and Authentication on page 26-5 and the Authentication Services chapter of the Switched Network Solutions User Manual. Through UI software, you can turn the relay function on or off and specify the IP addresses of servers, the delay before the relay forwards a request, and the maximum number of DHCP hops a packet may be forwarded through the network.
  • Page 769: Bootp/Dhcp Relay And Source Routing

    In multiple group configurations, AutoTracker rules can be deployed to strategically support the relay function. Two types of AutoTracker IP policies are appropriate for ments. The first is the IP protocol policy that puts all IP type frames into a single less of network address.
  • Page 770: External Bootp Relay

    BOOTP One requirement for routing tionality to be able to forward an external router, which forwards request frames from the incoming router port to the outgo- ing router port attached to the Omni Switch/Router. 125.0.0.1 External DHCP Client 125.0.0.2...
  • Page 771: Internal Bootp/Dhcp Relay

    IP network address until after they communicate with the forwarding feature in the switch, -ready and the server resides on just one of the DHCP DHCP Omni Switch/Router UDP Relay Group 3 130.0.0.14 DHCP Clients 130.0.0.13...
  • Page 772: Example 2

    , the client generates an IP frame without an IP address. DHCP server, they must DHCP request DHCP , and the switch must VLAN -ready and non- DHCP Omni Switch/Router 12345678 123456 VLAN Protocol Policy 140.0.0.20 130.0.0.14 130.0.15 Non-DHCP Non-DHCP...
  • Page 773: Enabling Bootp/Dhcp Relay

    In this example, the defined by an IP protocol policy is used as a mechanism to group VLAN the DHCP server and associated clients. The address will be allocated an This configuration works if you require only one subnet. All clients received on the same router port will be assigned to the same Note that the client’s request frames will also be received and forwarded by the if it is configured.
  • Page 774 BOOTP/DHCP Relay Forward Delay The amount of time (typically in seconds, but determined by the client) the BOOTP/DHCP relay will wait before forwarding a request to the server address. This delay gives a local server a chance to respond to a client before the relay forwards it further out in the network. This value may range from 1 to 65535.
  • Page 775: Netbios Relays

    NetBIOS Relays The switch supports a relay function that allows Network Basic Input/Output System ) messages to be sent across groups or NetBIOS Overview of NetBIOS is an applications interface that allows computers on Ethernet or token ring NetBIOS communicate with one another. An enhanced version of the protocol is used by networking operating systems such as With , each client and host in the...
  • Page 776: Netbios Relay Application

    130.0.0.2 b-node b-node NetBIOS Relay Application relays should be configured to forward to NBDD NBNS NBDD address of the VLAN Omni Switch/Router 12345678 123456 130.0.3 b-node 10 and VLAN servers are by definition dynamic, ensures that the relay will func-...
  • Page 777 Configuring NBNS Relay Each PC has a name unique for its local network. If you are using NetBIOS queries to resolve names and should configure relay for The relays are enabled from the UDP Relay Configuration screen and are configured in simi- lar ways.
  • Page 778: Next-Hop Addresses For Nbns

    NetBIOS Relays Next-Hop Addresses for NBNS At least one next-hop address (or a forwarding NBNS Relay on page 26-15) must be configured. To add a next-hop address for 1. On the UDP Relay Configuration screen command, enter the following: A screen similar to the following displays: 2.
  • Page 779: Forwarding Vlans For Nbns Relay

    Forwarding VLANs for NBNS Relay At least one forwarding VLAN NBNS on page 26-14) must be configured for To select forwarding VLANs 1. On the command line of the UDP Relay Configuration screen, enter the following: A screen similar to the following displays: 2.
  • Page 780 NetBIOS Relays Configuring NBDD Relay If you want to send NetBIOS To enable the relay, enter NBDD screen. The screen redisplays similar to the following: Either a Next-hop Address or a Forward to VLANs value must be configured for the relay. Next-hop Address Use this parameter to list, add, or delete the server address(es) to which the will forward.
  • Page 781: Next-Hop Addresses For Nbdd

    Next-Hop Addresses for NBDD At least one next-hop address (or a forwarding NBDD Relay on page 26-18) must be configured for the relay. To add a next-hop address for 1. At the command prompt for the UDP Relay Configuration screen, enter the following: A screen similar to the following displays: 2.
  • Page 782: Forwarding Vlans For Nbdd Relay

    NetBIOS Relays Forwarding VLANs for NBDD Relay You may select or deselect (or a next-hop address as described in Next-Hop Addresses for NBDD on page 26-17) VLAN must be configured for the relay. To select forwarding VLANs 1. On the command line of the UDP Relay Configuration screen, enter the following: A screen similar to the following displays: 2.
  • Page 783: Generic Service Udp Relay

    Generic Service UDP Relay relay may be configured for generic services. Generic services may include applications such as Trivial File Transfer Protocol ( Server. You will need to know the well-known these services. Generic Services Menu To configure a relay for a generic service, on the command line for the UDP Relay Configura- tion screen, enter .
  • Page 784 Generic Service UDP Relay Forward to VLANs Use this parameter to list, add, or delete This default is . This value redisplays as to 32 may be configured. You can list forwarding VLANs the forwarding list by entering To configure a generic service: 1.
  • Page 785: Modifying A Generic Service

    Modifying a Generic Service Use the Configured Generic Services screen to modify an existing generic service. On the Generic Services Menu, enter The parameters are defined here. Item A unique number assigned by the switch to the generic service in the order the services were configured using the Add new Generic Service screen.
  • Page 786: Deleting A Generic Service

    Generic Service UDP Relay 4. Enter to return to the UDP Relay Configuration screen. 5. Enter to save the changes and reinitialize the relay. Deleting a Generic Service To delete a generic service: 1. On the Generic Services Menu, enter similar to the following: The parameters are defined in Modifying a Generic Service on page 26-21.
  • Page 787: Viewing Udp Relay Statistics

    Viewing UDP Relay Statistics Use the command to display statistics about configured command is listed in the IP submenu. For information about other IP commands, see Chap- ter 25, “IP Routing.” The screen display for statistics is similar to the following: The fields are defined here.
  • Page 788 Viewing UDP Relay Statistics Page 26-24...
  • Page 789: Ipx Routing

    ) filters and timers. IPX is a layer 3 proto- Internal IPX Router Group 2 1A2B3C4D Router Network 1A2B3C4D nodes 22:45:67:87:00:00 68:27:43:29:00:00 with VLANs that do not have IPX VLANs Omni Switch/Router 12345678 123456 Group 3 AABBCCDDEE Network AABBCCDDEE node 00:5A:4D:CC:22:11 Page 27-1...
  • Page 790: Ipx Routing Overview

    Creating routing tables is performed by switch software unless a Hardware Routing Engine (HRE) or HRE-X is installed. The HRE or HRE-X significantly improves routing performance. See Chapter 1, “Omni Switch/Router Chassis and Power Supplies,” for information about the HRE-X respectively.
  • Page 791: Setting Up Ipx Routing On The Switch

    Setting Up IPX Routing on the Switch IPX routing is enabled on a per-port basis by creating a virtual IPX router port for a group/ VLAN. The switch does not do any routing unless the virtual IPX router port has IPX routing enabled (routing is enabled by default).
  • Page 792: The Ipx Submenu

    The IPX Submenu The IPX Submenu command in the Networking menu is used to access a submenu containing all the IPX-related commands. For more information about the Networking menu, see Chapter 25, “IP Routing.” To display the IPX submenu, enter the following commands: If you have enabled the verbose mode, you don’t need to enter the question mark ( ).
  • Page 793: Viewing The Ipx Routing Table

    Viewing the IPX Routing Table command is used to display the IPX Routing Table. The entries in the table show the routes entered by the IPX ally. All entries in the table are sorted by destination network. The IPX Routing Table can contain a maximum of 2,010 routes.
  • Page 794: Using Ipxr With Frame Relay Or Isdn Boards

    Viewing the IPX Routing Table The information in this route has recently been updated, but the new information has not yet been forwarded to neighbor routers. Indicates that this is a local interface (direct route) as opposed to a route to a destination network.
  • Page 795 Viewing the IPX Routing Table Displaying a List of Specific IPX Routes You can limit the number of routes that are displayed by the command by using an extra argument along with the command. To find out if a route to a particular destination network is known, simply include the network number on the command line.
  • Page 796: Viewing Ipx Statistics

    Viewing IPX Statistics Viewing IPX Statistics command is used to display data on IPX statistics and errors. To display information about IPX statistics and errors, enter the following command: A screen similar to the following displays: The fields (and the subfields) on this screen have the following meanings: Indicates whether IPX routing is “ON”...
  • Page 797 IPX Output Statistics The number of packets forwarded (not including fast path routed packets). The number of packets forwarded that were generated by local IPX applications (RIP and SAP). The number of discarded packets. The number of packets that could not be forwarded because a route to the destination IPX network could not be found.
  • Page 798: Viewing The Ipx Sap Bindery

    Viewing the IPX SAP Bindery Viewing the IPX SAP Bindery command is used to display a listing of the servers in the SAP Bindery, sorted by server name. To display a list of SAP servers, enter the following command: A screen similar to the following displays: The fields on this screen have the following meanings: Server Name The name of the server offering this service.
  • Page 799: Using Ipxsap With Frame Relay Or Isdn Boards

    Using IPXSAP with Frame Relay or ISDN Boards The following additional column heading appears in the or ISDN board is installed in the switch. s/p/vc or Peer ID The Slot, Port and Virtual Connection (i.e., DLCI) identifiers or the PPP Peer ID of the inter- face on which the server information was received.
  • Page 800: Adding An Ipx Static Route

    IPX static routes to the switch’s IPX Routing Table. You might want to add a static route to send traffic from a node in an Omni Switch/Router VLAN to an external IPX network address (such as an address reached through an external network router attached to the switch).
  • Page 801: Removing An Ipx Static Route

    Removing an IPX Static Route command is used to remove IPX static routes from the switch’s IPX Routing Table. Follow the steps below to remove an IPX static route. 1. Enter A screen similar to the following displays: 2. Enter at this prompt (or press A screen similar to the following displays: 3.
  • Page 802: Turning The Ipx Router Complex On And Off

    Turning the IPX Router Complex On and Off Turning the IPX Router Complex On and Off command is used to turn off the IPX Router Complex, which disables IPX routing on the switch. To turn off IPX routing, enter the following command: A screen similar to the following displays: command is used to turn on the IPX Router Complex, which enables IPX routing on the switch.
  • Page 803: Flushing The Ipx Rip/Sap Tables

    Flushing the IPX RIP/SAP Tables command is used to flush the IPX RIP Routing and SAP Bindery Tables. Follow the steps below to flush both the IPX tables. 1. Enter A screen similar to the following displays: 2. Enter (or just press Enter) to flush both tables. Enter to flush just the Routing Table. Enter to flush just the SAP Bindery Table.
  • Page 804: Using The Ipxping Command

    Using the IPXPING Command Using the IPXPING Command command is used to test the reachability of certain types of IPX nodes. The soft- ware supports two different types of IPX pings: • Novell-defined, which can test the reachability of NetWare servers currently running the NetWare Loadable Module called IPXRTR.NLM.
  • Page 805 5. The following prompt displays: Enter the number of seconds to wait for a response. The default timeout is 1. 6. The following prompt displays: Enter the type of IPX ping to be issued. The default is the Novell type. 7.
  • Page 806: Configuring Ipx Rip/Sap Filtering

    Configuring IPX RIP/SAP Filtering Configuring IPX RIP/SAP Filtering command is used to add or delete an IPX RIP or SAP Output or Input filter. The IPX RIP/SAP Filtering feature give you a means of controlling the operation of the IPX RIP/ SAP protocols.
  • Page 807: Adding A "Global" Ipx Rip/Sap Filter

    Adding a “Global” IPX RIP/SAP Filter Follow the steps below to add a “global” IPX RIP or SAP filter. 1. Enter A screen similar to the following displays: Enter (or just press 2. The following prompt displays: Enter (or just press filter.
  • Page 808 Configuring IPX RIP/SAP Filtering 8. The following prompt displays: Enter the SAP service type (in hexadecimal format) as defined by NetWare (or press to use the default of all services). 9. A message will confirm the addition of the filter: Adding an IPX RIP/SAP Filter for a Specific Group or VLAN Follow the steps below to add an IPX RIP or SAP Output or Input filter for a specific Group or VLAN.
  • Page 809 7. The following prompt displays: Enter the IPX node mask (in hexadecimal format) to be used (or just press the default mask of all F's). If you selected the default of “all nodes” in the previous step, this step is skipped. 8.
  • Page 810: Deleting An Ipx Rip/Sap Filter

    Configuring IPX RIP/SAP Filtering Deleting an IPX RIP/SAP Filter Follow the steps below to delete an existing IPX RIP or SAP filter. 1. Enter A screen similar to the following displays: Enter to select to delete a filter. 2. A screen similar to the following displays: This screen contains a list of the existing IPX RIP/SAP filters.
  • Page 811: Displaying Ipx Rip/Sap Filters

    Displaying IPX RIP/SAP Filters command is used to display a list of all existing IPX RIP and SAP filters. See Adding a “Global” IPX RIP/SAP Filter on page 27-19 for complete information on creating these filters. You can enter optional parameters with the Displaying a List of All IPX Filters To display a listing of all existing IPX RIP and SAP filters, enter the following command: A screen similar to the following displays:...
  • Page 812: Displaying A List Of "Global" Ipx Filters

    Configuring IPX RIP/SAP Filtering GP:VL (s/p/vc) or (Peer ID) The first number ( ) is the Group associated with this entry. The second number ( VLAN associated with this entry. When a filter applies to all interfaces, this field will say “global.”...
  • Page 813: Ipx Rip/Sap Filter Precedence

    Configuring IPX RIP/SAP Filtering As another example, to display a list of all global RIP Input filters, you would enter: A screen similar to the following displays: IPX RIP/SAP Filter Precedence Whenever you use multiple “allow” filters you must first define a filter to block all RIPs or SAPs.
  • Page 814: Configuring Ipx Serialization Packet Filtering

    Configuring IPX Serialization Packet Filtering Configuring IPX Serialization Packet Filtering command is used to enable and disable IPX Serialization Packet filtering on any or all WAN routing services. This feature can be used to reduce traffic on WAN links by preventing the transmission of NetWare serialization packets.
  • Page 815: Disabling Ipx Serialization Filtering

    5. Filtering will then become active. A message will appear indicating that IPX Serialization Filtering is enabled, either on all WAN routing services or for a specific Group: Disabling IPX Serialization Filtering Follow the steps below to disable IPX Serialization Packet Filtering. 1.
  • Page 816: Configuring Ipx Watchdog Spoofing

    Novell’s IPX Watchdog Protocol, which is used by NetWare to maintain network node and server connections, can consume significant network bandwidth and thereby incur costs on expensive dial-on-demand, pay-per-packet WAN links. The Omni Switch/Router provides an IPX Watchdog Spoofing feature to prevent Watchdog packets from initiating connections on WAN links in situations where no other data is ready to be transferred.
  • Page 817 This example prompt asks if you want to enable spoofing on all WAN routing services. If you had entered a specific Group number, the prompt would refer to that particular Group. Enter to enable IPX Watchdog Spoofing. 5. IPX Spoofing will then become active. A message will appear indicating that IPX Watch- dog Spoofing is enabled, either on all WAN routing services, or for a specific Group: Disabling IPX Watchdog Spoofing Follow the steps below to disable IPX Watchdog Spoofing.
  • Page 818: Configuring Spx Keepalive Spoofing

    Configuring SPX Keepalive Spoofing Configuring SPX Keepalive Spoofing command is used to enable and disable SPX Keepalive Spoofing on any or all WAN routing services. The use of this feature is explained below: Novell’s SPX Keepalive Protocol, which is used by NetWare to maintain SPX connections between end nodes, can also consume significant network bandwidth and thereby incur unnecessary costs on expensive dial-on-demand, pay-per-packet WAN links.
  • Page 819 Enter to proceed to enable spoofing. 4. The following prompt displays: This prompt requires you to verify that you want to enable spoofing in order to avoid the situation of accidental spoofing of SPX packets. This example prompt asks if you want to enable SPX spoofing on all WAN routing services.
  • Page 820: Controlling Ipx Type 20 Packet Forwarding

    Controlling IPX Type 20 Packet Forwarding Controlling IPX Type 20 Packet Forwarding command is used to control the forwarding of IPX Type 20 packets. The default setting is to not forward IPX Type 20 packets. You can use the itly enable the forwarding of Type 20 packets for individual interfaces routing IPX traffic. Type 20 packets contain the value 20 (14 hex) in the “packet type”...
  • Page 821: Configuring Netware To Minimize Wan Connections

    Configuring NetWare to Minimize WAN Connections If you have access to NetWare’s control parameters, you can “fine-tune” your network to minimize traffic on WAN links such as ISDN connections or Frame Relay lines. Doing so will reduce the costs associated with each connection that is made. Some suggested approaches are described below.
  • Page 822 Configuring NetWare to Minimize WAN Connections 6. Novell has developed a workaround that can be used to disable the SPX Watchdog mech- anism. This workaround could be used instead of enabling the SPX Spoofing feature on your switch. is a patch that is used to disable NetWare’s SPX Watchdog SPWXDOG.NLM mechanism on 3.x and 4.x servers.
  • Page 823: Configuring Rip And Sap Timers

    Configuring RIP and SAP Timers The standard time between broadcasts of RIP and SAP messages is 60 seconds. This default may be modified in order to alleviate network congestion or facilitate the discovery of network resources. Adding a RIP and SAP Timer 1.
  • Page 824: Viewing Rip And Sap Timers

    Configuring RIP and SAP Timers Viewing RIP and SAP Timers To view the RIP and SAP timers that have been configured through the enter the following command: A screen similar to the following displays: The fields are defined as follows: Group Displays the group number or RIP Timer (secs)
  • Page 825: Configuring Extended Rip And Sap Packets

    Configuring Extended RIP and SAP Packets Larger RIP and SAP packets may be transmitted so that congestion in the network is reduced. Other switches and routers in the network must support larger packet size if this feature is configured on the switch. Use the command to enable or disable extended packets or to view the current status of extended packet transmission.
  • Page 826: Configuring An Ipx Default Route

    Configuring an IPX Default Route Configuring an IPX Default Route A default IPX route may be configured for packets destined for networks unknown to the switch. If RIP messages are disabled, packets can still be forwarded to a router that knows where to send them.
  • Page 827: Managing Wan Switching Modules

    28 Managing WAN Switching Modules Introduction The Omni Switch/Router WAN Switching Modules (WSXs) are a family of modules that enable the creation of WANs by providing connectivity between geographically-distanced LANs. These modules support a variety of protocols, including Frame Relay, synchronous Point to Point Protocol (PPP), and Integrated Services Digital Network (ISDN).
  • Page 828: Type Of Service (Tos)

    The ToS setting is a feature of Quality of Service (QoS). It was set into the UI to make Voice over IP (VoIP) modules compatible with an Omni Switch/Router that does not have QoS installed. If the QoS image is installed ( do not function.
  • Page 829 If you feel that changing the default values is imperative to the working of the network, the following table is provided to give the hexadecimal values for various settings: IP Precedence Hexadecimal Value Value 5*** *Default settings for signalling data. **Cisco suggested default settings for video data.
  • Page 830: Tos And Qos Interaction

    ToS value for voice signaling. (the default values correspond to compatible values for Alcatel Voice over IP modules). On the Omni Switch/Router or OmniSwitch, when the frame matches either the voice data or voice signaling value the frame is forwarded to the high priority queue without any bandwidth monitoring or restrictions.
  • Page 831: Dtr Dial Backup

    Introduction DTR Dial Backup Currently, a feature is available to use a dynamic ISDN call as a backup WAN connection for a primary WAN connection. The primary WAN connection is a permanent virtual circuit (PVC) with upper layer protocol of Frame Relay or PPP. The DTR Dial Backup feature will allow another synchronous serial interface to be used for the backup purpose.
  • Page 832: Supported Physical Interfaces

    Supported Physical Interfaces Supported Physical Interfaces The WSX family of products support numerous physical interface (port) types. The port types available with the WSX family are: Universal Serial Port The Universal Serial Port (USP) provides connectivity to legacy synchronous serial port devices.
  • Page 833: Supported Protocols

    This section provides several examples of the types of WAN networking possible using WAN switching modules. Frame Relay WSX Using Serial Ports In a typical configuration, the in an OmniAccess 512. Because it is compatible with Omni Switch/Router any-to-any switching and architecture, you can switch other topologies in the VLAN or PPP.
  • Page 834: Back-To-Back Wsx Using T1 Ports

    Application Examples Software in the switch allows you to configure access rate, clocking and protocol-related parameters. Additional software commands allow you to view status at the or protocol level. Extensive statistics are provided at each level, including a breakdown of traffic by frame type (Ethernet, Back-to-Back WSX Using T1 Ports WAN switching modules may be connected “back-to-back”...
  • Page 835: Combined Frame Relay With Isdn Backup

    Combined Frame Relay with ISDN Backup In a typical configuration, the occupies either a slot in a switch chassis or a submodule on an OmniAccess 512. Because it is compatible with Omni Switch/Router any-to-any switching and architecture, you can switch other topologies in the...
  • Page 836: Omni Switch/Router Wan Modules

    Omni Switch/Router WAN Modules Omni Switch/Router WAN Modules The Omni Switch/Router currently supports four Wide Area Network modules: • Provides two serial ports that support the frame relay or WSX-S-2W • Provides 4 or 8 serial ports that support the frame relay or WSX-SC addition, hardware compression is also supported.
  • Page 837: Cable Interfaces For Universal Serial Ports

    Cable Interfaces for Universal Serial Ports automatically senses the cable type that you plug into one of its Universal Serial Ports. It can sense whether the cable type is following interfaces: • RS-232 • RS-449 • RS-530 • V.35 • X.21 (European) All cable types (except ) are capable of access rates from 9.6 kbps to 2 Mbps.
  • Page 838: Data Compression

    Frame Relay (FRF.9) or PPP (STAC-LZS) compression. (An Omni Switch/Router-to-Omni Switch/Router connection would support compression.) Negotiation is necessary because if compressed data is sent to a bridge/router that does not support compression, this bridge/router will not recognize the data and will automatically drop the unrecognizable frames.
  • Page 839: Loopback Detection

    Loopback Detection Loopback Detection Loopback Detection is a common method for Carrier Service Providers to test clients’ circuits in the event of suspected line transmission problems. For both Frame Relay and PPP, loop- back detection involves periodically transmitting a message and looking for that message to be received.
  • Page 840: The Wan Port Software Menu

    The WAN Port Software Menu The WAN Port Software Menu User interface commands for the command. The WAN Port menu is a submenu of the Interface menu. Typing any system prompt displays the following menu: The ISDN menu will only appear on systems with a least one You can start most of the commands by typing the first three (3) letters of the command name.
  • Page 841: Serial Port Example

    The WAN Port Software Menu Serial Port Example In this example, port 1 on slot 3 is a serial port, using Frame-Relay. To modify serial port 3/1, enter: A screen similar to following displays: Page 28-15...
  • Page 842 The WAN Port Software Menu If the interface was using PPP, the following screen would display: Admin Status The options for the Admin Status are transmit data as long as its Operational Status is also data even, if its physical connection is good. Speed in BPS This option specifies the access rate for the Frame Relay or PPP line to the service provider.
  • Page 843 Clocking This field sets the type of clocking used to clock transmit and receive data on the serial port. If the clock goes out-of-phase, you will receive errors. The clocking value is only relevant if the port is a physical port (i.e., port).
  • Page 844 The WAN Port Software Menu Split Clocking Split clocking, which is also known as “loop timing,” uses an additional control signal ) to keep the TXCE the external DTE takes the incoming transmit clock from the submodule and loops it back to TXCE.
  • Page 845 The WAN Port Software Menu TOS for Voice Signaling Data Set the priority for voice signaling data streams. The value must be entered in hexadecimal format translated from binary, and can use either IP Precedence or Differentiated Services Code Point (DSCP). Enter to disable this feature.
  • Page 846 The WAN Port Software Menu Loopback Timeout Sets the transition time between proprietary messages sent over the link. These messages are analyzed to determine whether the link is in a loopback state. This only displays if the port is using Frame Relay as its encapsulation type. The valid range is 0-255. Connection Function On serial ports using PPP, it is possible to configure the port to be a DTR dial backup port.
  • Page 847: Isdn-Bri Port Example

    ISDN-BRI Port Example In this example: port 2 on slot 3 is an ISDN-BRI port. To modify ISDN-BRI port 2/2, enter: A screen similar to following displays: Note that the only parameters you can set for an ISDN port from this screen is the Admin Status and the ToS settings.
  • Page 848 The WAN Port Software Menu Speed in BPS This option specifies the access rate for the Frame Relay or PPP line to the service provider. This parameter is the speed of the entire connection, not an individual virtual circuit. For example, if you have a 56 kbps line to your service provider, this field should be set to 56000.
  • Page 849 You can set up the external DCE this way by configuring its DTE, or dataport, configura- tion options. Set the “Transmit Clock Source” to “External.” In this mode of operation, the transmit clock is output by the DCE device and the submodule turns it around on the external transmit clock back to the DCE, eliminating any phase misalignment between transmit clock and transmit data.
  • Page 850: Fractional T1 Port Example

    The WAN Port Software Menu TOS for Voice Signaling Data Set the priority for voice signaling data streams. The value must be entered in hexadecimal format translated from binary, and can use either IP Precedence or Differentiated Services Code Point (DSCP). Enter above for a more detailed explanation of ToS.
  • Page 851 If the interface was using PPP, the following screen would display: The DTR Pulse settings do not apply to T1 and E1 interfaces, and are not described below. Admin Status The options for the Admin Status are and can transmit data as long as its Operational Status is also enabled. If set to port will not pass data, even if its physical connection is good.
  • Page 852 The WAN Port Software Menu T1/E1 Starting Time Slot This field specifies the first time slot number to use on a T1 or E1 port. For a full T1 or E1 connection, specify time slot 1. For a fractional T1 or E1 connection, set this field to the starting time slot number as specified by your service provider.
  • Page 853: Viewing Parameters For All Submodules In The Chassis

    KeepAlive Timeout The number of 100 millisecond increments between generated echo message requests. This only displays if the port is using PPP as its encapsulation type. The valid range is 0-255. Loopback Timeout Sets the transition time between proprietary messages sent over the link. These messages are analyzed to determine whether the link is in a loopback state.
  • Page 854: Viewing Parameters For All Ports In A Single Submodule

    The WAN Port Software Menu Viewing Parameters for all Ports in a Single Submodule To view port parameters for all ports on a particular followed by the number of the slot. In the following three examples, the port parameters are displayed for an ISDN-BRI board, a serial board, and a T1 board.
  • Page 855: Viewing Port Parameters

    The WAN Port Software Menu Viewing Port Parameters To view port parameters, enter the following command: where is the slot number for WAN uplinks, and is the port number for which you want to view information (either or ). The following three examples show the configuration setup screens for a fractional T1 port, a universal serial port, and an ISDN-BRI port.
  • Page 856 The WAN Port Software Menu This next example displays the configuration view screen for a fractional T1 port (port 1) using PPP. To view 3/1, enter: A screen similar to following displays: The DTR Pulse setting do not apply to T1 and E1 interfaces, and are not described below.
  • Page 857 The WAN Port Software Menu TOS for Voice Data Shows the priority for voice data streams. The value must be entered in hexadecimal format translated from binary, and can use either IP Precedence or Differentiated Services Code Point (DSCP). See Type of Service (ToS) on page 28-2 above for a more detailed explanation of ToS.
  • Page 858 The WAN Port Software Menu Universal Serial Port Example The following example displays the configuration view screen for a universal serial port (port 2). To view 3/2, enter: If the serial port is using Frame-Relay, a screen similar to following displays: If the serial port is using PPP, a screen similar to following displays: Admin Status The options for the Admin Status are...
  • Page 859 The WAN Port Software Menu Clocking This field displays either , or . For a more detailed discussion of clocking, see Clocking under Modifying a Port on page 28-14. Receive Clock Often, due to delays added to timestamps in when running through switch hardware, the receive clock time is significantly different than expected from the transmitting data source.
  • Page 860 The WAN Port Software Menu DTR Pulse Width A Data Terminal Ready (DTR) Pulse is sent at the hardware level to determine a port is still synchronized with its far end connection. The Pulse Width is the number of 100 milli- second increments that the pulse lasts.
  • Page 861 ISDN-BRI Port Example The following example displays the configuration view screen for an ISDN-BRI port (port 2). To view 3/2, enter: A screen similar to following displays: The ISDN options described in the section Modifying a Port on page 28-14. However, they do not apply to an ISDN port, and are not described below.
  • Page 862 The WAN Port Software Menu TOS for Voice Data Shows the priority for voice data streams. The value must be entered in hexadecimal format translated from binary, and can use either IP Precedence or Differentiated Services Code Point (DSCP). See Type of Service (ToS) on page 28-2 above for a more detailed explanation of ToS.
  • Page 863: Deleting Ports

    Deleting Ports command allows you to delete configuration information for a you delete a this information, all WAN configuration parameters for the selected port revert back to default settings. To delete a port configuration, enter the following command: in which is the slot number for the board that you want to delete.
  • Page 864: Obtaining Status And Statistical Information

    The WAN Port Software Menu Obtaining Status and Statistical Information You can obtain general and detailed WAN port statistical information on all switch, a single board, individual ports, and Frame Relay and PPP protocols. The command is used to provide this information. This information includes types of physical interface, access rate of the Frame Relay line, and errors.
  • Page 865 Intf Type This column indicates the physical cable type connected to this port. This cable type is automatically sensed by the hardware. This column indicates the cable type and whether it is . The following values may appear in this column: •...
  • Page 866: Obtaining Information On The Ports For A Single Wsx Board

    The WAN Port Software Menu Speed BPS This column indicates the speed, or access rate, between the physical device. The speed is expressed in bits per second (bps). This speed is the total bandwidth available on the line connected to this port. Virtual circuits on this port share this bandwidth.
  • Page 867 8-Port WSX Board Example In this example, the board in slot 5 is an 8-port This command displays a screen similar to the following: 2-Port Fractional T1 WSX Board Example In this example, the board in slot 8 is a 2-port Fractional T1 slot 8, enter: This command displays a screen similar to the following: The WAN Port Software Menu...
  • Page 868: Viewing Information On A Single Port

    The WAN Port Software Menu Field Descriptions The following section explains the fields and their corresponding values. The port number on the Admin/Oper Status, Int Type, Speed Bps These columns are described in the section, Obtaining Information on All Boards in a Switch on page 28-38.
  • Page 869 Frame Relay Example In the following example, port 1 on slot 4 is configured for Frame Relay. To obtain status information for this port, enter: A screen similar to the following will be displayed: Applicable to all port types. Physical Level Information.
  • Page 870 The WAN Port Software Menu PPP Example In the following example, port 1 on slot 4 is configured for Point-To-Point Protocol (PPP). To obtain status information for this port, enter: A screen similar to the following will display: Page 28-44...
  • Page 871 The section devoted to compressed data traffic statistics will be displayed only if the port has been configured for STAC-LZS compression. For detailed descriptions of the fields, refer to Chapter 30, “Point-to-Point Protocol.” Configuring 31 Timeslots on a WAN E1 Port E1 ports, the unframed format is not supported since framing for PPP or Frame Relay (the “unframed”...
  • Page 872 The WAN Port Software Menu Page 28-46...
  • Page 873: Managing Frame Relay

    Groups on one side of a Frame Relay link are compat- VLAN is capable of Frame Relay IP and IPX occupies one slot in an Omni Switch/Router. Since it is to Frame Relay. The following diagram shows a typical . The FRF.9...
  • Page 874 The supports 256 Permanent Virtual Circuits ( number of virtual ports allowed in an Omni Switch/Router. In addition, you can set up a default bridging and a default routing Group. Virtual circuits are automatically assigned to these Groups as soon as they are configured or learned, which means Frame Relay frames can be bridged or routed without user-configuration.
  • Page 875: Back-To-Back Frame Relay Configurations

    Back-to-Back Frame Relay Configurations Frame Relay switching modules may be connected “back-to-back” without an intervening Frame Relay network or switch. Such connections are made by using private leased lines, such as lines, instead of public Frame Relay networks usually over large geographic distances.
  • Page 876: Universal Serial Port Cable Interfaces

    Universal Serial Port Cable Interfaces Universal Serial Port Cable Interfaces automatically senses the cable type that you plug into one of its universal serial ports. It can sense whether the cable type is ing interfaces: • RS-232 • RS-449 • RS-530 •...
  • Page 877: Setting Configuration Parameters

    Compression Negotiation through software and the Bridge/Router on the other end of the Frame Relay virtual circuit supports standard FRF.9 compression. (An Omni Switch/Router-to-Omni Switch/Router connection would support compression.) Negotiation is necessary because if compressed data is sent to a Bridge/Router that does not support compression, then this Bridge/Router will not recognize the data and will automatically drop the unrecognizable frames.
  • Page 878: Virtual Circuits And Dlcis

    Virtual Circuits and DLCIs Virtual Circuits and DLCIs supports Permanent Virtual Circuits ( Most service carriers do not currently offer dynamic (learned). Static and any configured Data PVCs with the Frame Relay network. Dynamic by the Frame Relay network and not configured in advance. A logical Frame Relay device like the does not create or control dynamic data VCs.
  • Page 879: Wsx Self-Configuration And Virtual Circuits

    WSX Self-Configuration and Virtual Circuits The following diagram summarizes the self-configuration features of the assumes no configuration parameters are entered for the Group 1, and no Routing or Trunking are configured. – Cable plugs into serial port. — Board senses cable type and adjusts circuitry.
  • Page 880: Congestion Control

    Congestion Control Congestion Control Use of Frame Relay lines tends to be “bursty,” with heavy use at times and light use at others. During heavy periods of congestion, data may be discarded. However, Frame Relay uses several software-configurable parameters and techniques to control congestion and to avoid data loss on the network during these heavy periods.
  • Page 881: Discard Eligibility (De) Flag

    Discard Eligibility (DE) Flag The Frame Relay network keeps track of data that is eligible for discard by using a single bit within each frame. When the data rate exceeds the CIR, frames are tagged (i.e., the DE bit is set to 1).
  • Page 882 Congestion Control Frames are shown as broken lines below the Access Rate line. The space between frames indicates the delay between the transmission of each frame. For each second, frames sent within the white zone below the diagonal Access Rate line get through. The shaded area just above the white area contains frames that are stamped for Discard Eligibility that will get through as long as the VC is not congested.
  • Page 883 Notification By BECN Each data link header contains a congestion control flag called Congestion Notification), which is usually pronounced “beckon.” Normally this flag is turned off. As with other packet-based networks, frames in Frame Relay may build up in queues at certain points. When a queue is full, due to congestion, frames will be dropped. The senders of this data (Bridge/Router or Relay uses a congestion notification technique to notify the Bridge/Router that traffic is jammed further down the circuit.
  • Page 884 Congestion Control Notification By FECN Frame Relay headers also contain a congestion control bit called Congestion Notification), which is usually pronounced “Feckon.” Like notifies a or Bridge/Router of congestions problems. However, it is set by the Frame Relay network in frames that are actually experiencing congestion. When the frames with their FECN circuit in the direction that these...
  • Page 885: Frame Formats Supported

    Frame Formats Supported Frames coming in from the Frame Relay network are not translated, but they are manipulated to be compatible for transport over the switch’s headers. The following standard 1490 frame types are supported: • BPDU • Ethernet 802.3 •...
  • Page 886: Bridging Services

    Bridging Services Bridging Services All Frame Relay Virtual Circuits (VCs) belong to a service, whether it be a Bridge, Router, or Trunk service. By default, a virtual circuit belongs to a bridge service. No configuration is necessary for a VC to support bridging on Group 1. However, configuration is necessary for a VC to support Frame Relay Routing, Trunking, or Bridging on a Group other than Group 1.
  • Page 887: Frame Relay Ip Routing

    Frame Relay IP Routing Frame Relay routing is different than standard addresses are used as source and destination addresses. In Frame Relay IP Routing, no addresses are included in a routed frame. In fact, the only address in a routed Frame Relay frame is the , or virtual circuit identifier.
  • Page 888: The Frame Relay Subnet And "Split Horizon"

    Frame Relay IP Routing An InARP message is sent between the two routers indicating their IP addresses and associ- ated VC. Once they know each other’s IP address and the link (the same VC may have a different ing of RIP frames, etc. The Frame Relay Subnet and “Split Horizon”...
  • Page 889 If an additional Router and Subnet were added to the network and a new VC was added to connect the new location, then much of the to Subnet 1.1.1.x. New virtual circuit added for routing to Subnet 4.4.4.x. Adding A New Router Raises New Questions The new attached to Subnet 4.4.4.x connects to the virtual circuit connecting directly to the...
  • Page 890: Frame Relay Ipx Routing

    Frame Relay IPX Routing Frame Relay IPX Routing Frame Relay and IP routing differ in the way they determine the address of a router at each end of a virtual circuit. Instead of using Inverse ing” to determine routing information. In gleaning, the virtual circuit obtains the network node number for the router at other end of the virtual circuit.
  • Page 891: Trunking

    Trunking A trunking service must be set up for each virtual circuit that will support trunking. When trunking is set up, you specify the slot, port, over the virtual circuit. The illustration below shows a sample trunking configuration. The two trunk ports, one to Chicago and one to New York. Trunk port attaches to V C t o L o s A n g e l e s .
  • Page 892: Frame Relay Fragmentation Interleaving

    Frame Relay Fragmentation Interleaving Frame Relay Fragmentation Interleaving The fragmentation interleaving feature allows for the transmission of higher priority traffic to be expedited by setting a maximum frame size. If lower priority traffic exceeds the set frame size value, it is fragmented into smaller pieces less than or equal to the set maximum frame size.
  • Page 893: The Frame Relay Software Menu

    The Frame Relay Software Menu The Frame Relay Software Menu User interface commands for Frame Relay are on a separate menu that you can access through the command. The Frame Relay menu is a sub-menu of the menu. Typing at any system prompt displays the following menu: You can start any of the commands by typing just the first three (3) letters of the command name.
  • Page 894: Modifying A Port

    Setting Configuration Parameters Setting Configuration Parameters When you plug in a board will default the WAN port protocol to frame relay for WSX serial ports, T1 and E1 ports. Commands generic to the WSX module can be found in Chapter 49. By default the WSX frame relay software uses Management Interface ( tion, the access rate defaults to 64 Kbps for RS-232 cables and to 2 Mbps for all other cable...
  • Page 895 Setting Configuration Parameters A screen similar to the following displays: Page 29-23...
  • Page 896 Setting Configuration Parameters You make changes by entering the line number for the option you want to change, an equal sign (=), and then the value for the new parameter. When you are done entering all new values, type at the colon prompt (:) and all new parameters will be saved. The follow- ing sections describe the options you can alter through this menu.
  • Page 897 31) LMI Procedure Type This field specifies the Local Management Interface ( port. You have three choices for the screen correspond to the following: Bidirectional User (the default) Network Enter your choice by specifying the letter corresponding to your choice. 4) Polling Interval T391/nT1 This interval is the time in seconds between port polls the network by sending...
  • Page 898 Setting Configuration Parameters 6) Error Threshold N392/nN2 The number of DLCMI Relay line is down and all associated virtual circuits are inactive. These errors may include timeouts from STATUS ENQUIRY Relay network. By default, this threshold is set to 3, which is the standard Frame Relay default value.
  • Page 899 Frame Relay network admin- istrators. In addition, it should match the setting for the remote Omni Switch/Router or Bridge/Router. Setting Configuration Parameters learns about Data virtual circuits from the o Important Note o only applies to user-side (i.e.,...
  • Page 900 Setting Configuration Parameters 13) Default Compression PRetry Count This option sets the total number of compression negotiation messages that will be sent before giving up and not running compression. You enter the time between these retries in the Default Compression PRetry Time field. The number of retries can range from 3 to 255. The default is 10.
  • Page 901: Modifying A Virtual Circuit

    Setting Configuration Parameters Modifying a Virtual Circuit To modify a virtual circuit, enter the following command: where is the slot number where the board is located, is the port number on board, and is the number used to identify the virtual circuit that you want to modify.
  • Page 902 Setting Configuration Parameters Committed Information Rate (CIR) This field sets the Committed Information Rate (CIR) for this virtual circuit. See Congestion Control on page 29-8 for further information on the CIR. service provider. This option should only be modified by experienced Frame Relay network administrators. Committed Burst Size (Bc) The Committed Burst Size (BC) is the amount of data that the network will guarantee to trans- fer under normal conditions.
  • Page 903 Frame Relay network administra- tors. In addition, it should match the setting for the remote Omni Switch/Router or Bridge/Router. Compression PRetry Count This option sets the total number of compression negotiation messages that will be sent before giving up and not running compression on this virtual circuit.
  • Page 904: Adding A Virtual Circuit

    Adding a Virtual Circuit Adding a Virtual Circuit Data virtual circuits and their Frame Relay network. However, it may be convenient to pre-configure these virtual circuits before connecting to a live network. In such a case you will need to use the to set parameters for the virtual circuit.
  • Page 905: Viewing Configuration Parameters For The Wsx

    Viewing Configuration Parameters for the WSX You can view all current parameters for a command. These parameters will be either the default parameters or parameters you modified using the command or network management software. You have a choice of viewing parameters at the chassis, port or You receive different configuration choices depending upon which level you choose.
  • Page 906: Viewing Port Parameters

    Viewing Configuration Parameters for the WSX Viewing Port Parameters To view port parameters, enter the following command where is the slot number where the number on the board on which you want to view information. For example, if you wanted to view configuration parameters for Port number 1 on the would enter A screen similar to following displays: This screen lists all the current values for the listed parameters.
  • Page 907: Viewing Virtual Circuit Parameters

    Viewing Configuration Parameters for the WSX Viewing Virtual Circuit Parameters To view virtual circuit parameters, enter the following command where is the slot number where the board is located, is the port number on board, and is the number used to identify the virtual circuit that you want to view.
  • Page 908: Deleting Ports And Virtual Circuits

    To delete a virtual circuit, enter the following command where is the Omni Switch/Router slot number for the which the virtual circuit maps, and For example, if you wanted to delete virtual circuit 32 on Port 1 of the...
  • Page 909: Deleting A Port And Its Virtual Circuits

    To truly “delete” a port you must disconnect its cable or set its Administrative Status to Disable. To delete a virtual circuit, enter the following command: where is the Omni Switch/Router slot number for the board, is the port number on the board that you want to delete.
  • Page 910: Information On All Boards In A Switch

    Obtaining Status and Statistical Information Obtaining Status and Statistical Information You can obtain general and detailed Frame Relay statistical information on all the switch, a single command is used to provide this information. This information includes types of physical interface, access rate of the Frame Relay line, and errors. In addition, the can display the number of frames received and transmitted categorized by frame type (i.e., compressed/uncompressed, Ethernet, Information on All Boards in a Switch...
  • Page 911 Intf Type This column indicates the physical cable type connected to this port. This cable type is auto- matically sensed by the hardware. This column indicates the cable type and whether it is . The following values may display in this column •...
  • Page 912 Obtaining Status and Statistical Information Clocking This field indicates the type of clocking used to clock transmit and receive data in and out of the serial port. When the clock is out-of-phase, you receive errors. If this value is set to Exter- nal, then clocking is controlled by the external end of the cable from the a physical...
  • Page 913 Obtaining Status and Statistical Information VCs Active/Inactive Each port will have one or more associated virtual circuits. This column tells you the current status of virtual circuits. These counts do not apply to management virtual circuits. The Data first number is the number of active and the second is the number of inactive .
  • Page 914: Information On The Ports For One Wsx Board

    Obtaining Status and Statistical Information Information on the Ports for One WSX Board To obtain status information on a single with the slot number for the where is the slot number where the to obtain status information for the board in slot 4, you would enter: This command displays a screen similar to the following: Each row in the table corresponds to a port on the The Port number on the...
  • Page 915: Information On One Port

    Obtaining Status and Statistical Information Information on One Port To obtain status information on a single port, you enter the command along with the slot number for the board and the port number for which you want to receive infor- mation, as follows: where is the slot number where the...
  • Page 916 Obtaining Status and Statistical Information Physical Level Information Logical (Frame Relay) Infor- mation Virtual Circuit Level Information Fragmentation Information This command displays three (4) layers of information. The top section provides information on the physical interface. The middle section provides information on the logical, or Frame Relay, interface.
  • Page 917 Physical Layer Information The statistics shown in this section are taken at the physical, or serial, interface level. Administrative/Operational Status This field shows the Administrative and Operational Status of this indicator before the slash refers to the Administrative Status. If enabled and can transmit data as long as its Operational Status is also UP.
  • Page 918 Obtaining Status and Statistical Information Control Signal This table (which displays only for serial ports, not T1 or E1 ports) lists two or more control signals along with their current state. If a attached then this table lists the following signals: •...
  • Page 919 Obtaining Status and Statistical Information Frame Relay Information The statistics shown in the section are gathered at the Frame Relay protocol level. Octets The total octets, or bytes, received (first row) and sent (second row) on this port. The third row shows the cumulative number of octets that have passed through the port (sent and received).
  • Page 920 Obtaining Status and Statistical Information Last Error Type The last type of Frame Relay describes the error types displayed: Last Error Time The time since the last Frame Relay protocol error was received. A value of zero (0) indi- cates no Frame Relay protocol errors have been received. The type of error that was last received is indicated in the Interface Failures The number of times this Frame Relay port has gone down since it was initialized.
  • Page 921 DLCI Layer Information The information in this section of the display provides statistics on virtual circuits. Each row in this table corresponds to one virtual circuit. DLCI Num number assigned to this virtual circuit. This value is only valid locally; the same DLCI virtual circuit on the other end of the Frame Relay line may or may not use the same for this VC.
  • Page 922 Obtaining Status and Statistical Information Fragmentation Information The information in this section of the display provides statistics on fragmentation. Each row in this table corresponds to one virtual circuit. DCLI The virtual circuit that the fragmentation statistics apply to. Frag Size The maximum size of a frame if fragmentation is enabled.
  • Page 923: Information On One Virtual Circuit

    Information on One Virtual Circuit To obtain status information on a single virtual circuit, you enter the with the slot number for the circuit on which you want information, as follows: where is the slot number where the on the board, and obtain status information for the board in slot 4, port 1, This command displays a screen similar to the following:...
  • Page 924 Obtaining Status and Statistical Information The Frame Relay Fragmentation Information gives a break down of the fragmented traffic received and sent by this virtual circuit, with indications if fragmentation is currently enabled and the maximum frame size. The final table provides information on compressed data on this virtual circuit. The following sections describe information in the table.
  • Page 925: Notification By Becn

    Obtaining Status and Statistical Information FECN Bit This value indicates the total number of frames received from the network indicating forward congestion. This occurs when the Frame Relay network sets the frame’s Forward Discard Eligibility ( ) flag. These frames experienced congestion coming over the virtual circuit. FECN Statistics are given only for Frames In for Bit since the Frame Relay network sets it.
  • Page 926: Resetting Statistics Counters

    Resetting Statistics Counters Resetting Statistics Counters You can reset the statistics counters for a single The statistics that are cleared on those that are displayed through the command is used to reset statistics. Resetting Statistics for a WSX Board To reset statistics on a single number for the board, as follows: where...
  • Page 927: Managing Frame Relay Services

    Managing Frame Relay Services By default, all virtual circuits on a Group 1. The command allows you to change this default bridging service to another Group and to set up a default routing service for the port. See Setting Configuration Parame- ters on page 29-22 for information on the To extend your control over a Frame Relay service, you can use Service menu commands.
  • Page 928 Managing Frame Relay Services An overview of each type of service and how each operates in a Frame Relay environment can be found earlier in this chapter in the following sections: • Bridging See Bridging Services on page 29-14. • Routing See Frame Relay IP Routing on page 29-15 and Frame Relay IPX Routing on page 29-18.
  • Page 929: Configuring A Bridging Service

    Configuring a Bridging Service Frame Relay traffic is automatically bridged for Group 1 in a switch. You can alter this default through two different commands: command allows you to change the default Bridging Group from Group 1 to another Group or to turn off bridging completely. This command configures bridging on a port-by-port basis, but does not configure bridging on a virtual circuit basis—all virtual circuits may also be assigned to the Group specified in 29-22 for more information on the...
  • Page 930 Configuring a Bridging Service 5. You need to specify the one virtual circuit may be specified for each bridging service. There is a one-to-one mapping between the Group and the virtual circuit. Enter a 4, an equal sign (=), and the number for the virtual circuit.
  • Page 931: Configuring A Wan Routing Service

    Configuring a WAN Routing Service There are two main steps to configuring 1. Enable and configure routing for a specific (Frame Relay Groups are different from other Groups as far as router configurations are concerned.) 2. Set up a routing service through the Both of these steps are described in the next two sections.
  • Page 932: Step 2. Set Up A Frame Relay Routing Service

    Configuring a WAN Routing Service Step 2. Set Up a Frame Relay Routing Service You create a Frame Relay routing service using the set up a routing service. 1. Enter the command followed the slot number, a slash (/), the port number, and then the service number for the routing service: A screen similar to the following displays: You make changes to the options in this screen at the colon prompt (:).
  • Page 933 6. Specify the Group number to which this router port belongs. Enter a 5, an equal sign (=), and the Group number. The example below includes Group 4 in the routing service: Press You must have previously configured this Group as a Frame Relay Routing Group through command.
  • Page 934: Configuring A Trunking Service

    Configuring a Trunking Service Configuring a Trunking Service To configure a Frame Relay Trunking service, you must use the following steps: 1. Enter the command followed the slot number, a slash (/), the port number, and then the service number for the Trunking service: A screen similar to the following displays: You make changes to the options in this screen at the colon prompt (:).
  • Page 935 5. You need to specify the DLCI Frame Relay network. Only one virtual circuit may be specified for each Trunking service. Enter a 4, an equal sign (=), and the example below: Press 6. Specify the Group number or numbers that you want to be Trunked over the specified virtual circuit.
  • Page 936: Viewing Frame Relay Services

    Viewing Frame Relay Services Viewing Frame Relay Services You can view all Frame Relay services for an entire switch, a single port. Use the The <slot>, <port> and <service number> parameters are not required but may be specified to narrow the range of the information displayed. The following is an example of the Frame Relay portion of the The following sections describe the columns in this table.
  • Page 937: Modifying A Frame Relay Service

    Vport The virtual port associated with this service. For bridging services, there is a one-to-one mapping between a virtual port and a virtual circuit. For routing services, multiple virtual circuits may map to a single virtual port. For trunking services, multiple virtual ports can map to a single virtual circuit.
  • Page 938: Deleting A Frame Relay Service

    Deleting a Frame Relay Service Deleting a Frame Relay Service You can delete a Frame Relay service using the 1. Enter followed by the slot, port and service number for the Frame Relay service that you want to delete. You can obtain the service number by using the Viewing Frame Relay Services on page 29-64.
  • Page 939: Point-To-Point Protocol

    Control Protocols (NCPs) that are used for establishing and configuring different network- layer protocols such as IP and IPX. The implementation of PPP for the Omni Switch/Router WAN Switching Modules supports bridging, IP routing and IPX routing. Data compression of the PPP packets is also supported when the WSX module contains a STAC 9705 Data Compression Coprocessor.
  • Page 940: Multi-Link Ppp

    Data Compression RFC 1974 specifies the use of STAC-LZS compression with PPP. Data compression allows the payload of a PPP packet, including the protocol ID, to be compressed, saving valuable bandwidth. Compression is negotiated during the Network phase using Compression Control Protocol (CCP), which includes the negotiation of a data compression algorithm and any parameters specific to the algorithm.
  • Page 941: Multilink Modes Of Operation

    Multilink Modes of Operation Multilink PPP supports combinations of both permanent and switched connections. This results in two possible modes of operation: • permanent connection only • switched connection only One important thing to remember when setting up multilinks is that all links to be bundled must exist on the same slot.
  • Page 942 On the receiving side, as low priority frames are being received they will be put into the MLPPP reassembly queue, as supported by the existing software. As complete frames are received they will be forwarded to the normal PPP processing. When high priority frames are received, since they will always be sent complete, they will immediately be forwarded to the normal PPP processing.
  • Page 943 The configuration of a T1/E1 interface is described in Chapter 33 titled “Managing T1 and E1 Ports.” The configuration of a universal serial port (USP) on a WSX-S board is described in Chapter 28 titled “Managing WAN Switching Modules.” Step 2. Configure the Operation of PPP Itself The information configured at the PPP level includes the remote and local user IDs and passwords, network protocol information, the use of data compression, and retry and delay information to be used during PPP connection establishment with LCP.
  • Page 944: The Ppp Submenu

    The PPP Submenu The PPP Submenu The WAN menu contains a submenu, named to Point-Protocol (PPP). To display the menu, enter the following commands: A screen similar to the following displays: PPP Configuration Overview Your first configuration step is to create a global PPP configuration record using the command.
  • Page 945: Setting Global Ppp Parameters

    Setting Global PPP Parameters Setting Global PPP Parameters command is used to set global configuration parameters that are used by the PPP protocol. These parameters are termed “global” because they are the default settings used by the switch to establish connections with incoming calls. These global settings are not tied to a specific peer (i.e., a PPP Entity;...
  • Page 946 Setting Global PPP Parameters Default Compression Type Specifies the type of compression that is to be expected on incoming calls. The options are . If you set this parameter to and your callers are using compression, the caller’s connection request may be refused. See Data Compression on page 30-2 for a description of STAC-LZS data compression.
  • Page 947: Adding A Ppp Entity

    Adding a PPP Entity command is used to add a PPP Entity configuration record. The PPP Entities you create are identified by numbers called Peer IDs. When you enter the may enter a Peer ID number with the command like this: Alternatively, you can enter the command alone and you will be prompted for a Peer ID.
  • Page 948 Adding a PPP Entity A screen similar to the following will display: The prompts for Bridging, Routing, Authentication, and Fragmentation Interleaving (numbered 5, 6, 7, and 12 above), contain suboptions that are displayed only if you have enabled those features. These expanded menus are shown below in the relevant sections describing the UI fields.
  • Page 949 You can add the link needed for a PPP Entity later if you decide not to do so now. The automatic execution of the command is done here only as a conve- nience to you. The fields on the configuration screen have the following meanings: Description A textual description for this PPP Entity.
  • Page 950 Adding a PPP Entity Enabling Routing expands the menu with the following suboptions: The suboptions under this heading are: IP Config Admin Status Used to enable or disable the routing of IP packets over PPP. The options are Remote IP Address (Only valid if IP is enabled) Used to specify the Remote IP address of the PPP connection when IP routing is enabled.
  • Page 951 User ID sent to remote for Authentication Used to specify the User ID to be sent to the remote end during PAP or CHAP authentica- tion. This parameter is used only for outgoing calls. Incoming calls use the global defaults (see Setting Global PPP Parameters on page 30-7 for details).
  • Page 952 Adding a PPP Entity Limit Maximum number of fragments to 16 This flag is set to make the interface compatible with Cisco products. When set to PPP packet is never fragmented into more than 16 smaller packets. Page 30-14...
  • Page 953: Modifying A Ppp Entity

    Modifying a PPP Entity command is used to modify the parameters of an existing PPP Entity. To modify a specific PPP Entity, for example Peer ID 1, enter the following command: A screen similar to the following displays: The fields on this screen are the same as those produced by the Adding a PPP Entity on page 30-9 for descriptions of each of these fields.
  • Page 954: Viewing Ppp Entity Configurations

    Viewing PPP Entity Configurations Viewing PPP Entity Configurations command is used to view the configuration parameters of existing PPP Entities. Displaying the Configuration of All PPP Entities To view configuration information on all PPP Entities, enter the following command: A screen similar to the following displays: The fields on this screen have the following meanings: Peer ID The number assigned to this PPP Entity when it was added.
  • Page 955 Viewing PPP Entity Configurations Routing Group Indicates the VLAN Group to be used for PPP Routing of the IP and IPX protocols. A value of zero ( ) indicates that this PPP Entity will not perform a routing service and will discard all routed format packets received or transmitted.
  • Page 956: Displaying Ppp Entity Status

    Displaying PPP Entity Status Displaying PPP Entity Status command is used to view the operational status of one or more PPP Entities. Displaying the Status of All PPP Entities To view the operational status of all PPP Entities, enter the following command: A screen similar to the following displays: The fields on this screen have the following meanings: Peer ID...
  • Page 957 Displaying PPP Entity Status BCP Oper State Indicates the operational state of the Bridging Control Protocol option. means that the bridging operation is active. means that the bridging operation has not yet reached the open state. The reasons why the state may be closed are: 1) the call has been disconnected, 2) the protocol is in the process of making a connection, or 3) the Bridging option was not configured.
  • Page 958 Displaying PPP Entity Status IPCP Pkts IN/OUT The total number of IP Control Protocol (IPCP) packets received ( ) and transmitted ( this PPP connection. IPCP Pkts IN/OUT The total number of IP Control Protocol (IPCP) packets received ( ) and transmitted ( this PPP connection.
  • Page 959: Deleting A Ppp Entity

    Deleting a PPP Entity command is used to delete an existing PPP Entity. 1. Before you can delete a PPP Entity, you must first delete all the links associated with it. You do so using the delete a PPP Entity that still has links associated with it, the following message will be displayed: 2.
  • Page 960 Deleting a PPP Entity Page 30-22...
  • Page 961: Wan Links

    Introduction This chapter describes the procedures for configuring a “WAN link” between an already created PPP Entity (see Chapter 30, Point-to-Point Protocol) and the physical interface that will be used to carry PPP traffic. The procedures described in this chapter comprise the third and final step in the three-step process for configuring the operation of PPP on your Omni Switch/Router (the complete three-step process was also described in Chapter 30).
  • Page 962: The Link Submenu

    The Link Submenu The Link Submenu The WAN menu contains a submenu named WAN Links needed to support the Point-to-Point Protocol (PPP) over various hardware inter- faces. WAN links can either be “fixed” (i.e., configured for a serial port or T1/E1 port), or dial- based (i.e., configured for an ISDN port).
  • Page 963: Adding A Wan Link

    Adding a WAN Link command is used to add link configuration records, or “WAN Links” to the switch. This command defaults to a WSX physical port (serial or Fractional T1/E1). When the command is used to create links over WSX ports, all of the parameters needed to create the link are contained on one screen.
  • Page 964: Adding Isdn Call Links

    Adding a WAN Link Administrative Status Sets the Administrative Status of this WAN Link. The options are “ this link and “ Link Type Specifies the type of physical connection that will carry the link. The options are “ which means a serial or Fractional T1/E1 connection and “ will be used to make the connection.
  • Page 965 2. You must now change the Link Type to ISDN. To do so, enter the following commands: A screen similar to the following displays: 3. You must now enter the ISDN slot and port numbers that will be used by this WAN Link. For example, to use slot 4, port 2, you would enter the following commands: Incoming and backup ISDN calls may dynamically select and use any available slot and port.
  • Page 966 Adding a WAN Link A screen similar to the following displays: The fields on this screen have the following meanings: Link Description A textual description used to identify this WAN Link. Link Administrative Status Sets the Administrative Status of this WAN Link. The options are “ ”...
  • Page 967 Minimum Call Duration The minimum duration of a call, in seconds, starting from the time the call is connected until the call is disconnected. If you enable this field by entering a nonzero value, the Inactivity Timer will be disabled until the time set in the Minimum Call Duration field has passed. Maximum Call Duration The maximum call duration in seconds.
  • Page 968 Adding a WAN Link 4. You must now enter a value in at least the . If you do not make an entry in this field, an error will be returned by the system when you attempt to save and exit the screen. You can also make changes to any of the other fields on this screen if they are needed to provide ISDN call information this WAN Link.
  • Page 969: Modifying A Wan Link

    Modifying a WAN Link command is used to modify the parameters of an existing WAN Link. Different parameters will be displayed by the command based on the type of link. The first subhead- ing (Modifying ISDN Links) below shows the sequence of screens when modifying a link over a WSX port.
  • Page 970: Modifying Wsx Links

    Modifying a WAN Link 2. Make the desired changes to each of the fields on this screen, then enter the command to implement your changes. The system prompt will then reappear. Modifying WSX Links 1. To modify a WAN Link, you must enter its Link Index with the command. For example, to modify Link Index 2 which uses a WSX physical port (serial or Fractional T1/E1), you would enter the following command: A screen similar to the following displays:...
  • Page 971: Deleting Wan Links

    Deleting WAN Links command is used to delete one or more existing WAN Link records. Before you can delete a PPP Entity, you must first delete all WAN Links that have been associated with it. See Deleting a PPP Entity in Chapter 30 for complete information.
  • Page 972: Viewing Wan Links

    Viewing WAN Links Viewing WAN Links command is used to view information on existing WAN Link records. Displaying All Existing WAN Links To view information on all existing WAN Links, enter the following command: A screen similar to the following displays: The fields on this screen have the following meanings: Peer ID The number assigned to the PPP Entity that is related to this WAN Link.
  • Page 973 Incoming Caller ID The phone number reported by the Caller ID service, if available. Peer Speed The specified calling speed for this link. The options are 56000 and 64000 bits/second. Inactivity Timer Specifies the time period (in seconds) after which the connection will be terminated if it is not carrying useful data.
  • Page 974 Viewing WAN Links Example of WSX Serial or T1/E1 Link An example of a link over a WSX serial or Fractional T1/E1 port would look like this: The fields on this screen provide the same information as those on the screen.
  • Page 975: Displaying Link Status

    Displaying Link Status command is used to display the operational status of WAN Links. Displaying Status for All WAN Links To view information on all WAN Links, enter the following command: A screen similar to the following displays: The fields on this screen have the following meanings: Link Index The number assigned to identify this WAN Link.
  • Page 976 Displaying Link Status Peer Call Address The number to which this call is connected. Zero (0) means the number is not available. Connection Time The value of “sysUpTime” (the time of day) when the call was connected. Zero (0) means the call is not currently connected.
  • Page 977 Displaying Link Status Refused Calls The number of calls from the Peer ID that were refused, or any reason, since system start-up. Last Setup Time The value of “sysUpTime” (the time of day) when the last call to this peer was started. For ISDN, this will be the time when the setup message was received from or sent to the network.
  • Page 978 Displaying Link Status Page 31-18...
  • Page 979: Managing Isdn Ports

    Rate Interface (PRI), was intended for users with greater data-transfer capacity requirements, such as offices with a digital PBX. The Omni Switch/Router WSX-BRI board supports only the BRI interface. Future products may be introduced that include support for PRI interfaces.
  • Page 980: U", "S/T" , And "R" Interfaces

    B channels. The D channel can also be used to carry low-speed packet- switched data (the Omni Switch/Router does not support such usage). The H channel, supported only on PRI interfaces, is used to transfer information at higher bit rates by aggregating B channels.
  • Page 981: The Isdn Submenu

    The ISDN Submenu The WAN menu contains a submenu, ports. To switch to, and to display, the A screen similar to the following displays: Switch Configuration This section describes how to configure the ISDN ports on WSX-BRI boards. You use the command to modify the configuration of an ISDN port.
  • Page 982: Modifying An Isdn Configuration Entry

    Modifying an ISDN Configuration Entry Modifying an ISDN Configuration Entry command is used to modify the parameters for a selected ISDN port. These param- eters are typically provided by the telephone carrier or other service provider at the time the ISDN line is installed.
  • Page 983: Deleting An Isdn Configuration Entry

    Deleting an ISDN Configuration Entry command is used to delete one or more ISDN configuration entries. Deleting the configuration entry is equivalent to returning the ISDN port to its default settings. Although you cannot delete a physical ISDN port from the switch, you can remove the configuration entry that was recorded for a port.
  • Page 984: Viewing An Isdn Configuration Entry

    Viewing an ISDN Configuration Entry Viewing an ISDN Configuration Entry command is used to view the configuration of existing ISDN configuration entries. You can either view a configuration summary for all ISDN ports on a specified slot, or display the configuration for a single ISDN port. To view configuration information on all ISDN ports on a specific slot, for example, slot 4, enter the following command: A screen similar to the following displays:...
  • Page 985: Displaying Isdn Configuration Entry Status

    Displaying ISDN Configuration Entry Status command is used to view the operational status of existing ISDN configuration entries. You can select to view the status of all ISDN ports, or select to display the status of a single ISDN port. Displaying Status of All ISDN Ports To view status information of the ISDN channels on all ISDN ports, enter the following command:...
  • Page 986 Displaying ISDN Configuration Entry Status Displaying Status of a Specific ISDN Slot To view status information on all ISDN channels on a specific ISDN slot, for example, slot 4, enter the following command: A screen similar to the following displays: The fields on this screen have the following meanings: The number of incoming calls Indicates the number of incoming calls received on this interface.
  • Page 987: Displaying Status Of A Specific Isdn Slot

    Oper Status Indicates the current call control state for this interface. The possible entries are: means the B Channel is idle: no call or call attempt is in progress. means a connection attempt (outgoing call) is being made. means an incoming call is currently in the process of validation. means a call is currently active.
  • Page 988 Displaying ISDN Configuration Entry Status Page 32-10...
  • Page 989: Managing T1 And E1 Ports

    33 Managing T1 and E1 Ports T1 and E1 ports are supported on a variety of switching modules. In the Omni Switch/Router, T1 and E1 are used as standard WAN access portss. The following switching modules contain T1 or E1 ports: •...
  • Page 990: T1 And E1 Overview

    T1 and E1 Overview T1 and E1 Overview Carrier digital services were designed primarily to support digitized voice over long distances. Digital services are the primary method for carrying voice between two endpoints using two pairs of copper wire. Digital wide-area data networking uses the same digital services that were originally designed for digitized voice.
  • Page 991: The T1/E1 Menu

    The T1/E1 Menu The commands for configuring and monitoring submenu. This submenu displays as shown below and may be accessed (when in verbose mode) by entering at a system prompt. The commands in this menu are described in the following sections. The first command, displays configuration information on ports.
  • Page 992: Configuring A T1 Port

    Configuring a T1 Port Configuring a T1 Port command configures a T1 port at the physical level and is generic to all such ports regardless of the logical level service, such as circuit emulation, that controls them. To configure a T1 port, enter the following command where is the slot number where the board is located, and on the board that you want to modify.
  • Page 993 If you choose the format, then the framer will not look for Channel Associated Signalling ( ). Data is treated as a data stream. When used in a circuit emulation applica- tion, this option must be chosen when configuring an “unstructured” circuit emulation service. You cannot use the unframed format on WAN modules.
  • Page 994 Configuring a T1 Port 5) Facility Datalink Facility Datalink ( ) gathers performance statistics every second and stores them in the 24- hour local statistical database. It also sends local performance statistics to the remote T1 port depending on the type of In order to obtain far-end, or remote, performance statistics (viewed through the commands), you must enable an Facility Datalink requires a T1 port and the frame type...
  • Page 995 8) Loopback Mode The loopback configuration for this port. Loopback configurations describe the relation between the device attached to a Framing functionality assembles depending on how the port is configured. Possible values are as follows: The port is not in a loopback state. This is the typical live network state for a port.
  • Page 996: Configuring An E1 Port

    Configuring an E1 Port Configuring an E1 Port command configures an E1 port at the physical level and is generic to all such ports regardless of the logical level service, such as circuit emulation, that controls them. You configure the circuit emulation service that controls this port through the To configure an E1 port, enter the following command where is the slot number where the board is located, and...
  • Page 997 2) Frame Format Specify the E1 frame format to be used on this port. The choices are as follows: Standard E1 frame format using the framing bits in time slot 0 for framing. E1 frame using framing bits in both time slot 0 and ing.
  • Page 998 Configuring an E1 Port 6) Transmit Clock Source The source of the transmit clock. Loop timing means the receive clock (recovered from receive data) is used as the transmit clock. Local timing indicates the local clock source (generated from s) is used as the transmit clock. The transmit clock source is related to the clocking mode used in circuit emulation services.
  • Page 999: Viewing T1/E1 Configuration And Alarm Information

    Viewing T1/E1 Configuration and Alarm Information You can view all current parameters and alarms for a These parameters will be either the default parameters or parameters you modified through command or network management software. You have a choice of viewing parameters at the chassis or port level. You receive different displays depending upon which level you choose.
  • Page 1000: Viewing Information For T1/E1 Ports On One Module

    Viewing T1/E1 Configuration and Alarm Information The port has experienced a Loss of Signal ( event occurs after 175 contiguous pulse positions with no pulses (10 absent pulses on observes a single pulse. This port is receiving loss of multiframe ( port.
  • Page 1001: Viewing Information For A T1 Port

    Viewing T1/E1 Configuration and Alarm Information Viewing Information For a T1 Port To view T1 port parameters, enter the following command where is the slot number where the board is located, and is the T1 port number on the board on which you want to view information. For example, to view information for Port 2 on the board in slot 5, enter A screen similar to following displays for a port:...

Table of Contents