Extreme Networks ExtremeWare XOS Guide Manual page 468

Concepts guide
Hide thumbs Also See for ExtremeWare XOS Guide:
Table of Contents

Advertisement

Glossary
P (continued)
PMBR
policy files
port mirroring
POST
primary port
protected VLAN
proxy ARP
PVST+
ExtremeWare XOS 11.1 Concepts Guide
PIM multicast border router. A PIMBR integrates PIM-DM and PIM-
SM traffic.
You use policy files in ExtremeWare XOS to specify ACLs and
policies. A policy file is a text file (with a .pol extension) that specifies
a number of conditions to test and actions to take. For ACLs, this
information is applied to incoming traffic at the hardware level.
Policies are more general and can be applied to incoming routing
information; they can be used to rewrite and modify routing
advertisements.
Port mirroring configures the switch to copy all traffic associated with
one or more ports to a designated monitor port. A packet bound for or
heading away from the mirrored port is forwarded onto the monitor
port as well. The monitor port can be connected to a network analyzer
or RMON probe for packet analysis. Port mirroring is a method of
monitoring network traffic that a network administrator uses as a
diagnostic tool or debugging feature; it can be managed locally or
remotely.
Power On Self Test. On Extreme Networks switches, the POST runs
upon powering-up the device. If the MGMT LED is yellow after the
POST completes, contact your supplier for advice.
In EAPS, a primary port is a port on the master node that is
designated the primary port to the ring.
In STP, protected VLANs are the other (other than the carrier VLAN)
VLANs that are members of the STPD but do not define the scope of
the STPD. Protected VLANs do not transmit or receive STP BPDUs,
but they are affected by STP state changes and inherit the state of the
carrier VLAN. Also known as non-carrier VLANs, they carry the data
traffic.
In EAPS, a protected VLAN is a VLAN that carries data traffic
through an EAPS domain. You must configure one or more protected
VLANs for each EAPS domain. This is also known as a data VLAN.
This is the technique in which one machine, usually a router, answers
ARP requests intended for another machine. By masquerading its
identity (as an endstation), the router accepts responsibility for routing
packets to the real destination. Proxy ARP allows a site to use a single
IP address with two physical networks. Subnetting is normally a
better solution.
Per VLAN Spanning Tree +. This implementation of STP has a 1:1
relationship with VLANs. The Extreme Networks implementation of
PVST+ allows you to interoperate with third-party devices running
this version of STP. PVST is a earlier version of this protocol and is
compatible with PVST+.
468

Advertisement

Table of Contents
loading

This manual is also suitable for:

Extremeware xos 11.1

Table of Contents