Extreme Networks ExtremeWare Enterprise Manager Installation And User Manual
Extreme Networks ExtremeWare Enterprise Manager Installation And User Manual

Extreme Networks ExtremeWare Enterprise Manager Installation And User Manual

Version 2.0
Table of Contents

Advertisement

Quick Links

ExtremeWare
Enterprise Manager
Installation and User
Guide
Version 2.0
Extreme Networks, Inc.
3585 Monroe Street
Santa Clara, California 95051
(888) 257-3000
http://www.extremenetworks.com
Published: November 1999
Part number: 100008-00 Rev A

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the ExtremeWare Enterprise Manager and is the answer not in the manual?

Questions and answers

Summary of Contents for Extreme Networks ExtremeWare Enterprise Manager

  • Page 1 ExtremeWare ™ Enterprise Manager Installation and User Guide Version 2.0 Extreme Networks, Inc. 3585 Monroe Street Santa Clara, California 95051 (888) 257-3000 http://www.extremenetworks.com Published: November 1999 Part number: 100008-00 Rev A...
  • Page 2 Extreme Networks, Inc., which may be registered or pending registration in certain jurisdictions. The Extreme Turbodrive logo is a service mark of Extreme Networks, which may be registered or pending registration in certain jurisdictions. All other registered trademarks, trademarks and service marks are...
  • Page 3: Table Of Contents

    Support for Summit Virtual Chassis Stacks Policy-based Quality of Service Simple Inventory Management Real-Time Statistics The MAC/IP Address Finder Security Management ExtremeWare Enterprise Manager Components Extreme Networks Switch Management Hardware and Software Requirements Extreme Networks Device Requirements Third-Party Device Requirements Server Requirements Client Requirements 1-10...
  • Page 4 NSTALLING THE XTREME NTERPRISE ANAGER Installation Overview Installing on a Windows NT System Installing the Enterprise Manager Server Updating an Evaluation Version to a Licensed Version Uninstalling the Enterprise Manager Server Installing on a SPARC Solaris System Installing the Enterprise Manager Server Updating an Evaluation Version to a Licensed Version 2-12 Uninstalling the Enterprise Manager Server...
  • Page 5 Starting the Enterprise Manager Client for the First Time Changing the Admin Password Adding or Modifying User Accounts Deleting Users Changing Your Own User Password RADIUS Administration SING THE NVENTORY ANAGER Overview of the Enterprise Manager Device Inventory Device Groups Port Groups Gathering Device Status Information Displaying the Network Device Inventory...
  • Page 6 Copy/Paste from an Interactive Telnet Session 6-14 Macro Recording and Playback from an Interactive Telnet Session 6-15 Using Telnet with Cisco Devices 6-15 VLAN M SING THE ANAGER Overview of Virtual LANs Displaying VLANs Adding a VLAN Deleting a VLAN Modifying a VLAN 7-10 Adding and Deleting Protocol Filters...
  • Page 7 Custom Policy Definition Tab 8-32 The Status Tab 8-34 The Scope Tab 8-35 The Overlaps Tab 8-37 The Precedence Tab 8-38 The QoS Results Tab 8-41 Viewing and Modifying Network QoS Treatments 8-42 Adding or Modifying Local Users 8-44 Adding or Modifying User Groups 8-47 Adding or Modifying End Stations 8-48...
  • Page 8 TATISTICS Overview 10-1 Displaying Multiport Statistics 10-3 Displaying Statistics For a Single Port 10-7 Changing the Display Mode 10-9 Setting Graph Preferences 10-11 IP/MAC A SING THE DDRESS INDER Overview of the IP/MAC Finder Applet 11-1 Tasks List Summary Window 11-2 Creating a Search Task 11-4...
  • Page 9 ATABASE TILITIES Overview The Validation Utility Using the DBVALID Command-line Utility Database Connection Parameters The Backup Utility The DBBACKUP Command-line Utility Database Connection Parameters Installing a Backup Database XTREME NTERPRISE ANAGER ROPERTIES ILES The extreme.properties File The ciscoipports.properties File ROUBLESHOOTING ExtremeWare Enterprise Manager Server Issues Installation SNMP...
  • Page 11 Figures ExtremeWare Enterprise Manager software architecture ExtremeWare Enterprise Manager Start-up page 2-15 Security warning prior to downloading the signed client applet 2-16 ExtremeWare Enterprise Manager Start-up page ExtremeWare Enterprise Manager Login page The About ExtremeWare Enterprise Manager page VLAN Manager applet running in a browser window 3-10 Inventory Manager applet 3-12...
  • Page 12 5-11 Add Port Group window in the Inventory Manager 5-17 5-12 Devices tab of the Modify Devices, Device Groups, and Port Groups window. 5-19 5-13 Device Groups tab of the Modify Devices, Device Groups, and Port Groups window. 5-20 Port Groups tab of the Modify Devices, Device Groups, and Port 5-14 Groups window.
  • Page 13 7-11 Protocol Panel dialog box, Add Protocol page 7-14 Application Server Policy Client/Server Policy Source Port Policy VLAN Policy Basic Policy Definition The Policy System main view 8-13 Using the policy object selector to specify policy components 8-16 Pop-up selection box for Policy type 8-20 Create: Network QoS Policy page for a VLAN policy 8-21...
  • Page 14 8-30 The Import Data view 8-58 8-31 The Event Log 8-59 Virtual Chassis Stack Manager display of known Virtual Chassis stacks Details of an individual Virtual Chassis Stack Detail view of a Virtual Chassis component of a VC stack Orphan Virtual Chassis Connections Orphan switches Virtual Chassis connections Creating a VC stack 9-10...
  • Page 15 Tables Text Conventions xviii Inventory Manager Device Status Indicators ExtremeView Switch Status Indicators ExtremeView Macro Variables 6-12 Default QoS Treatments 8-43 dbvalid Command Switches Database Connection Parameters for dbvalid Utility dbbackup Command Switches Database Connection Parameters for dbbackup Utility...
  • Page 17: Preface

    Preface This Preface provides an overview of the ExtremeWare Enterprise Manager ™ Installation and User Guide, describes guide conventions, and lists other useful publications. NTRODUCTION This guide provides the required information to install and use the ExtremeWare Enterprise Manager software. It is intended for use by network managers who are responsible for monitoring and managing Local Area Networks, and assumes a basic working knowledge of: •...
  • Page 18: Terminology

    REFACE ERMINOLOGY When features, functionality, or operation is specific to a particular model of the Summit family, the model name is used (for example, Summit1 or Summit4). Explanations of features and operations that are the same among all members of the Summit family simply refer to the product as the Summit.
  • Page 19 • BlackDiamond User Guide • The Summit Virtual Chassis Design and Installation Guide The Extreme Networks web site provides much useful information: • For general information about Extreme Networks, see the Extreme Networks home page: http://www.extremenetworks.com • A link to the ExtremeWare Enterprise Manager User Guide in PDF format may be found at: http://www.extremenetworks.com/support/documentation.htm...
  • Page 20 REFACE XTREME NTERPRISE ANAGER NSTALLATION AND UIDE...
  • Page 21: Extremeware Enterprise Manager Overview

    Today’s corporate networks commonly encompass hundreds or thousands of systems, including individual end user systems, servers, network devices such as printers, and ™ internetworking systems. Extreme Networks recognizes that network managers have ™ different needs, and delivers a suite of ExtremeWare management tools to meet those needs.
  • Page 22: Summary Of Features

    You can set VLAN configuration and policy-based Quality of Service policies across the network. Centralized and distributed stacks of Summit switches can be managed as aggregated entities. Extreme Networks switches and selected Cisco devices can be monitored and controlled from a central web-based interface, without exiting ExtremeWare Enterprise Manager to run a separate program or telnet session.
  • Page 23: Enterprise-Wide Vlan Management

    UMMARY OF EATURES The ExtremeView applet displays detailed information about the status of Extreme switches (Summit and Black Diamond switches) in a number of categories. Any Enterprise Manager user can view status information about these network devices known to the Enterprise Manager. Users with the appropriate access permissions can also view and modify configuration information for those switches using either the ExtremeWare Vista graphical user interface, or through Telnet and the ExtremeWare Command Line Interface (CLI).
  • Page 24: Policy-Based Quality Of Service

    XTREME NTERPRISE ANAGER VERVIEW OLICY BASED UALITY OF ERVICE Policy-based management is used to protect and guarantee delivery of mission-critical traffic. A network policy is a set of high-level rules for controlling the priority of, and amount of bandwidth available to, various types of network traffic. Leveraging ExtremeWare 5.0’s Policy-Based Quality of Service (QoS) capabilities, the ExtremeWare Enterprise Manager Policy System offers a powerful set of easy-to-use policy management tools that meet the application-specific needs of today’s networks.
  • Page 25: Real-Time Statistics

    MAC/IP A DDRESS INDER The IP/MAC Address Finder applet lets you search for network addresses (MAC or IP addresses) and identify the Extreme Networks switch and port on which the address resides. ECURITY ANAGEMENT In order to access the ExtremeWare Enterprise Manager features, a user must log in with a user name and a password.
  • Page 26 • Administrator—users who can modify device parameters as well as view status information and statistics. These permissions enable access to Extreme Networks switches through Telnet or ExtremeWare Vista. The use of the RADIUS server avoids the need to maintain user names, passwords, and access permissions in each switch, and instead centralizes the configuration in one location in the ExtremeWare Enterprise Manager.
  • Page 27: Extremeware Enterprise Manager Components

    XTREME NTERPRISE ANAGER OMPONENTS Figure 1-1: ExtremeWare Enterprise Manager software architecture XTREME ETWORKS WITCH ANAGEMENT ExtremeWare Enterprise Manager uses SNMP to monitor and manage the Extreme switches in the network. To avoid the overhead of frequent device polling, the ExtremeWare Enterprise Manager uses a mechanism called SmartTraps to identify changes in device status and configuration.
  • Page 28: Extreme Networks Device Requirements

    XTREME ETWORKS EVICE EQUIREMENTS The ExtremeWare Enterprise Manager can manage Extreme Networks Summit and BlackDiamond switches running the ExtremeWare software release 2.0 or later within the switch. However, features such as the Policy-Based Management Service require ExtremeWare 5.0 or later.
  • Page 29: Server Requirements

    ARDWARE AND OFTWARE EQUIREMENTS ERVER EQUIREMENTS The ExtremeWare Enterprise Manager Server can run under Microsoft Windows NT or Sun Microsystems’ Solaris Operating Environment, SPARC Platform Edition. For installation under Windows NT, the requirements are: • Microsoft Windows NT 4.0 running on an Intel platform •...
  • Page 30: Client Requirements

    XTREME NTERPRISE ANAGER VERVIEW Required patches for Solaris 7: Patch Number Description 106984-04 libthread patch 107078-03 OpenWindows 3.6.1 Xsun patch ExtremeWare Enterprise Manager also provides software to enable you to launch the Enterprise Manager client from within HP OpenView, either from the Tools menu or from a pop up menu from the Network Node Manager map.
  • Page 31: Installing The Extremeware Enterprise Manager

    Installing the ExtremeWare Enterprise Manager This chapter describes how to do the following: • Install the ExtremeWare Enterprise Manager Server under either Windows NT or the Solaris Operating Environment • Install the browser-based client software NSTALLATION VERVIEW The ExtremeWare Enterprise Manager software includes a set of Java applications, a Web Server, and database software.
  • Page 32 NSTALLING THE XTREME NTERPRISE ANAGER Note: See the ExtremeWare Enterprise Manager Release Notes for the most current information on installation requirements. The ExtremeWare Enterprise Manager server installation process installs two components: • The ExtremeWare Enterprise Manager Database Engine • The ExtremeWare Enterprise Manager Web Server NT S NSTALLING ON A INDOWS...
  • Page 33: Installing On A Windows Nt System

    NT S NSTALLING ON A INDOWS YSTEM The ExtremeWare Enterprise Manager Welcome screen appears. 4 Follow the on-screen instructions to progress through the Welcome screen. 5 If you are running a previous version of ExtremeWare Enterprise Manager, you are notified that the EEM 1.x services will be stopped in order to install EEM 2.0. If this is acceptable, click Yes.
  • Page 34 — The port number you just entered for the database TCP port. — Any port number already in use by another process. 14 To view an Extreme Networks on-screen video while the installation is taking place, click Yes. Click No to proceed without the on-screen video.
  • Page 35 NT S NSTALLING ON A INDOWS YSTEM If you answer Yes, an MS-DOS window will appear briefly while the database contents are dumped from the old 1.x database and loaded into the 2.0 database. 18 If HP OpenView is installed on the system where you are installing the ExtremeWare Enterprise Manager server, the installation software asks if you want to integrate with HP OpenView.
  • Page 36 NSTALLING THE XTREME NTERPRISE ANAGER is the 11-character license key found on the License Agreement shipped with <key> the ExtremeWare Enterprise Manager software. Type the key exactly as it is shown on the License Agreement. If the license update is successful, the message “ ”...
  • Page 37: Installing The Enterprise Manager Server

    SPARC S NSTALLING ON A OLARIS YSTEM For the most current information on required patches, see the ExtremeWare Enterprise Manager Release Note that accompanies your ExtremeWare Enterprise Manager software. Patches for Solaris 2.6: Patch Number Description 105181-11 Recommended kernel update 105210-17 Required libc patch 105490-05...
  • Page 38 3 Run the installation script: ./install.sh The ExtremeWare Enterprise Manager Welcome message appears as follows: ****************************************************************** Welcome to the Extreme Networks ExtremeWare Enterprise Manager install program. This program will install: ExtremeWare Enterprise Manager version 2.0.0 on this system. ****************************************************************** Please review the following software license terms and conditions.
  • Page 39: Installing On Asparc Solaris System

    SPARC S NSTALLING ON A OLARIS YSTEM /opt/eem20: No such directory. Do you wish to create it? (y/n)[y] Assuming you want to create the directory, accept Y as the default. If you answer N, the script will assume the directory already exists. 7 The installation script now copies and installs the ExtremeWare Enterprise Manager files: Installing ExtremeWare Enterprise Manager files...
  • Page 40 NSTALLING THE XTREME NTERPRISE ANAGER For purchased products, this is found on the license agreement sheet included with the product. ’Evaluation’ will grant a 30 day evaluation license. Please enter the license key: [Evaluation] If you have purchased the product and received a license key from Extreme Networks, enter it here.
  • Page 41 SPARC S NSTALLING ON A OLARIS YSTEM — Any port number already in use by another process. 12 Finally, you are asked to confirm the configuration parameters: *** Configuration Please review the following items. Upgrade = NO License = <the key you entered or “Evaluation” > Database Port = <the port you entered or 2638 >...
  • Page 42 NSTALLING THE XTREME NTERPRISE ANAGER If you are upgrading from an earlier version of ExtremeWare Enterprise Manager, you will also see the following: *** Database Upgrade Upgrading Database... Upgrading from EEM 1.1 Generating sql files... Dumping data from tables in old database ... Loading data into tables in new database ...
  • Page 43 SPARC S NSTALLING ON A OLARIS YSTEM For example, if you installed in the default directory, enter: /opt/eem20/instlic <key> is the 11-character license key found on the License Agreement shipped with <key> the ExtremeWare Enterprise Manager software. Type the key exactly as it is shown on the License Agreement.
  • Page 44 NSTALLING THE XTREME NTERPRISE ANAGER NSTALLING THE NTERPRISE ANAGER LIENT In order to run the ExtremeWare Enterprise Manager client, Web browser software must be installed. • Under Windows 95 or Windows NT, install Microsoft Internet Explorer 5.0 with the Microsoft 5.x JVM. To download Internet Explorer 5.0, go to http://www.microsoft.com/ie/ The Enterprise Manager client will also run with Internet Explorer 4.0 with the...
  • Page 45: Installing The Enterprise Manager Client

    NSTALLING THE NTERPRISE ANAGER LIENT that you assigned to the ExtremeWare Enterprise Manager Web Server during installation. Note: If you used the default web server port, 80, you do not need to include the port number. The Enterprise Manager Start-up page appears, as shown in Figure 2-1. Figure 2-1: ExtremeWare Enterprise Manager Start-up page 2 From the Enterprise Manager Start-up page click Launch Installed ExtremeWare Enterprise Manager.
  • Page 46: Security Warning Prior To Downloading The Signed Client

    NSTALLING THE XTREME NTERPRISE ANAGER Figure 2-2: Security Warning prior to downloading the signed client applet 3 To continue with the download, click Yes. To get more information about the applet, the security certificate or the permissions that are being granted, select any of the links on the page, or click the More Info button.
  • Page 47: Starting The Extremeware Enterprise Manager

    Starting the ExtremeWare Enterprise Manager This chapter describes: • Starting the ExtremeWare Enterprise Manager Server. • Launching an Enterprise Manager Client. • Navigating the Enterprise Manager pages. When you log in for the first time after installing the ExtremeWare Enterprise Manager server software, there are only two user accounts enabled—an Administrator account “admin,”...
  • Page 48: Starting Or Restarting The Enterprise Manager Server

    TARTING THE XTREME NTERPRISE ANAGER TARTING OR ESTARTING THE NTERPRISE ANAGER ERVER If you have not installed the components as a service, you must start them manually after you boot the server system. You can do this from the Windows NT Start menu. The ExtremeWare Enterprise Manager Server consists of two components: •...
  • Page 49: Services

    UNNING THE NTERPRISE ANAGER NDER INDOWS 4 Repeat the same actions for the EEM Database Engine. If the components are running as regular applications, follow these steps to shut them down: 1 Double-click on the ExtremeWare Enterprise Manager 2.0 Server button on the Windows Taskbar to bring up the ExtremeWare Enterprise Manager 2.0 Server MS-DOS window.
  • Page 50: Running The Enterprise Manager Under Solaris

    TARTING THE XTREME NTERPRISE ANAGER UNNING THE NTERPRISE ANAGER NDER OLARIS The following instructions assume that you are using a command or Xterm window running the C shell. TARTING OR ESTARTING THE NTERPRISE ANAGER ERVER To run the Enterprise Manager Server: 1 Set the current directory: cd <install_dir>...
  • Page 51 AUNCHING THE XTREME NTERPRISE ANAGER LIENT AUNCHING THE XTREME NTERPRISE ANAGER LIENT The Enterprise Manager client user interface is a Java-based application that runs within a Java-enabled browser such as Microsoft Internet Explorer 4.72 or later under Windows 95 or Windows NT, or Netscape Communicator (Navigator) version 4.0.7 or later under Solaris or HP-UX.
  • Page 52: Extremeware Enterprise Manager Start-Up Page

    TARTING THE XTREME NTERPRISE ANAGER Figure 3-1: ExtremeWare Enterprise Manager Start-up page 3 You are presented with several ways to run the ExtremeWare Enterprise Manager client: For Windows NT or Windows 95 running Internet Explorer: — Click Launch ExtremeWare Enterprise Manager to launch the Enterprise Manager using the JVM in the browser.
  • Page 53: Launching The Extremeware Enterprise Manager Client

    AUNCHING THE XTREME NTERPRISE ANAGER LIENT — Click Launch ExtremeWare Enterprise Manager with the Java Plug-In to launch the Enterprise Manager using Sun’s Java plug-in. If the most current version of the plug-in is not available, you will be prompted to download it, and will be led through the brief installation process.
  • Page 54 TARTING THE XTREME NTERPRISE ANAGER To log into ExtremeWare Enterprise Manager: 1 Type your user name in the User field if you already have an ExtremeWare Enterprise Manager user account. — If you are the network administrator logging in to the Enterprise Manager server for the first time since it has been installed, log in as “admin.”...
  • Page 55: Navigating The Enterprise Manager Functions

    AVIGATING NTERPRISE ANAGER UNCTIONS Navigation Toolbar Main applet frame Figure 3-3: The About ExtremeWare Enterprise Manager page • The Navigation Toolbar, on the left, displays a set of buttons you can use to access various Enterprise Manager modules. — About returns you to the display shown in Figure 3-3. —...
  • Page 56: Vlan Manager Applet Running In A Browser Window

    TARTING THE XTREME NTERPRISE ANAGER — EView runs the ExtremeView applet. — Policy runs the Policy System applet. — RT Stats runs the Real Time statistics applet. — Find IP/MAC runs the MAC/IP Address Finder applet. — Logoff ends your session and returns you to the Login display. •...
  • Page 57: The Component Tree

    AVIGATING NTERPRISE ANAGER UNCTIONS Enterprise Manager applets use a two-panel display within the main applet frame. The two panels are: • The Component Tree. • A component status/detail information panel. In addition, some applets provide an applet-specific set of buttons at the top of the main applet frame.
  • Page 58: Inventory Manager Applet

    TARTING THE XTREME NTERPRISE ANAGER Column heading separators Figure 3-5: Inventory Manager applet Click on a component in the Component Tree to display information about that component. In Figure 3-5, the selected component is the Default device group. The component status/detail panel displays summary status information about each device in this device group.
  • Page 59: Moving The Component Tree Boundary

    AVIGATING NTERPRISE ANAGER UNCTIONS OVING THE OMPONENT OUNDARY You can move the boundary between the Component Tree panel and the main applet panel by following these steps: 1 Place the cursor over the line separating the panels. 2 Click and hold the left mouse button to “grab” the panel separator. 3 Drag the separator until the panels are the desired widths.
  • Page 60: Pop-Up Dialog Box For Adding A Vlan In The Vlan

    TARTING THE XTREME NTERPRISE ANAGER Figure 3-6: Pop-up dialog box for adding a VLAN in the VLAN Manager A dialog box can contain the following types of fields: • Text fields, such as the VLAN Name field in Figure 3-6. Enter text or numbers by clicking in the field and then typing.
  • Page 61: Administering The Extremeware Enterprise Manager

    Administering the ExtremeWare Enterprise Manager This chapter describes how to use the Administration applet for the following: • Adding ExtremeWare Enterprise Manager users. • Setting and modifying user permissions for both the Enterprise Manager and ExtremeWare. • Changing a user’s password. •...
  • Page 62: Extremeware Access

    • Administrator—users who can modify device parameters as well as view status information and statistics. These permissions enable access to Extreme Networks switches through Telnet or ExtremeWare Vista. The use of the RADIUS server avoids the need to maintain user names, passwords, and access permissions in each switch, and instead centralizes the configuration in one location in the ExtremeWare Enterprise Manager.
  • Page 63 TARTING THE NTERPRISE ANAGER LIENT FOR THE IRST TARTING THE NTERPRISE ANAGER LIENT FOR THE IRST The two default users, admin and user, do not initially have passwords. It is strongly recommended that you log in the first time with the user name admin, and immediately change the admin user password.
  • Page 64: Changing The Admin Password

    DMINISTERING THE XTREME NTERPRISE ANAGER Figure 4-1: User Administration window HANGING THE DMIN ASSWORD To change the Admin password: 1 Click the tab at the top of the page to display the User Administration page, if necessary. 2 Select the user admin in the User list. 3 Click Modify.
  • Page 65 TARTING THE NTERPRISE ANAGER LIENT FOR THE IRST Figure 4-2: Edit User window 4 Type a new password in the Password field. 5 Type the password again in the Verify Password field. 6 Click OK. The new admin password is stored in the Enterprise Manager database. You cannot change the ExtremeWare Enterprise Manager access level for this user.
  • Page 66: Adding Or Modifying User Accounts

    DMINISTERING THE XTREME NTERPRISE ANAGER DDING OR ODIFYING CCOUNTS To add users to the Enterprise Manager database, or to modify ExtremeWare Enterprise Manager user account access, follow these steps: 1 Login to the ExtremeWare Enterprise Manager as a user with Administrator access. 2 In the About ExtremeWare Enterprise Manager window, click Admin in the Navigation Toolbar.
  • Page 67: Deleting Users

    ELETING SERS 8 Select the appropriate EEM Account Access level: — Administrator access allows the user to add, edit and delete user accounts, as well as view status information and statistics and modify device parameters. — Manager access allows the user to view status information and statistics and modify device parameters.
  • Page 68: Changing Your Own User Password

    DMINISTERING THE XTREME NTERPRISE ANAGER 4 Click Yes. This removes all information about this user account from the Enterprise Manager database. Note: To remove all access privileges for a user without removing the user account from the Enterprise Manager database, use the Modify User function and change the Account Access to Disabled.
  • Page 69: Radius Administration

    RADIUS A DMINISTRATION The window shows your user name, and your EEM and RADIUS Account Access levels as well as your password, but you cannot change them. 2 Type your new password in the Password field. 3 Type the password again in the Verify Password field. 4 Click Apply.
  • Page 70: Radius Administration Page

    DMINISTERING THE XTREME NTERPRISE ANAGER Figure 4-5: Radius Administration page 2 To change the RADIUS server’s shared secret, simply type a new string in the Radius Secret field. This string is basically a shared key by which the RADIUS server and its clients recognize each other, and which they use for secure transmission of user passwords.
  • Page 71 RADIUS A DMINISTRATION administered through the Enterprise Manager. Thus, even if a user accesses the switch directly through Telnet or a browser, the RADIUS server will provide the authentication service. Disabling the RADIUS server means that it will not be available for authenticating users.
  • Page 72 DMINISTERING THE XTREME NTERPRISE ANAGER 4-12 XTREME NTERPRISE ANAGER NSTALLATION AND UIDE...
  • Page 73: Using The Inventory Manager

    Using the Inventory Manager This chapter describes how to use the ExtremeWare Enterprise Manager Inventory Manager applet for: • Viewing the ExtremeWare Enterprise Manager device inventory. • Discovering network devices. • Adding network devices to the ExtremeWare Enterprise Manager database. •...
  • Page 74: Device Groups

    SING THE NVENTORY ANAGER Manager database, you can assign it to a specific device group, and configure it using the VLAN Manager, Virtual Chassis Stack Manager, ExtremeView, or the Policy System. Any Enterprise Manager user can view status information about the network devices currently known to Enterprise Manager.
  • Page 75: Displaying The Network Device Inventory

    ISPLAYING THE ETWORK EVICE NVENTORY • Extreme switches send SmartTraps to the Enterprise Manager whenever a change occurs in a switch status variable that the Enterprise Manager has registered interest in. These include changes to operating variables as well as configuration changes made through other management entities such as the switch command line interface or ExtremeWare Vista.
  • Page 76: The Inventory Manager Applet, Main Page

    SING THE NVENTORY ANAGER Figure 5-1: The Inventory Manager applet, main page You must add network devices to the database using Discovery or the Add Note: Devices function in order to make them “known” to the ExtremeWare Enterprise Manager. Until this is done, no devices are displayed in the Inventory Manager. The Device Groups currently defined in the Enterprise Manager are displayed in the Component Tree in the left panel.
  • Page 77: Viewing Device Status Information

    IEWING EVICE TATUS NFORMATION A red circle with the white “S” next to a device indicates that the device is not reachable through SNMP. The buttons at the top of the page provide the following functions: • Discover lets you find network devices by IP address or range of addresses. •...
  • Page 78: Inventory Manager Device Group Summary Status

    SING THE NVENTORY ANAGER Figure 5-2: Inventory Manager device group summary status • The status “lights” show the status of the device as detected by the ExtremeWare Enterprise Manager: Table 5-1: Inventory Manager Device Status Indicators Status Light Device Status Green Device is up and OK Yellow...
  • Page 79: Inventory Manager Device Status Information

    IEWING EVICE TATUS NFORMATION • The name and type of the device are detected by the ExtremeWare Enterprise Manager. • The IP address and read/write community strings are also detected by the Enterprise Manager discovery, or are those entered into the ExtremeWare Enterprise Manager database manually if the switch was added using the Add command.
  • Page 80: Discovering Network Devices

    SING THE NVENTORY ANAGER Figure 5-4: Inventory Manager information for a Cisco device ISCOVERING ETWORK EVICES ExtremeWare Enterprise Manager 2.0 provides an automatic Discovery function that lets you discover network devices by IP address. To discover network devices, do the following: 1 Click the Discovery button at the top of the Inventory Manager main window.
  • Page 81: Inventory Manager Device Discovery Set Up Window

    ISCOVERING ETWORK EVICES Figure 5-5: Inventory Manager Device Discovery set up window 2 Click the appropriate boxes to select the types of devices you want to include in the discovery. You can discover Extreme, Cisco, and Xedia devices. 3 Specify the device address range you want to discover. You may specify the range in one of two ways: —...
  • Page 82 SING THE NVENTORY ANAGER Examples: IP Address Specification Addesses Generated 10.203.0.* polls 10.203.0.0 through 10.203.0.255 10.203.?.?? polls 10.203.0.0 through 10.203.9.99 0.203.0.1? or both specify the same range: 10.203.0.10 through 10.203.0.10-19 10.203.0.19 polls 10.203.0.10 through 10.203.0.30 10.203.0-2.10-30 10.203.1.10 through 10.203.1.30 10.203.2.10 through 10.203.2.30 —...
  • Page 83 ISCOVERING ETWORK EVICES 8 You can remove an address range from the Device Discovery Criteria list at any time before you initiate the discovery by selecting the range and clicking the Remove button. You can remove all address ranges using the Reset button at the bottom of the page. 9 Click the Discover button at the bottom of the window to initiate the discovery.
  • Page 84 SING THE NVENTORY ANAGER Note: These devices are NOT automatically entered into the Enterprise Manager database. You must explicitly select and add devices to the database. 10 To add devices to the ExtremeWare Enterprise Manager database, select individual devices or a range of devices in the Results list, and click the Add button at the bottom of the window.
  • Page 85 DDING EVICES EVICE ROUPS AND ROUPS Figure 5-8: Message window showing Add device progress Warning: If you close the Discovery Results window without adding devices, the results for any devices not already in the ExtremeWare Enterprise Manager database are lost. You will need to perform a discovery again to regenerate information on those devices.
  • Page 86 SING THE NVENTORY ANAGER Figure 5-9: Add Device window in the Inventory Manager 2 Enter the device IP address, community strings, device login and password into the appropriate fields. These are the parameters that the Enterprise Manager uses to access the switch. You may also enter a DNS-resolvable host name in place of the Switch IP address.
  • Page 87: Adding Devices, Device Groups And Port Groups

    DDING EVICES EVICE ROUPS AND ROUPS SmartTraps rules that tell the switch what status and configuration changes are of interest to the Enterprise Manager. REATING A EVICE ROUP Device groups are sets of managed network devices that have something in common, and that can be managed as a group.
  • Page 88 SING THE NVENTORY ANAGER Figure 5-10: Add Device Group window in the Inventory Manager 2 Type a name for the device group into the Device Group Name field, and a description (optional) into the Device Group Description field. 3 To add a device to the selected device group, select the device in the Available Devices list and click Add ->.
  • Page 89: Add Port Group Window In The Inventory Manager

    DDING EVICES EVICE ROUPS AND ROUPS REATING A ROUP A port group is a set of ports that have something in common, and can be manipulated as a unit. A port group may contain ports from many different switches. Unlike device groups, there is no default port group, and ports do not need to be members of a group.
  • Page 90 SING THE NVENTORY ANAGER 2 Type a name for the port group into the Port Group Name field, and a description (optional) into the Description field. 3 Select a device from the Devices list. This displays a list of ports on the switch that are available to be included in the port group.
  • Page 91: Modifying Devices, Device Groups And Port Groups

    ODIFYING EVICES EVICE ROUPS AND ROUPS Figure 5-12: Devices tab of the Modify Devices, Device Groups, and Port Groups window. 2 Select the device for which you want to change contact information. 3 Enter the changed information in the appropriate fields. The Device Login and Device Password are the login and password needed in order to Telnet to the device or to use ExtremeWare Vista 4 Click Reset to change the fields back to their original values.
  • Page 92: Groups Window

    SING THE NVENTORY ANAGER Figure 5-13: Device Groups tab of the Modify Devices, Device Groups, and Port Groups window. 2 Select the device group you want to modify. The Included Devices list displays the devices that are currently members of this group. The Available Devices list displays the other devices known to the Enterprise Manager, and their current device group membership.
  • Page 93: Port Groups Tab Of The Modify Devices, Device Groups, And Port

    ODIFYING EVICES EVICE ROUPS AND ROUPS Moving a device from one device group to another requires two steps. First, remove it from its current device group (returning it to the Default group). Then select the new device group, and move the device from the Default device group to the new group. ODIFYING A ROUP To add or remove ports from a port group, or to rename the group or change its...
  • Page 94 SING THE NVENTORY ANAGER 5 Select one or more ports from the Available Ports list. Click the Add -> button in the middle of the screen to add these ports to the Selected Ports list. Click the Add All -> button to add all ports in the Available Ports list to the Selected Ports list. 6 Repeat steps 3 through 5 until you have included all the ports that should be members of this port group.
  • Page 95: Deleting Devices, Device Groups, And Port Groups From The Database

    ELETING EVICES EVICE ROUPS ROUPS FROM THE ATABASE Figure 5-15: Devices tab of the Delete Devices and Device Groups window. 2 To select a device from a specific device group, select the device group from the pull-down list in the Filter by Device Group field. Select All to view the list of all devices from all device groups.
  • Page 96: Deleting A Device Group

    SING THE NVENTORY ANAGER ELETING A EVICE ROUP To delete a device group from the Enterprise Manager database, follow these steps: 1 Click the Delete button at the top of the Inventory Manager main page. Select the appropriate tab to display the Delete Device Groups window (see Figure 5-16).
  • Page 97: Updating Device Information

    PDATING EVICE NFORMATION Figure 5-17: Port Groups tab of the Delete Devices, Device Groups, and Port Groups window. 2 Select one or more port groups in the Port Groups list, and click Delete. 3 Click OK to confirm that you want to delete the port group information from the database.
  • Page 98: Synchronize Devices Dialog

    SING THE NVENTORY ANAGER 1 Click Sync at the top of the Inventory Manager page. The Synchronize Devices dialog, as shown in Figure 5-18, is displayed, listing the devices in the Enterprise Manager database. Figure 5-18: Synchronize Devices dialog 2 Select one or more devices in the Device list. 3 Click Sync to initiate the synchronization process.
  • Page 99: Using Extremeview

    Using ExtremeView This chapter describes how to use ExtremeView for: • Viewing Extreme switch status • Viewing and setting Extreme device configuration information using the ExtremeWare Vista graphical user interface • Viewing Extreme device statistics • Configuring Extreme devices using Telnet and the ExtremeWare Command Line Interface (CLI) •...
  • Page 100: The Extremeview Applet, Main Page

    SING XTREME Note: You must have a user account on the Extreme switch in order to run ExtremeWare Vista on the switch. A user account on a switch is separate from your Enterprise Manager user account. Figure 6-1: The ExtremeView applet, main page •...
  • Page 101: Viewing Switch Status Information

    IEWING WITCH TATUS NFORMATION • Telnet starts a macro application that allows the scripting and playback of CLI commands to a selection of Extreme switches. The applet performs a Telnet to the switch, logs into the switch, and performs the scripted commands. You can also use this applet to run an interactive Telnet session to an individual switch.
  • Page 102: The Extremeview Applet, Switch Status

    SING XTREME Table 6-1: ExtremeView Switch Status Indicators Status Light /Switch Status Green Switch is up and OK Yellow Switch is responding, but reports an error condition such as a fan or power supply failure, or excessive temperature Switch is not responding to Enterprise Manager status queries. This may mean that the switch is down, that it is unreachable on the network, or that the SNMP community strings have changed and the ExtremeWare Enterprise Manager can no longer contact the switch.
  • Page 103: The Extremeview Applet, Port Status

    IEWING WITCH ONFIGURATION NFORMATION This view shows an active graphical display of the switch front panel, as well as a table of status information. You can view the status of individual ports, as shown in Figure 6-4, in two ways: •...
  • Page 104: The Extremeview Applet, Configuration Summary

    SING XTREME Figure 6-5: The ExtremeView applet, Configuration summary The sub-components under Configuration in the Component Tree are the categories of configuration information that are available through this applet. These correspond to pages from the ExtremeWare Vista application running on the switch. Select one of these categories to display a list of switches, and select a switch to view the configuration settings for that switch in the category you’ve chosen.
  • Page 105: Viewing Switch Configuration Information

    IEWING WITCH ONFIGURATION NFORMATION Figure 6-6: The ExtremeView applet, Configuration details When you have made the necessary configuration changes, click Submit to send these to the switch for implementation. XTREME NTERPRISE ANAGER NSTALLATION AND UIDE...
  • Page 106: Viewing Switch Statistics

    SING XTREME IEWING WITCH TATISTICS Select Statistics in the Component Tree to display summary statistics for the Extreme switches known to the Enterprise Manager (see Figure 6-7). Figure 6-7: The ExtremeView applet, Statistics summary The sub-components under Statistics in the Component Tree are the categories of statistical information that are available through this applet.
  • Page 107: The Extremeview Applet, Statistics Details

    SING ELNET WITH XTREME WITCHES Figure 6-8: The ExtremeView applet, Statistics details SING ELNET WITH XTREME WITCHES The Telnet applet allows the scripting and playback of groups of CLI commands (macros) to a selection of Extreme switches. You can also use this applet to run an interactive telnet session on an individual switch, including third-party switches.
  • Page 108: The Extremeview Applet, Telnet Interface

    SING XTREME Figure 6-9: The ExtremeView applet, Telnet interface The Telnet Connections lists indicates which switches have open Telnet connections, and the status of any macros that have run or are being run on the switch. Switches with open Telnet connections are also shown in bold in the list of switches under the Telnet component in the Component Tree.
  • Page 109: The Extremeview Applet, Record And Play Buffer

    SING ELNET WITH XTREME WITCHES UNNING XTREME OMMAND ACROS The lower half of the Telnet page contains the macro Record/Play buffer. You can enter a series of ExtremeWare commands into this buffer, which will form a script that can be played to the set of switches you select in the Telnet Connections list.
  • Page 110 SING XTREME There are four variables you can use in an ExtremeWare CLI command that will be expanded when the target switch is contacted. These are: Table 6-2: ExtremeView Macro Variables Variable Definition The name of the switch <NAME> The current date of the EEM server <DATE>...
  • Page 111: Using Telnet With Extreme Switches

    SING ELNET WITH XTREME WITCHES 5 To close an open connection, select the switch and click the Closed button. To view the results of the macro execution on a particular switch, select the switch in the Telnet switch list in the Component Tree. This will display a telnet session display for the switch.
  • Page 112: Copy/Paste From An Interactive Telnet Session

    SING XTREME the white portion of the window. As output grows, the older lines scroll up into the grey portion of the screen. This makes it easy to tell whether you are viewing the most recent Telnet output. The Telnet session window will display the commands and results from macros that are run on the switch.
  • Page 113: Telnet Session

    SING ELNET WITH ISCO EVICES • To copy from an interactive session, highlight the lines you want to copy, click the right mouse button and select Copy from the pop-up menu. • To paste into another window, display the window, place the cursor where you want the lines inserted, click the right mouse button and select Paste from the pop-up menu.
  • Page 114: An Open Telnet Session For Cisco Device In Extremeview

    SING XTREME Figure 6-13: An open Telnet session for Cisco device in ExtremeView You can enter and execute commands using Cisco’s Command Line Interface. The commands and any resulting output will be displayed in the session window just as if you were running a Telnet session on any other client.
  • Page 115: Using The Vlan Manager

    VLAN feature that enables you to construct broadcast domains without being restricted by physical connections. The VLAN Manager creates and manages VLAN for Extreme Networks devices only. It does not handle other third-party devices, even though some third-party devices (Cisco and Xedia devices as of ExtremeWare Enterprise Manager 2.0) can be managed through...
  • Page 116: Displaying Vlans

    VLAN M SING THE ANAGER The VLAN Manager is an enterprise-wide application that manages all aspects of VLANs on Extreme devices. If you run the Enterprise Manager with Administrator or Manager access, you can: • Create and delete VLANs • Add or remove ports from existing VLANs •...
  • Page 117: Vlan Manager Applet, Topology Shown By Vlan

    VLAN ISPLAYING Figure 7-1: VLAN Manager applet, topology shown by VLAN The VLANs currently known to the Enterprise Manager database are displayed in the Component Tree on the left. The panel on the right shows summary information about the configuration of the switches and ports that are members of a selected VLAN. Note: You must add switches to the ExtremeWare Enterprise Manager database through Discovery or by using the Add function in the Inventory Manager.
  • Page 118 VLAN M SING THE ANAGER • Select By VLAN to display VLANs in the component tree, and showing under the VLAN each switch that has ports that are members of the VLAN (see Figure 7-1). • Select By Switch to display every switch in the component tree, and showing under the switch each VLAN that “owns”...
  • Page 119 VLAN ISPLAYING Figure 7-3: VLAN member ports on a selected switch Figure 7-3 presents details about which ports in a VLAN belong to the selected switch. XTREME NTERPRISE ANAGER NSTALLATION AND UIDE...
  • Page 120: Adding Avlan

    VLAN M SING THE ANAGER Figure 7-4: Switch member ports for a selected VLAN Figure 7-4 presents details about which ports on a given switch are found in the selected VLAN. VLAN DDING A Users with Administrator or Manager access can create VLANs on the Extreme switches managed by the ExtremeWare Enterprise Manager.
  • Page 121 VLAN DDING A Figure 7-5: Add VLAN dialog, Properties and Ports page 2 Enter a descriptive name for the VLAN. The name must begin with a letter followed by up to 31 characters. See the Summit Switch Installation and User Guide for details on VLAN naming.
  • Page 122: Add Vlan Dialog, Ip Forwarding Page

    VLAN M SING THE ANAGER 7 Click Tagged to add the port as a tagged port. Click Untagged to add the port as an untagged port. Note: If this is an untagged VLAN, you are not able to add a tagged port. When you add an untagged port to a VLAN, it is automatically removed from any other VLAN which uses the same protocol as the new VLAN, and where the port is an untagged member.
  • Page 123: Deleting Avlan

    VLAN ELETING A 2 Select a switch from the table of switches. 3 Enter an IP address and IP mask. Click the Enable IP Forwarding check box if you want to enable IP forwarding for this VLAN on the switch. 4 Click Apply to have the changes take effect.
  • Page 124: Modifying Avlan

    VLAN M SING THE ANAGER VLAN ODIFYING A Users with Administrator or Manager access can modify the properties of a VLAN, and add and remove ports from the VLAN. If you have Monitor access, you will not be able to use this function. To modify a VLAN, follow these steps: 1 Click the Modify button in the VLAN Manager panel.
  • Page 125 VLAN ODIFYING A 5 To remove a port from the VLAN, select the port in the Ports in VLAN list, and click Remove. 6 To add a port to the VLAN, first select the switch from the Available Switches list. This displays a list of ports on the switch that are available to be included in the VLAN.
  • Page 126: Adding And Deleting Protocol Filters

    VLAN M SING THE ANAGER Figure 7-9: The Modify VLAN dialog, IP Forwarding page 11 Select a switch from the table of switches. 12 Change the IP address and IP mask as appropriate. Click the Enable IP forwarding check box to enable or disable IP forwarding for this VLAN on the switch. 13 Click Apply to have the changes take effect.
  • Page 127: Protocol Panel Dialog Box, View/Delete Page

    DDING AND ELETING ROTOCOL ILTERS Figure 7-10: Protocol Panel dialog box, View/Delete page This page shows all the protocol filters configured within the ExtremeWare Enterprise Manager. Any filters that are in use by a VLAN are indicated with an asterisk (*) in the In Use column. 2 To delete a protocol filter, select a filter in the list, and click Delete.
  • Page 128: Protocol Panel Dialog Box, Add Protocol Page

    VLAN M SING THE ANAGER To add a protocol filter, follow these steps: 1 Click the Add tab at the top of the Protocol Panel dialog box to display the Add Protocol page, as shown in Figure 7-11. Figure 7-11: Protocol Panel dialog box, Add Protocol page 2 Enter a descriptive name for the Protocol.
  • Page 129: Using The Policy System

    Using the Policy System This chapter describes how to use the ExtremeWare Enterprise Manager Policy System for: • Creating, modifying, and deleting network Quality of Service (QoS) policies • Defining and modifying QoS treatments • Defining users and user groups as policy objects •...
  • Page 130: Policy Types

    SING THE OLICY YSTEM devices. It also detects overlaps and conflicts in policies, with precedence rules for resolving conflicting QoS rules. Note: The ExtremeWare Enterprise Manager Policy System is based on the ExtremeWare 5.0’s Policy-Based QoS. For details on the capabilities and implementation of QoS in Extreme Switches, see the chapter on Quality of Service in the ExtremeWare Software User Guide V 4.0 , and the Release Note for ExtremeWare 5.0 .
  • Page 131 VERVIEW OF OLICY YSTEM • Client/Server Policy maps a QoS treatment to traffic going between a server and specific clients. You specify the both sets of endpoints (clients and server) between which the traffic will travel. The server endpoint can include an application (translated to an L4 port) or it can be a host (indicated by the application choice “ANY,”...
  • Page 132 SING THE OLICY YSTEM Figure 8-3: Source Port Policy You can specify multiple source ports in a single policy, and you can specify them by providing a host name or even a user name (or group of names) and leave it to the Policy System to determine the source port to which those names map.
  • Page 133: Basic Policy Definition

    VERVIEW OF OLICY YSTEM Both VLAN QoS and Source Port QoS depend on 802.1Q tagging to carry the QoS parameters across VLAN boundaries or switch boundaries. In order to allow these QoS types to be effectrive end-to-end, you should make sure your switch-to-switch links use tagged ports.
  • Page 134: Basic Policy Definition

    SING THE OLICY YSTEM Figure 8-5: Basic Policy Definition The ExtremeWare Enterprise Manager Policy System converts the high-level policy definition you supply into a set of low-level QoS rules that it will implement on the devices within the policy’s scope. To do this, the Policy system takes the following steps: 1 Converts the endpoint components, application components, and traffic direction components into traffic patterns.
  • Page 135: Policy Objects

    VERVIEW OF OLICY YSTEM OLICY BJECTS The ExtremeWare Enterprise Manager Policy System lets you work with high-level components, or policy objects, when defining a QoS policy. The components used within the Enterprise Manager Policy System are the following: • Devices (by name) and Device Groups: These are entered into the Enterprise Manager database via the Inventory Manager (Discovery or Add Devices), and are mapped to IP addresses in the Enterprise Manager database.
  • Page 136: Policy Implementation Types

    SING THE OLICY YSTEM OLICY MPLEMENTATION YPES ExtremeWare 5.0, and thus ExtremeWare Enterprise Manager, supports three policy implementation types. The implementation type of a policy is primarily determined by the type of endpoints to which the policy will apply. The implementation types are: •...
  • Page 137: Third-Party Device Support

    HIRD ARTY EVICE UPPORT In addition to supporting Extreme Networks switches, ExtremeWare Enterprise Manager provides support for some third-party devices. As of ExtremeWare Enterprise Manager 2.0, these include: • Cisco devices running IOS 11.2 or later • Xedia devices running the Xedia 2.1 R3 or later software Enterprise Manager supports policies on these devices that simulate the QoS policies supported for Extreme devices.
  • Page 138: Cisco Port Mappings

    SING THE OLICY YSTEM ISCO APPINGS When ExtremeWare Enterprise Manager pushes a policy to a Cisco device, the device automatically maps well-known TCP and UDP port numbers to names (for example, TCP port 80 to the name “HTTP”). When Enterprise Manager reads the rules from a Cisco device, it must re-map the name back to a port number.
  • Page 139: Xedia Device Support

    HIRD ARTY EVICE UPPORT EDIA EVICE UPPORT ExtremeWare Enterprise Manager can support certain Xedia devices running Xedia software version 2.1. Later software versions may work but have not been tested. ExtremeWare Enterprise Manager 2.0 has been tested with the following model running the Xedia 2.1 software: •...
  • Page 140 SING THE OLICY YSTEM Precedence Profile • • Lowest For Extreme switches, there is a set of rules to determine the precedence. See the ExtremeWare Software User Guide, V 4.0, Chapter 8, “Quality of Service (QoS)” for details. Under the Xedia 2.1 R3 software, for an Root class bandwidth-allocation parameter.
  • Page 141: Using The Policy System

    SING OLICY YSTEM SING OLICY YSTEM To invoke the Policy System, click the Policy button in the Navigation Toolbar. The Policy System main window is displayed (see Figure 8-6). The Component Tree on the left shows the elements of the Policy System. The main applet frame shows the definition and function of each of these elements.
  • Page 142 SING THE OLICY YSTEM • End Stations lets you define specific hosts or groups of hosts by name as policy objects for use in policy definitions. They dynamically translate into IP addresses/ports when QoS rules are computed for configuration onto network devices.
  • Page 143 REATING A ETWORK OLICY REATING A ETWORK OLICY There are two ways to create a network policy: • Using the Create Policy Wizard, which is invoked by clicking the Create Policy button at the top of the Policy System page. The Create Policy Wizard guides you step by step through the policy creation process.
  • Page 144: Using The Policy Object Selector To Specify Policy

    SING THE OLICY YSTEM — Source Port Policy lets you specify the components of a policy for traffic originating from specific ingress ports. — VLAN Policy lets you specify the components of a policy for traffic originating from one or more VLANs. —...
  • Page 145: Creating A New Network Policy

    REATING A ETWORK OLICY b Select individual users, user groups, end stations, end station groups, or devices and add or remove them from the Selected items list. You can display either the Local End Stations list or the End Station Groups list by selecting from the pull-down list in the Show Type field.
  • Page 146 SING THE OLICY YSTEM b To select specific Device Groups to which this policy should apply, click the Specified Device Groups button. — To include a device group, select the device group in the Excluded Device Groups list and click the right-arrow button. The device group will move to the Included Device Groups list.
  • Page 147 REATING A ETWORK OLICY — The QoS Type of the policy (IP QoS, Source Port QoS, or VLAN QoS). — The time at which the policy was created. The precedence based on QoS type overrides all other precedence factors. IP QoS is the highest priority, Source Port QoS is second, and VLAN QoS is the lowest.
  • Page 148 SING THE OLICY YSTEM REATING A OLICY FROM THE If you are experienced in network policy creation, using the Network QoS Policy view page is a quicker method for creating new policies. To create a policy using the New menu, follow these steps: 1 Click the New button at the top of the Policy System page, then select Policy from the drop-down menu.
  • Page 149 IEWING AND ODIFYING ETWORK OLICIES Policy object selector Figure 8-9: Create: Network QoS Policy page for a VLAN policy This view lets you specify all the components of a network policy by using the various tabs to specify the elements of a policy, as described in the next section. IEWING AND ODIFYING ETWORK...
  • Page 150: Network Qos Policy View For A Vlan Policy, Definition Tab

    SING THE OLICY YSTEM Figure 8-10: Network QoS Policy view for a VLAN policy, Definition tab The main applet frame has two sections: • The top section lists all the network policies currently defined in the policy system, with type and status information. —...
  • Page 151: Viewing And Modifying Network Policies

    IEWING AND ODIFYING ETWORK OLICIES A small switch with a green light indicates that the current QoS rules have been configured onto the appropriate network devices. A small switch with a half-green light indicates that the current QoS rules have been partially configured onto the appropriate network devices. A small switch with a white light indicates that the current QoS rules have not been configured onto the appropriate network devices.
  • Page 152: Application Server Policy Definition Tab

    SING THE OLICY YSTEM Select individual VLANs and add or remove them from the Selected items list. When you are finished, click OK. — Type in new VLAN names or delete the names of VLANs in the VLAN list itself. The names you type must be valid names of VLAN known to the ExtremeWare Enterprise Manager.
  • Page 153: Network Qos Policy View For An Application Server Policy

    IEWING AND ODIFYING ETWORK OLICIES For an Application Server policy (Figure 8-11) the Definition tab shows a list of the servers and the application to which this policy applies, and the Treatment that is used by this policy. Policy object selector Application selector...
  • Page 154 SING THE OLICY YSTEM — You can type in new End Station or End Station Group names or delete names in the Servers list itself. The names you type must be valid names already known to the Extremeware Enterprise Manager. The names in the Servers list are separated by semi-colons, following the convention used by Microsoft Outlook.
  • Page 155: Client/Server Policy Definition Tab

    IEWING AND ODIFYING ETWORK OLICIES LIENT ERVER OLICY EFINITION A Client/Server policy maps a QoS treatment to traffic going between a server and specific clients. You specify the both sets of endpoints (clients and server) between which the traffic will travel. The server endpoint can also include an application (translated to a Layer 4 port) or it can be a host (indicated by the application choice “ANY,”...
  • Page 156: Network Qos Policy View For A Client/Server Policy, Definition Tab

    SING THE OLICY YSTEM For a Client/Server policy, the Definition tab shows a list of the servers, clients, and the application to which this policy applies, and the Treatment used by this policy (see Figure 8-13). Figure 8-13: Network QoS Policy view for a Client/Server policy, Definition tab •...
  • Page 157 IEWING AND ODIFYING ETWORK OLICIES appears. You can display lists of other policy objects by selecting from the drop-down list in the Show Type field. When you have finished, click OK. — You can also type in new policy object names or delete names in the Servers field itself.
  • Page 158: Source Port Policy Definition Tab

    SING THE OLICY YSTEM • Clicking Reset at any time prior to clicking Save will restore the policy definition to those currently in effect for the selected policy. • Click the Save button to save the changes as the new policy definition. OURCE OLICY EFINITION...
  • Page 159 IEWING AND ODIFYING ETWORK OLICIES — Click the policy object selector button at the right of the Source Ports field, then select the type of policy object for which you want to specify the source port pop-up menu. Source Ports are specified (implicitly) for users or end stations, and explicitly using port sets.
  • Page 160: Custom Policy Definition Tab

    SING THE OLICY YSTEM USTOM OLICY EFINITION A Custom policy lets you define all the parameters of the policy without any predefintion. A custom policy is always implemented as IP QoS. For a Custom policy the Definition tab, as shown in Figure 8-15, shows the endpoints, applications and direction that defines the traffic pattern to which this policy applies, and the treatment that is used by this policy.
  • Page 161 IEWING AND ODIFYING ETWORK OLICIES Select individual endpoints and add or remove them from the Selected items list. You can display lists of other types of policy objects by selecting from the pull-down list in the Show Type field. When you have finished, click OK. —...
  • Page 162: The Status Tab

    SING THE OLICY YSTEM TATUS Figure 8-16 shows the Status tab. This tab displays the selected policy’s readiness and configuration status. Figure 8-16: Network QoS Policy view for a VLAN policy, Status tab The Status tab displays the following fields: •...
  • Page 163: The Scope Tab

    IEWING AND ODIFYING ETWORK OLICIES This screen is a status only display; no modifications can be made to these fields. The Save and Reset buttons are disabled. Note: If the Policy Configured field shows the message “Error: Too many rules” this means you need to reduce the number of endpoints that your policy specifies.
  • Page 164 SING THE OLICY YSTEM When All Managed Devices is selected, this policy automatically applies to any newly-added devices and any new device groups created after the policy has been defined. • If Specific Device Groups is selected, the display shows which groups are included and which are excluded.
  • Page 165: The Overlaps Tab

    IEWING AND ODIFYING ETWORK OLICIES VERLAPS Figure 8-18 shows the Overlaps tab for the selected policy. Figure 8-18: Network QoS Policy view for a VLAN policy, Overlaps tab The Overlaps tab displays a list of policies that overlap or conflict with the selected policy.
  • Page 166: The Precedence Tab

    SING THE OLICY YSTEM which it was created). Precedence type and the rules that determine the precedence between policies in discussed in the next section. You cannot change the information shown under this tab—the Save and Reset buttons are disabled. To change the precedence of a policy, click the Precedence tab and make changes there.
  • Page 167: Network Qos Policy View For A Vlan Policy, Precedence Tab

    IEWING AND ODIFYING ETWORK OLICIES Figure 8-19: Network QoS Policy view for a VLAN policy, Precedence tab The Precedence tab displays the following information: • The precedence lists show how overlapping policies relate to the selected policy. — Higher Priority Policies are those which have higher priority (take precedence) over the currently selected policy.
  • Page 168 SING THE OLICY YSTEM policies in the precedence lists that aren’t relevant, you can remove them. You can also add and remove other network QoS policies from a precedence relationship with the selected policy. Click OK to return to the Precedence tab. Figure 8-20: Edit: Select Policies pop-up window •...
  • Page 169: The Qos Results Tab

    IEWING AND ODIFYING ETWORK OLICIES ESULTS Figure 8-21 shows the QoS Results tab. This shows the QoS rules that have been computed from the selected policy. Figure 8-21: Network QoS Policy view for a VLAN policy, QoS Results tab The QoS rules are the rules that the current definition of the policy expects to generate. Note that these may not correspond exactly to the computed QoS rules because the computed rules take into account the intersection of multiple policies.
  • Page 170: Viewing And Modifying Network Qos Treatments

    SING THE OLICY YSTEM IEWING AND ODIFYING ETWORK REATMENTS To view the current QoS treatments defined within the Policy System, click the plus sign next to Network Policy to display the policy subcomponents, then click Treatment. This displays the Network QoS Treatment view (see Figure 8-22). The main applet frame has two sections: •...
  • Page 171: Network Qos Treatment View

    IEWING AND ODIFYING ETWORK REATMENTS Figure 8-22: Network QoS Treatment view There are five treatments: four quality treatments (corresponding to QP1-QP4) and Deny/Disable (corresponding to Blackhole IP traffic or disabling source ports). The default definitions for QoS treatments are shown in Table 8-1. Table 8-1: Default QoS Treatments QoS Treatment Name Description Priority...
  • Page 172: Adding Or Modifying Local Users

    SING THE OLICY YSTEM QoS treatments cannot be added or deleted. You can change the names and descriptions of all five treatments, and you can change the priority and bandwidths of the four quality treatments. Treatments can be scoped, so that you can have different treatment parameters for each device group.
  • Page 173 DDING OR ODIFYING OCAL SERS Figure 8-23: The Network User View 2 To add a new user, type the user name in the Name field, and an optional description in the Description field. 3 If DLCS is running in your network devices, you can click Lookup, and the Enterprise Manager will use DLCS to try to find any end stations where this user is logged in.
  • Page 174 SING THE OLICY YSTEM A check in the Allow Automatic DLCS Updates box means that the policy system will get network station information for the user from the switch’s DLCS feature. This will be done automatically every time the QoS policies are re-configured. If auto-configuration is turned on, changes to DLCS mappings in the switch (due to a user logging in or logging out) will trigger a re-configuration.
  • Page 175: Adding Or Modifying User Groups

    DDING OR ODIFYING ROUPS DDING OR ODIFYING ROUPS 1 To create a new User Group, click New at the top of the Policy System page, then select User Group from the pull-down list. To modify an existing User Group, select User Groups under the Users entry in the Component Tree.
  • Page 176: Adding Or Modifying End Stations

    SING THE OLICY YSTEM 4 You can also add members by typing a user name in the Add field at the bottom of the screen. Type the name and click Add to add it to the members list. 5 To remove members from the User Group, select one or more names in the Members list and click the Remove members button (just below the selector button to the right of the Members list) to remove them from the list.
  • Page 177: The End Station View

    DDING OR ODIFYING TATIONS Figure 8-25: The End Station view. 2 To add a new end station, type the host name in the Name field, and an optional description in the Description field. 3 If DLCS is running in your network devices, you can click Lookup, and the Enterprise Manager will use DLCS to try to find the IP Address, switch device, and port associated with the host name you entered.
  • Page 178: Adding Or Modifying End Station Groups

    SING THE OLICY YSTEM A check in the Allow Automatic DLCS Updates box means that the policy system will get IP address and switch/port information for the end station from the switch’s DLCS feature. This will be done automatically every time the QoS policies are re-configured. If auto-configuration is turned on, then changes to DLCS mappings in the switch (due to a an end station booting up) will trigger a re-configuration.
  • Page 179: The End Station Group View

    ADDING OR ODIFYING TATION ROUPS Figure 8-26: The End Station Group view. 2 To add a new End Station Group, type the group name into the Name field, and a description (optional) into the Description field. 3 Click the selector box to the right of the Members field to display a list of the end stations known to the Enterprise Manager.
  • Page 180: Displaying Managed Device Status

    SING THE OLICY YSTEM ISPLAYING ANAGED EVICE TATUS Select Managed Devices in the Component Tree to display a list of all the managed devices known to the Enterprise Manager. Selecting a device in the Devices list displays the name, description and IP address of the device (see Figure 8-27).
  • Page 181: Cisco Device Policy Setup

    ISPLAYING ANAGED EVICE TATUS ISCO EVICE OLICY ETUP You can set up policy for a Cisco device running Cisco IOS 11.2 or later. 1 Select a Cisco Device in the Devices list, then click the Cisco Policy Setup button. This button will not be available unless a Cisco device is selected. This displays the Cisco Device Policy Setup window as shown in Figure 8-28.
  • Page 182 SING THE OLICY YSTEM — Access Start List: ExtremeWare Enterprise Manager uses six consecutive access lists to specify traffic on a Cisco device. You can specify the starting access list, and Enterprise Manager will use that list plus the following five. For example, if you specify 100, then Enterprise Manager will use access lists 100 through 105.
  • Page 183: Configuring Qos Policies

    ONFIGURING OLICIES ONFIGURING OLICIES If Automatic Configuration is turned on every change you make within the ExtremeWare Enterprise Manager will trigger an immediate re-computation and reconfiguration of the QoS policies on your network. Configuration changes on a device managed by ExtremeWare Enterprise Manager, or a user login or end station reboot when DLCS is enabled, also trigger a recomputation and reconfiguration of QoS policies.
  • Page 184: System Status

    SING THE OLICY YSTEM YSTEM TATUS The System Status block indicates the status of the policy configuration process. • Data Complete indicates whether the policy system has sufficient information about a host (end station) or user policy object, to compute valid QoS rules. For example, you might not have entered an IP address for a host.
  • Page 185: Importing Data From Nt Domains Or Solaris Nis

    NT D MPORTING ATA FROM OMAINS OR OLARIS • Computing QoS Rules indicates that computation is under way. While this is occurring, the Policy System State icon in the upper right corner of the Policy System page will indicate Busy. •...
  • Page 186: Displaying The Event Log

    SING THE OLICY YSTEM Figure 8-30: The Import Data view • Select the types of data you want to import in the Data Types box, then click Update to start the import. If you want to stop the process before it is finished, click Stop. Import will update existing data if it has changed, as well as add new users and end stations.
  • Page 187: The Event Log

    ISPLAYING THE VENT Figure 8-31: The Event Log The Clear All button clears the Event Log display only—the event data remains in the log file. Click Show All to restore the display of the full Envent Log 8-59 XTREME NTERPRISE ANAGER NSTALLATION AND UIDE...
  • Page 188 SING THE OLICY YSTEM 8-60 XTREME NTERPRISE ANAGER NSTALLATION AND UIDE...
  • Page 189: Managing Virtual Chassis Stacks

    Managing Virtual Chassis Stacks This chapter describes how to use the Virtual Chassis Stack Manager for: • Displaying a Virtual Chassis stack. • Updating the Virtual Chassis stack topology. • Creating a Virtual Chassis stack. • Editing a Virtual Chassis stack. •...
  • Page 190: Identifying Virtual Chassis Stack Topologies

    ANAGING IRTUAL HASSIS TACKS ExtremeWare Enterprise Manager manages Virtual Chassis stacks as aggregated entities. The Enterprise Manager uses an SNMP identification process to recognize virtual stacks and their components, based on the known Extreme switches. This information is stored in the Enterprise Manager database. The Enterprise Manager can automatically identify single stacks and single parallel stacks.
  • Page 191 ISPLAYING THE IRTUAL HASSIS TACK OPOLOGY Each Summit device uses the Extreme Discovery Protocol (EDP) to identify all neighboring Summits connected via a Summit Virtual Chassis. The Virtual Chassis Stack Manager uses SNMP to collect this information about VC connections from each managed Summit switch in the ExtremeWare Enterprise Manager database.
  • Page 192: Virtual Chassis Stack Manager Display Of Known Virtual Chassis Stacks

    ANAGING IRTUAL HASSIS TACKS Figure 9-1: Virtual Chassis Stack Manager display of known Virtual Chassis stacks As with the other ExtremeWare Enterprise Manager applets, the Component Tree is displayed in the left-hand panel. Detailed information about a selected component is displayed in the right-hand panel.
  • Page 193: Displaying The Virtual Chassis Stack Topology

    ISPLAYING THE IRTUAL HASSIS TACK OPOLOGY • Orphan Summits are any Summit switches that do not appear to be components of any VC stack. They do not appear to have any port connections to a Virtual Chassis. A Summit switch can be classified as an orphan because: —...
  • Page 194: Displayinga Vc Stack Component

    ANAGING IRTUAL HASSIS TACKS Figure 9-2: Details of an individual Virtual Chassis Stack The following functions are available from this page: • Click on a Virtual Chassis or a switch to highlight the connections from that VC or switch. • Click on a connection to highlight the individual connection. •...
  • Page 195: Displaying Orphan Vcs

    ISPLAYING THE IRTUAL HASSIS TACK OPOLOGY Figure 9-3: Detail view of a Virtual Chassis component of a VC stack ISPLAYING RPHAN Orphan VCs are any Virtual Chassis that do not appear to be members of a VC stack, as detected by ExtremeWare Enterprise Manager. •...
  • Page 196: Displaying Orphan Summit Switches

    ANAGING IRTUAL HASSIS TACKS Figure 9-4: Orphan Virtual Chassis Connections The display shows any ports that have connections to switches, for each Virtual Chassis in the Orphan VC list. Selecting an individual Virtual Chassis in the Orphan VC list displays a detail diagram similar to that shown in Figure 9-3.
  • Page 197 ISPLAYING THE IRTUAL HASSIS TACK OPOLOGY Figure 9-5: Orphan switches Virtual Chassis connections A Summit may be considered an orphan if: • It is a member of multiple stacks. • It has been added to the switch inventory since the last stack identification was done.
  • Page 198: Creating A Virtual Chassis Stack

    ANAGING IRTUAL HASSIS TACKS REATING A IRTUAL HASSIS TACK You must have Administrator or Manager access to create a Virtual Chassis stack. Creating a Virtual Chassis stack creates a stack representation in the ExtremeWare Enterprise Manager database. It does not change the physical stack configuration or the actual member switch configurations.
  • Page 199: Deleting A Virtual Chassis Stack

    ELETING A IRTUAL HASSIS TACK 4 To remove a Virtual Chassis from the VC stack, select the Virtual Chassis and click the left arrow button. The selected switch is moved to the Orphan VCs list. 5 To remove a Summit switch from the VC stack, select the switch and click the left arrow button.
  • Page 200: Editing A Virtual Chassis Stack

    ANAGING IRTUAL HASSIS TACKS To delete a Virtual Chassis stack, select the stack from the VC Stacks list, and click the Delete button. If you confirm that you want the stack deleted, the representation of this stack is deleted in the ExtremeWare Enterprise Manager database. It has no effect on the actual devices in your network.
  • Page 201: Configuring Virtual Chassis Stack Ports

    ONFIGURING IRTUAL HASSIS TACK ORTS To edit a Virtual Chassis Stack, follow these steps: 1 Select a Virtual Chassis Stack from the pull down list in the VC Stack field. The dialog box displays all the Summit Virtual Chassis and Summit Switches that are either included in the selected stack, or are considered orphans (not included in any VC stack).
  • Page 202: Configure Ports In A Vc Stack

    ANAGING IRTUAL HASSIS TACKS You can also configure the ports on switches in the Orphan Summit list. This is done in the same way as for switches in a VC stack. You may need to do this prior to adding an Orphan switch to a Virtual Chassis stack.
  • Page 203: Identifying The Virtual Chassis Stack Topology

    DENTIFYING THE IRTUAL HASSIS TACK OPOLOGY — The SummitLink Mode box indicates whether the port is configured for connection to a Virtual Chassis. A check indicates the port is in SummitLink mode. No check indicates the port is in Ethernet mode. —...
  • Page 204 ANAGING IRTUAL HASSIS TACKS Figure 9-10: Identify Virtual Stack To use a SNMP identification process to identify Virtual Chassis Stacks, click Yes. ExtremeWare Enterprise Manager runs the SNMP identification process, and redisplays the Component Tree to show the Virtual Stack configuration topology as identified during the discovery process.
  • Page 205: Real Time Statistics

    Note: You must have RMON enabled on the switch in order to collect real-time statistics for the switch. This feature is supported only for Extreme Networks switches. You can view data for multiple ports on a device, device slot, or within a port group, and optionally limit the display to the “top N”...
  • Page 206 TATISTICS You can also view historical statistics for a single port. If you choose to view a single port, the display shows the value of the selected variable(s) over time, based on the number of datapoints the MIB maintains in the etherHistory table. You can choose from a variety of styles of charts and graphs as well as a tabular display.
  • Page 207: Displaying Multiport Statistics

    ISPLAYING ULTIPORT TATISTICS Table 10-2: Definition of RMON etherHistory error variables for port error displays etherHistoryOversizePkts The number of packets received during this sampling interval that were longer than 1518 octets (excluding framing bits but including FCS octets) but were otherwise well formed. etherHistoryFragments The total number of packets received during this sampling interval that were less than 64 octets in...
  • Page 208: Real Time Statistics Main Page

    TATISTICS Figure 10-1: Real Time Statistics main page A device with a red circle “S” next to it indicates that the device dis not responding to SNMP requrests. A port group with a red circle “S” indicates that the port group is empty.
  • Page 209 ISPLAYING ULTIPORT TATISTICS Figure 10-2: Bar chart showing device port statistics If you place the cursor near a bar in the chart, a pop-up window shows the port number and device, actual data value, and the time stamp on the data sample. You can use the mouse to change the depth and rotation of a 3-dimensional chart: •...
  • Page 210: Warning Displayed When Enterprise Manager Cannot Retrieve

    TATISTICS There are cases where you may not see data for every port you expect in a multi-port display: • You have selected the “top N” feature (top 15 by default), so only the “N” ports with the highest utilization or the highest total number of errors are displayed. •...
  • Page 211: Displaying Statistics For A Single Port

    ISPLAYING TATISTICS OR A INGLE There are several reasons why the Enterprise Manager may not be able to display any device data: • The Enterprise Manager cannot communicate with the device (indicated by an “S” in a red circle next to the device name). •...
  • Page 212: Utilization Data Over Time For An Individual Port On A

    TATISTICS Figure 10-4: Utilization data over time for an individual port on a device. The number of data points displayed, and the sampling interval are user-configurable parameters, within the limitations of the device configuration. The defaults are: • A 30-second sampling interval •...
  • Page 213: Changing The Display Mode

    HANGING THE ISPLAY Figure 10-5: Individual errors in a single-port chart HANGING THE ISPLAY The icons at the top of the page let you select the format of the statistical display, and control several other aspects of the display. Select this to determine whether the display for a device or port group will include all ports, or only the top N ports (where N is initially fifteen).Click the icon to toggle between the red X, which indicates the top N limitation is not in effect, and a green check, which indicates that...
  • Page 214 TATISTICS Select this to display the data as a line graph. This chart type is especially useful when displaying individual errors for a single port. Select this to display the data as a pie chart. This chart type is available only when you are displaying statistics for multiple ports on a device, device slot, or in a port group.
  • Page 215: Setting Graph Preferences

    ETTING RAPH REFERENCES Determines whether the graph data is updated automatically at every sampling interval. Click on the icon to toggle between continuous updates, indicated by the bar with the red dot (representing a traveling data packet), and the open palm, indicating that updates have been suspended. Select this to bring up the graph preferences pop-up window.
  • Page 216 TATISTICS • To change to a 2D graph view, click the Set 3D Graph View box to remove the check mark. • View Depth controls the depth of a bar. The default is 10, maximum is 1000. • View Elevation controls the elevation (rise) from the front of the bar to the back, in degrees.
  • Page 217 ETTING RAPH REFERENCES Data Colors (Figure 10-8) lets you set the colors used for the various data sets in your graph. Figure 10-8: Setting data color preferences • To change a color, click on a button with the color bar icon. This displays a color selection window where you can select the color you want.
  • Page 218 TATISTICS • Historical Data Display Count specifies the number of historical data points to display in a graph for an individual port. The default is 50, the maximum value you can set is 100. However, the actual maximum number of data points you can get is determined by the SNMP agent running in the device from which you are getting data.
  • Page 219: Using The Ip/Mac Address Finder

    Using the IP/MAC Address Finder This chapter describes how to use the IP/MAC Address Finder applet for: • Creating search requests for locating MAC or IP addresses on the network. IP/MAC F VERVIEW OF THE INDER PPLET The IP/MAC Address Finder applet lets you search for network addresses (MAC or IP addresses) and identify the switch and port on which the address resides.
  • Page 220: Ip/Mac Address Finder Main Page

    IP/MAC A SING THE DDRESS INDER Figure 11-1: IP/MAC Address Finder main page ASKS UMMARY INDOW As search tasks are initiated, they are placed in the Find Address Tasks List in the Component Tree. Selecting the Find Address Tasks folder in the Component Tree displays a summary of the status of the tasks in the Task List (see Figure 11-2).
  • Page 221: Tasks List Summary Window

    ASKS UMMARY INDOW Figure 11-2: Tasks List summary The Tasks List shows you basic information about the tasks you set up. • ID is automatically assigned by ExtremeWare Enterprise Manager. • Name is the name you gave the task when you created it. Giving a task a unique name is important to distinguish it from other tasks in the Tasks List.
  • Page 222: Creating A Search Task

    IP/MAC A SING THE DDRESS INDER • Select a task and click Delete to delete an individual task. This deletes the task specification as well as the task results. Once a task has completed, it cannot be rerun unless it is the most recent task completed. •...
  • Page 223: Detailed Task View

    ETAILED 1 Enter the task name in the Task Name field. This name helps you identify the task in the Find Address Tasks List. 2 Define the search targets: select either IP or MAC to determine the format of the address to search for, and enter the address into the fields provided.
  • Page 224 IP/MAC A SING THE DDRESS INDER Figure 11-4: Search in progress While the task is in progress, the window shows the status as Pending. When the search is complete, the Detailed Task View shows the results for the search (Figure 11-5). 11-6 XTREME NTERPRISE...
  • Page 225 ETAILED Figure 11-5: Address search results in the Detailed Task View The Detailed Task View shows the following information about your search. • Name is the name you gave the task when you created it. Giving a task a unique name is important to distinguish it from other tasks in the Tasks List.
  • Page 226 IP/MAC A SING THE DDRESS INDER The Search Results list shows the results of the search. For every address successfully located, this list shows: • Both the MAC address and the corresponding IP address. • The switch and port to which the address is connected •...
  • Page 227: Hp Openview Integration

    HP OpenView Integration This appendix describes: • Integrating the ExtremeWare™ Enterprise Manager and ExtremeWare Vista components for HP OpenView. • Launching the Enterprise Manager client and ExtremeWare Vista from HP OpenView. NTEGRATION VERVIEW The HP OpenView integration process makes it possible to launch the ExtremeWare Enterprise Manager client from within HP OpenView.
  • Page 228 OpenView under Windows NT, you must add commands to the appropriate HP OpenView menus with links to the Extreme Networks software. In addition, the Extreme Networks MIBs need to be included in the set of MIBs available to HP OpenView. The integration process provided with ExtremeWare Enterprise Manager adds the needed components.
  • Page 229: Integrating With Hp Openview Under Windows Nt

    NTEGRATING WITH IEW UNDER INDOWS — Click Extreme Networks supported MIBs to install Extreme Network’s Management Information Base (MIB) definitions. This is necessary for HP Openview to recognize and manage Extreme Networks Summit devices. 7 If you are installing the ExtremeWare Enterprise Manager, the Get ExtremeWare Enterprise Manager Location Dialog Box is displayed.
  • Page 230: Installing The Hp Openview Integration Components

    3 From the Control Panel folder, double-click Add/Remove Programs. This displays the Add/Remove Program Properties widow. 4 From the list of installed programs select Extreme Networks HP OpenView 5.01 Integration and click Add/Remove. Follow the instructions to remove the component.
  • Page 231 This script will copy bitmap and configuration files into your OpenView installation. It will also add entries to the oid_to_type and oid_to_sym files. Optionally, xmnloadmib will be used to load the Extreme Networks mib. To update the OpenView database, we will stop OpenView, run ovtopofix, and optionally restart OpenView.
  • Page 232 Would you like to update the installed MIBs?: (Y/N) [Y]: Installation of Extreme Network’s Management Information Base (MIB) definitions is necessary for HP OpenView to recognize and manage Extreme Networks devices. 9 The script then asks you to confirm the installation/integration instructions:...
  • Page 233 HP O NTEGRATING WITH IEW UNDER OLARIS Updating /etc/opt/OV/share/conf/oid_to_type... (This may take a few moments) Removing any previous ExtremeNetworks entries in /etc/opt/OV/share/conf/oid_to_type Appending new entries to /etc/opt/OV/share/conf/oid_to_type Done Updating /etc/opt/OV/share/conf/oid_to_sym... Removing any previous ExtremeNetworks entries in /etc/opt/OV/share/conf/oid_to_sym Appending new entries to /etc/opt/OV/share/conf/oid_to_sym Done Copying bitmap files to /etc/opt/OV/share/bitmaps/C/connector Copying bitmap files to /etc/opt/OV/share/bitmaps/C/toolbar...
  • Page 234 • When this process has finished, the script runs a process to update the HP OpenView topology database to include the Extreme Networks configuration information. This adds the Summit sysOIDs (system Object IDentifiers) to the HP OpenView topology database, and updates any Summit devices on the map to use Summit-specific icons rather than generic device icons.
  • Page 235: Uninstalling The Integration Components

    HP O AUNCHING THE LIENT FROM script done on Fri 22 Oct 1999 11:23:28 AM PDT Note: ExtremeWare Vista is only available when you have selected an Extreme device on the Network Node Manager map. You must add the Extreme Networks configuration information to the topology database so the Network Node Manager can recognize Extreme switches.
  • Page 236: The Tools Menu In Hp Openview Network Node

    To launch either ExtremeWare Enterprise Manager or ExtremeWare Vista, follow these steps: 1 Click Tools to drop down the Tools menu. 2 Click Extreme Networks to display the ExtremeWare menu. 3 Click ExtremeWare Enterprise Manager or ExtremeWare Vista to launch the appropriate application.
  • Page 237: Launching Extremeware Vista From The Hp Openview Map

    HP O AUNCHING THE LIENT FROM ExtremeWare Enterprise Manager icon Figure A-2: ExtremeWare Enterprise Manager icon on the HP OpenView toolbar HP O AUNCHING XTREME ISTA FROM THE You can launch ExtremeWare Vista for an individual Extreme device directly from the Network Node Manager map using the pop-up menu associated with the device icon.
  • Page 238 HP O NTEGRATION Figure A-3: Pop-up menu for a selected Summit device To Launch ExtremeWare Vista, follow these steps: 1 Select a Summit device on the Network Node Manager Map. 2 Click with the right mouse button to display the pop-up menu. 3 Click ExtremeWare Vista in the menu.
  • Page 239: Dynamic Link Context System (Dlcs

    Dynamic Link Context System (DLCS) This appendix describes: • How the ExtremeWare Enterprise Manager policy system uses The Dynamic Link Context System (DLCS) to map logical endstations (users, hosts) to physical attributes. • How to enable DLCS on Extreme switches running ExtremeWare 5.0 or later. •...
  • Page 240: Using Dlcs In The Policy System

    (DLCS) YNAMIC ONTEXT YSTEM ExtremeWare Enterprise Manager uses DLCS information to create a policy object for a user or end station that is mapped to the appropriate physical attributes (IP address and switch, port). DLCS SING IN THE OLICY YSTEM For DLCS to operate within the ExtremeWare Enterprise Manager Policy System, two conditions must be met: •...
  • Page 241: Dlcs Limitations

    DLCS L IMITATIONS the ExtremeView Configuration features. However, you can use the ExtremeView Telnet feature to access the switch and enable DLCS. To enable DLCS on a switch, do the following: 1 Click the ExtremeView icon in the ExtremeWare Enterprise Manager Navigation Toolbar 2 Select Telnet in the component tree, then select the switch you want to configure.
  • Page 242: Isq Improvements

    (DLCS) YNAMIC ONTEXT YSTEM • DLCS information is dynamic. Therefore if the switch is rebooted the DLCS information is lost. However, this information is still stored in the Enterprise Manager database. To delete the information from the policy system, you must explicitly delete the configuration parameters using the Enterprise Manager Policy System client.
  • Page 243: C Database Utilities

    Database Utilities This chapter describes: • The DBVALID command-line database validation utility. • The DBBACKUP command-line database backup utility VERVIEW Sybase database validation and backup utilities are shipped with the ExtremeWare Enterprise Manager software. The Validation utility validates all indexes and keys on some or all of the tables in the database.
  • Page 244: The Validation Utility

    ATABASE TILITIES ALIDATION TILITY The Validation utility validates all indexes and keys on some or all of the tables in the database. Access the Validation utility from the MSDOS or Solaris command line using the dbvalid command. This convention also allows incorporation into batch or command files.
  • Page 245: Database Connection Parameters

    ACKUP TILITY ATABASE ONNECTION ARAMETERS These are the parameters for the -c command-line switch. If the connection parameters are not specified, connection parameters from the SQLCONNECT environment variable are used, if set. Table C-2: Database Connection Parameters for dbvalid Utility uid= <user name>...
  • Page 246: Database Connection Parameters

    ATABASE TILITIES This example assumes a database user ID of , with password . These are the defaults used when the database server is installed through the ExtremeWare Enterprise Manager installation process. If you have changed your database user ID and password, substitute your actual user ID and password in the command.
  • Page 247: The Backup Utility

    ACKUP TILITY The connection parameters are separated by semi-colons, and the entire set must be quoted. For example, under Windows NT the following backs up the ExtremeWare Enterprise Manager database , connecting as user ID dba with password basecamp.db sql: <install_dir>...
  • Page 248 ATABASE TILITIES XTREME NTERPRISE ANAGER NSTALLATION AND UIDE...
  • Page 249: D Extreme Ware Enterprise Manager Properties Files

    ExtremeWare Enterprise Manager Properties Files This chapter describes several properties files used by ExtremeWare Enterprise Manager: • — ExtremeWare Enterprise Manager configuration extreme.properties parameters. • — Cisco’s mapping of names to well-known ports. ciscoipports.properties These files are both found in the extreme subdirectory of the installation directory (by default eem2_0\extreme extreme.properties F...
  • Page 250: The Ciscoipports.properties File

    XTREME NTERPRISE ANAGER ROPERTIES ILES Snmp.TimeoutPeriod=2 # Number of retries before timing out. # Default=1, Minimum=0, Maximum=5 Snmp.NumberOfRetries=1 # Enables ExtremeView to save switch user names and passwords in the database # automatically. # Default = true, Disable with false SaveSwitchPassword=true # Timeout period in milliseconds after EEM terminates after which the user is # required to relogin...
  • Page 251 ciscoipports.properties F domain = 53 echo exec = 512 finger = 79 = 21 ftp-data = 20 gopher = 70 hostname = 101 ident = 113 = 194 isakmp = 500 klogin = 543 kshell = 544 login = 513 = 515 mobile-ip = 434...
  • Page 252 XTREME NTERPRISE ANAGER ROPERTIES ILES XTREME NTERPRISE ANAGER NSTALLATION AND UIDE...
  • Page 253: E Troubleshooting

    Troubleshooting This appendix describes: • Resolving problems you may encounter using the ExtremeWare Enterprise Manager Server. • Resolving problems you may encounter using the ExtremeWare Enterprise Manager client application. XTREME NTERPRISE ANAGER ERVER SSUES NSTALLATION Problem: The Windows NT installation wizard automatically imported the database from the most recent previous version of ExtremeWare Enterprise Manager, when I wanted to import from an older version (e.g.
  • Page 254: Snmp

    ROUBLESHOOTING SNMP Problem: Cannot talk to a specific switch. Verify that the switch is running ExtremeWare software version 2.0 or greater. Ping the switch’s IP-address to verify availability of a route. Use the command ping from a MS-DOS or Solaris command shell. Verify that the read and write community strings used in the ExtremeWare Enterprise Manager match those configured on the switch.
  • Page 255: Vlans

    XTREME NTERPRISE ANAGER ERVER SSUES Problem: Need to change polling interval, SNMP request time-out, or number of SNMP request retries. To change the default values for the SNMP polling interval, the SNMP request time-out, or the number of SNMP request retries, edit the file , found in the extreme.properties directory.
  • Page 256: Extremeware Enterprise Manager Client

    ROUBLESHOOTING Problem: An untagged port has disappeared from its VLAN. Check to see if the port has been added as an untagged port to a different VLAN. In ExtremeWare Enterprise Manager, adding an untagged port to a VLAN automatically removes the port from its previous VLAN if the port was an untagged port, and the new and old VLANs used the same protocol.
  • Page 257: Vlan Manager

    (browser memory is shared among the various running applets). Problem: Multiple switches have the same name. This is because the sysName of those switches is the same. Typically, Extreme Networks switches are shipped with the names “Summit1,” “Summit2,” “Summit4,” or “Summit48,”...
  • Page 258: Policy System Client

    ROUBLESHOOTING OLICY YSTEM CLIENT Problem: Cannot Import users from NT Domain Controller The ExtremeWare Enterprise Manager Server must be running with permissions that enable it to get user information from a Domain Controller. To verify and change permissions for the Web Server, do the following: 1 From the Start menu, highlight Settings, pull right, and click on the Control Panel.
  • Page 259 Index All Device Groups page 5-4 Numerics Application as policy object 8-7 802.1Q tag 7-2, 7-7 Application Server policy 8-2 Application Server policy definition tab 8-24 architecture Enterprise Manager software 1-6 About button 3-9 Auto Configure button (Policy) 8-14 access levels 1-5, 4-1 Add button in Inventory Manager 5-5 in VLAN Manager 7-6...
  • Page 260 RT Stats 3-10 Source Port policy 8-30 Sync (Inventory Manager) 5-5, 5-25 VLAN policy 8-23 Up (Policy) 8-14 Delete button 9-11 VC 3-9, 9-3 in Inventory Manager 5-5 VLAN 3-9 in VC Stack Manager 9-5 in VLAN Manager 7-9 Delete button (Policy) 8-14 deleting 9-11 a switch 5-23 changing password...
  • Page 261 ExtremeView 1-2 logging in 3-8 Telnet 1-3 Login page 3-8, 4-3 ExtremeWare Vista Logoff button 3-10 launching from HP OpenView A-11 Managed Devices (Policy System) 8-14 Find IP/MAC button 3-10 Manager access level 1-5, 4-1 menu New (Policy System) 8-14, 8-15 Modify button in Inventory Manager 5-5 heartbeat check 1-8...
  • Page 262 Policy System 1-4, 8-1 adding end station groups 8-50 adding end stations 8-48 RADIUS server 4-2 adding users 8-44 administering 4-9 adding user groups 8-47 changing port 4-10 Auto Configure 8-14 changing shared secret 4-10 Cisco devices 8-9 disabling 4-10 Configuration 8-14 enabling 4-10 Create Policy button 8-14...
  • Page 263 stopping the server utilities under Solaris 3-4 database backup C-3 under Windows NT 3-2 database validation C-1 Subnet as policy object 8-7 subnet mask in Discovery 5-10 VC button 3-9, 9-3 Summit switch VC Stack 9-11 configuring ports in VC Stack Manager 9-2 VC Stack Manager 1-3, 9-1 deleting 5-23 configuring switch ports 9-2...
  • Page 264 starting the server 3-2 stopping the server 3-2 uninstalling HP OpenView integration A-4 uninstalling the server 2-6 Xedia device requirements 1-8 Xedia device support in Policy System 8-11 vi - Index...

This manual is also suitable for:

Extremeware enterprise manager 2.0

Table of Contents