1584
Extreme Networks, Inc. 3585 Monroe Street Santa Clara, California 95051 (888) 257-3000 (408) 579-2800 http://www.extremenetworks.com ExtremeXOS ® Concepts Guide Software Version 12.5.3 Published: April 2011 Part number: 100377-00 Rev. 03

EXOSConcepts12_5_3

Embed Size (px)

Citation preview

ExtremeXOS Concepts GuideSoftware Version 12.5.3

Extreme Networks, Inc. 3585 Monroe Street Santa Clara, California 95051 (888) 257-3000 (408) 579-2800 http://www.extremenetworks.com

Published: April 2011 Part number: 100377-00 Rev. 03

AccessAdapt, Alpine, Altitude, BlackDiamond, Direct Attach, EPICenter, ExtremeWorks Essentials, Ethernet Everywhere, Extreme Enabled, Extreme Ethernet Everywhere, Extreme Networks, Extreme Standby Router Protocol, Extreme Turbodrive, Extreme Velocity, ExtremeWare, ExtremeWorks, ExtremeXOS, Go Purple Extreme Solution, ExtremeXOS ScreenPlay, ReachNXT, Ridgeline, Sentriant, ServiceWatch, Summit, SummitStack, Triumph, Unified Access Architecture, Unified Access RF Manager, UniStack, XNV, the Extreme Networks logo, the Alpine logo, the BlackDiamond logo, the Extreme Turbodrive logo, the Summit logos, and the Powered by ExtremeXOS logo are trademarks or registered trademarks of Extreme Networks, Inc. or its subsidiaries in the United States and/or other countries. sFlow is the property of InMon Corporation. Specifications are subject to change without notice. All other registered trademarks, trademarks, and service marks are property of their respective owners. 2011 Extreme Networks, Inc. All Rights Reserved.

ExtremeXOS Concepts Guide, Software Version 12.5.3

2

ContentsPreface.......................................................................................................................................................31Introduction.............................................................................................................................................................31 Terminology ....................................................................................................................................................31 Conventions ...........................................................................................................................................................32 Platform-Dependent Conventions ...................................................................................................................32 Text Conventions ............................................................................................................................................32 Related Publications...............................................................................................................................................33 Using ExtremeXOS Publications Online .........................................................................................................33

PART 1: USING EXTREMEXOS Chapter 1: Getting Started....................................................................................................................... 37Overview ................................................................................................................................................................37 Software Required..................................................................................................................................................38 Logging In to the Switch .........................................................................................................................................41 Understanding the Command Syntax.....................................................................................................................42 Syntax Helper..................................................................................................................................................42 Object Names .................................................................................................................................................43 Command Shortcuts .......................................................................................................................................45 Symbols ..........................................................................................................................................................45 Limits ...............................................................................................................................................................46 Port Numbering ......................................................................................................................................................46 Stand-alone Switch Numerical Ranges...........................................................................................................46 Modular Switch and SummitStack Numerical Ranges ....................................................................................47 Stacking Port Numerical Ranges ....................................................................................................................47 Line-Editing Keys ...................................................................................................................................................47 Command History...................................................................................................................................................48 Common Commands..............................................................................................................................................48 Accessing the Switch for the First Time .................................................................................................................50 Safe Defaults Setup Method ...........................................................................................................................51 Configuring Management Access...........................................................................................................................52 Account Access Levels ...................................................................................................................................52 Configuring Banners .......................................................................................................................................53 Startup Screen and Prompt Text.....................................................................................................................53 Default Accounts .............................................................................................................................................55 Creating a Management Account....................................................................................................................55 Failsafe Accounts ............................................................................................................................................56 Managing Passwords .............................................................................................................................................57 Applying a Password to the Default Account ..................................................................................................57 Applying Security to Passwords ......................................................................................................................58 Displaying Passwords .....................................................................................................................................59 Access to Both MSM/MM Console PortsModular Switches Only .......................................................................59 Access to an Active Node in a SummitStack..........................................................................................................59 Domain Name Service Client Services...................................................................................................................60

ExtremeXOS Concepts Guide, Software Version 12.5.3

3

Contents

Checking Basic Connectivity ..................................................................................................................................60 Ping .................................................................................................................................................................60 Traceroute .......................................................................................................................................................61 Displaying Switch Information ................................................................................................................................62

Chapter 2: Managing the Switch ............................................................................................................. 63Overview ................................................................................................................................................................63 Understanding the ExtremeXOS Shell ...................................................................................................................64 Using the Console Interface ...................................................................................................................................64 Using the 10/100 Ethernet Management Port ........................................................................................................65 Using Ridgeline to Manage the Network ................................................................................................................66 Authenticating Users ..............................................................................................................................................66 RADIUS Client ................................................................................................................................................66 TACACS+........................................................................................................................................................66 Management Accounts ...................................................................................................................................66 Using Telnet ...........................................................................................................................................................67 About the Telnet Client....................................................................................................................................67 About the Telnet Server ..................................................................................................................................67 Connecting to Another Host Using Telnet .......................................................................................................68 Configuring Switch IP Parameters ..................................................................................................................68 Configuring Telnet Access to the Switch.........................................................................................................70 Disconnecting a Telnet Session ......................................................................................................................73 Using Secure Shell 2 ..............................................................................................................................................73 Using the Trivial File Transfer Protocol ..................................................................................................................74 Connecting to Another Host Using TFTP ........................................................................................................74 Understanding System RedundancyModular Switches and SummitStack Only ................................................75 Node Election ..................................................................................................................................................76 Replicating Data Between Nodes ...................................................................................................................78 Viewing Node Status .......................................................................................................................................79 Understanding Hitless Failover SupportModular Switches and SummitStack Only ...........................................80 Protocol Support for Hitless Failover...............................................................................................................81 Platform Support for Hitless Failover...............................................................................................................84 Hitless Failover Caveats .................................................................................................................................87 Understanding Power Supply Management ...........................................................................................................88 Using Power SuppliesModular Switches Only.............................................................................................88 Using Power SuppliesSummit Family Switches Only ..................................................................................91 Using Power Supplies - SummitStack Only ....................................................................................................92 Displaying Power Supply Information..............................................................................................................92 Using the Simple Network Management Protocol ..................................................................................................92 Enabling and Disabling SNMPv1/v2c and SNMPv3........................................................................................93 Accessing Switch Agents ................................................................................................................................94 Supported MIBs ..............................................................................................................................................94 Configuring SNMPv1/v2c Settings ..................................................................................................................94 Displaying SNMP Settings ..............................................................................................................................95 SNMPv3 ..........................................................................................................................................................96 Message Processing .......................................................................................................................................97 SNMPv3 Security ............................................................................................................................................98 SNMPv3 MIB Access Control........................................................................................................................100 SNMPv3 Notification .....................................................................................................................................101 Using the Simple Network Time Protocol .............................................................................................................104 Configuring and Using SNTP ........................................................................................................................104 SNTP Example..............................................................................................................................................107 Using Auto Provision of Edge Switches ...............................................................................................................108 Auto-provisioning Process ............................................................................................................................109 Auto-provisioning Configuration ....................................................................................................................110

ExtremeXOS Concepts Guide, Software Version 12.5.3

4

Contents

Using Access Profile Logging...............................................................................................................................111 Limitations .....................................................................................................................................................111 Configuring Access Profile Logging ..............................................................................................................111

Chapter 3: Managing the ExtremeXOS Software.................................................................................113Overview ..............................................................................................................................................................113 Using the ExtremeXOS File System.....................................................................................................................114 Moving or Renaming Files on the Switch ......................................................................................................115 Copying Files on the Switch ..........................................................................................................................116 Displaying Files on the Switch ......................................................................................................................117 Transferring Files to and from the Switch......................................................................................................118 Deleting Files from the Switch.......................................................................................................................120 Managing the Configuration File ..........................................................................................................................121 Managing ExtremeXOS Processes ......................................................................................................................123 Displaying Process Information.....................................................................................................................123 Stopping a Process .......................................................................................................................................124 Starting a Process .........................................................................................................................................125 Understanding Memory Protection .......................................................................................................................126

Chapter 4: Configuring Stacked Switches ...........................................................................................129Overview ..............................................................................................................................................................129 SummitStack Terms ......................................................................................................................................130 SummitStack Compatible Switches...............................................................................................................133 SummitStack Topologies ..............................................................................................................................133 Stack Depth...................................................................................................................................................136 Understanding Stack Configuration Parameters, Configuration Files, and Port Numbering.........................137 Understanding Stacking Link Overcommitment ............................................................................................138 About Stack Logging Messages....................................................................................................................139 About QoS in Stacking ..................................................................................................................................139 About Power Management and Power Over Ethernet on Stacking ..............................................................141 About Stacking Node Roles, Redundancy, and Failover ..............................................................................141 About the Failsafe Account on SummitStack Nodes.....................................................................................142 Logging into a Stack .............................................................................................................................................142 Logging in Through the Console Port ...........................................................................................................143 Logging in from the Management Network ...................................................................................................143 Logging Into a Node From Another Node .....................................................................................................143 Stack Configuration Guidelines ............................................................................................................................144 General Stack Configuration Guidelines .......................................................................................................144 Summit X460 Stack Configuration Guidelines ..............................................................................................145 Summit X480 Stack Configuration Guidelines ..............................................................................................146 Summit X650 Stack Configuration Guidelines ..............................................................................................147 Configuring a New Stack ......................................................................................................................................147 About Easy Setup .........................................................................................................................................147 Configuration Procedure ...............................................................................................................................148 Example: Deploying a New Stack .................................................................................................................149 Converting a Standalone Node Deployment to a Stack .......................................................................................153 Stack Configuration Tasks ...................................................................................................................................155 Enabling and Disabling Stacking Support for Summit X650 Switches ..........................................................155 Using Ethernet Ports for Stacking (SummitStack-V) .....................................................................................156 Selecting the Stacking Protocol ....................................................................................................................159 Enabling the Stack ........................................................................................................................................159 Verifying the Configuration ............................................................................................................................159 Setting the Command Prompt .......................................................................................................................162 Configuring Slot Numbers .............................................................................................................................162 Configuring the Master, Backup, and Standby Roles....................................................................................163 Assigning a MAC Address for the Stack .......................................................................................................165 Configuring Master-Capability .......................................................................................................................167

ExtremeXOS Concepts Guide, Software Version 12.5.3

5

Contents

Configuring an Alternate IP Address and Gateway.......................................................................................168 Configuring the Failsafe Account on a Stack ................................................................................................171 Disabling Stacking.........................................................................................................................................171 Saving the Configuration ...............................................................................................................................171 Managing an Operating Stack ..............................................................................................................................171 Managing Licenses on a Stack .....................................................................................................................172 Stacking LEDs...............................................................................................................................................175 Viewing the Alternate IP Address..................................................................................................................176 Viewing Stacking Port Statistics ....................................................................................................................177 Adding a Node to a Stack .............................................................................................................................177 Replacing a Node with the Same Switch Type .............................................................................................180 Replacing a Node with a Different Switch Type ............................................................................................181 Merging Two Stacks......................................................................................................................................182 Upgrading ExtremeXOS on a Stack..............................................................................................................188 Upgrading SummitStack Option Cards .........................................................................................................190 Dismantling a Stack ......................................................................................................................................193 Removing a Node from a Stack ....................................................................................................................193 Rebooting a Stack .........................................................................................................................................194 Troubleshooting a Stack.......................................................................................................................................195 Managing a Dual Master Situation ................................................................................................................196 Setting Traps for Stacking .............................................................................................................................199 Connecting to a Stack with No Master ..........................................................................................................199 Rescuing a Stack That Has No Master-Capable Node .................................................................................199 FAQs on the SummitStack Feature......................................................................................................................202

Chapter 5: Configuring Slots and Ports on a Switch ..........................................................................203Overview ..............................................................................................................................................................203 Configuring Slots on Modular Switches................................................................................................................203 Details on I/O Ports .......................................................................................................................................205 Disabling MSM-G8X I/O Ports..............................................................................................................................206 Configuring Ports on a Switch ..............................................................................................................................207 Port Numbering .............................................................................................................................................207 Enabling and Disabling Switch Ports ............................................................................................................208 Configuring Switch Port Speed and Duplex Setting ......................................................................................209 Flow Control ..................................................................................................................................................212 IPFIX .............................................................................................................................................................218 WAN PHY OAM ............................................................................................................................................222 Configuring Switching ModeCut-through Switching...................................................................................224 SyncE ............................................................................................................................................................225 DWDM Optics Support ..................................................................................................................................226 Jumbo Frames .....................................................................................................................................................227 Guidelines for Jumbo Frames .......................................................................................................................227 Enabling Jumbo Frames per Port .................................................................................................................228 Enabling Jumbo Frames ...............................................................................................................................229 Path MTU Discovery .....................................................................................................................................229 IP Fragmentation with Jumbo Frames ..........................................................................................................230 IP Fragmentation within a VLAN ...................................................................................................................231 Link Aggregation on the Switch ............................................................................................................................231 Link Aggregation Overview ...........................................................................................................................232 Link Aggregation and Software-Controlled Redundant Ports........................................................................233 Dynamic Versus Static Load Sharing............................................................................................................233 Load-Sharing Algorithms...............................................................................................................................233 LACP .............................................................................................................................................................239 Health Check Link Aggregation.....................................................................................................................241 Guidelines for Load Sharing..........................................................................................................................242 Configuring Switch Load Sharing ..................................................................................................................245

ExtremeXOS Concepts Guide, Software Version 12.5.3

6

Contents

Load-Sharing Examples ................................................................................................................................248 Displaying Switch Load Sharing....................................................................................................................249 MLAG ...................................................................................................................................................................250 Overview .......................................................................................................................................................250 Limitations and Requirements.......................................................................................................................252 Configuring MLAGs .......................................................................................................................................254 Displaying Information...................................................................................................................................255 Example of MLAG Configuration...................................................................................................................256 Mirroring ...............................................................................................................................................................259 Guidelines for Mirroring .................................................................................................................................260 Mirroring Rules and Restrictions ...................................................................................................................265 Mirroring Examples .......................................................................................................................................266 Verifying the Mirroring Configuration.............................................................................................................268 Remote Mirroring..................................................................................................................................................268 Configuration Details .....................................................................................................................................269 Guidelines .....................................................................................................................................................270 Use of Remote Mirroring with Redundancy Protocols...................................................................................271 Remote Mirroring with EAPS.........................................................................................................................271 Extreme Discovery Protocol .................................................................................................................................274 Software-Controlled Redundant Port and Smart Redundancy.............................................................................275 Guidelines for Software-Controlled Redundant Ports and Port Groups ........................................................276 Configuring Software-Controlled Redundant Ports .......................................................................................276 Verifying Software-Controlled Redundant Port Configurations .....................................................................277 Configuring Automatic Failover for Combination Ports.........................................................................................277 Displaying Port Information ..................................................................................................................................278 DDMI .............................................................................................................................................................278

Chapter 6: Universal Port ......................................................................................................................281Overview ..............................................................................................................................................................281 Profile Types .................................................................................................................................................282 Dynamic Profile Trigger Types ......................................................................................................................284 How Device Detect Profiles Work .................................................................................................................287 How User Authentication Profiles Work ........................................................................................................288 Profile Configuration Guidelines....................................................................................................................288 Collecting Information from Supplicants........................................................................................................293 Supplicant Configuration Parameters ...........................................................................................................295 Universal Port Configuration Overview .........................................................................................................295 Using Universal Port in an LDAP or Active Directory Environment...............................................................297 Configuring Universal Port Profiles and Triggers .................................................................................................297 Creating and Configuring New Profiles .........................................................................................................298 Editing an Existing Profile .............................................................................................................................298 Configuring a Device Event Trigger ..............................................................................................................299 Configuring a User Login or Logout Event Trigger........................................................................................299 Configuring a Universal Port Timer ...............................................................................................................299 Configuring a Timer Trigger ..........................................................................................................................299 Creating an EMS Event Filter........................................................................................................................300 Configuring an EMS Event Trigger ...............................................................................................................300 Enabling and Disabling an EMS Event Trigger .............................................................................................300 Unconfiguring a User or Device Profile Trigger.............................................................................................300 Unconfiguring a Timer ...................................................................................................................................300 Managing Profiles and Triggers............................................................................................................................301 Manually Executing a Static or Dynamic Profile............................................................................................301 Displaying a Profile .......................................................................................................................................301 Displaying Timers..........................................................................................................................................301 Displaying Universal Port Events ..................................................................................................................302 Displaying Profile History ..............................................................................................................................302 Verifying a Universal Port Profile...................................................................................................................302

ExtremeXOS Concepts Guide, Software Version 12.5.3

7

Contents

Handling Profile Execution Errors .................................................................................................................302 Disabling and Enabling a Profile ...................................................................................................................303 Deleting a Profile ...........................................................................................................................................303 Deleting a Timer ............................................................................................................................................303 Deleting an EMS Event Trigger.....................................................................................................................303 Sample Universal Port Configurations..................................................................................................................303 Sample MAC Tracking Profile .......................................................................................................................304 Universal Port Handset Provisioning Module Profiles ...................................................................................309 Sample Static Profiles ...................................................................................................................................313 Sample Configuration with Device-Triggered Profiles...................................................................................316 Sample Configuration with User-Triggered Profiles ......................................................................................318 Sample Timer-Triggered Profile ....................................................................................................................321 Sample Profile with QoS Support..................................................................................................................322 Sample Event Profile.....................................................................................................................................322 Sample Configuration for Generic VoIP LLDP ..............................................................................................324 Sample Configuration for Generic VoIP 802.1x ............................................................................................326 Sample Configuration for Avaya VoIP 802.1x ...............................................................................................327 Sample Configuration for a Video Camera....................................................................................................329

Chapter 7: Using CLI Scripting .............................................................................................................331Overview ..............................................................................................................................................................331 Setting Up Scripts.................................................................................................................................................331 Enabling and Disabling CLI Scripting ............................................................................................................332 Creating Scripts.............................................................................................................................................332 Using Script Variables ...................................................................................................................................333 Using Special Characters in Scripts ..............................................................................................................334 Using Operators ............................................................................................................................................334 Using Control Structures in Scripts ...............................................................................................................335 Using Built-In Functions ................................................................................................................................336 Controlling Script Configuration Persistence.................................................................................................337 Saving, Retrieving, and Deleting Session Variables .....................................................................................338 Nesting Scripts ..............................................................................................................................................338 Executing Scripts ..........................................................................................................................................339 Configuring Error Handling............................................................................................................................339 Aborting a Script............................................................................................................................................339 Displaying CLI Scripting Information ....................................................................................................................339 Viewing CLI Scripting Status .........................................................................................................................340 Viewing CLI Scripting Variables ....................................................................................................................341 Controlling CLI Script Output ........................................................................................................................341 CLI Scripting Examples ........................................................................................................................................341

Chapter 8: LLDP .....................................................................................................................................343Overview ..............................................................................................................................................................343 Supported Advertisements (TLVs) ................................................................................................................344 LLDP Packets ...............................................................................................................................................347 Transmitting LLDP Messages .......................................................................................................................348 Receiving LLDP Messages ...........................................................................................................................348 LLDP Management .......................................................................................................................................349 Configuring and Managing LLDP .........................................................................................................................349 Configuration Overview .................................................................................................................................349 Enabling and Disabling LLDP .......................................................................................................................350 Configuring LLDP Timers ..............................................................................................................................351 Configuring SNMP for LLDP .........................................................................................................................351 Configuring Optional TLV Advertisements ....................................................................................................352 Unconfiguring LLDP ......................................................................................................................................358

ExtremeXOS Concepts Guide, Software Version 12.5.3

8

Contents

Displaying LLDP Information ................................................................................................................................358 Displaying LLDP Port Configuration Information and Statistics ....................................................................359 Displaying LLDP Information Collected from Neighbors ...............................................................................359

Chapter 9: OAM ......................................................................................................................................361CFM......................................................................................................................................................................361 Overview .......................................................................................................................................................362 Ping and Traceroute......................................................................................................................................365 Supported Instances for CFM .......................................................................................................................366 VPLS Node as a CFM MIP ...........................................................................................................................367 Configuring CFM ...........................................................................................................................................367 Displaying CFM .............................................................................................................................................371 CFM Example ...............................................................................................................................................371 Y.1731Compliant Frame Delay and Delay Variance Measurement .................................................................372 Frame Delay Measurement...........................................................................................................................373 Configuring a CFM Segment.........................................................................................................................374 EFM OAMUnidirectional Link Fault Management.............................................................................................376 Unidirectional Link Fault Management ..........................................................................................................376 Configuring Unidirectional Link Fault Management.......................................................................................377 Bidirectional Forwarding Detection (BFD) ............................................................................................................378 Overview .......................................................................................................................................................378 Limitations .....................................................................................................................................................380 Configuring BFD............................................................................................................................................380 Displaying BFD Information ..........................................................................................................................380 Clearing BFD Information..............................................................................................................................381

Chapter 10: PoE......................................................................................................................................383Overview ..............................................................................................................................................................383 Extreme Networks PoE Devices...........................................................................................................................384 Summary of PoE Features ...................................................................................................................................385 Power Checking for PoE Module..........................................................................................................................385 Power Delivery .....................................................................................................................................................386 Enabling PoE to the Switch ...........................................................................................................................386 Power Reserve Budget .................................................................................................................................386 PD Disconnect Precedence ..........................................................................................................................387 Port Disconnect or Fault................................................................................................................................388 Port Power Cycling........................................................................................................................................389 PoE Usage Threshold ...................................................................................................................................389 Legacy Devices .............................................................................................................................................389 PoE Operator Limits ......................................................................................................................................389 Configuring PoE ...................................................................................................................................................390 Enabling Inline Power ...................................................................................................................................390 Reserving Power ...........................................................................................................................................391 Setting the Disconnect Precedence ..............................................................................................................392 Configuring the Usage Threshold .................................................................................................................393 Configuring the Switch to Detect Legacy PDs...............................................................................................394 Configuring the Operator Limit ......................................................................................................................394 Configuring PoE Port Labels .........................................................................................................................395 Power Cycling Connected PDs .....................................................................................................................395 Adding an S-PoE Daughter Card to an Existing Configuration .....................................................................395 Displaying PoE Settings and Statistics.................................................................................................................397 Clearing Statistics .........................................................................................................................................397 Displaying System Power Information...........................................................................................................397 Displaying Slot PoE Information on Modular Switches .................................................................................398 Displaying PoE Status and Statistics on Stand-alone Switches....................................................................399 Displaying Port PoE Information ...................................................................................................................399

ExtremeXOS Concepts Guide, Software Version 12.5.3

9

Contents

Chapter 11: Status Monitoring and Statistics......................................................................................403Overview ..............................................................................................................................................................403 Viewing Port Statistics ..........................................................................................................................................404 Viewing Port Errors ..............................................................................................................................................405 Using the Port Monitoring Display Keys ...............................................................................................................406 Viewing VLAN Statistics .......................................................................................................................................407 Configuring VLAN Statistics ..........................................................................................................................407 Guidelines and Limitations ............................................................................................................................408 Performing Switch Diagnostics.............................................................................................................................408 Running Diagnostics .....................................................................................................................................409 Observing LED Behavior During a Diagnostic Test ......................................................................................412 Displaying Diagnostic Test Results ...............................................................................................................419 Using the System Health Checker........................................................................................................................419 Understanding the System Health Checker ..................................................................................................420 Enabling Diagnostic Packets on the SwitchModular Switches Only..........................................................421 Configuring Diagnostic Packets on the SwitchModular Switches Only .....................................................422 Disabling Diagnostic Packets on the SwitchModular Switches Only .........................................................422 Displaying the System Health Check SettingAll Platforms ........................................................................422 System Health Check Examples: DiagnosticsModular Switches Only ......................................................423 Setting the System Recovery Level......................................................................................................................426 Configuring Software Recovery ....................................................................................................................426 Configuring Hardware RecoverySummitStack and Summit Family Switches Only...................................427 Configuring Module RecoveryModular Switches Only...............................................................................429 Using ELSM .........................................................................................................................................................436 About ELSM ..................................................................................................................................................436 ELSM Hello Messages ..................................................................................................................................437 ELSM Port States..........................................................................................................................................437 Link States ....................................................................................................................................................438 ELSM Link States..........................................................................................................................................439 ELSM Timers ................................................................................................................................................440 Configuring ELSM on a Switch .....................................................................................................................441 Displaying ELSM Information ........................................................................................................................443 Using ELSM with Layer 2 Control Protocols .................................................................................................445 ELSM Configuration Example .......................................................................................................................446 Viewing Fan Information.......................................................................................................................................447 Viewing the System Temperature ........................................................................................................................447 System Temperature Output .........................................................................................................................448 Power Supply TemperatureModular Switches Only ..................................................................................449 Fan Tray TemperatureBlackDiamond 10808 and 20800 Series Switches Only........................................449 Using the Event Management System/Logging ...................................................................................................450 Sending Event Messages to Log Targets .....................................................................................................450 Filtering Events Sent to Targets ....................................................................................................................451 Displaying Real-Time Log Messages............................................................................................................460 Displaying Event Logs...................................................................................................................................460 Uploading Event Logs ...................................................................................................................................460 Displaying Counts of Event Occurrences......................................................................................................461 Displaying Debug Information .......................................................................................................................462 Logging Configuration Changes....................................................................................................................462 Using the XML Notification Client .........................................................................................................................462 Introduction ...................................................................................................................................................462 HTTP Client Interface....................................................................................................................................463 Configuring XML Notification.........................................................................................................................463 Displaying XML Notification ..........................................................................................................................463 Configuring Log Target in EMS .....................................................................................................................464 Examples ......................................................................................................................................................464

ExtremeXOS Concepts Guide, Software Version 12.5.3

10

Contents

Using sFlow ..........................................................................................................................................................465 Sampling Mechanisms ..................................................................................................................................466 Configuring sFlow .........................................................................................................................................467 Additional sFlow Configuration Options ........................................................................................................469 sFlow Configuration Example .......................................................................................................................470 Displaying sFlow Information ........................................................................................................................471 Using RMON ........................................................................................................................................................471 About RMON .................................................................................................................................................471 Supported RMON Groups of the Switch .......................................................................................................472 Configuring RMON ........................................................................................................................................474 Event Actions ................................................................................................................................................475 Displaying RMON Information.......................................................................................................................475 SMON ...........................................................................................................................................................475 Monitoring CPU Utilization....................................................................................................................................475 Disabling CPU Monitoring .............................................................................................................................476 Enabling CPU Monitoring ..............................................................................................................................476 Displaying CPU Utilization History ................................................................................................................476

Chapter 12: VLANs .................................................................................................................................479Overview ..............................................................................................................................................................479 Benefits .........................................................................................................................................................480 Virtual Routers and VLANs ...........................................................................................................................480 Types of VLANs ............................................................................................................................................480 Default VLAN ................................................................................................................................................487 VLAN Names ................................................................................................................................................487 Configuring VLANs on the Switch ........................................................................................................................488 VLAN Configuration Overview ......................................................................................................................488 Creating and Deleting VLANs .......................................................................................................................489 Managing a VLAN IP Address ......................................................................................................................489 Configuring a VLAN Tag ...............................................................................................................................489 Adding and Removing Ports from a VLAN ....................................................................................................489 Renaming a VLAN ........................................................................................................................................490 Enabling and Disabling VLANs .....................................................................................................................490 VLAN Configuration Examples......................................................................................................................490 Displaying VLAN Information................................................................................................................................491 Private VLANs ......................................................................................................................................................492 PVLAN Overview ..........................................................................................................................................492 Configuring PVLANs .....................................................................................................................................500 Displaying PVLAN Information ......................................................................................................................504 PVLAN Configuration Example 1 ..................................................................................................................505 PVLAN Configuration Example 2 ..................................................................................................................507 VLAN Translation .................................................................................................................................................510 VLAN Translation Behavior ...........................................................................................................................511 VLAN Translation Limitations ........................................................................................................................512 Configuring Translation VLANs .....................................................................................................................513 Displaying Translation VLAN Information......................................................................................................513 VLAN Translation Configuration Examples ...................................................................................................514

Chapter 13: vMAN (PBN), PBBN, and PBB-TE.....................................................................................521Overview ..............................................................................................................................................................521 vMAN Configuration Options and Features...................................................................................................529 Configuration ........................................................................................................................................................537 Configuring vMANs (PBNs)...........................................................................................................................537 Configuring PBBNs .......................................................................................................................................540 Configuring vMAN Options............................................................................................................................549

ExtremeXOS Concepts Guide, Software Version 12.5.3

11

Contents

Displaying Information ..........................................................................................................................................553 Displaying vMAN Information ........................................................................................................................553 Displaying PBBN Information ........................................................................................................................554 Configuration Examples .......................................................................................................................................554 vMAN Example, Black Diamond 8810 ..........................................................................................................555 vMAN Example, Black Diamond 10808 ........................................................................................................556 LAG Port Selection Example.........................................................................................................................557 Multiple vMAN Ethertype Example................................................................................................................558 Tag Translation Example Using ACLs Only ..................................................................................................559 1:N Flooding Examples .................................................................................................................................560 PBBN Example .............................................................................................................................................562 PBB-TE Example ..........................................................................................................................................566

Chapter 14: FDB .....................................................................................................................................569Overview ..............................................................................................................................................................569 FDB Contents................................................................................................................................................569 How FDB Entries Get Added ........................................................................................................................570 FDB Entry Types ...........................................................................................................................................570 Managing the FDB ...............................................................................................................................................572 Increasing the FDB Table Size .....................................................................................................................572 Adding a Permanent Unicast Static Entry .....................................................................................................572 Adding a Permanent Multicast Static Entry ...................................................................................................573 Configuring the FDB Aging Time ..................................................................................................................574 Adding Virtual MAC Entries from IP ARP Packets ........................................................................................574 Clearing FDB Entries ....................................................................................................................................574 Supporting Remote Mirroring ........................................................................................................................575 Displaying FDB Entries and Statistics ..................................................................................................................575 Displaying FDB Entries .................................................................................................................................575 Displaying FDB Statistics ..............................................................................................................................576 MAC-Based Security ............................................................................................................................................576 Managing MAC Address Learning ................................................................................................................577 Managing Egress Flooding ...........................................................................................................................578 Displaying Learning and Flooding Settings ...................................................................................................580 Creating Blackhole FDB Entries....................................................................................................................580 Managing MAC Address Tracking........................................................................................................................581 Adding and Deleting MAC Addresses for Tracking .......................................................................................581 Enabling and Disabling MAC Address Tracking on Ports .............................................................................582 Enabling and Disabling SNMP Traps for MAC Address Changes ................................................................582 Configuring Automatic Responses to MAC Tracking Events ........................................................................582 Displaying the Tracked MAC Addresses and Tracking Statistics..................................................................582 Clearing the Tracking Statistics Counters .....................................................................................................582

Chapter 15: Data Center Solutions .......................................................................................................583Overview ..............................................................................................................................................................583 Introduction to Data Center Bridging .............................................................................................................583 Introduction to the XNV Feature....................................................................................................................584 Introduction to the Direct Attach Feature ......................................................................................................586 Managing the XNV Feature, VM Tracking............................................................................................................586 Limitations .....................................................................................................................................................587 Managing VM Tracking on the Switch...........................................................................................................587 Managing VM Tracking on Specific Ports .....................................................................................................587 Configuring the Authentication Method and Sequence .................................................................................588 Managing the Repository Server...................................................................................................................588 Managing NMS Server Authentication ..........................................................................................................590 Managing Network Authentication (Using the VMMAP File) .........................................................................592

ExtremeXOS Concepts Guide, Software Version 12.5.3

12

Contents

Managing Local Database Authentication.....................................................................................................592 Example XNV Configuration .........................................................................................................................593 Managing Direct Attach to Support VEPA ............................................................................................................602

Chapter 16: Virtual Routers ...................................................................................................................603Overview ..............................................................................................................................................................603 Types of Virtual Routers................................................................................................................................604 VR Configuration Context .............................................................................................................................606 Managing Virtual Routers .....................................................................................................................................607 Creating and Deleting User Virtual Routers ..................................................................................................607 Creating and Deleting VRFs .........................................................................................................................607 Enabling and Disabling VRFs .......................................................................................................................608 Configuring and Removing a VR Description................................................................................................608 Changing the VR Context .............................................................................................................................608 Adding and Deleting Routing Protocols ........................................................................................................608 Configuring Ports to Use One or More Virtual Routers .................................................................................609 Displaying Ports and Protocols .....................................................................................................................610 Configuring the Routing Protocols and VLANs .............................................................................................611 Virtual Router Configuration Example ..................................................................................................................611

Chapter 17: Policy Manager ..................................................................................................................613Overview ..............................................................................................................................................................613 Creating and Editing Policies ...............................................................................................................................613 Using the Edit Command ..............................................................................................................................614 Using a Separate Machine ............................................................................................................................614 Checking Policies ..........................................................................................................................................615 Refreshing Policies .......................................................................................................................................615 Applying Policies ..................................................................................................................................................615 Applying ACL Policies ...................................................................................................................................616 Applying Routing Policies..............................................................................................................................616

Chapter 18: ACLs ...................................................................................................................................617Overview ..............................................................................................................................................................617 ACL Rule Syntax ..................................................................................................................................................618 Matching All Egress Packets.........................................................................................................................620 Comments and Descriptions in ACL Policy Files ..........................................................................................620 Types of Rule Entries ....................................................................................................................................621 Match Conditions ..........................................................................................................................................622 Actions ..........................................................................................................................................................622 Action Modifiers.............................................................................................................................................623 ACL Rule Syntax Details ...............................................................................................................................626 IPv6 ACL Address Masks .............................................................................................................................633 vMAN ACLs ..........................................................................................................................................................633 vMAN Match Conditions................................................................................................................................634 vMAN ACL Actions........................................................................................................................................635 vMAN ACL Action Modifiers ..........................................................................................................................635 vMAN ACL Examples....................................................................................................................................637 Layer-2 Protocol Tunneling ACLs.........................................................................................................................638 ACL Byte Counters...............................................................................................................................................639 Dynamic ACLs......................................