User GuideTable of Contents(START Page)1Home1Front Matter2Copyright Information2Patents2Contacting Alcatel2Contents3About This Guide9Supported Platforms9Who Should Read this Manual?11When Should I Read this Manual?11What is in this Manual?11What is Not in this Manual?11How is the Information Organized?12Documentation Roadmap12Related Documentation14User Manuals Web Site15Technical Support151. Configuring OSPF17In This Chapter17OSPF Specifications18OSPF Defaults Table19OSPF Quick Steps20OSPF Overview23OSPF Areas24Classification of Routers25Virtual Links25Stub Areas26Not-So-Stubby-Areas27Totally Stubby Areas27Equal Cost Multi-Path (ECMP) Routing28Non-Broadcast OSPF Routing28Graceful Restart on Switches with Redundant CMMs29Configuring OSPF30Preparing the Network for OSPF31Activating OSPF32Creating an OSPF Area33Creating OSPF Interfaces37Creating Virtual Links40Creating Redistribution Policies and Filters41Configuring Router Capabilities44Configuring Static Neighbors45Configuring Redundant CMMs for Graceful Restart46OSPF Application Example47Step 1: Prepare the Routers48Step 2: Enable OSPF50Step 3: Create and Enable the Areas and Backbone50Step 4: Create, Enable, and Assign Interfaces51Step 5: Examine the Network53Verifying OSPF Configuration542. Configuring BGP55In This Chapter55BGP Specifications56Quick Steps for Using BGP57BGP Overview58Autonomous Systems (ASs)59Internal vs. External BGP60Communities61Route Reflectors62BGP Confederations63Policies64Regular Expressions65The Route Selection Process68Route Dampening69CIDR Route Notation69BGP Configuration Overview70Starting BGP71Disabling BGP71Setting Global BGP Parameters72Setting the Router AS Number73Setting the Default Local Preference73Enabling AS Path Comparison74Controlling the use of MED Values75Synchronizing BGP and IGP Routes76Displaying Global BGP Parameters77Configuring a BGP Peer78Creating a Peer80Restarting a Peer81Setting the Peer Auto Restart81Changing a Peer Address to the Local Router Address82Clearing Statistics for a Peer82Setting Peer Authentication83Setting the Peer Route Advertisement Interval83Configuring a BGP Peer with the Loopback0 Interface83Configuring Aggregate Routes84Configuring Local Routes (Networks)85Adding the Network85Configuring Network Parameters86Viewing Network Settings87Controlling Route Flapping Through Route Dampening88Example: Flapping Route Suppressed, then Unsuppressed88Enabling Route Dampening89Configuring Dampening Parameters89Clearing the History91Displaying Dampening Settings and Statistics91Setting Up Route Reflection92Configuring Route Reflection94Redundant Route Reflectors94Working with Communities95Creating a Confederation96Routing Policies97Creating a Policy97Assigning a Policy to a Peer102Displaying Policies104Configuring Redistribution Filters105Application Example107AS 100107AS 200108Displaying BGP Settings and Statistics1103. Configuring Multicast Address Boundaries111In This Chapter111Multicast Boundary Specifications112Quick Steps for Configuring Multicast Address Boundaries112Using Existing Router Ports112On New Router Ports112Multicast Address Boundaries Overview114Multicast Addresses and the IANA114Administratively Scoped Multicast Addresses114Source-Specific Multicast Addresses114Multicast Address Boundaries115Concurrent Multicast Addresses116Configuring Multicast Address Boundaries117Basic Multicast Address Boundary Configuration117Creating a Multicast Address Boundary117Deleting a Multicast Address Boundary117Verifying the Multicast Address Boundary Configuration117Application Example for Configuring Multicast Address Boundaries1184. Configuring DVMRP121In This Chapter121DVMRP Specifications122DVMRP Defaults122Quick Steps for Configuring DVMRP123DVMRP Overview125Reverse Path Multicasting125Neighbor Discovery126Multicast Source Location, Route Report Messages, and Metrics127Dependent Downstream Routers and Poison Reverse127Pruning Multicast Traffic Delivery128Grafting Branches Back onto the Multicast Delivery Tree128DVMRP Tunnels129Configuring DVMRP130Enabling DVMRP on the Switch130Loading DVMRP into Memory130Enabling DVMRP on a Specific Interface131Viewing DVMRP Status and Parameters for a Specific Interface132Globally Enabling DVMRP on the Switch132Checking the Current Global DVMRP Status132Automatic Loading and Enabling of DVMRP Following a System Boot133Neighbor Communications133Routes134Pruning135More About Prunes135Grafting137Tunnels137Verifying the DVMRP Configuration1395. Configuring PIM-SM141In This Chapter141PIM-SM Specifications142PIM-SM Defaults143Quick Steps for Configuring PIM-SM144PIM-SM Overview145Rendezvous Points (RPs)145Candidate Rendezvous Points (C-RPs)145Bootstrap Routers (BSRs)146Candidate Bootstrap Routers (C-BSRs)146Designated Routers (DRs)146Shared (or RP) Trees147Avoiding Register Encapsulation149RP Initiation of (S, G) Source-Specific Join Message149SPT Switchover151Configuring PIM-SM154Enabling PIM-SM on the Switch154Verifying the Software154Loading PIM-SM into Memory155Enabling IPMS155Enabling PIM-SM on a Specific Interface156Viewing PIM-SM Status and Parameters for a Specific Interface156Globally Enabling PIM-SM on the Switch156Checking the Current Global PIM-SM Status157Automatic Loading and Enabling of PIM-SM Following a System Boot157PIM Bootstrap and RP Discovery158Configuring a C-RP on an Interface158Specifying a Multicast Group158Specifying the Maximum Number of RPs159Configuring Candidate Bootstrap Routers (C-BSRs)161Candidate Bootstrap Routers (C-BSRs)161Configuring a C-BSR on an Interface161Verifying your Changes162Bootstrap Routers (BSRs)163Configuring Static RP Groups163Group-to-RP Mapping164Verifying the PIM-SM Configuration165PIM-SSM Support166Source-Specific Multicast Addresses166PIM-SSM Specifications166A. Software License and Copyright Statements167Alcatel License Agreement167ALCATEL INTERNETWORKING, INC. (“AII”) SOFTWARE LICENSE AGREEMENT167Third Party Licenses and Notices170Index179Size: 4.17 MBPages: 184Language: EnglishOpen manual
User GuideTable of Contents(START page)1Home1Front Matter2Copyright Information2Patents2Contacting Alcatel2Contents3About This Guide11Supported Platforms11Who Should Read this Manual?13When Should I Read this Manual?13What is in this Manual?13What is Not in this Manual?13How is the Information Organized?14Documentation Roadmap14Related Documentation16User Manuals Web Site17Technical Support171. Logging Into the Switch19In This Chapter19Login Specifications20Login Defaults20Quick Steps for Logging Into the Switch21Overview of Switch Login Components22Management Interfaces22Logging Into the CLI22Using the WebView Management Tool23Using SNMP to Manage the Switch23User Accounts23Using Telnet24Logging Into the Switch Via Telnet24Starting a Telnet Session from the Switch24Using FTP25Using FTP to Log Into the Switch25Using Secure Shell26Secure Shell Components26Secure Shell Interface26Secure Shell File Transfer Protocol26Secure Shell Application Overview27Secure Shell Authentication28Protocol Identification28Algorithm and Key Exchange28Authentication Phase28Connection Phase29Starting a Secure Shell Session29Closing a Secure Shell Session31Log Into the Switch with Secure Shell FTP31Closing a Secure Shell FTP Session32Modifying the Login Banner33Modifying the Text Display Before Login34Configuring Login Parameters35Configuring the Inactivity Timer35Enabling the DNS Resolver36Verifying Login Settings362. Managing System Files37In This Chapter37File Management Specifications38File Management Overview39File Transfer39Switch Directories40File and Directory Management41Using Wildcards43Multiple Characters43Single Characters43Directory Commands44Determining Your Location in the File Structure44Changing Directories45Displaying Directory Contents46Making a New Directory47Displaying Directory Contents Including Subdirectories48Copying an Existing Directory48Removing a Directory and its Contents49File Commands50Creating or Modifying Files50Copying an Existing File50Moving a File or Directory51Changing File Attribute and Permissions52Deleting a File52Utility Commands52Displaying Free Memory Space52Performing a File System Check52Deleting the Entire File System53Loading Software onto the Switch54Using the Switch as an FTP Server54Using the Switch as an FTP Client56Using Secure Shell FTP58Closing a Secure Shell FTP Session58Using Zmodem59Registering Software Image Files60Directories on the Switch60Using the Install Command61Available Image Files62Application Examples for File Management63Creating a File Directory on the Switch63Transferring a File to the Switch Using FTP64FTP Client Application Example65Creating a File Directory Using Secure Shell FTP67Transfer a File Using Secure Shell FTP68Closing a Secure Shell FTP Session68Verifying Directory Contents68Setting the System Clock69Setting Date and Time69Date69Time Zone69Time70Daylight Savings Time Configuration71Enabling DST723. Configuring Network Time Protocol (NTP)75In This Chapter75NTP Specifications76NTP Defaults Table76NTP Quick Steps77NTP Overview78Stratum79Using NTP in a Network79Authentication81Configuring NTP82Configuring the OmniSwitch as a Client82NTP Servers83Using Authentication84Verifying NTP Configuration854. Managing CMM Directory Content87In This Chapter87CMM Specifications88CMM Files89CMM Directory Structure89Where is the Switch Running From?90Software Rollback Feature90Software Rollback Configuration Scenarios91CMM Redundancy94Managing the Directory Structure of the CMM (Non-Redundant)95Rebooting the Switch95Copying the Running Configuration to the Working Directory97Rebooting from the Working Directory99Copying the Working Directory to the Certified Directory101Copying the Certified Directory to the Working Directory102Show Currently Used Configuration103Show Switch Files104Managing Redundant CMMs105Rebooting the Switch105Copying the Working Directory to the Certified Directory106Synchronizing the Primary and Secondary CMMs107Swapping the Primary CMM for the Secondary CMM109Show Currently Used Configuration110NI Module Behavior During Takeover110Emergency Restore of the boot.cfg File111Can I Restore the boot.file While Running from Certified?111Displaying CMM Conditions1125. Using the CLI113In This Chapter113CLI Specifications114CLI Overview114Online Configuration114Offline Configuration Using Configuration Files115Command Entry Rules and Syntax115Text Conventions115Using “Show” Commands116Using the “No” Form116Using “Alias” Commands116Partial Keyword Completion117Command Help117Tutorial for Building a Command Using Help119CLI Services121Command Line Editing121Deleting Characters121Recalling the Previous Command Line122Inserting Characters122Syntax Checking123Prefix Recognition123Example for Using Prefix Recognition124Prefix Prompt125Command History125Logging CLI Commands and Entry Results127Enabling Command Logging127Disabling Command Logging127Viewing the Current Command Logging Status128Viewing Logged CLI Commands and Command Entry Results128Customizing the Screen Display129Changing the Screen Size129Changing the CLI Prompt129Displaying Table Information130Filtering Table Information131Multiple User Sessions132Listing Other User Sessions132Listing Your Current Login Session133Application Example134Using a Wildcard to Filter Table Information1346. Working With Configuration Files137In This Chapter137Configuration File Specifications138Tutorial for Creating a Configuration File138Quick Steps for Applying Configuration Files140Setting a File for Immediate Application140Setting an Application Session for a Date and Time140Setting an Application Session for a Specified Time Period141Configuration Files Overview142Applying Configuration Files to the Switch142Verifying a Timed Session143Cancelling a Timed Session143Configuration File Error Reporting143Setting the Error File Limit144Verbose Mode144Displaying a Text File145Text Editing on the Switch145Invoke the “Vi” Editor145Creating Snapshot Configuration Files146Snapshot Feature List146User-Defined Naming Options147Editing Snapshot Files147Verifying File Configuration1497. Managing Switch User Accounts151In This Chapter151User Database Specifications152User Account Defaults152Overview of User Accounts153Startup Defaults154Quick Steps for Creating Network Administrator User Accounts155Quick Steps for Creating Customer Login User Accounts156Default User Settings157How User Settings Are Saved157Creating a User158Removing a User158User-Configured Password158Setting a Minimum Password Size159Configuring Password Expiration159Default Password Expiration159Specific User Password Expiration160Configuring Privileges for a User161Setting Up SNMP Access for a User Account163SNMP Access Without Authentication/Encryption163SNMP Access With Authentication/Encryption164Removing SNMP Access From a User164Setting Up End-User Profiles165Creating End-User Profiles166Setting Up Port Ranges in a Profile166Setting Up VLAN Ranges in a Profile166Associating a Profile With a User167Removing a Profile From the Configuration167Verifying the User Configuration1678. Managing Switch Security169In This Chapter169Switch Security Specifications170Switch Security Defaults170Switch Security Overview171Authenticated Switch Access172AAA Servers-RADIUS or LDAP172Authentication-only-ACE/Server172Interaction With the User Database173ASA and Authenticated VLANs173Configuring Authenticated Switch Access174Quick Steps for Setting Up ASA175Setting Up Management Interfaces177Enabling Switch Access178Configuring the Default Setting178Using Secure Shell179Configuring Accounting for ASA180Verifying Switch Security Configuration1819. Using WebView183In This Chapter183WebView CLI Defaults184Browser Setup184WebView CLI Commands185Enabling/Disabling WebView185Enabling/Disabling SSL185Quick Steps for Setting Up WebView186WebView Overview186WebView Page Layout186Banner187Toolbar187Feature Options188View/Configuration Area188Configuring the Switch With WebView189Accessing WebView189Home Page190Configuration Page191Global Configuration Page191Table Configuration Page192Table Features195Adjacencies199WebView Help200General WebView Help200Specific-page Help20010. Using SNMP201In This Chapter201SNMP Specifications202SNMP Defaults202Quick Steps for Setting Up An SNMP Management Station203Quick Steps for Setting Up Trap Filters204Filtering by Trap Families204Filtering by Individual Traps205SNMP Overview206SNMP Operations206Using SNMP for Switch Management207Setting Up an SNMP Management Station207SNMP Versions207SNMPv1207SNMPv2208SNMPv3208SNMP Traps Table209Using SNMP For Switch Security226Community Strings (SNMPv1 and SNMPv2)226Configuring Community Strings226Encryption and Authentication (SNMPv3)227Configuring Encryption and Authentication227Setting SNMP Security228Working with SNMP Traps229Trap Filtering229Filtering by Trap Families229Filtering By Individual Trap229Authentication Trap230Trap Management230Replaying Traps230Absorbing Traps230Sending Traps to WebView230SNMP MIB Information231MIB Tables231MIB Table Description231Industry Standard MIBs232Enterprise (Proprietary) MIBs237Verifying the SNMP Configuration241A. Software License and Copyright Statements243Alcatel License Agreement243ALCATEL INTERNETWORKING, INC. (“AII”) SOFTWARE LICENSE AGREEMENT243Third Party Licenses and Notices246A. Booting and Debugging Non-Proprietary Software246B. The OpenLDAP Public License: Version 2.4, 8 December 2000246C. Linux247D. GNU GENERAL PUBLIC LICENSE: Version 2, June 1991247E. University of California252F. Carnegie-Mellon University252G. Random.c252H. Apptitude, Inc.253I. Agranat253J. RSA Security Inc.253K. Sun Microsystems, Inc.253L. Wind River Systems, Inc.254M. Network Time Protocol Version 4254Index255Size: 3.46 MBPages: 260Language: EnglishOpen manual