Home
OmniSwitch 6800/6850/9000 Switch Management Guide
Contents
1. W C W C W C 1 Stack is booted 2 The primary 3 The primary up from the work CMM switch cop CMM switch cop ing directory ies its working ies its working directory to the directory to the secondary CMM other switch work switch working ing directories directory Booting from the Working Directory This synchronization process occurs automatically on a working directory reboot Note It is important to certify the working directory and synchronize the stack as soon as the validity of the software is established Stacks booted from the working directory or unsynchronized stacks are at risk of mismanaging data traffic due to incompatibilities in different versions of switch software Certifying the working directory is described in Copying the Working Directory to the Certified Directory on page 4 21 while synchronizing the switch is described in Synchronizing the Primary and Secondary CMMs on page 4 27 page 4 10 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing CMM Directory Content CMM Files Scenario 3 Synchronizing Switches in a Stack When changes have been made to the primary CMM switch certified directory these changes need to be propagated to the other switches in the stack This could be done by completely rebooting the stack However a loss of switch functionality is to be avoided a copy flash synchro command can
2. R W C 4 Switch reboots from certified directory by using saved configura tion file in the cer tified directory Since the working and certified direc tories are the same it will be running from the working directory Running Configuration is Saved to Working then to the Certified Directory OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 4 7 CMM Files Managing CMM Directory Content Scenario 4 Rollback to Previous Version of Switch Software Later that year an upgraded image file is released from Alcatel Lucent The network administrator loads the new file via FTP to the working directory of the switch and reboots the switch from the working direc tory Since the switch is specifically booted from the working directory the switch is running from the working directory After the reboot loads the new image file from the working directory it is discovered that the image file was corrupted during the FTP transfer Rather than having a disabled switch the network administrator can reboot the switch from the certified directory which has the previous more reliable version of the ENI image file and wait for a new version of the image In the meantime the administrator s switch is still functioning This is illustrated below
3. ALA gt p gt R W C RW C R W C RW C 1 The new file is 2 The new file is 3 The file is cor 4 Switch reboots installed in the loaded via a rupted and does from certified working directory reboot from the not boot correctly directory by using working direc the old file Since tory The switch is the working and running from the certified directo working directory ries are not the same it will be running from the certified directory Switch Rolls Back to Previous File Version page 4 8 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing CMM Directory Content CMM Files Redundancy CMM software redundancy is one of the switch s most important fail over features For CMM software redundancy at least two fully operational OmniSwitch 6800 or OmniSwitch 6850 switches must be linked together as a stack However with an OmniSwitch 9000 two fully operational CMM modules must be installed in the chassis at all times In addition the CMM software must be synchronized Refer to Synchronizing the Primary and Secondary CMMs on page 4 27 for more information In a stack of OmniSwitch 6800 or OmniSwitch 6850 switches one of the switches has the primary role and the another switch has the secondary role at any given time The primary and secondary roles are determined by the switch number indicated on the LED on the front panel the lowest number switch becomes th
4. More next screen lt sp gt next line lt cr gt filter pattern lt gt quit lt q gt At the More prompt you are given a list of options The output formats are described here lt sp gt Press lt sp gt space bar to display the next page of information lt cr gt Press lt cr gt character return to display the next line of information Press to enter the filter mode See Filtering Table Information on page 5 19 lt q gt Press the character q to exit More and return you to the system prompt To exit the more mode use the no more CLI command Note The value set with the more size command applies to the screen display when the CLI is in the more mode or when you are using the switch s Vi text editor page 5 18 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using the CLI Customizing the Screen Display Filtering Table Information The CLI allows you to define filters for displaying table information This is useful in cases where a vast amount of display data exists but you are interested in only a small subset of that data Commands show ing routing tables are a good example for when you might want to filter information You can specify a filter that identifies the data that are relevant to your search The switch will then display the information you identified This saves you the trouble of scanning long lists of data unnecessarily The filter mode filters unwanted in
5. 1 Create a configuration text file containing CLI commands needed to configure DHCP Relay applica tion This example used MS Notepad to create a text file on a PC workstation The text file named dhcp_relay txt contains three CLI commands needed to configure the forward delay value to 15 seconds and the maximum number of hops to 3 The IP address of the DHCP server is 128 251 16 52 ip helper address 128 251 16 52 ip helper forward delay 15 ip helper maximum hops 3 2 Transfer the configuration file to the switch s file system To transfer the configuration file to the switch use an FTP transfer method For more information about transferring files onto the switch see Chapter 1 Managing System Files 3 Apply the configuration file to the switch by using the configuration apply command as shown here gt configuration apply dhcp relay txt File configuration lt dhcp_ relay txt gt completed with no errors page 6 2 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Working With Configuration Files Tutorial for Creating a Configuration File 4 Use the show configuration status command to verify that the dhep_relay txt configuration file was applied to the switch The display is similar to the one shown here gt show configuration status File configuration lt dhcp_ relay txt gt completed with no errors File configuration none scheduled Running configuration and saved configuration are different
6. cecccccecesesssseeeseceeeeseeeeeseeeeeeeseeenseeesseecnseesseeeneaes 1 28 Directories on the Switch isisisi ennaa E e E T Eas 1 28 Available Image Files ccccccescccsssccsssseeseessceeeeseeenseeeseecsscenseecsseecssceeeseeseseeenseeenas 1 29 Application Examples for File Management 00 ccseeseesseseceseceeceseeneceaeceseeneeeaeeeaeees 1 30 Transferring a File to the Switch Using FTP ooo ee ceeeseceseceseececeeecenececeeeeeeeeees 1 30 Creating a File Directory on the Switch cee eecccctceeseeeseeeneeeeeeecneeenseeenereseeeenes 1 31 FTP Client Application Example cccccesccessscessceeseeeeneeeeeeeseeenseesseeeseneenes 1 32 Creating a File Directory Using Secure Shell FTP ssessesseseesessesseserssessessrsessesse 1 34 Transfer a File Using Secure Shell FTP o oo ccc ceeccessccssseessecseeeeseeesseeeeeseseeeeeneees 1 36 Closing a Secure Shell FTP Session ccccccccsccsssessseeeeneeseeeeseeeeeceeeeeeeeeeeesseeenss 1 36 Verifying Directory Contents 20 ec ceceseceseceseesecesecenecseececaecceceaeeaeccecaecaeceeseaeesaeess 1 36 Setting the System Clock wo ceccecccecssccseseeseceeeeesseecseecsseecsseecesecseeeeeeseeenseeseeseseeenaees 1 37 Setting Date and Time neissen irrin rE ei E A a aE 1 37 Date seccscsscevidsecetecadecsscetscsveceesesscauvsescebencobcovecdevdossdancedbiesecescagucesscasecendesscasnaesseasys 1 37 Time Zone siriene rrena EN EN EEEa OEE NESNE E ESENE EEEE EAEE EAAS 1 37 TIME rererere ir
7. Managing Redundancy in a Stack and CMM on page 4 25 See the appropriate Hardware Users Guide for more information on switch redundancy Rebooting the Switch When booting the switch the software in the certified directory is loaded into the RAM memory of the switch and used as a running configuration as shown gi gi Primary CMM The certified directory software should be the best most reliable versions of both the image files and the boot cfg file configuration file The switch will run from the certified directory after boot if the working and certified directories are not exactly the same If they are the same then the switch will run from the working directory allowing changes made to the running configuration to be saved If the switch is running from the certified directory you cannot save any changes to the running configuration or copy files between the directories OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 4 13 Managing the Directory Structure Non Redundant Managing CMM Directory Content To reboot the switch from the certified directory enter the reload command at the prompt gt reload This command loads the image and configuration files in the certified directory into the RAM memory These files control the operation of the switch Note When the switch reboots using the reload command it will boot from the certified dire
8. For information on saving the working directory to the certified directory see Copying the Working Directory to the Certified Direc tory on page 4 21 The following picture illustrates the case of a switch being rebooted from the working directory Q pi pi Primary CMM u In the above diagram 1 The certified directory is used to initially boot the switch 2 Changes are made to the configuration file and are saved to the configuration file in the working direc tory by using the copy running config working command described in the section Copying the Running Configuration to the Working Directory on page 4 16 3 The switch is rebooted from the working directory by using the reload working command When a reload working command is entered the switch prohibits a takeover from the secondary CMM Switch functions are suspended until the boot process is complete If you decide against using the new software booted from the working directory the switch can revert to the software stored in the certified directory by using the copy certified working command as described in Copying the Certified Directory to the Working Directory on page 4 22 or by using the reload command as described in Rebooting the Switch on page 4 13 page 4 18 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing CMM Directory Content Managing the Directory Struct
9. If a switch is running from the certified directory you will not be able to save any changes made in the running configuration If the switch reboots the changes made to switch parameters will be lost In order to save running configuration changes the switch must be running from the working directory You can determine where the switch is running from by using the show running directory command described in Show Currently Used Configuration on page 4 23 Software Rollback Feature The directory structure inherent in the CMM software allows for a switch to return to a previous more reliable version of image or configuration files Initially when normally booting the switch the software is loaded from the certified directory This is the repository for the most reliable software When the switch is booted the certified directory is loaded into the running configuration and used to manage switch functionality Changes made to the configuration file in the running configuration will alter switch functionality These changes are not saved unless explicitly done so by the user using the copy running config working command described in Copying the Running Configuration to the Working Directory on page 4 16 If the switch reboots before the configuration file in the running configuration is saved then the certified directory is reloaded to the running configuration and changes made to the configuration file in the running configuration p
10. IpsTrapSwitchSlice The physical slice number for the LPS port on which the violation occurred IpsTrapSwitchPort The physical port number on which the violation occurred IpsTrapViolatingMac tThe violating MAC address IpsTrapViolationType tThe type of violation that occurred on the LPS port systemServicesDate This object contains the current System Date in the following format MM DD YYYY systemServicesTime This object contains the current System Time in the following format HH MM SS 41 alaDoSTrap alaDoSType ip Indicates that the sending agent alaDoSDetected has received a Denial of Service DoS attack alaDoSType Index field for the alaDoSTable Integer indicating the DoS Type 0 portscan 1 tcpsyn 2 pingofdeath 3 smurf 3 pepsi 5 land and 6 teardropBonkBoink alaDoSDetected Number of attacks detected page 10 20 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using SNMP SNMP Overview No Trap Name Objects Family Description 42 gmBindRuleViolation gmBindRule vlan Occurs whenever a binding rule Type which has been configured gets gmBindRuleV violated lanId gmBindRulel PAddress gmBin dRuleMac Address gmBindRule PortIfIndex gmBin dRuleProto Class gmBindRu leEthertype gmBindRuleD sapSsap gmBindRuleType Type of binding rule for which trap sent gmBindRuleVlanId Binding Rule VLAN Id gmBindRuleIPAddress Binding Rule IP address gmBindRuleMacAddress
11. Note If the configuration file applied with the configuration apply command results in no changes to the saved configuration the message will state that the running configuration and saved configuration are identical To synchronize the running configuration and the saved configuration use the write memory command For more information about these displays refer to the OmniSwitch CLI Reference Guide 5 Use a the show ip helper command to verify that the DHCP Relay parameters defined in the configu ration files were actually implemented on the switch The display is similar to the one shown here gt show ip helper Forward Delay seconds 15 Max number of hops 3 Forwarding option standard Forwarding Address 128 251 16 52 These results confirm that the commands specified in the file dhep_relay txt configuration file were successfully applied to the switch OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 6 3 Quick Steps for Applying Configuration Files Working With Configuration Files Quick Steps for Applying Configuration Files Setting a File for Immediate Application In this example the configuration file configfile_1 exists on the switch in the flash directory When these steps are followed the file will be immediately applied to the switch 1 Verify that there are no timer sessions pending on the switch gt show configuration status File configuration none scheduled 2 Apply
12. SYNCHRONIZATION STATUS Flash Between CMMs SYNCHRONIZED Running Configuration NOT AVAILABLE Stacks Reload on Takeover ALL STACKs SW Activation To check the directory from where the switch is currently running enter the following command on OmniSwitch 9000 switches gt show running directory CONFIGURATION STATUS Running CMM PRIMARY CMM Mode MONO CMMs Current CMM Slot A Running configuration WORKING Certify Restore Status CERTIFY NEEDED SYNCHRONIZATION STATUS Running Configuration NOT SYNCHRONIZED NIs Reload on Takeover 2 3 The command returns the name of the directory the switch is currently running from working or certi fied and also displays the CMM which is currently controlling the switch primary or secondary It also displays whether the working and certified directories are the same and whether a synchronization is needed between the primary and secondaryCMM In addition the command output displays how many modules in the stack will be reloaded in the event of a management module takeover Options include NONE ALL or a list of specific modules Refer to the following section for additional information on NI module behavior during a redundant CMM takeover The show running directory command is described in detail in the OmniSwitch CLI Reference Guide page 4 30 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing CMM Directory Cont
13. unlocked on the switch before users can access the switch through that interface OmniSwitch C vA Server Eze Eesieskesstsiasaesieasee assesses 4 local user remote user database Login via Secure Shell Telnet FTP HTTP or SNMP local user Login via the console port Switch Login Components Management Interfaces Logging into the switch may be done locally or remotely Remote connections may be secure or insecure depending on the method Management interfaces are enabled using the aaa authentication command This command also requires specifying the external servers and or local user database that will be used to authenticate users The process of authenticating users to manage the switch is called Authenticated Switch Access ASA Authenticated Switch Access is described in detail in Chapter 8 Managing Switch Security An overview of management methods is listed here Logging Into the CLI e Console port A direct connection to the switch through the console port The console port is always enabled for the default user account For more information about connecting to the console port see your OmniSwitch Hardware Users Guide e Telnet Any standard Telnet client may be used for remote login to the switch This method is not secure For more information about using Telnet to access the switch see Using Telnet on page 2 8 e FTP Any standard FTP c
14. 1 if the interface is ready to transmit and receive net work traffic it should change to dormant 5 if the interface is waiting for external actions such as a serial line waiting for an incoming connection it should remain in the down 2 state if and only if there is a fault that prevents it from going to the up 1 state it should remain in the notPresent 6 state if the interface has missing typically hardware components 3 linkUp ifIndex interface The SNMP agent in the switch ifAdminStatus recognizes that one of the com ifOperStatus munications links configured for the switch has come up IfIndex A unique value greater than zero for each interface It is recommended that values are assigned con tiguously starting from 1 The value for each interface sub layer must remain constant at least from one re ini tialization of the entity s network management system to the next re initialization ifAdminStatus The desired state of the interface The testing 3 state indicates that no operational packets can be passed When a managed system initializes all interfaces start with ifAdminStatus in the down 2 state As a result of either explicit management action or per configuration information retained by the managed sys tem ifAdminStatus is then changed to either the up 1 or testing 3 states or remains in the down 2 state ifOperStatus The current operational state of the interface The testing 3 state indicates that
15. 3 Add read only privileges for the snmp chassis and interface command families gt user usermark2 read only snmp chassis interface Note Optional To verify the user account enter the show user command A partial display is shown here gt show user User name usermark2 Read right 0x0000a200 0x00000000 Write right 0x00000000 0x00000000 Read for domains Read for families snmp chassis interface Write for domains None NONE Snmp encryption NONE Snmp authentication The usermark2 account has read only privileges for the snmp chassis and interface command families 4 Set up an SNMP station with the user account usermark2 defined above gt snmp station 210 1 2 1 usermark2 v3 enable Note Optional To verify the SNMP Management Station enter the show snmp station command The display is similar to the one shown here gt show snmp station ipAddress udpPort status protocol user 210 1 2 1 162 enable v3 usermark2 The usermark2 account is established on the SNMP station at IP address 210 1 2 1 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 10 5 Quick Steps for Setting Up Trap Filters Using SNMP Filtering by Individual Traps The following example enables trap filtering for the coldstart warmstart linkup and linkdown traps The identification numbers for these traps are
16. 6 4 Daylight Savings Time see DST defaults login 2 3 NTP 3 2 SNMP 10 2 startup 7 5 switch security 8 2 user accounts 7 2 WebView 9 2 delete command 1 18 DES encryption 10 28 dir command 1 10 directories certified 1 28 4 3 flash 1 8 managing 4 13 network 1 28 working 1 28 4 3 Directory Contents verify information about 1 36 DNS resolver 2 23 Domain Name Server see DNS resolver DSA key Secure Shell 8 11 DST 1 39 E editor vi 6 9 Emergency Restore application examples 4 32 encryption DES 10 28 end user profile command 7 7 7 21 end user profile port list command 7 21 end user profile vlan range command 7 21 errors 6 7 exit command 1 26 2 17 F File Configuration verify information about 6 14 file management application examples 1 30 specifications 1 2 files attributes 1 18 boot cfg 4 3 configuration 4 3 image 1 29 4 3 names 6 11 permissions 1 18 snapshots 6 10 text 6 9 filters 5 19 traps 10 5 freespace command 1 20 fsck command 1 20 FTP 2 10 FTP client 1 23 2 10 ftp command 1 23 1 24 2 10 2 11 FTP server 1 21 ftp6 command 1 23 H help 5 5 HTTP web browser 2 7 http port command 9 3 http server command 9 3 http ssl command 9 3 https portcommand 9 4 image files 4 3 ip domain lookup command 2 23 ip domain name command 2 23 ip name server command 2 23 K keywords 5 5 L LDAP accounting servers Authenticated Switch Access 8 12 LDAP servers for switch security 8 4
17. Doing so invites common points of failure Note NTP does not support year date values greater than 2035 the reasons are documented in RFC 1305 in the data format section This should not be a problem until the year 2035 as setting the date this far in advance runs counter to the administrative intention of running NTP Authentication NTP is designed to use MD5 encryption authentication to prevent outside influence upon NTP timestamp information This is done by using a key file The key file is loaded into the switch memory and consists of a text file that lists key identifiers that correspond to particular NTP entities If authentication is enabled on an NTP switch any NTP message sent to the switch must contain the correct key ID in the message packet to use in decryption Likewise any message sent from the authenti cation enabled switch will not be readable unless the receiving NTP entity possesses the correct key ID The key file is a text txt file that contains a list of keys that are used to authenticate NTP servers It should be located in the networking directory of the switch Key files are created by a system administrator independent of the NTP protocol and then placed in the switch memory when the switch boots An example of a key file is shown below M RI rop8KPPvQvYotM mdS key as an ASCII random string 14 M sundial mdS key as an ASCII string In a key file the first token is the key number ID the second is t
18. This list will include the files that were originally in the certified directory plus the newly created copy of the working directory and all its contents gt ls r flash certified Listing Directory drw drw rw rw rw 2048 2048 4347 844217 4658 Oct oct Oct Oct Oct Listing Directory drw drw drw rw rw rw rw 2048 2048 2048 4347 142830 2743945 844217 Oct Oct Oct Oct Oct Oct Oct Listing Directory drw drw 2048 2048 Oct Oct flash certified 12 15 2 25 25 16 10 123 14 14 22 16 25 21 21 suf wi boot cfg Kos img Krelease img flash certified working 14 14 14 2 25 25 25 Lk L7 L7 129 14 14 14 12 14 12 14 Ld 16 ed ay eA newdirl boot cfg Ksecu img Kbase img Kos img flash certified working newdir 14 17 14 14 17 14 sf Removing a Directory and its Contents The rmdir command removes the specified directory and all its contents If the following command is issued from the flash directory shown in the drawing on page 1 8 the working directory would be removed from the certified directory gt rm r flash certified working Note Your login account must have write privileges to execute the rmdir command page 1 14 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing System Files File and Directory Management File Commands The file commands apply to files
19. This procedure is described in Setting Up Management Inter faces for ASA on page 8 9 4 Set Up Accounting This step is optional and is described in Configuring Accounting for ASA on page 8 12 Additional configuration is required in order to set up the switch to communicate with external authentica tion servers This configuration is briefly mentioned in this chapter and described in detail in the Manag ing Authentication Servers chapter of the OmniSwitch 6800 6850 9000 Network Configuration Guide If you are using the local switch database to authenticate users user accounts must be set up on the switch Procedures for creating user accounts are described in this chapter See Chapter 7 Managing Switch User Accounts Note that by default e Authenticated switch access is available only through the console port e Users are authenticated through the console port via the local user database on the switch These defaults provide out of the box security at initial startup Other management interfaces Telnet HTTP etc must be specifically enabled before they can access the switch A summary of the commands used for configuring ASA is given in the following table Commands Used for user Configuring the local user database on the switch aaa radius server Setting up the switch to communicate with external RADIUS or LDAP aaa tacacs server authentication servers aaa authentication Configuring
20. To set password expiration globally use the user password expiration command with the desired number of days the allowable range is 1 to 150 days For example gt user password expiration 3 The default password expiration is now set to three days All user passwords on the switch will be set or reset with the three day expiration If an individual user was configured with a different expiration through the user command the expiration will be reset to the global value The expiration is based on the switch system date time and date time the user password expiration command is entered For example if a user is configured with a password expiration of 10 days but the global setting is 20 days that user s password will expire in 10 days To disable the default password expiration use the user password expiration command with the disable option gt user password expiration disable OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 7 13 Configuring Password Policy Settings Managing Switch User Accounts Specific User Password Expiration To set password expiration for an individual user use the user command with the expiration keyword and the desired number of days or an expiration date For example gt user bert password techpubs expiration 5 This command gives user bert a password expiration of five days To set a specific date for password expiration include the date in mm dd yyyy hh mm format
21. swapping with the secondary 4 29 synchronizing with secondary 4 27 prompt 5 13 5 17 prompt prefix command 5 13 pwd command 1 8 R RADIUS accounting servers Authenticated Switch Access 8 12 RADIUS servers for switch security 8 4 RAM 4 3 rcp command 1 19 reboot cancelling 4 14 4 20 4 25 checking status 4 15 primary 4 13 4 25 scheduling 4 14 4 25 secondary 4 25 working directory 4 18 4 26 reload cancel command 4 14 4 20 reload command 4 14 4 25 reload secondary command 4 25 reload working command 4 18 rls command 1 19 rmdir command 1 14 rrm command 1 19 running configuration 4 3 4 4 copying to working directory 4 16 rz command 1 27 S screen display 5 17 prompt 5 13 5 17 secondary CMM managing files 1 19 swapping with the primary 4 29 synchronizing with primary 4 27 Secure Shell 2 6 2 12 8 9 algorithms 2 14 DSA key 8 11 key exchange 2 14 managing the switch 8 11 Secure Socket Layer WebView 9 3 security SNMP 10 27 session banner command 2 20 session login attempt command 2 22 session login timeout command 2 22 session prompt command 5 17 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Index 3 Index session timeout command 2 22 sftp command 1 25 2 17 sftp6 command 1 25 1 34 SHA authentication 10 28 show command log command 5 16 show command log status command 5 16 show configuration status command 6 3 6 7 show history command 5 13 show ip helper command 6 3 sh
22. 0 1 2 and 3 When trap filtering is enabled these traps will be filtered This means that the switch will not pass them through to the SNMP management station All other traps will be passed through 1 Specify the IP address for the SNMP management station and the trap identification numbers gt show snmp trap filter 210 1 2 1 0123 gt snmp trap filter 300 1 13 4 Note Optional You can verify which traps will not pass through the filter by entering the snmp trap filter command The display is similar to the one shown here gt show snmp trap filter ipAddress trapId list The SNMP management station with the IP address of 210 1 2 1 will not receive trap numbers 0 1 2 and 3 For trap numbers refer to the SNMP Traps Table on page 10 10 For more information on the CLI commands and the displays in these examples refer to the OmniSwitch CLI Reference Guide page 10 6 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using SNMP SNMP Overview SNMP Overview SNMP provides an industry standard communications model used by network administrators to manage and monitor their network devices The SNMP model defines two components the SNMP Manager and the SNMP Agent Network Management Station OmniSwitch lt p SNMP Manager SNMP Agent SNMP Network Model e The SNMP Manager resides on a workstation hosting the management application It can query agents by using SN
23. 00 No default No default No default zps China 08 00 No default No default No default Manila Philippines zp7 Bangkok 07 00 No default No default No default Zp6 No standard name 06 00 No default No default No default zp5 No standard name 05 00 No default No default No default zp4 No standard name 04 00 No default No default No default msk Moscow 03 00 Last Sunday in Mar Last Sunday in Oct 1 00 at 2 00 a m at 3 00 a m eet Eastern Europe 02 00 Last Sunday in Mar Last Sunday in Oct 1 00 at 2 00 a m at 3 00 a m page 1 40 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing System Files Setting the System Clock Time Zone and DST Information Table continued Hours from Abbreviation Name UTC DST Start DST End DST Change cet Central Europe 01 00 Last Sunday in Mar Last Sunday in Oct 1 00 at 2 00 a m at 3 00 a m met Middle Europe 01 00 Last Sunday in Mar Last Sunday in Oct 1 00 at 2 00 a m at 3 00 a m bst British Standard 00 00 Last Sunday in Mar Last Sunday in Oct 1 00 Time at 1 00 a m at 3 00 a m wet Western Europe 00 00 Last Sunday in Mar Last Sunday in Oct 1 00 at 1 00 a m at 3 00 a m gmt Greenwich Mean 00 00 No default No default No default Time wat West Africa 01 00 No default No default No default zm2 No standard name 02 00 No de
24. 1305 Network Time Protocol Maximum number of NTP servers per client 3 NTP Defaults Table The following table shows the default settings of the configurable NTP parameters NTP Defaults Parameter Description Command Default Value Comments Specifies an NTP server from which ntp server version 4 this switch will receive updates minpoll 6 prefer no key 0 Used to activate client ntp client disabled Used to activate NTP client ntp broadcast disabled broadcast mode Used to set the advertised broadcast ntp broadcast delay 4000 microseconds delay in microseconds page 3 2 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Configuring Network Time Protocol NTP NTP Quick Steps NTP Quick Steps The following steps are designed to show the user the necessary commands to set up NTP on an OmniSwitch 1 Designate an NTP server for the switch using the ntp server command The NTP server provides the switch with its NTP time information For example gt ntp server 1 2 5 6 2 Activate the client side of NTP on the switch using the ntp client command For example gt ntp client enable 3 You can check the server status using the show ntp server status command as shown gt show ntp server status 198 206 181 139 IP address 198 206 181 139 Host mode client Peer mode server Prefer no Version 4 Key 0 Stratum 2 inpoll 6 64 seconds axpoll 10 1024 s
25. 19 Removing SNMP Access From a User cccccssscssseesceeeeeceeseeeeeeeseecsseeeneeenseeensaes 7 19 Setting Up End User Profileseneinneinianu ede this Shae ede Bee teed 7 20 Creating End User Profiles meruerint e t ea nis 7 21 Setting Up Port Ranges in a Profile oo ec ecseesceeseceseeeeeeeseeceeeeeeeesseeeseeesseeenes 7 21 Setting Up VLAN Ranges in a Profile s osnnnonnenoosneesesseesssesseessesseesressseesessesseese 7 21 Associating a Profile With a User ccccccccccceesecesseeeseeesseeesscesseeensseeesseeeseeenseeenes 7 22 Removing a Profile From the Configuration c cccsccsssceesseeeseeeseeeeseeeeeeesseeensnes 7 22 Verifying the User Configuration s sssesesessessessreseesesseessressesstessressessessresseesesseeeseessee 7 23 Chapter 8 Managing Switch Security 0 0 0 0 cccececeseeseesceseeseeseeceesenececeeseeaeceeneeaeeneeeneeas 8 1 In Fis Chapter secre e eaten eevee dieters 8 1 Switch Security Specifications ne inh A S ROANNE e 8 2 Switch Security Defaults cc ccccsesececcestedecss castes ar E EE E E E EEE E EEEE k 8 2 viii OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Contents Chapter 9 Switch Security Overview cccceesscesssccssseesseeeseeesscessceceeseeeeseeeseeesseeceeeeseecseeeeeeeneeeenses 8 3 Authenticated Switch ACCESS nenene e oere eeen earte aeae re iei Eaei toist 8 4 AAA Servers RADIUS or LDAP sssssossessssssssesessseessresressesseesssessessressesssesressresse
26. 2 the value of the selected variable at the last sample will be subtracted from the current value and the differ ence compared with the thresholds alarmValue The value of the statistic during the last sampling period For example if the sample type is deltaValue this value will be the difference between the samples at the beginning and end of the period If the sample type is absoluteValue this value will be the sampled value at the end of the period alarmFallingThreshold A threshold for the sampled statistic When the current sampled value is less than or equal to this threshold and the value at the last sampling interval was greater than this threshold a single event will be generated A single event will also be generated if the first sample after this entry becomes valid is less than or equal to this threshold and the associated alarmStartupAlarm is equal to fallingAlarm 2 or risingOr FallingAlarm 3 26 stpNewRoot vStpNumber stp Sent by a bridge that became the new root of the spanning tree vStpNumber The Spanning Tree number identifying this instance OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 10 17 SNMP Overview Using SNMP No Trap Name Objects Family Description 27 stpRootPortChange vStpNumber stp A root port has changed for a vStpRootPort spanning tree bridge The root Number port is the port that offers the lowest cost path from this bridge to the root bridge v
27. A help window displays similar to the following http 10 255 73 12 IP Static Routes Help Microsoft rnet i 5 xj IP Static Routes Help Print or close the Help page I Print 11 Close The IP Static Routes page displays all static IP routes stored in the IP Forwarding Table A route with a 0 0 0 0 Destination Address and a J 0 0 0 0 Subnet Mask is a default route Click to jump to field definition Destination Address Subnet Mask Gateway Address Metric Destination Address The destination IP address of the route Top Print Close Subnet Mask The subnet mask corresponding to the destination IP address Top Print Close zi E Done i LE p n internet Help Page Layout 2 Click on the field name hyperlink on the Help page to go to the Help page for that field or use the scroll bar on the right side of the Help page to scroll through help for all fields You can also click Print to print a hard copy of the Help page Click Close or click the Close Window icon at the top right corner to close the Help page and return to the configuration or table page OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 9 19 WebView Help Using WebView page 9 20 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 10 Using SNMP The Simple Network Management Protocol SNMP is an application layer protocol that allows communication between SNMP mana
28. An enumerated value that provides the object type involved in the alert trap chassisTrapsObjectNumber A number defining the order of the object in the set e g the number of the considered fan or power supply This intends to clarify as much as possible the location of the failure or alert An instance of the appearance of the trap could be failure on a module Power supply 3 chasEntPhysOperStatus An enumerated value that indicates the operational status of installed modules includes empty slots 12 chassisTrapsMacOverlap physicalIndex module A MAC range overlap was found chasTrapMac in the backplane eeprom RangeIndex physicalIndex The physical index of the involved object chasTrapMacRangeIndex The MAC range index of the involved object 13 vrrpTrapNewMaster virpOperMas vrrp The SNMP agent has transferred terlpAddr from the backup state to the mas ter state vrrpOperMasterIpAddr tThe master router s real primary IP address This is the IP address listed as the source in the VRRP advertisement last received by this virtual router 14 vrrpTrapAuthFailure virpTrapPack vrrp A packet was received from the etSre network whose authentication virp TrapAuth key conflicts with the switch s ErrorType authentication key or type vrrpTrapPacketSrec tThe IP address of an inbound VRRP packet vrrpTrapAuthErrorType Potential types of configuration conflicts OmniSwitch 6800 6850 9000 Switch Manage
29. Chapter 5 Using mhe CU mennaan tL Ee UN ett nt ee ine 5 1 CLI Specifications c erreneren Suede gutch oa a n tins weds ads ean enir ai 5 2 EEEO TIE W aan TERRE AERES ANE A A A Ra ATRE 5 2 Online ConmSuration i 2 3 cos cs wh acsoresel a E E E EA EOAR 5 2 Offline Configuration Using Configuration Files cccccccsscssseeeseeseneeeeeeeeeennes 5 3 Command Entry Rules and Syntax cccccccccessccesseceeneceeeesseeeseeeneeeseeeeeeeeeeseeeeeeeeeenes 5 3 Text CONVENTIONS sairis atiii riis EEEE EEEE EEEE NEEE ETE ie 5 3 Using Show Commands ccccccscesssessseceeseceeseeeeeeeseeceecseecseeeeeeeceeeeeseeenseeseees 5 4 Using the No Form sran ier eee ra esidie dese E sis eevee E R E A R t 5 4 Using Alias Commands ssiccccccciecsesencevieseesaheissceievedersvaieccsesveuevsdarvstieeniaseleviectvestiees 5 4 Partial Keyword Completion 0 cceccceccescseceseceecesecneceseceaeceaecneseaeeeseceaeeeeseaeeeaeeeaees 5 5 Command Help srs s2 0 2e tercrceeeeieieel aa eee wedded ede eee 5 5 Tutorial for Building a Command Using Help 00 00 ccc eeccessceeseceeseeeseeeeseeeseeeeneeenes 5 7 CIEL SERVICES sire fesse tetaa iad tae cea an dice R te chats unde tae lyalgediclsvadetavelvelavcialeveds sutelevadesn 5 9 Command Line Editing orei ies Seti Aen he Se 5 9 Deleting Characters serra eet Saad aotegdaecencslad T ier kee tte elects 5 9 Recalling the Previous Command Line cccceceseessceeseeeeeeeseeesseeenereeseeenes 5 10 I
30. Command Help Using the CLI 3 At the command prompt enter name followed by a space and a question mark This step will either give you more choices or an error message gt vlan 33 name A lt hex gt lt string gt lt string gt Vlan Manager Command Set There is a smaller set of keywords available for use with the vlan 33 name syntax This is because the command becomes more specialized as more keywords are added From the choices shown on the screen you can enter a hex value a text string enclosed in quotes or a text string without quotes In this case the name selected for the VLAN includes spaces so you should use the syntax enclosed in quotes 4 Atthe command prompt enter the name of the VLAN enclosed in quotes followed by a space and a question mark gt vlan 33 name test vlan 2 A lt cr gt Vlan Manager Command Set When the question mark is issued this time the only syntax listed is lt cr gt This means that the command syntax is complete At this point when you press Enter the command will be issued Note Optional To verify that the command was accepted enter the show vlan command The display is similar to the one shown here gt show vlan vlan admin oper stree auth ip ipx name 4 4 4 4 4 4 T on off on OFF off off VLAN 1 33 on off on off off off test vlan 2 The second entry verifies that a VLAN was cr
31. Community Strings SNMPv1 and SNMPV2 ssssssssssssssssssesssesesssssssessesseessrsssessee 10 27 Configuring Community Strings 0 ccescsscesssceecsseeeereeeeeceeseeeneeeeeensaees 10 27 Encryption and Authentication SNMPV3 cscccssccsssscesseesseeesecseeesseeeesseeesseeaes 10 28 Configuring Encryption and Authentication 0 c ccccccecseeseeeteeeeseeeteeeeeees 10 28 Setting SNMP Security srei ete Sieh eee Ma een Sens 10 29 Working with SNMP Traps c35 iio eicstves ieee ich ee Pas Getic ees Ga eee 10 30 Trap Filtern aa Be ee eee ne ee 10 30 Filtering by Frap Families 2 6 3 stead hve eerie ecient A R 10 30 Filtering By Individual Trap oeae a i 10 30 Authentication Trap s ciciices eaten Pa el a hee tees es A ee 10 31 Trap Management te ce c6sie hevteel adste li aleR Aavtuaterni betes a a ie e E E AEN aac 10 31 Replays Gras 25 2245 Se Nh ede ee ie Ge ee en ed 10 31 Absorbine Traps siera a val tite edie a a a a 10 31 Sending Traps to WebVIeW s sseseeesseesseserssseseeesseererssenesrnsessensrensseessseesses 10 31 SNMP MIB Information ccccceccccccscesscceseeeeseeeescesseeessnecsecesceeesseceseeeeeeeseeeeeenseees 10 32 IVIL TaD ES a Na 10 32 MIB Table Description ccccceccessscesseeeeseeeseeeeseecesecsseeesseecsecesensesseeesseeenes 10 32 Industry Standard MIBS o cccccccecesscessseeneceeneeesseeseeesseecsseceseeesececseeeseneeseseseeeeeaes 10 33 Enterprise Proprietary MIBS c ccces
32. Enabling Disabling WebView c ccccccssssceesscesseeeneceeeecseecsscecsceeeeeessseeesseeneeenseees 9 3 Changing the HTTP POTt sieche oo s ciedsecetees hs eeren a e ta sate es Meee 9 3 Enabling Disabling SSE ireren eiaei t eie eraa er e a E e elass 9 3 Changing the HELPS Port inmsrennio a A ee ek 9 4 Quick Steps for Setting Up WebView occ ccccescceessceeseeeeeeeeeeeseeeeeeneeeeeeeeeseeneneeneneees 9 5 Web View Overview siaiu a i A A T E aA 9 5 WebView Page Layout 0 cccecccccssseesseesssecsscecseeeesseceeseeeseeesseeesseesseeeseeenseeseneenenenes 9 5 la T e EE A TE PA AE E ATIE AE AE EEE E T E 9 6 Too Da ea sh cota Ganges E E E E N OA 9 6 Feature Options r a a a a A E A EN AS 9 7 View Configuration Area sssssseseesseesesssessressresresreesresseesstereesseesesseessessreseeese 9 7 Configuring the Switch With WebView cccsccessscesssccseessceeeereeesecseneeeesecesseeeeeeseeenes 9 8 Accessing WebVieW sercereraeere eer a E a E a Ea E ES 9 8 Home Pare Terrero a a Me ei ae 9 9 Confe ration Pasen a a EA OO ES 9 10 Global Configuration Page scis aeie ia e 9 10 Fable Confre r ti on Pace sisenes neha A S 9 11 Table Features mrki r a a ee a aN 9 13 AdjacencieS aisi a a e Kc even een a a ese 9 17 WebView Hel pivesiccccciecccciiccs ceieecieeid ess a oe aides Adis E a ANER 9 18 General Web View Help iceccsiecidcssiticueseseeheasideievendenensvgeclesseistadebesteveneseerevetseads 9 18 Specific page Help nenene E EEE iene ee
33. FTP HTTP Secure Shell SNMP ACE Server Telnet FTP HTTP Secure Shell local console FTP HTTP Secure Shell SNMP OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 8 9 Setting Up Management Interfaces for ASA Managing Switch Security Enabling Switch Access Enter the aaa authentication command with the relevant keyword that indicates the management inter face and specify the servers to be used for authentication In this example Telnet access for switch management is enabled Telnet users will be authenticated through a chain of servers that includes a RADIUS server and an LDAP server that have already been configured through the aaa radius server and aaa Idap server commands respectively For example gt aaa authentication telnet radl ldap2 local After this command is entered Telnet users will be authenticated to manage the switch through the rad1 RADIUS server If that server is unavailable the LDAP server Idap2 will be polled for user information If that server is unavailable the local user database will be polled for user information Note that if the local user database is specified it must be last in the list of servers To disable authenticated access for a management interface use the no form of the command with the keyword for the interface For example gt no aaa authentication ftp FTP access is now denied on the switch Note The admin user always has switch access through the c
34. Ine HRE Chapter OAS EESE SSA AE S EAE AEAEE E EE EE 7 1 User Database Specifications censent enata A E N 7 2 User Account Defaults ccciccccccsescievaccsevacevucevess nVa ienen TEENE UREI eNEAN TEE E ENEEK ASES 7 2 Overview of User ACCOUMES 000 eee etceseeseeseceteesecesecesecesecneceseceseceaecaeceaeceaeeeseceeseneeeaeeeaees 7 4 Startup Defaults 0 1 scree ite E eset silane eel eee E 7 5 Quick Steps for Network Administrator User Accounts 0 ceceeceeeeseeesreereeteeenees 7 6 Quick Steps for Creating Customer Login User Accounts cccccecssseeeseeereeeereeees 7 7 Default User Settings 0 0 ccccccsccccssesssecesecssecseeeeesecesseesseecsaecnseesaeeseneeeseeeneeenseees 7 8 Account and Password Policy Settings cccsscccssessseceseceeesereceeseeesseesseeesseeensees 7 8 How User Settings Are Saved c cccccccsccessscessceeseeeeseeseecsseesseeesseeeseseseneeesseeesseeeeees 7 9 Creating a WS entre oien a e TEE oat NN N EE eae eeeas tbe 7 10 Removing aA User hes oie hee ea es es he ee 7 10 UserConfioured Password 220d zelctar ev ciig ede a i a ete aos 7 10 Configuring Password Policy Settings ce eeeeseesceeseeeseeeceeeeeeseeceeeeeeeseeceeeeeceeeeeeeeees 7 12 Setting a Minimum Password Size ccccsseessseesseesseeeseeessceeesseseneeeeseeeneeeeeeseeenss 7 12 Configuring the Username Password Exception cccccsssceesceseeeeteeeeteeeneeenseees 7 12 Configuring Password Character Requirements ccccccccs
35. SNMP security level as authentication all as defined in the table below gt snmp security authentication all The command parameters shown in the following table define security from the lowest level no security to the highest level traps only as shown Security Level no security SNMP requests accepted by the switch All SNMP requests are accepted authentication set SNMPv1 v2 Gets Non authenticated v3 Gets and Get Nexts Authenticated v3 Sets Gets and Get Nexts Encrypted v3 Sets Gets and Get Nexts authentication all Authenticated v3 Sets Gets and Get Nexts Encrypted v3 Sets Gets and Get Nexts privacy set Authenticated v3 Gets and Get Nexts Encrypted v3 Sets Gets and Get Nexts privacy all Encrypted v3 Sets Gets and Get Nexts traps only All SNMP requests are rejected OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 10 29 Working with SNMP Traps Using SNMP Working with SNMP Traps The SNMP agent in the switch has the ability to send traps to the management station It is not required that the management station request them Traps are messages alerting the SNMP manager to a condition on the network A trap message is sent via a PDU issued from the switch s network management agent It is sent to alert the management station to some event or condition on the switch Traps can indicate improper user authentication restarts the los
36. Schedule Contract with Alcatel Lucent s reseller s or ii restrictions set forth in subparagraph c 1 and 2 of 48 CFR 52 227 19 as applicable 14 Third Party Materials Licensee is notified that the Licensed Files contain third party software and materials licensed to Alcatel Lucent by certain third party licensors Some third party licensors e g Wind River and their licensors with respect to the Run Time Module are third part beneficiaries to this License Agreement with full rights of enforcement Please refer to the section entitled Third Party Licenses and Notices on page A 4 for the third party license and notice terms OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page A 3 Third Party Licenses and Notices Software License and Copyright Statements Third Party Licenses and Notices A The licenses and notices related only to such third party software are set forth below Booting and Debugging Non Proprietary Software A small separate software portion aggregated with the core software in this product and primarily used for initial booting and debugging constitutes non proprietary software some of which may be obtained in source code format from Alcatel Lucent for a limited period of time Alcatel Lucent will provide a machine readable copy of the applicable non proprietary software to any requester for a cost of copying shipping and handling This offer will expire 3 years from the date of the
37. TC SNMPv2 CONF ALCATEL IND1 Definitions of managed objects for the OmniAccess SNMPv2 SMI TP DEVICES 4000 ALCATEL IND1 BASE ALCATEL IND1 Definitions of managed objects for the SNMP Notifi SNMPv2 SMI TRAP MGR MIB cation 1 e Trap Manager subsystem SNMP v2 TC SNMPv2 CONF ALCATEL IND1 Definitions of managed objects for the User Datagram SNMPv2 SMI UDP RELAY MIB Protocol UDP Relay subsystem SNMPv2 CONF ALCATEL IND1 Definitions of managed objects for the VLAN Man SNMPv2 SMI VLAN MGR MIB ager subsystem SNMPv2 TC SNMPv2 CONF ALCATEL IND1 Definitions of managed objects for the VLAN Span SNMPv2 SMI VLAN STP MIB ning Tree Protocol STP subsystem SNMPv2 COMNF BRIDGE MIB OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 10 41 SNMP MIB Information Using SNMP MIB Name Description Dependencies ALCATEL IND1 VRRP Definitions of managed objects for the Virtual Router SNMPv2 SMI MIB Redundancy Protocol VRRP subsystem SNMPv2 TC SNMPv2 CONF INET ADDRESS MIB IF MIB ALCATEL IND1 Definitions of managed objects for the Virtual Router SNMPv2 SMI VRRP3 MIB Redundancy Protocol 3 VRRP3 subsystem SNMPv2 TC SNMPv2 CONF INET ADDRESS MIB IF MIB ALCATEL IND1 WEB Definitions of managed objects for the Web Based SNMPv2 SMI MGI MIB Management subsystem SNMPv2 TC SNMPv2 CONF INET ADDRESS MIB page 10 42 OmniSwitch 6800 6850 9000 Swit
38. Tag Profiles m for login information privi Le for login information end leges are stored on the user profiles are stored on switch the switch OmniSwitch OmniSwitch Authentication Only Server ACE Server Note A RADIUS server supporting the challenge and response mechanism as defined in RADIUS RFC 2865 may access an ACE Server for authentication purposes The ACE Server is then used for user authentication and the RADIUS server is used for user authorization Interaction With the User Database By default switch management users may be authenticated through the console port via the local user database If external servers are configured for other management interfaces such as Telnet or HTTP but the servers become unavailable the switch will poll the local user database for login information Access to the console port provides secure failover in case of misconfiguration or if external authentica tion servers become unavailable The admin user is always authorized through the console port via the local database provided the correct password is supplied even if access to the console port is disabled The database includes information about whether or not a user is able to log into the switch and which kinds of privileges or rights the user has for managing the switch The database may be set up by the admin user or any user with write privileges to the AAA commands See Chapter 7 Managing Switch U
39. Telnet or Secure Shell see Using Telnet on page 2 8 and Using Secure Shell on page 2 12 For information about connecting to the CLI through the console port see your Getting Started Guide For information about using the CLI in general see Chapter 5 Using the CLI The ftp option sets the time out for FTP sessions For example to change the FTP time out to 5 minutes enter the following command gt session timeout ftp 5 This command changes the time out for new FTP sessions to 5 minutes Current FTP sessions are not affected For more information about FTP sessions see Using FTP on page 2 10 The http option sets the time out for WebView sessions For example to change the WebView inactivity timer to 10 minutes enter the following command gt session timeout http 10 In this example any new WebView session will have a time out of 10 minutes Current WebView sessions are not affected For more information about WebView sessions see Chapter 9 Using WebView page 2 22 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Logging Into the Switch Enabling the DNS Resolver Enabling the DNS Resolver A Domain Name System DNS resolver is an optional internet service that translates host names into IP addresses Every time you enter a host name when logging into the switch a DNS service must look up the name on a server and resolve the name to an IP address You can configure up
40. When the current sampled value is greater than or equal to this threshold and the value at the last sampling interval was less than this threshold a single event will be generated A single event will also be generated if the first sample after this entry becomes valid is greater than or equal to this threshold and the associated alarmStartupAlarm is equal to risingAlarm 1 or risin gOrFallingAlarm 3 25 fallingAlarm alarmIndex rmon An Ethernet statistical variable alarm Variable has dipped below its falling alarmSample threshold The variable s falling Type threshold and whether it will alarm Value issue an SNMP trap for this con alarmFallingTh dition are configured by an NMS reshold station running RMON alarmIndex An index that uniquely identifies an entry in the alarm table Each such entry defines a diagnos tic sample at a particular interval for an object on the device alarmVariable The object identifier of the particular variable to be sampled Only variables that resolve to an ASN 1 primitive type of INTEGER INTEGER Integer32 Counter32 Counter64 Gauge or TimeTicks may be sampled alarmSampleType tThe method of sampling the selected variable and calculating the value to be compared against the thresholds If the value of this object is absoluteValue 1 the value of the selected variable will be compared directly with the thresholds at the end of the sampling interval If the value of this object is deltaValue
41. act as primary time servers to synchronize a much larger number of secondary servers and clients connected by a common network In order to do this a distributed network clock synchronization protocol is required which can read a server clock transmit the reading to one or more clients and adjust each client clock as required Protocols that do this include NTP Note The OmniSwitch 6800 6850 and 9000 switches can only be NTP clients in an NTP network They cannot act as NTP servers OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 3 5 NTP Overview Configuring Network Time Protocol NTP Stratum Stratum is the term used to define the relative proximity of a node in a network to a time source such as a radio clock Stratum 1 is the server connected to the time source itself In most cases the time source and the stratum 1 server are in the same physical location An NTP client or server connected to a stratum 1 source would be stratum 2 A client or server connected to a stratum 2 machine would be stratum 3 and so on as demonstrated in the diagram below UTC Time Source Stratum 1 Stratum 2 Stratum 3 The farther away from stratum 1 a device is the more likely there will be discrepancies or errors in the time adjustments done by NTP A list of stratum 1 and 2 sources available to the public can be found on the Internet Note It is not required that NTP be connected to an officially recognized tim
42. and 2 above ona medium customarily used for software interchange or c Accompany it with the information you received as to the offer to distribute corresponding source code This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a work means the preferred form of the work for making modifications to it For an executable work complete source code means all the source code for all modules it contains plus any associated interface definition files plus the scripts used to control compilation and installation of the executable However as a special exception the source code distributed need not include anything that is normally distributed in either source or binary form with the major components compiler kernel and so on of the operating system on which the executable runs unless that component itself accompanies the executable If distribution of executable or object code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place counts as distribution of the source code even though third parties are not compelled to copy the source along with the object code 4 You may not copy modify sublicense or distribute the Program except as expressly provided under this License Any attempt otherwise to copy modi
43. and exchange time information page 3 6 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Configuring Network Time Protocol NTP NTP Overview Examples of these are shown in the simple network diagram below UTC Time Source Stratum 1 NTP Servers la 1b Stratum 2 NTP za aa Server Clients j 2b Stratum 3 NTP E Clients Al 3b Servers la and 1b receive time information from or synchronize with a UTC time source such as a radio clock In most cases these servers would not be connected to the same UTC source though it is shown this way for simplicity Servers la and 1b become stratum 1 NTP servers and are peered with each other allowing them to check UTC time information against each other These machines support machines 2a and 2b as clients and these clients are synchronized to the higher stratum servers la and 1b Clients 2a and 2b are also peered with each other for time checks and become stratum 2 NTP servers for more clients 3a and 3b which are also peered In this hierarchy the stratum servers synchronize to the most accurate time source available then check the time information with peers at the same stratum The stratum 2 machines synchronize to the stratum 1 servers but do not send time information to the stratum 1 machines Machines 2a and 2b in turn provide time information to the stratum 3 machines It is important to consider the issue of robustness wh
44. be configured on the switch For information about setting up external servers that are configured with user information see the Managing Authentication Servers chapter in the OmniSwitch 6800 6850 9000 Network Configuration Guide OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 7 1 User Database Specifications Managing Switch User Accounts User Database Specifications Maximum number of alphanumeric characters in a 31 username Maximum number of alphanumeric characters in a 31 user password Maximum number of alphanumeric characters inan 32 end user profile name Maximum number of user accounts 64 Maximum number of end user profiles 128 User Account Defaults Two user accounts are available on the switch by default admin and default For more information about these accounts see Startup Defaults on page 7 5 and Default User Settings on page 7 8 e Password defaults are as follows New users inherit the privileges of the default user if the specific privileges for the user are not config ured the default user is modifiable Description Minimum password length Command user password size min Default 8 characters Default password expiration for any user password expiration disabled user Password expiration for particular expiration keyword in the user none user command Username is not allowed in pass user pas
45. be used page 1 16 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing System Files File and Directory Management Note Your login account must have write privileges to use the move or mv command Flash Directory Certified Directory Testfiles Directory Files File Working Directory testfile2 Network Directory Files File policy cfg In this first example the user s current directory is the flash directory The following command syntax moves the testfile2 file from the user created testfiles directory into the working directory as shown in the illustration above The screen displays a warning that the file is being renamed or in this case redirected gt move flash testfiles testfile2 flash working testfile2 WARNING renaming file flash testfiles testfile2 gt flash working testfile2 In the next example the user s current directory is the flash testfiles directory as shown in the illustration so it is not necessary to specify a path for the file being copied However the command syntax specifies a path to the destination directory The screen displays a warning that the file is being renamed gt move testfile2 flash working newtestfile2 WARNING renaming file flash working newtestfile2 gt flash working newtestfile2 In this third example the user s current directory is the flash directory Here it is not necessary to specify a path for the destinatio
46. can use the ssh6 command to start an SSHV6 session followed by the relevant IPv6 address or the hostname over an IPv6 environment Note You can only use a host name instead of an IP address if the DNS resolver has been configured and enabled If not you must specify an IP address See Chapter 1 Managing System Files for details OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 2 15 Using Secure Shell Logging Into the Switch Note Use of the cmdtool OpenWindows support facility is not recommended over Secure Shell connec tions with an external server The following command establishes a Secure Shell interface from the local OmniSwitch to IP address 11 133 30 135 gt ssh 11 133 30 135 login as Note If Secure Shell is not enabled on a switch use the ssh enable command to enable it You must have a login and password that is recognized by the IP address you specify When you enter your login the device you are logging in to will request your password as shown here gt ssh 11 133 30 135 login as rrloginl rrloginl s password for keyboard interactive method Once the Secure Shell session is established you can use the remote device specified by the IP address on a secure connection from your OmniSwitch Note The login parameters for Secure Shell session login parameters can be affected by the session login attempt and session login timeout CLI commands The following drawing shows an
47. debug domain system system aip snmp rmon webmgt config domain physical chassis module interface pmm health domain network ip rip ospf bgp vrrp ip routing ipx ipmr ipms rdp ospf3 ipv6 domain layer2 vlan bridge stp 802 1q linkagg ip helper domain service dns domain policy qos policy slb domain security session avlan aaa In addition to command families the keywords all or none may be used to set privileges for all command families or no command families respectively An example of setting up user privileges gt user thomas read write domain network ip helper telnet User thomas will have write access to all the configuration commands and show commands in the network domain as well as Telnet and IP helper DHCP relay commands The user will not be able to execute any other commands on the switch Use the keyword all to specify access to all commands In the following example the user is given read access to all commands gt user lindy read only all Note When modifying an existing user the user password is not required If you are configuring a new user with privileges the password is required The default user privileges may also be modified See Default User Settings on page 7 8 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 7 17 Setting Up SNMP Access for a User Account Managing Switch User Accounts Setting Up SNMP Access for a User Account By default users can access the s
48. e g Modify IP Static Route The current configuration is displayed in each field 2 Modify the applicable field s then click Apply If successful the Modify window disappears The new configuration takes effect immediately and the modified entry appears in the table If there is an error the window will remain and an error message is displayed 3 Repeat the procedure to modify additional entries Z http 10 255 73 12 Modify LAN Microsoft Internet Exple 10 xj Modify VLAN VLAN 73 Description pana Admin Status Enabled STP Status A Flat STP Status Enabled 1x1 STP Status Enabled gt Authentication Disabled VLAN Tag Mobile Port Status Disabled Apply Restore Cancel Help l M internets Modify Window Deleting an Existing Entry To delete an existing entry 1 Click on the checkbox to the left of the entry on the Configuration page 2 Click Delete The entry is immediately deleted from the table Note You can delete multiple entries by selecting the checkbox next to each entry Click on the top box to select all entries in the table OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 9 13 Configuring the Switch With WebView Using WebView Table Features Table Views Some table configuration pages can be expanded to view additional configuration information If this option is available a toggle switch appears at the bottom left corner of the table To cha
49. feature Multiple servers may be specified as backups gt aaa accounting session ldap2 local OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 8 7 Quick Steps for Setting Up ASA Managing Switch Security The order of the server names is important here as well In this example the switch will use Idap2 for logging switch access sessions If Idap2 becomes unavailable the switch will use the local Switch Logging facility For more information about Switch Logging see the OmniSwitch 6800 6850 9000 Network Configuration Guide Note To verify the switch access setup enter the show aaa authentication command The display is similar to the one shown here Service type Default lrst authentication server 2nd authentication server Service type Console Authentication Use Default lrst authentication server 2nd authentication server Service type Telnet Authentication Use Default Ilrst authentication server 2nd authentication server Service type Ftp Authentication Use Default lrst authentication server 2nd authentication server Service type Http Authentication denied Service type Snmp Authentication Use Default lrst authentication server 2nd authentication server Service type Ssh Authentication Use Default lrst authentication server 2nd authentication server For more information about this command see the OmniSwitch CLI Reference Guide rad
50. file directory shown in the illustration on page 1 5 Flash Directory Certified Directory Working Directory Network Directory Files boot params cs_system pmd Files Files File boor alore Ksecu img Ksecu img policy cfg boot cfg 1 err Kos img Kbase img swlog 1 log Krelease img boot cfg swlog2 log boot cfg Sample Switch Directory Tree Note The directory tree on OmniSwitch 6850 and OmniSwitch 9000 switches is similar Determining Your Location in the File Structure Use the pwd command to display the path to your current directory When you first log into the switch your current directory is the flash directory If you enter the pwd command the following will be displayed gt pwd flash gt The display shows the name of the current directory and its path If your current directory is the certified directory and you enter the pwd command the following will be displayed gt pwd flash certified gt The display shows the path to your current directory page 1 8 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing System Files File and Directory Management Changing Directories Use the cd command to navigate within the file directory structure The cd command allows you to move up or down the directory tree To go down you must specify a directory located in your current direc tory The following command example presumes your current directory is th
51. flash certified e Working directory The working directory is a repository for configuration files that you are work ing on If you are working on configuration files to develop a custom switch application you may want to test them before certifying them as the switch s default To do this you can boot from the files in the working directory while preserving the files in the certified directory When the files in the working directory are tested and working properly you may certify them as the switch s default files The files are then copied into the certified directory to replace the old ones The path to this directory is flash working e Network directory tThis directory holds files that may be required by servers used for authentica tion Other files can be put into this directory if desired The path to this directory is flash network For more information on switch directories refer to the Managing CMM Directory Content chapter of this manual page 1 28 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing System Files Registering Software Image Files Available Image Files The following table lists the image files available for the OmniSwitch 6800 Series switches Most of the files listed here are part of the base switch configuration Files that support an optional switch feature are noted in the table Archive File Name Kadvrout img Kbase img Kdiag img Keni img Kos img Ks
52. gt show running directory CONFIGURATION STATUS Running CMM PRIMARY CMM Mode DUAL CMMs Current CMM Slot fo wi Running configuration WORKING Certify Restore Status CERTIFY NEEDED SYNCHRONIZATION STATUS Flash Between CMMs SYNCHRONIZED Running Configuration NOT AVAILABLE Stacks Reload on Takeover ALL STACKs SW Activation To check the directory from where the switch is currently running enter the following command on OmniSwitch 9000 switches gt show running directory CONFIGURATION STATUS Running CMM PRIMARY CMM Mode MONO CMMs Current CMM Slot A Running configuration WORKING Certify Restore Status CERTIFY NEEDED SYNCHRONIZATION STATUS Running Configuration NOT SYNCHRONIZED NIs Reload on Takeover 3 The command returns the directory the switch is currently running from working or certified and which CMM is currently controlling the switch primary or secondary It also displays whether the working and certified directories are the same and if a synchronization is needed between the primary and secondary CMM The show running directory command is described in detail in the OmniSwitch CLI Reference Guide OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 4 23 Managing the Directory Structure Non Redundant Managing CMM Directory Content Show Switch Files The files currently installed on a switch can be
53. iinne oeri EEE E EEEN EN NEEESE NOESEN ENEE A 1 38 Daylight Savings Time Configuration ccccccecsccessseesseeeseeeeseeeseeeeseeeeeseseneeeeneees 1 39 Enabling DST serenite d i i ai ieia NER EE Ein 1 40 Chapter 2 Logging Into the Switch 0 0 0 0 ccc cccscssecsseceseeseeeseeeseeeeesceeeeeeeecseeseeseseseeeeees 2 1 In Ths Chapter ena e n ae ee N 2 1 L gin Specifications sesriirsniiiriirnireren iiien ia i E E AER RE ARREA Eaa 2 3 laiita DIE O I ETS TEE E E 2 3 Quick Steps for Logging Into the Switch oc ccceescccesecesseeeneeeeeeeeeeeeeeseeesseeeneeensneeees 2 5 Overview of Switch Login Components s ssesseesseesseesesseseeesstssosseessreseresrreresseesseessese 2 6 Management Interfaces o ssnoniansn nrin i nr eon ey A aF E oa EEE Eaa TS 2 6 Logging Into the CLI oreren ii A E E RK a aers 2 6 Using the WebView Management Tool cccescceesscessceeseeeeseeeeeeenseeeesneenseenes 2 7 Using SNMP to Manage the Switch ee eeeeesceeseeeseeeseeseeeseeeeeeeseeeeeeeeeeseeees 2 7 User ACCOUNS aicvccicvscsetesscpecevadessvacevecevesvecevedeveceveceuccpedavecepeccedenuceaecenedencevensdenndeee 2 7 LOSE KA aT sah hasnt een ie eae ann eee eS 2 8 Logging Into the Switch Via Telnet 2 0 0 cccccecccsssccssseeseeeeneceeeeeeeeeeeeneesseeeneeeenes 2 8 Starting a Telnet Session from the Switch o cccccceessseceeneceeteeeeeeeneeenseesseeeneees 2 8 Using FTP 22 teneaees Sess dn eas edd ete Meese a nde tessa OM eas en ase tees 2 10 Us
54. intfl 220 Connecting to fe80 a00 20ff fea8 8961 connected Cosmo Windows FTP server ready Name Myhostl Note FTPv6 sessions are supported only on OmniSwitch 6850 or 9000 It is mandatory to specify the name of the particular IPv6 interface if the FTPv6 server has been specified using its link local address 4 Enter a valid user name and password for the host you specified with the ftp command A screen similar to the following is displayed Name d Jsmith 331 Password required for Jsmith Password x 230 User Jsmith logged in 5 Use the FTP put command to transfer the file from your switch to the host as shown here ftp gt put rrtest txt The following will be displayed 200 Port set okay 150 Opening BINARY mode data connection Transferred 20 octets in 1 seconds 226 Transfer complete ftp gt 6 To exit the switch s FTP client mode use the quit FTP command Your current directory on the switch is flash working which is the location from which you initiated the FTP client session Use the pwd CLI command to verify your current directory ftp gt quit 221 Bye gt pwd flash working OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 1 33 Application Examples for File Management Managing System Files Creating a File Directory Using Secure Shell FTP The following example describes the steps necessary to create a directory on a remote OmniSwitch and to transfer a f
55. is needed to suppress specific traps e The IP address of the SNMP management station that will receive the traps e The ID number of the individual traps to be suppressed Procedures for filtering individual traps can be found in the Quick Steps for Filtering by Individual Traps on page 10 6 For a list of trap names ID numbers and their descriptions refer to the table SNMP Traps Table on page 10 10 page 10 30 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using SNMP Working with SNMP Traps Authentication Trap The authentication trap is sent when an SNMP authentication failure is detected This trap is a signal to the management station that the switch received a message from an unauthorized protocol entity This normally means that a network entity attempted an operation on the switch for which it had insufficient authorization When the SNMP authentication trap is enabled the switch will forward a trap to the management station The following command will enable the authentication trap gt snmp authentication trap enable The trap will be suppressed if the SNMP authentication trap is disabled Trap Management Several CLI commands allow you to control trap forwarding from the agent in the switch to the SNMP management station Replaying Traps The switch normally stores all traps that have been sent out to the SNMP management stations You can list the last stored traps by using the show snm
56. is possible to cause a working directory reboot of the CMM at a future time by setting time parameters in conjunction with the reload working command using the in or at keywords You will still need to specify a rollback time out time or that there is no rollback To schedule a working directory reboot of the CMM in 3 hours and 3 minutes with no rollback time out you would enter gt reload working no rollback timeout in 3 03 To schedule a working directory reboot of the CMM at 8 00pm with a rollback time out of 10 minutes you would enter gt reload working rollback timeout 10 at 20 00 Note Scheduled reboot times should be entered in military format i e a twenty four hour clock OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 4 19 Managing the Directory Structure Non Redundant Managing CMM Directory Content Cancelling a Rollback Timeout To cancel a rollback time out enter the reload cancel command as shown gt reload primary cancel or gt reload cancel The reload working command is described in detail in the OmniSwitch CLI Reference Guide page 4 20 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing CMM Directory Content Managing the Directory Structure Non Redundant Copying the Working Directory to the Certified Directory When the running configuration is saved to the working directory the switch s working and certified directories are now diff
57. located in the flash file directory and its sub directories Note Each file in any directory must have a unique name If you attempt to create or copy a file into a directory where a file of the same name already exists you will overwrite or destroy one of the files Creating or Modifying Files The switch has an editor for creating or modifying files The editor is invoked by entering the vi command and the name of the new file or existing file that you want to modify For example gt vi flash my file This command puts the switch in editor mode for my_file If my_file does not already exist the switch will create the file in the flash directory In the editing mode the switch uses command keystrokes similar to any vi UNIX text editor For example to quit the edit session and save changes to the file type ZZ to return to the CLI prompt Copy an Existing File Use the cp command to copy an existing file You can specify the path and filename for the original file being copied as well as the path and filename for the new copy being created If no path is specified the command assumes the current directory The following syntax copies the Kos img file from the working directory to the certified directory gt cp flash working Kos img flash certified This second example presumes that the user s current directory is the flash working directory Here it is not necessary to specify a path for the original file A copy of Kos img
58. lock a user account enter user lockout and the username for the account For example gt user lockout j smith To unlock a user account enter user unlock and the username for the locked account For example gt user unlock j smith In addition to this command the admin user or users with read write access privileges can change the user account password to unlock the account Note that if a lockout duration time see Configuring the User Lockout Duration Time on page 7 16 is not configured for the switch then it is only possible to manually unlock a user account with the user lockout command or by changing the user password page 7 16 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing Switch User Accounts Configuring Privileges for a User Configuring Privileges for a User To configure privileges for a user enter the user command with the read only or read write option and the desired CLI command domain names or command family names The read only option provides access to show commands the read write option provides access to configuration commands and show commands Command families are subsets of command domains If you create a user without specifying any privileges the user s account will be configured with the privi leges specified for the default user account Command domains and families are listed here Domain Corresponding Families domain admin file telnet
59. logging into the switch application examples 2 5 login defaults 2 3 specifications 2 3 login banner 2 20 login settings verify information about 2 24 ls command 1 6 1 10 5 10 Is r command 1 14 Index 2 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Index M Management Information Bases see MIBs MD5 authentication 10 28 memory 1 20 MIBs enterprise 10 38 industry standard 10 33 mkdir command 1 12 morecommand 5 18 6 9 my command 1 31 network administrator user accounts application examples 7 6 Network Management Station see NMS Network Time Protocol see NTP NI modules behavior during takeover 4 31 NMS 10 8 NTP 3 1 application examples 3 3 configuring 3 9 client 3 9 defaults 3 2 overview 3 5 specifications 3 2 stratum 3 6 using in a network 3 6 ntp broadcast command 3 9 ntp broadcast delay command 3 9 NTP client broadcast delay 3 9 broadcast mode 3 9 ntp client command 3 3 3 9 NTP Configuration verify information about 3 13 ntp key command 3 12 ntp key load command 3 12 NTP server designating 3 10 minimum poll time 3 10 preferred server 3 11 Synchronization Tests 3 10 version number 3 11 ntp server command 3 3 3 10 P partition management 10 30 password command 7 10 passwords expiration 7 13 global settings 7 8 minimum length 7 12 user configured 7 10 pre_banner txt file 2 21 Prefix Recognition 5 11 application examples 5 12 prefixes 5 11 primary CMM
60. no operational packets can be passed If ifAdminStatus is down 2 then ifOperStatus should be down 2 If ifAdminStatus is changed to up 1 then ifOperStatus should change to up 1 if the interface is ready to transmit and receive net work traffic it should change to dormant 5 if the interface is waiting for external actions such as a serial line waiting for an incoming connection it should remain in the down 2 state if and only if there is a fault that prevents it from going to the up 1 state it should remain in the notPresent 6 state if the interface has missing typically hardware components 4 authenticationFailure none snmp The SNMP agent in the switch has received a protocol message that is not properly authenticated page 10 10 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using SNMP SNMP Overview No Trap Name Objects Family Description 5 entConfigChange none module An entConfigChange notification is generated when a conceptual row is created modified or deleted in one of the entity tables 6 aipAMAPStatusTrap aipAMAPLast aip The status of the Alcatel Lucent TrapReason Mapping Adjacency Protocol aipAMAPLast AMAP port changed TrapPort aipAMAPLastTrapReason Reason for last change of port status Valid reasons are 1 port added 2 change of information on existing port 3 port deleted and 4 no trap has been sent aip AMAPLastTrapPort The ifindex number of
61. num gt Miscellaneous Command Set The question mark character invokes the help feature which displays keywords that can be used with the vlan prefix Because you are setting up anew VLAN you can presume the proper command for this task will be shown in the VLAN Manager Command Set This set shows two possible keywords to follow the vlan syntax ROUTER and lt num gt Because you are assigning an ID number to the VLAN you can presume a number should be entered at this time Note The presumptions you make while using the help feature may be educated guesses Whenever you make a guess as to the next keyword it is a good idea to enter the keyword followed by a space and a question mark 2 At the command prompt enter the number 33 followed by a space and a question mark This step will either give you more choices or an error message gt vlan 33 A lt cr gt AUTHENTICATION DISABLE ENABLE NAME NO PORT ROUTER STP Vlan Manager Command Set BINDING DHCP IP IPX MAC NO PORT PROTOCOL USER Group Mobility Command Set 802 10 NO Miscellaneous Command Set In this example the question mark displays all keywords that can be used with the vlan 33 syntax Because you are setting up anew VLAN and want to give the VLAN a name you can presume the proper syntax for this task will be NAME as shown in the VLAN Manager Command Set OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 5 7
62. of traps to snmp trap to webview Enabled Web View page 10 2 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using SNMP SNMP Defaults Parameter Description Command Default Value Comments Enables or disables SNMP snmp authentication trap Disabled authentication failure trap forwarding OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 10 3 Quick Steps for Setting Up An SNMP Management Station Using SNMP Quick Steps for Setting Up An SNMP Management Station An SNMP Network Management Station NMS is a workstation configured to receive SNMP traps from the switch To set up an SNMP NMS by using the switch s CLI proceed as follows 1 Specify the user account name and the authentication type for that user For example gt user NMSuserV3MD5DES md5 des password x 2 Specify the UDP destination port number in this case 8010 the IP address of the management station 199 199 100 200 a user account name NMSuserV3MDS5DES and the SNMP version number v3 For example gt snmp station 199 199 100 200 8010 NMSuserV3MD5DES v3 enable Use the same command as above for specifying the IPv6 address of the management station For example gt snmp station 300 1 enable Note Optional To verify the SNMP Management Station enter the show snmp station command The display is similar to the one shown here gt show snmp station ipAddress udpPort statu
63. satellite receiver It provides client time accuracies within a millisecond on LANs and up to a few tens of milliseconds on WANs relative to a primary server synchronized to Universal Coordinated Time UTC via a Global Positioning Service receiver for exam ple Typical NTP configurations utilize multiple redundant servers and diverse network paths in order to achieve high accuracy and reliability Some configurations include cryptographic authentication to prevent accidental or malicious protocol attacks It is important for networks to maintain accurate time synchronization between network nodes The stan dard timescale used by most nations of the world is based on a combination of UTC representing the Earth s rotation about its axis and the Gregorian Calendar representing the Earth s rotation about the Sun The UTC timescale is disciplined with respect to International Atomic Time TAD by inserting leap seconds at intervals of about 18 months UTC time is disseminated by various means including radio and satellite navigation systems telephone modems and portable clocks Special purpose receivers are available for many time dissemination services including the Global Posi tion System GPS and other services operated by various national governments For reasons of cost and convenience it is not possible to equip every computer with one of these receivers However it is possi ble to equip some computers with these clocks which then
64. stand alone version of the on line help system that is embedded in the OmniVista network management application Besides the OmniVista documentation all documentation on the User Manual CD is in PDF format and requires the Adobe Acrobat Reader program for viewing Acrobat Reader freeware is available at www adobe com Note In order to take advantage of the documentation CD s global search feature it is recommended that you select the option for searching PDF files before downloading Acrobat Reader freeware To verify that you are using Acrobat Reader with the global search option look for the following button in the toolbar Note When printing pages from the documentation PDFs de select Fit to Page if it is selected in your print dialog Otherwise pages may print with slightly smaller margins Technical Support An Alcatel Lucent service agreement brings your company the assurance of 7x24 no excuses technical support You ll also receive regular software updates to maintain and maximize your Alcatel Lucent prod uct s features and functionality and on site hardware replacement through our global network of highly qualified service delivery partners Additionally with 24 hour a day access to Alcatel Lucent s Service and Support web page you ll be able to view and update any case open or closed that you have reported to Alcatel Lucent s technical support open a new case or access helpful release notes technical bulletins an
65. such copyrights and trade marks This License Agreement does not convey to Licensee an interest in or to the Licensed Materials but only a limited right to use revocable in accordance with the terms of this License Agreement OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page A 1 Alcatel Lucent License Agreement Software License and Copyright Statements 3 Confidentiality Alcatel Lucent considers the Licensed Files to contain valuable trade secrets of Alcatel Lucent the unauthorized disclosure of which could cause irreparable harm to Alcatel Lucent Except as expressly set forth herein Licensee agrees to use reasonable efforts not to disclose the Licensed Files to any third party and not to use the Licensed Files other than for the purpose authorized by this License Agreement This confidentiality obligation shall continue after any termination of this License Agreement 4 Indemnity Licensee agrees to indemnify defend and hold Alcatel Lucent harmless from any claim lawsuit legal proceeding settlement or judgment including without limitation Alcatel Lucent s reason able United States and local attorneys and expert witnesses fees and costs arising out of or in connec tion with the unauthorized copying marketing performance or distribution of the Licensed Files 5 Limited Warranty Alcatel Lucent warrants for Licensee s benefit alone that the program media shall for a period of ninety 90 days fro
66. summary listing of the current directory on the remote host put Send a file to the remote machine pwd Display the current working directory on the remote host quit Close session gracefully remotehelp List the commands that the remote FTP server supports user Send new user information Ipwd Display the current working directory on the local host mput Allows for the transfer of multiple files out of the local machine mget Allows for the transfer of multiple files into the local machine prompt Toggles the query for use with the mput and mget commands page 1 24 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing System Files Loading Software onto the Switch Is Lists the contents files and directories of the local directory lcd Change to a new local directory user Sends new user information If you lose communications while running FTP you may receive a message similar to the following Waiting for reply Hit G to abort In this case you can press CrtI C to abort the session or wait until the communication failure is resolved and the FTP transfer can continue Note You must use the binary mode bin to transfer files via FTP Using Secure Shell FTP 1 Log on to the OmniSwitch and issue the sftp CLI command The command syntax requires you to identify the IP address for the device you are connecting to The following command establishes a Secure Shell FTP interface
67. the OmniSwitch CLI Reference Guide Setting a Minimum Password Size The default minimum password length or size is 8 characters To configure a minimum password size enter the user password size min command For example gt user password size min 10 The minimum length for any passwords configured for users is now 10 characters Note that the maximum password length is 31 characters Configuring the Username Password Exception By default specifying the username as all or part of a password is allowed Use the user password policy cannot contain username command to block the ability to configure a password that contains the user name For example gt user password policy cannot contain username enable Enabling this functionality prevents the user from specifying the username in the password that is config ured for the same user account For example the password for the account username of public can not contain the word public in any part of the password However the username of another account is still allowed page 7 12 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing Switch User Accounts Configuring Password Policy Settings Configuring Password Character Requirements The character requirements specified in the global password policy determine the minimum number of uppercase lowercase non alphanumeric and 10 base digit characters required in all passwords These requirements are conf
68. the OmniSwitch 6800 6850 9000 Network Configuration Guide To enable accounting logging a user session for Authenticated Switch Access use the aaa accounting session command with the relevant server name s In this example the RADIUS and LDAP servers have already been configured through the aaa radius server and aaa Idap server commands gt aaa accounting session radl ldap2 local After this command is entered accounting will be performed through the rad1 RADIUS server If that server is unavailable the LDAP server Idap2 will be used for accounting If that server is unavailable logging will be done locally on the switch through the Switch Logging feature For more information about Switch Logging see the OmniSwitch 6800 6850 9000 Network Configuration Guide To remove an individual server from the list of servers enter the aaa accounting session command with the relevant server name s removing the desired server from the list For example gt aaa accounting session radl local The server Idap2 is removed as an accounting server To disable accounting for Authenticated Switch Access use the no form of the aaa accounting session command gt no aaa accounting session Accounting will not be performed for Authenticated Switch Access sessions page 8 12 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing Switch Securi Verifying the ASA Configuration ging ty g g Verifying the ASA Configu
69. the diagram below ly ae P N R W C R W C R W C R W C 1 Switch boots from certified directory by using factory configura tion settings Since the working and certified directories are the same it will be running from the working direc tory 2 Changes are made to the run ning configura tion and stored in the running con figuration 3 Power is inter rupted and the switch goes down 4 Switch reboots from certified directory by using factory configura tion settings run ning configuration changes are lost Since the working and certified direc tories are the same it will be running from the working directory Running Configuration is Overwritten by the Certified Directory on Boot OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 4 5 CMM Files Managing CMM Directory Content Scenario 2 Running Configuration Saved to Working Directory The network administrator recreates Switch X s running configuration and immediately saves the running configuration to the working directory In another mishap the power to the switch is again interrupted The switch reboots from certified direc tory overwrites all of the changes in the running configuration and rolls back to the certified directory which in this case is
70. the factory settings However since the configuration file was saved to the working directory that file is still in the working directory and can be retrieved Since the working and certified directories are not exactly the same the switch is running from the certified directory This is illustrated in the diagram below R W C 1 Switch boots from certified directory using factory configura tion settings Since the working and certified directories are the same it will be running from the working direc tory R W C R W C 2 Changes are made to the run ning configura tion and stored in the running con figuration and then saved to the working directory 3 Power is inter rupted and the switch goes down R W C 4 Switch reboots from the certified directory by using factory configura tion settings saved configuration file is still in the work ing directory Since the working and certified direc tories are not the same it will be running from the certified directory Running Configuration Saved to Working Directory It is important to note that in the above scenario the switch is using the configuration file from the certi fied directory and not the working directory The changes made and saved to the working directory are not in
71. the file by executing the configuration apply command followed by the path and file name If the configuration file is accepted with no errors the CLI responds with a system prompt gt configuration apply flash configfile 1 txt gt Note Optional You can specify verbose mode when applying a configuration file to the switch When the keyword verbose is specified in the command line all syntax contained in the configuration file is printed to the console When verbose is not specified in the command line cursory information number of errors and error log file name will be printed to the console only if a syntax or configuration error is detected To verify that the file was applied enter the show configuration status command The display is similar to the one shown here gt show configuration status File configuration lt flash configfile 1 txt gt completed with 0 errors For more information about this display see Configuration File Manager Commands in the OmniSwitch CLI Reference Guide Setting an Application Session for a Date and Time You can set a timed session to apply a configuration file at a specific date and time in the future The following example applies the bncom_cfg txt file at 9 00 a m on July 4 of the current year 1 Verify that there are no current timer sessions pending on the switch gt show configuration status File configuration none scheduled 2 Apply the file by executing the con
72. the history list show history at the prompt as shown here gt gt show history Note When you use n or to recall a command in the history list you must press the Enter key to execute the command You can configure the number of history commands saved by the switch for display by the show history command The range for the history size value is 1 to 30 To view the history parameters use the show history parameters command gt history size 30 gt show history parameters History size 30 CurrentSize 10 Index Range 1 10 The values in this display are defined here e History Size The number of commands the switch will save for display by the show history command e Current Size The number of commands currently saved by the switch ready for display by the show history command e Index Range This value indicates the index range of the commands for this CLI session currently stored in the history buffer In the above example the switch is set to display 30 commands However when the show history parameters command was issued only ten commands had yet been issued Since only ten commands had been issued during the current login session the index range shows to 10 This is because the commands in the buffer are the first through the tenth commands issued during the current login session Note The Partial Keyword Completion feature described on page 5 5 works within the CLI history buffer page 5 14
73. the new VLAN ID Show Prefix You can view the current prefix by issuing the show prefix command If you issue this command when the prefix stored by the CLI is vlan 501 the following will display gt show prefix Current prefix vlan 501 If you issue the show prefix command when there is no prefix stored by the CLI a no prefix message will display page 5 12 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using the CLI CLI Services Prefix Prompt You may set the CLI so that your screen prompt displays the stored prefix To display the stored prefix as part of the screen prompt for the VLAN example above enter the prompt prefix CLI command as follows gt prompt prefix The following will display gt vlan 501 Your screen prompt will include your stored prefix until a new prompt is specified To set the prompt back to the arrow gt enter the prompt string gt prompt string arrow syntax as follows gt vlan 501 prompt string gt gt The arrow displays to indicate that your prompt has changed back to the default For more general information about changing the prompt refer to Changing the CLI Prompt on page 5 17 Command History The history command allows you to view commands you have recently issued to the switch The switch has a history buffer that stores up to 30 of the most recently executed commands Note The command history feature differs from the command l
74. the port that most recently changed 7 aipGMAPConflictTrap aipGMAPLast aip Indicates a Group Mobility TrapReason Advertisement Protocol GMAP aipGMAPLast port update conflict TrapPort aipGMAPLast TrapMac aipGMAPLast TrapProtocol aipGMAPLast Trap Vlan aipGMAPLastTrapReason Reason for last GMAP update to not be applied Valid reasons are 1 Target VLAN is an authenticated VLAN 2 update would conflict with a binding rule 3 update would create two different VLAN entries for the same protocol 4 update would create two different protocol entries for the same VLAN 5 target VLAN is not mobile and 6 no trap has been sent aipGMAPLastTrapPort The ifindex number of the last port on which the GMAP was not applied because of a conflict aipGMAPLastTrapMac The last MAC address for which a GMAP change was not applied because of a conflict aipGMAPLastTrap Protocol The protocol identifier of the last GMAP change that was not applied because of a conflict aipGMAPLastTrapVlan The VLAN identifier of the last GMAP change that was not applied because of a conflict Note This trap GMAP is not supported on OmniSwitch 6800 6850 9000 switches in the current release 8 policyEventNotification policyTrapE qos The switch notifies the NMS ventDetail when a significant event happens String that involves the policy manager policy TrapE ventCode policy TrapEventDetailString Details about the event that took pl
75. the public key on the client device using PutTTY gen Instead copy the key from the PuTTY gen public key window and paste the key into a text file with the filename userid_dsa pub Spec ify a valid OmniSwitch user login name for the userid portion of the filename For example the following public key filename is for OmniSwitch user Thomas thomas_dsa pub 3 Use PuTTY gen to save the private key on the client device 4 Verify that the userid specified as part of the filename in Step 2 is a valid user name on the OmniSwitch If the username does not already exist in the switch configuration create the user name with the appropriate privileges 5 FTP in ASCII mode the userid_dsa pub file from the client device to the flash network pub direc tory on the OmniSwitch Create the flash network pub directory first if it does not already exist 6 Using PuTTY software on the client device access SSH then Auth and then select the private key generated in Step 1 to start the authentication process Note that if public key authentication fails the user is prompted for a password This is the password that was specified when the user name was created on the OmniSwitch Note To enforce Secure Shell Public Key Authentication on a switch use the ssh enforce pubkey auth command Starting a Secure Shell Session To start a Secure Shell session issue the ssh command and identify the IP address or hostname for the device you are connecting to You
76. the text The More mode prompt will automatically re appear Enter filter pattern vlan More next screen lt sp gt next line lt cr gt filter pattern lt gt quit lt q gt OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 5 23 Verifying CLI Usage Using the CLI 4 Press the spacebar lt sp gt key to execute the filter option The following will display Enter filter pattern vlan 8193 dotlqBase vian 8194 dotiqVlan vian 8195 dotiqVlanCurrentTable vian 8196 dotiqVlanStaticTable vlan 8197 vlanMgrVlanSet vlan 8198 vlanTable vlan 8199 vpaTable vlan 9217 vCustomRuleTable vlan 9218 vDhcpGenericRuleTabl vlan 9219 vDhcpMacRuleTable vlan More next screen lt sp gt next line lt cr gt filter pattern lt gt quit lt q gt The screen displays 10 table rows each of which contain the text pattern vlan Alcatel Lucent s CLI uses a single level command hierarchy The screen rows shown above and below the table are not counted as part of the 10 rows If you want to display the rows one line at a time press Enter instead of the space bar key To exit the table type the q character and the CLI will exit the more mode and return you to the system prompt Verifying CLI Usage To display information about CLI commands and the configuration status of your switch use the show commands listed here show session config Displays session manager configuratio
77. the text pattern appears alone on a table row In this example the show snmp mib family command is used because it displays a long table of MIB information This example uses the filter option to display only those lines containing the vlan character pattern 1 Use the more command to set the number of displayed lines to 10 and to enable the more mode gt more size 10 gt more To verify your settings enter the following gt show more The more feature is enabled and the number of line is set to 10 2 Enter the show snmp mib family command Note that 10 lines of information are displayed The switch is now in the More mode as indicated at the bottom of the screen gt show snmp mib family MIP ID MIB TABLE NAME FAMILY es es 4 4 ee eee 6145 esmConfTrap NO SNMP ACCESS 6146 alcetherStatsTable interface 6147 esmConfTable interface 6148 ifJackTable interface 7169 dotlqPortVlanTable 802 10 7170 qAggregateVlanTable 802 10 7171 qPortVlanTable 802 10 More next screen lt sp gt next line lt cr gt filter pattern lt gt quit lt q gt 3 Type the filter pattern command and the following message will automatically appear Enter filter pattern Enter the desired text pattern in this case vlan at the prompt Remember to type the text exactly as it would appear in the CLI table and to type the asterisk character before and after
78. threshold status indicating if threshold was crossed or no change healthMonCpuStatus CPU threshold status indicating if threshold was crossed or no change 17 healthMonPortTrap healthPortSlot healthPortIF healthMonRx Status healthMonRx TxStatus healthPortSlot The physical slot number for this port healthPortIF The on board interface number health Indicates a port level threshold was crossed healthMonRxStatus Rx threshold status indicating if threshold was crossed or no change healthMonRxTxStatus RxTx threshold status indicating if threshold was crossed or no change page 10 14 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using SNMP SNMP Overview No Trap Name Objects Family Description 18 bgpEstablished bgpPeerLastEr bgp The BGP routing protocol has ror entered the established state bgpPeerState bgpPeerLastError tThe last error code and subcode seen by this peer on this connection If no error has occurred this field is zero Otherwise the first byte of this two byte OCTET STRING contains the error code and the second byte contains the subcode bgpPeerState The BGP peer connection state 19 bgpBackwardTransition bgpPeerLastEr bgp This trap is generated when the ror BGP router port has moved from bgpPeerState a more active to a less active state bgpPeerLastError tThe last error code and subcode seen by this peer on this connection If no error has oc
79. used rather than any user configured settings e Checking for new versions of pages should be set to Every time when your browser opens e Ifyou are using a proxy server the proxy settings should be configured to bypass the switch on which you are running WebView the local switch Typically many of these settings are configured as the default Different browsers and different versions of the same browser may have different dialogs for these settings Check your browser help pages if you need help page 9 2 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using WebView WebView CLI Commands WebView CLI Commands The following configuration options can be performed using the CLI These configuration options are also available in WebView but changing the web server port or secured port may only be done through the CLI or SNMP Enabling Disabling WebView WebView is enabled on the switch by default If necessary use the http server command to enable WebView For example gt http server Use the no http server command to disable WebView on the switch If web management is disabled you will not be able to access the switch using WebView Use the show http command to view WebView status As an alternative you can use the https keyword instead of the http keyword to enable WebView For example gt https server When using this format of the command use the no https server command to disable We
80. you must enter the switch IP address in your Telnet FTP or Secure Shell client typically the IP or IPv6 address of the EMP The login prompt then displays 2 At the login prompt enter the admin username At the password prompt enter the switch password Alternately you may enter any valid username and password The switch s default welcome banner will display followed by the CLI prompt Welcome to the Alcatel Lucent OmniSwitch 6000 Software Version 6 3 1 733 R01 Development October 05 2007 Copyright c 1994 2007 Alcatel Lucent All Rights reserved OmniSwitch TM is a trademark of Alcatel Lucent registered in the United States Patent and Trademark Office You are now logged into the CLI For information about changing the welcome banner see Modifying the Login Banner on page 2 20 For information about changing the login prompt see Chapter 5 Using the CLI For information about setting up additional user accounts locally on the switch see Chapter 7 Managing Switch User Accounts OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 2 5 Overview of Switch Login Components Logging Into the Switch Overview of Switch Login Components Switch access components include access methods or interfaces and user accounts stored on the local user database in the switch and or on external authentication servers Each access method except the console port must be enabled or
81. 0 primary 1 secondary 2 idle 3 standalone 4 passthrough 5 Note This trap is not supported on OmniSwitch 9000 switches in the current release 55 alaStackMgrClearedSlotTrap alaStack chassis The element identified by MegrSlotNI alaStackMegrSlotNINumber will Number enter the pass through mode because its operational slot was cleared with immediate effect alaStackMgrSlotNINumber Numbers allocated for the stack NIs as follows 0 invalid slot number 1 8 valid and assigned slot numbers corresponding to values from the entPhysicalTable 1001 1008 switches operating in pass through mode 255 unassigned slot number Note This trap is not supported on OmniSwitch 9000 switches 56 alaStackMgrOutOfSlotsTrap N A chassis One element of the stack will enter the pass through mode because there are no slot num bers available to be assigned to this element Note This trap is not supported on OmniSwitch 9000 switches in the current release OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 10 23 SNMP Overview Using SNMP No Trap Name Objects Family Description 57 alaStackMgrOutOfTokensTrap alaStack chassis The element identified by MegrSlotNI alaStackMgrSlotNINumber will Number enter the pass through mode because there are no tokens available to be assigned to this element alaStackMgrSlotNINumber Numbers allocated for the stack NIs as follows 0 invalid slo
82. 0 DST ends on the last sunday in october 10 27 at 2 00 DST will change the time by 1 00 hour s The second line in the above display indicates the Enabled Disabled status of the DST setting on the switch The last three lines describe the date and time parameters for the selected time zone or the custom parameters set with the CLI To enable daylight savings time use the following command gt system daylight savings time enable Note If your time zone shows No default in the Time Zone and DST Information Table refer to Daylight Savings Time Configuration on page 1 39 for information on configuring and enabling DST The following table shows a list of supported time zone abbreviations and DST parameters Time Zone and DST Information Table Hours from Abbreviation Name UTC DST Start DST End DST Change nzst New Zealand 12 00 Ist Sunday in Oct at 3rd Sunday in Mar 1 00 2 00 a m at 3 00 a m zpli No standard name 11 00 No default No default No default aest Australia East 10 00 Last Sunday in Oct Last Sunday in Mar 1 00 at 2 00 a m at 3 00 a m gst Guam 10 00 No default No default No default acst Australia Central 09 30 Last Sunday in Oct Last Sunday in Mar 1 00 Time at 2 00 a m at 3 00 a m jst Japan 09 00 No default No default No default kst Korea 09 00 No default No default No default awst Australia West 08
83. 0 6850 9000 Switch Management Guide December 2007 Index Symbols command 5 10 A aaa authentication command 8 7 8 8 8 10 9 5 aaa radius server command 8 7 accounting for Authenticated Switch Access 8 12 ACE Servers 8 4 application examples applying configuration files 6 4 Authenticated Switch Access 8 7 CLI 5 7 5 23 CMM 4 5 configuration file 6 2 customer login user accounts 7 7 Emergency Restore 4 32 file management 1 30 logging into the switch 2 5 network administrator user accounts 7 6 NTP 3 3 Prefix Recognition 5 12 SNMP 10 4 Trap Filters 10 5 WebView 9 5 applying configuration files application examples 6 4 ASA see Authenticated Switch Access ASA Configuration verify information about 8 13 Authenticated Switch Access 8 4 accounting 8 12 application examples 8 7 management interfaces 8 9 authentication MD5 10 28 SHA 10 28 traps 10 31 B banner login 2 20 pre login text 2 21 boot cfg file 4 3 4 16 Emergency Restore 4 32 C cd command 1 9 certified directory 4 3 copying to working directory 4 22 4 27 Chassis Management Module see CMM chmod command 1 18 CLI 5 1 application examples 5 7 5 23 domains and families 7 17 logging commands 5 15 5 16 specifications 5 2 CLI usage verify information about 5 24 CMM 4 1 application examples 4 5 boot cfg file 4 3 cancelling a reboot 4 14 4 20 4 25 certified directory 4 3 checking reboot status 4 15 configuration files 4 3 copying certified dir
84. 0 6850 9000 Switch Management Guide December 2007 page 4 31 Emergency Restore of the boot cfg File Managing CMM Directory Content Emergency Restore of the boot cfg File If all copies of the boot cfg file have been deleted and a system boot has occurred network configuration information is permanently lost However if the files have been deleted and no boot has occurred you can issue a write memory command to regenerate the boot cfg file Can I Restore the boot file While Running from Certified Yes While it is not recommended that you routinely save configuration changes while running from the certified directory you can perform an emergency restore of your configuration by following the steps 1 Copy your current configuration to a manually generated boot cfg file in the flash directory by enter ing the following command gt configuration snapshot all boot cfg 2 Copy the new boot cfg file from the flash directory to the flash working directory by using the ep command For example gt cp boot cfg working boot cfg 3 Reboot the switch from the flash working directory by entering the following command gt reload working no rollback timeout Once the boot cfg file is confirmed to be good it needs to be saved to the certified directory by using the procedure described in Copying the Working Directory to the Certified Directory on page 4 21 page 4 32 OmniSwitch 6800 6850 9000 Switch Management Guide December 20
85. 0 Aug 19 2023 policy cfg drw 2048 Aug 25 16 25 resources rw 0 Sep 24 08 00 boot cfg 3 Use the Ils command to list the contents of the flash working directory gt ls flash working Listing Directory flash working drw 2048 Aug 5 17 03 drw 2048 Aug 5 16 25 rw 880 Sep 31 13 05 boot cfg rw 6 Aug 5 17 03 test1 txt rw 6 Aug 5 17 03 test2 txt rw 6 Aug 5 17 03 test3 txt 4 Use the mv command to move the test files from flash working to flash resources gt mv testl txt flash resources gt mv test2 txt flash resources gt mv test3 txt flash resources OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 1 31 Application Examples for File Management Managing System Files 5 Use the ls command to verify that the files are now located in the flash resources directory gt ls flash resources Listing Directory flash resources drw 2048 Jul 5 17 20 drw 2048 Jul 5 16 25 rw 6 Jul 5 17 03 testi txt rw 6 Jul 5 17 03 test2 txt rw 6 Jul 5 17 03 test3 txt 17995776 bytes free FTP Client Application Example The following example shows how to transfer a file named rrtext txt from the switch s flash working directory to another host by using the switch as an FTP client 1 Log into the switch Use the Is command to verify that your current directory is flash gt Is Listing Directory flash rw 272 Jun 12 15 57 boot params drw 2048 Jun 12 17 52 c
86. 00 switches in the current release OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 10 19 SNMP Overview Using SNMP No Trap Name Objects Family Description 38 alaStackMgrNeighborChangeTrap alaStack chassis Indicates whether or not the stack MegrStackSta is in loop tus alaStack MegrSlotNI Number alaStackMgr Tra pLinkNumber alaStackMegrStackStatus Indicates whether the stack is or is not in a loop alaStackMgrSlotNINumber The numbers allocated for the stack NIs are from Ito 8 alaStackMegrTrapLinkNumber Holds the link number when the stack is not in a loop Note This trap is not supported on OmniSwitch 9000 switches in the current release 39 alaStackMgrRoleChangeTrap alaStackMegrPri chassis Indicates that a new primary or mary secondary stack is elected alaStackMgr Secondary alaStackMgrPrimary Holds the number of the stack which is in Primary role alaStackMgrSecondary Holds the number of the stack which is in Secondary role Note This trap is not supported on OmniSwitch 9000 switches in the current release 40 lpsViolationTrap IpsTrapSwitch bridge A Learned Port Security LPS Name violation has occurred IpsTrapSwitchI pAddr IpsTrapSwitch Slice IpsTrapSwitch Port IpsTrap Violat ingMac IpsTrap Viola tionType systemServices Date systemServices Time IpsTrapSwitchName The name of the switch IpsTrapSwitchIpAddr tThe IP address of switch
87. 07 Managing CMM Directory Content Displaying CMM Conditions Displaying CMM Conditions To show various CMM conditions such as where the switch is running from and which files are installed use the following CLI show commands show running directory Shows the directory from where the switch was booted show reload Shows the status of any time delayed reboot s that are pending on the switch show microcode Displays microcode versions installed on the switch show microcode history Displays the archive history for microcode versions installed on the switch For more information on the resulting displays from these commands see the OmniSwitch CLI Reference Guide An example of the output for the show microcode command is given in Show Switch Files on page 4 24 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 4 33 Displaying CMM Conditions Managing CMM Directory Content page 4 34 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 5 Using the CLI Alcatel Lucent s Command Line Interface CLI is a text based configuration interface that allows you to configure switch applications and to view switch statistics Each CLI command applicable to the switch is defined in the OmniSwitch CLI Reference Guide All command descriptions listed in the Reference Guide include command syntax definitions defaults usage guidelines example screen output and release history This chapter descri
88. 09 38 boot params drw 2048 Jan 5 09 22 certified drw 2048 Jan 5 09 22 working rw 12 Dec 18 2030 boot slot cfg drw 2048 Dec 27 2030 switch rw 64000 Jan 5 09 37 swlogl log rw 64000 Dec 27 2030 swlog2 log rw 256 Dec 27 2030 random seed drw 2048 Dec 18 2030 network 40208384 bytes free The following information describes the screen displayed by the ls command The first column consists of three text characters The first character indicates whether the row entry is a file or a directory d The second and third characters indicate the user s read write permissions drw 512 Oct 25 14 17 WORKING rw 321 Oct 25 14 39 boot params Here the first entry shows a directory d for which the user has read and write rw permissions The second entry shows a file for which the user has read and write rw permissions The second column indicates the number of bytes of flash memory the row entry occupies drw 512 Oct 25 14 17 WORKING rw 321 Oct 25 14 39 boot params Here the first entry shows that the directory uses 512 bytes of flash memory The second entry shows that the file occupies 321 bytes of flash memory The third fourth and fifth columns show the date and time the row entry was created or copied into the flash directory drw 512 Oct 25 14 17 WORKING rw 321 Oct 25 14 39 boot params Here the first entry indicates the file was created or copied on April 22 at 05 23 hours The second entry indicates that the
89. 09 59 boot params 21 43 cs_system pmd 09 57 random seed 09 59 swlogl log 08 31 certified 08 29 NETWORK 08 29 SWITCH 09 59 boot cfg l err 10 51 u boot bin 10 50 miniboot uboot 10 56 swlog2 log 12 07 test020 11 16 rule930 txt N Oo OFF O CO OF w w 63308800 bytes free page 1 10 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing System Files File and Directory Management If you specify a path as part of the Is or dir command your screen will list the contents of the directory at the specified path gt ls flash Listing Directory flash drw 1024 rw 276 rw 4890749 rw 256 rw 64000 drw 1024 drw 1024 drw 1024 rw 222 rw 524288 rw 834497 rw 64000 rw 719 rw 199567 63308800 bytes free Nov Nov Oct Nov Nov Nov Nov Nov Nov Oct OCE Nov Nov Nov N OonmrRrF OMO oO O OFrF w w 08 09 21 09 09 08 08 08 09 103 10 10 123 dis 30 59 43 57 59 31 29 29 59 51 50 56 07 16 WORKING boot params cs_system pmd random seed swlogl log certified NETWORK SWITCH boot cfg 1l err u boot bin miniboot uboot swlog2 log test020 rule930 txt OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 1 11 File and Directory Management Managing System Files Making a New Directory To make a new directory use the mkdir command You may specify a path for th
90. 1 In this example the user name is Customer and the password is my_passwd gt user Customerl password my passwd end user profile Profilel For more information about creating a user and setting up a password see Creating a User on page 7 10 For information about creating end user profiles see Setting Up End User Profiles on page 7 20 Note Optional To verify the user account enter the show user command The display is similar to the following User name Customerl END user profile Profilel SNMP authentication NONE Snmp encryption NONE User name default END user profile Profiled Snmp not allowed For more information about the show user command see the OmniSwitch CLI Reference Guide OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 7 7 Overview of User Accounts Managing Switch User Accounts Default User Settings The default user account on the switch is used for storing new user defaults for privileges and profile information This account does not include a password and cannot be used to log into the switch At the first switch startup the default user account is configured for e No read or write access e No SNMP access e No end user profile Any new users created on the switch will inherit the privileges or the end user profile of the default user unless the user is configured with specific privileges or a profile The default user settings may be mod
91. 1 the IP address is 11 233 10 145 and the Access type is ssh which indicates a Secure Shell session Note You can use the ssh6 command followed by the IPv6 address or the hostname of the SSHv6 server to start an SSHv6 session It is mandatory to specify the name of the particular IPv6 interface if the SSHV6 server has been specified using its link local address SSHv6 sessions are supported only on OmniSwitch 6850 or 9000 Closing a Secure Shell Session To terminate the Secure Shell session issue the exit command The following will display gt exit Connection to 11 133 30 135 closed Using the example shown above this display indicates the Secure Shell session between the two switches is closed At this point the user is logged into the local OmniSwitch at IP address 11 233 10 145 Note Establishing and closing the Secure Shellv6 connection is similar to that of the Secure Shell connec tion Log Into the Switch with Secure Shell FTP To open a Secure Shell FTP session from a local OmniSwitch to a remote device issue the sftp command and identify the IP address or hostname for the device you are connecting to You can use the sftp6 command to start an Secure Shell FTPv6 session followed by the relevant IPv6 address or hostname over an IPv6 environment The following example describes how a Secure Shell interface is established from the local OmniSwitch to IP address 10 222 30 125 1 Log on to the OmniSwitch and iss
92. 14 00 p m gt system time 15 41 00 gt page 1 38 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing System Files Setting the System Clock Daylight Savings Time Configuration The switch can be set to change the system clock automatically to adjust for Daylight Savings Time DST There are two situations that apply depending on the time zone selected for your switch If the time zone set for your switch shows DST parameters in the table on page 1 40 you need to only enable DST on your switch by using the following command gt system daylight savings time enable If the time zone set for your switch does not show DST parameters in the table on page 1 40 you must specify the start end and change parameters for DST by using the system daylight savings time command The following information is needed to specify DST e The day of the week and month of the year when DST will begin e The position of that day in the month e g first second third fourth or last Sunday of the month e The hour and minute of the day at which DST will begin e The day of the week and month of the year when DST will end e The position of that day in the month e g first second third fourth or last Sunday of the month e The hour and minute of the day at which DST will end e The number of hours the switch clock will be offset for DST one hour in most cases To set the switch DST parameters so that the clo
93. 2 SMI IPMS MIB Switching IPMS subsystem SNMPv2 TC SNMPv2 CONF IF MIB ALCATEL IND1 Definitions of managed objects for the IP Routing SNMPv2 SMI IPRM MIB Manager IPRM subsystem SNMPv2 TC SNMPv2 CONF IANA RTPROTO MIB ALCATEL IND1 Definitions of managed objects for the IPv6 sub SNMPv2 SMI IPv6 MIB system SNMPv2 TC SNMPv2 CONF IPv7 TC IPv6 MIB ALCATEL IND1 IPX Definitions of managed objects for the IPX routing SNMPv2 SMI MIB subsystem SNMPv2 TC SNMPv2 CONF ALCATEL IND1 Definitions of managed objects for the IEEE 802 3ad SNMPv2 SMI LAG MIB Link Aggregation LAG subsystem SNMPv2 TC SNMPv2 CONF IEEE8023 LAG MIB IF MIB Q BRIDGE MIB ALCATEL IND1 Definitions of the MIB module for the address learning SNMPv2 SMI LPS MIB MIB addresses entity SNMPv2 TC IF MIB Q BRIDGE MIB ALCATEL IND1 SYSTEM MIB SNMPv2 CONF OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 10 39 SNMP MIB Information Using SNMP MIB Name Description Dependencies ALCATEL IND1 Definitions of managed objects for the Source Learn SNMPv2 SMI MAC ADDRESS MIB ing MAC Address subsystem SNMPv2 TC SNMPv2 CONF IF MIB Q Bridge MIB ALCATEL IND1 Definitions of managed objects for the Chassis Super SNMPv2 SMI MAC SERVER MIB vision MAC Server subsystem SNMPv2 TC SNMPv2 CONF ENTITY MIB ALCATEL IND1 CHASSIS MIB ALCATEL IND1 Definitions of the Multicast Listener D
94. 3 12 gt Home feu Routes Interfaces Denial of Service Service Statistics Networking Global IP Parameters Enter a value ey Primary Router IP Address 19 955 73 12 apply restore Applies Ce Router ID 10 255 73 12 DEW Select item apply restore configu from drop ration down menu i IP Directed Broadcast Of x i Of Suh reii Restores original uppen IP Route Preference field values amp 3 Local i Static eR Services apply restore apply restore Policy IES eK OSPF 110 RIP 120 _System apply restore apply restore PTT TT nene Global Configuration Page OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 9 11 Configuring the Switch With WebView Using WebView Table Configuration Page Table configuration pages show current configurations in tabular form Entries may be added modified or deleted You can delete multiple entries but you can only modify one entry at a time Z Webview 10 255 73 12 Microsoft Internet Explorer File Edit View Favorites Tools Help c 2 Zh seach Ppr 2 2 a Ul A fel bepsf10 255 73 12ivebjcontentflogn Rem SG inks ima WebView B ation Help About Telnet Log Out ee PX VLANs SLANT Click to select item to modify or delete Spanning Tree VLAN Administration Status M VLAN SVLAN Description Admin Traffic Operational Flat STP 1x1 STP Authentication IP VLAN
95. 51 working rw 31 Jul 29 2001 policy cfg drw 2048 Jul 28 12 17 switch Single Characters The question mark is used as a wildcard for a single character in a text pattern The following command will locate all entries containing swlog followed by any single character and the log extension gt ls swlog log Listing Directory flash rw 64000 Jul 21 19 49 swlogl log rw 64000 Aug 12 19 06 swlog2 log The single and multiple character wildcards can be used in combination The following command lists all entries containing the letter i followed by any two single characters a dls 21 92 Listing Directory flash drw 2048 Aug 12 18 51 working OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 1 7 File and Directory Management Managing System Files Directory Commands The directory commands are applied to the switch file system and to files contained within the file system When you first enter the flash directory your login is located at the top of the directory tree You may navigate within this directory by using the pwd and cd commands discussed below The location of your login within the directory structure is called your current directory You need to observe your login location because when you issue a command that command applies only to directories and files in your current directory unless another path is specified The following drawing is an OmniSwitch 6800 logical representation of the
96. 8 time 1 38 6 4 time zone 1 37 timed sessions 6 4 cancelling 6 7 future timed session 6 5 Trap Filters application examples 10 5 Traps 10 30 traps authentication 10 31 families 10 30 filters 10 30 management 10 31 tty command 5 17 U user accounts defaults 7 2 for switch access 7 4 saving settings 7 9 SNMP access 7 19 user command 7 7 7 14 7 22 8 7 10 5 creating a user 7 10 user configuration verify information about 7 23 user database specifications 7 2 switch management 8 5 user password expiration command 7 13 user password size min command 7 12 users see user accounts UTC 3 1 vV verbose mode 6 9 vicommand 1 15 Index 4 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Index Ww WebView 9 1 accessing WebView 9 8 adjacencies 9 17 application examples 9 5 browser setup 9 2 CLI commands 9 3 configuring the switch 9 8 defaults 9 2 disabling 9 3 enabling 9 3 HTTP port 9 3 on line help 9 18 Secure Socket Layer 9 3 Webview Configuring the Switch 9 8 whocommand 2 16 5 20 whoamicommand 5 21 wildcards 5 23 working directory 4 3 copying to certified directory 4 21 4 26 write memory command 4 17 Z Zmodem 1 27 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Index 5 Index Index 6 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007
97. Administration 4 N N C wan Y swan Desaiption Admin Status Operational Status Y Flat STP Status 1x1 STP Status Authentication IS r 34 VLAN 34 Enabled Inactive Enabled Enabled Disabled On g ir s VANS Enabled Inactive Enabled Enabled Disabled on Fi xz VLAN32 Enabled Inactive Enabled Enabled Disabled Of ee r 33 VLANS3 Enabled Inactive Enabled Enabied Disabled lon a ae Vana Enabled Inactive Enabled Enabled Disabled los Patan E 38 VLAN 3 Enabled Inactive Enabled Enabled Disabled On x 36 VUN Enabled Inactive Enabled Enabled Disabled os ir 27 VLAN 27 Enabled Inactive Enabled Enabled Disabled OF C z VLAN28 Enabled Inactive Enabled Enabled Disabled on 7 z VAN Enabled Inactive Enabled Enabled Disabled os C 30 VIAN30 Enabled Inactive Enabled Enabled Disabled on irs VUAN31 Enabled inact Enabled Enabled Disabled om w 29 VLAN 23 Enabled Inactive Enabled Enabled Disabled lor r v7 VIAN 47 Enabled Inactive Enabled Enabled Disabled On Ir 4 VLAN 48 Enabled Inactive Enabled Enabled Disabled Of Tie sce lat refresh 0 00 00 03 TTT TT eaten Table Sort Feature Advanced Sort Click on the Sort icon page 9 16 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using WebView Configuring the Switch With WebView Table Paging Certain potentially large tables e g VLANs have a paging feature that loads the table data in incre
98. BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEM PLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCURE MENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE OpenLDAP is a trademark of the OpenLDAP Foundation Copyright 1999 2000 The OpenLDAP Foundation Redwood City California USA All Rights Reserved Permission to copy and distributed verbatim copies of this document is granted page A 4 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Software License and Copyright Statements Third Party Licenses and Notices C Linux Linux is written and distributed under the GNU General Public License which means that its source code is freely distributed and available to the general public GNU GENERAL PUBLIC LICENSE Version 2 June 1991 Copyright C 1989 1991 Free Software Foundation Inc 675 Mass Ave Cambridge MA 02139 USA Everyone is permitted to copy and distribute verbatim copies of this license document but changing it is not allowed Preamble The licenses for most software are designed to take away your freedom to share and change it By contrast the GNU General Public License is intended to guarantee yo
99. Binding Rule Mac Address gmBindRulePortIfIndex tThe ifIndex corresponding to the mobile port on which the binding rule violation occurred gmBindRuleProtoClass The encoded protocol number used for binding VLAN classification gmBindRuleEthertype Ethertype value for generic Ethertype or snap rule This value has no meaning for vProtoRuleProtoClass set to values other than 9 or 11 gmBindRuleDsapSsap DSAP and SSAP values for generic DSAP SSAP and SNAP rules This value has no meaning for vProtoRuleProtoClass set to values other than 10 43 unused N A N A 44 unused N A N A 45 unused N A N A 46 unused N A N A 47 pethPsePortOnOff pethPsePortDe module Indicates if power inline port is tectionStatus or is not delivering power to the a power inline device pethPsePortDetectionStatus Describes the operational status of the port PD detection A value of disabled 1 indicates that the PSE State diagram is in the state IDLE A value of searching 2 indicates that the PSE State diagram is in the state DETECTION CLASSIFICATION SIGNATURE_INVALID or BACKOFF A value of deliveringPower 4 indicates that the PSE State diagram is in the state POWER UP POWER_ON or POWER OFF A value of fault 5 indicates that the PSE State diagram is in the state TEST ERROR or the state IDLE due to the variable error condition Faults detected are vendor specific A value of test 7 indicates that the PSE State diagram is i
100. CMM software directory management and how to implement them by using the Command Line Interface CLI CLI commands are used in the configuration exam ples for more details about the syntax of commands see the OmniSwitch CLI Reference Guide This chapter contains the following information e The interaction between the running configuration the working directory and the certified directory is described in CMM Files on page 4 3 e A description of how to restore older versions of files and prevent switch downtime is described in Software Rollback Feature on page 4 4 e The CLI commands available for use and the correct way to implement them are listed in Managing the Directory Structure Non Redundant on page 4 13 e The CLI commands and issues involved in managing the directory structure of a stack with redundant CMM software is described in Managing Redundancy in a Stack and CMM on page 4 25 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 4 1 CMM Specifications Managing CMM Directory Content CMM Specifications Size of Flash Memory 64 Megabytes OmniSwitch 6800 and 6850 128 Megabytes OmniSwitch 9000 Size of RAM Memory 256 Megabytes Maximum Length of File Names 32 Characters Maximum Length of Directory Names 32 Characters Default Boot Directory Certified page 4 2 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing CMM Directory
101. Content CMM Files CMM Files The management of a stack or single switch is controlled by three types of files e Image files which are proprietary code developed by Alcatel Lucent to run the hardware These files are not configurable by the user but may be upgraded from one release to the next These files are also known as archive files as they are really the repository of several smaller files grouped together under a common heading e A configuration file named boot cfg which is an ASCII based text file sets and controls the config urable functions inherent in the image files provided with the switch This file can be modified by the user When the switch boots it looks for the file called boot cfg It uses this file to set various switch parameters defined by the image files e A boot file on the OmniSwitch 6800 and 6850 named boot slot cfg is an ASCII based text file that numbers the switches in a stack The boot slot cfg file and how to configure it is discussed more thor oughly in the Getting Started Guide for each switch A boot file on the OmniSwitch 9000 named boot params is an ASCII based text file that sets the Ethernet Management Port EMP IP address gateway and mask It also controls the console port s baud rate and displays directory loading infor mation and is located in the Flash memory of the switch The boot params file and how to configure it is discussed more thoroughly in OmniSwitch 9000 Getting Started Gu
102. ENT BE LIABLE FOR ANY INDIRECT INCIDENTAL CONSE QUENTIAL SPECIAL OR EXEMPLARY DAMAGES OR LOST PROFITS EVEN IF ALCATEL LUCENT HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES SOME STATES DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDEN TAL OR CONSEQUENTIAL DAMAGES SO THE ABOVE LIMITATION OR EXCLUSION TO INCIDENTAL OR CONSEQUENTIAL DAMAGES MAY NOT APPLY TO LICENSEE 7 Export Control This product is subject to the jurisdiction of the United States Licensee may not export or reexport the Licensed Files without complying with all United States export laws and regula tions including but not limited to i obtaining prior authorization from the U S Department of Commerce if a validated export license is required and 11 obtaining written assurances from licensees if required 8 Support and Maintenance Except as may be provided in a separate agreement between Alcatel Lucent and Licensee if any Alcatel Lucent is under no obligation to maintain or support the copies of the Licensed Files made and distributed hereunder and Alcatel Lucent has no obligation to furnish Licensee with any further assistance documentation or information of any nature or kind 9 Term This License Agreement is effective upon Licensee opening this package and shall continue until terminated Licensee may terminate this License Agreement at any time by returning the Licensed Materi als and all copies thereof and extracts therefrom to Alcat
103. EORY OF LIABIL ITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF NOT ADVISED OF THE POSSIBILITY OF SUCH DAMAGE page A 10 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Software License and Copyright Statements Third Party Licenses and Notices H K Apptitude Inc Provided with this product is certain network monitoring software MeterWorks RMON licensed from Apptitude Inc whose copyright notice is as follows Copyright C 1997 1999 by Apptitude Inc All Rights Reserved Licensee is notified that Apptitude Inc formerly Technically Elite Inc a California corporation with principal offices at 6330 San Ignacio Avenue San Jose California is a third party bene ficiary to the Software License Agreement The provisions of the Software License Agreement as applied to MeterWorks RMON are made expressly for the benefit of Apptitude Inc and are enforceable by Apptitude Inc in addition to ALCATEL LUCENT IN NO EVENT SHALL APPTITUDE INC OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES INCLUDING COSTS OF PROCUREMENT OF SUBSTITUTE PRODUCTS OR SERVICES LOST PROFITS OR ANY SPECIAL INDIRECT CONSEQUENTIAL OR INCIDENTAL DAMAGES HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY ARISING IN ANY WAY OUT OF THIS AGREEMENT Agranat Provided with this product is certain web server software EMWEB PRODUCT licen
104. Flat STP Status 1x1 STP Status Add Add SVLAN Enabled Enabled Enabled Modity Delete Refresh Help Apply Apply Apply Port Security Networking Policy Security System E Time since last refresh 0 00 00 03 EMEAK gt Table View Feature Expanded View page 9 14 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using WebView Configuring the Switch With WebView Table Sorting Basic Sort Table entries can be sorted by column in ascending or descending order Initially tables are sorted on the first column in ascending order the number 1 appears in the first column To sort in descending order click on the column heading Click again to return to the ascending order To sort on a different column click on the column heading the table will sort on that column and the number will appear at the top of the column Click again to sort the data in descending order Note You can also click on the Flip icon at the upper right corner of the table to toggle between the ascending and the descending order T Webview 10 253 73 12 Microsoft Internet Explorer Fie Edt Vw Fortes Tooke Heip E C7 Ou O J Ol ma Jrone 3 5 BOS Pie eest0 288 73 s2veblectertoge Nl Aedes H hetp 10 255 73 12 webleontertilegn hemi WebView About Telnet Log O Click to toggle between ascending and descending order SVLAN Description Admin Trafic Operational Flat STP 1x1 S
105. For example gt user bert password techpubs expiration 02 19 2003 13 30 This command sets the password expiration to February 19 2003 at 1 30pm the switch will calculate the expiration based on the system date time The system date time may be displayed through the system date and system time commands For more information about the system date time see the OmniSwitch 6800 6850 9000 Switch Management Guide Note The expiration will be reset to the global default setting based on the user password expiration command if the user password is changed or the user password expiration command is entered again Configuring the Password History The password history refers to the number of old passwords for each user account that are saved by the switch This functionality prevents the user from using the same password each time their account pass word is changed For example if the password history is set to 10 and a new password entered by the user matches any of the 10 passwords saved then an error message is displayed notifying the user that the pass word is not available By default the password history is set to save up to 4 old passwords for each user account To configure the number of old passwords to save use the user password history command For example gt user password history 2 To disable the password history function specify 0 as the number of old passwords to save For example gt user password history 0 Note tha
106. I commands and explains their syntax Whenever a command has a no form it is described on the same page as the original command The no form of a command will mean one of the following e Jt can remove the configuration created by a command For example you create a VLAN with the vlan command and you delete a VLAN with the no vlan command e It can reset a configuration value to its default For example you can create a static IGMP entry on a specified port of a specified VLAN with the ip multicast static group command You can remove the static IGMP entry from a specified port on a specified VLAN with the no ip multicast static group command Using Alias Commands You may define substitute text for the switch s CLI commands by using the alias command There are two main reasons for defining aliases e You can eliminate excess typing by reducing the number of characters required for a command To reduce the number of characters required to use the group term in a CLI command you can change the syntax to gp as follows gt alias gp group e You can change unfamiliar command words into familiar words or patterns If you prefer the term privilege to the term attribute with reference to a login account s read write capabilities you can change the CLI word from attrib to privilege by using the following command gt alias privilege attrib After an alias has been defined both the alias and the origin
107. MOVE MORE MODIFY MKDIR LS KILL IP INSTALL HISTORY FTP FSCK FREESPACE EXIT DSHELL DIR DELETE DEBUG CP COMMAND LOG CHMOD CD AUTO ATTRIB ALIAS System Service amp File Mgmt Command Set Additional output not shown Note that the command keywords are shown in all capital letters The name of the command set is listed parenthetically below the keywords in initial caps OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 5 5 Command Help Using the CLI The following table contains the first level commands and their set names as they are listed on the display screen when you enter a single question mark and press Enter Command Set Name System Service amp File Management Commands WHOAMI WHO VIEW VI VERBOSE USER UPDATE TTY TELNET6 TELNET SYSTEM SWLOG SSH6 SSH SHOW SFTP6 SFTP SESSION RZ RMDIR RM RENAME PWD PROMPT NTP NSLOOKUP NO NEWFS MV MOVE MORE MODIFY MKDIR LS KILL IP HISTORY FTP FSCK FREESPACE EXIT DSHELL DIR DELETE DEBUG CP COMMAND LOG CHMOD CD AUTO ATTRIB ALIAS CMM Chassis Supervision COPY WRITE POWER TEMP THRESHOLD TAKEOVER SYSTEM SHOW RRM RPUT RLS RGET RELOAD RDF RCP NO DEBUG CONFIGURE Source Learning SOURCE LEARNING SHOW PORT SECURITY NO MAC ADDRESS TABLE DEBUG Spanning
108. MP operations An SNMP manager is commonly called a Network Management System NMS NMS refers to a system made up of a network device such as a workstation and the NMS software It provides an interface that allows users to request data or see alarms resulting from traps or informs It can also store data that can be used for network analysis e The SNMP Agent is the software entity that resides within the switch on the network It maintains the management data about a particular network device and reports this data as needed to the managing systems The agent also responds to requests for data from the SNMP Manager Along with the SNMP agent the switch also contains Management Information Bases MIBs MIBs are databases of managed objects written in the SNMP module language which can be monitored by the NMS The SNMP agent contains MIB variables which have values the NMS can request or change using Get GetNext GetBulk or Set operations The agent can also send unsolicited messages traps or informs to the NMS to notify the manager of network conditions SNMP Operations Devices on the network are managed through transactions between the NMS and the SNMP agent residing on the network device i e switch SNMP provides two kinds of management transactions manager request agent response and unsolicited notifications traps or informs from the agent to the manager In a manager request agent response transaction the SNMP manager send
109. NMP 2573 SNMPv3 Applications 2574 User based Security Model USM for version 3 SNMP 2575 View based Access Control Model VACM for SNMP 2576 Coexistence between SNMP versions SNMPv1 SNMPv2 SNMPv3 The SNMPv3 protocol is ascending compatible with SNMPv1 and v2 and supports all the SNMPv1 and SNMPv2 PDUs SNMPv1 and SNMPv2 Authentication Community Strings SNMPv1 SNMPv2 Encryption None SNMPv1 and SNMPv 2 Security requests accepted by the switch Sets and Gets SNMPv3 Authentication SHA MD5 SNMPv3 Encryption DES SNMPv3 Security requests accepted by the switch Non authenticated Sets Non authenticated Gets and Get Nexts Authenticated Sets Authenticated Gets and Get Nexts Encrypted Sets Encrypted Gets and Get Nexts SNMP traps Refer to the table on page 10 10 for a complete list of traps and their definitions Maximum number of SNMP ses sions that can be established on an OmniSwitch 50 SNMP Defaults The following table describes the default values of the SNMP protocol parameters Parameter Description Command Default Value Comments SNMP Management Station snmp station UDP port 162 SNMPv3 Enabled Community Strings snmp community map Enabled SNMP Security setting snmp security Privacy all highest security Trap filtering snmp trap filter Disabled Trap Absorption snmp trap absorption Enabled Enables the forwarding
110. No Trap Name Objects Family Description 67 alaVrrp3TrapProtoError alaVirp3TrapPr vrrp The error trap indicates that the otoErrReason sending agent has encountered the protocol error alaVrrp3TrapProtoErrReason This indicates the reason for protocol error trap 68 alaVrrp3TrapNewMaster alaVirp3OperM vrrp The newMaster trap indicates asterlpAd that the sending agent has transi drType tioned to Master state alaVirp3OperM asterlpAddr alaVirp3TrapNe wMasterRea son alaVrrp3OperMasterlpAddrType tThis specifies the type of alaVrrp3OperMasterlpAddr in this row alaVrrp3OperMasterlpAddr the master switch s real primary for vrrp over IPv4 IP address This is the Ip address listed as the source in the advertisement last received by this virtual switch For IPv6 a link local address alaVrrp3TrapNewMasterReason This indicates the reason for NewMaster trap 69 gmHwMixModeSubnetRuleTable gmSubnetRule vlan An subnet overload trap occurs OverloadAlert Table in mixed mode whenever a new gmOverloadRu entry to the HW subnet rule table leSlice gets dropped due to the overload of the table gmSubnetRuleTable Overloaded HW subnet rule table gmOverloadRuleSlice Overloaded slot Id Note This trap is not supported on OmniSwitch 6800 6850 9000 switches in the current release page 10 26 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using SNMP Using SNMP For Switch Security Using SNMP For Swi
111. ONF IPv6 MIB IPv6 TCP MIB Management Information Base for the Transmission SNMPv2 SMI RFC 2452 Control Protocol SNMPv2 TC SNMPv2 CONF IPv6 UDP MIB Management Information Base for User Datagram SNMPv2 SMI RFC 2454 Protocol SNMPv2 CONF IPv6 TC MAU MIB Management Information for IEEE 802 3 Medium SNMPv2 SMI RFC 2668 Attachment Units SNMPv2 TC SNMPv2 CONF page 10 34 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using SNMP SNMP MIB Information MIB Name Description Dependencies Novell RIPSAP MIB This MIB defines the management information for the SNMPv2 SMI Routing Information Protocol RIP and Service Advertising Protocol SAP protocols running in a Novell Internetwork Packet Exchange IPX protocol environment It provides information in addition to that contained in the IPX MIB itself All tables in this MIB are linked to an instance of IPX via the system instance identifier as defined in the IPX MIB OSPF MIB Open Path Shortest First OSPF Version 2 SNMPv2 SMI RFC 1850 Management Information Base SNMPv2 TC SNMPv2 CONF OSPF V3 MIB Open Path Shortest First OSPF Version 3 SNMPv2 SMI Management Information Base SNMPv2 TC SNMPv2 CONF IF MIB INET ADDRESS MIB OSPF MIB PIM MIB Protocol Independent Multicast MIB for IPv4 SNMPv2 SMI RFC 2934 SNMPv2 TC SNMPv2 CONF IF MIB IPMROUTE STD MIB Q BRIDGE MIB The Bridge MIB Extension module for managing Pri SNMPv2 SMI RFC 2674 ority
112. OmniSwitch using IP address 11 233 10 145 establishing a Secure Shell session across a network to another OmniSwitch using IP address 11 133 30 135 To establish this session from the console in the figure below you would use the CLI commands shown in the examples above Once you issue the correct password you are logged into the OmniSwitch at IP address 11 133 30 135 ie LLLLLLLLI OmniSwitch OmniSwitch Console 11 233 10 145 11 133 30 135 Secure Shell Session between Two OmniSwitches To view the parameters of the Secure Shell session issue the who command The following will display gt who Session number 0 User name at login Access type console Access port Local page 2 16 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Logging Into the Switch Using Secure Shell IP address 0 0 0 0 Read only domains None Read only families Read Write domains None Read Write families End User profile Session number 1 User name rrloginl Access type ssh Access port NI IP address 11 233 10 145 Read only domains None Read only families Read Write domains All Read Write families End User profile This display shows two sessions currently running on the remote OmniSwitch at IP address 11 133 30 135 Session number 0 is identified as the console session Session number indicates the User name is rrlogin
113. OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using the CLI Logging CLI Commands and Entry Results Logging CLI Commands and Entry Results OmniSwitch 6800 6850 9000 switches provide command logging via the command log command This feature allows users to record up to 100 of the most recent commands entered via Telnet Secure Shell and console sessions In addition to a list of commands entered the results of each command entry are recorded Results include information such as whether a command was executed successfully or whether a syntax or configuration error occurred Note The command history feature differs from the command logging feature in that command history buffers up to 30 of the most recent commands The command information is not written to a separate log file Also the command history feature includes only general keyword syntax i e it does not record full syntax date and time session IP address and entry results For more information on command history refer to page 5 13 Refer to the sections below for more information on configuring and using CLI command logging For detailed information related to command logging commands refer to the OmniSwitch CLI Reference Guide Enabling Command Logging By default command logging is disabled To enable command logging on the switch enter the following command gt command log enable When command logging is enabled via the command log enable synt
114. OmniVista includes a complete context sensitive on line help system This guide provides overview material on software features how to procedures and tutorials that will enable you to begin configuring your OmniSwitch However it is not intended as a comprehensive refer ence to all CLI commands available in the OmniSwitch For such a reference to all OmniSwitch 6800 6850 9000 CLI commands consult the OmniSwitch CLI Reference Guide How is the Information Organized Each chapter in this guide includes sections that will satisfy the information requirements of casual read ers rushed readers serious detail oriented readers advanced users and beginning users Quick Information Most chapters include a specifications table that lists RFCs and IEEE specifications supported by the software feature In addition this table includes other pertinent information such as mini mum and maximum values and sub feature support Some chapters include a defaults table that lists the default values for important parameters along with the CLI command used to configure the parameter Many chapters include Quick Steps sections which are procedures covering the basic steps required to get a software feature up and running In Depth Information All chapters include overview sections on software features as well as on selected topics of that software feature Topical sections may often lead into procedure sections that describe how to configure the feature just
115. Part No 060215 10 Rev E December 2007 OmniSwitch 6800 Series OmniSwitch 6850 Series OmniSwitch 9000 Series Switch Management Guide Alcatel Lucent www alcatel lucent com This user guide documents release 6 3 1 of the OmniSwitch 6800 Series OmniSwitch 6850 Series and OmniSwitch 9000 Series The functionality described in this guide is subject to change without notice Copyright 2007 by Alcatel Lucent All rights reserved This document may not be reproduced in whole or in part without the express written permission of Alcatel Lucent Alcatel Lucent and the Alcatel Lucent logo are registered trademarks of Alcatel Lucent Xylan OmniSwitch OmniStack and Alcatel Lucent OmniVista are registered trademarks of Alcatel Lucent OmniAccess Omni Switch Router Policy View RouterView SwitchManager VoiceView WebView X Cell X Vision and the Xylan logo are trademarks of Alcatel Lucent This OmniSwitch product contains components which may be covered by one or more of the following U S Patents U S Patent No 6 339 830 U S Patent No 6 070 243 U S Patent No 6 061 368 U S Patent No 5 394 402 U S Patent No 6 047 024 U S Patent No 6 314 106 U S Patent No 6 542 507 U S Patent No 6 874 090 Alcatel Lucent 26801 West Agoura Road Calabasas CA 91301 818 880 3500 FAX 818 880 3505 support ind alcatel com US Customer Support 800 995 2696 Inter
116. R Invalid entry set The set ip routing command is not valid so the CLI error message states what the problem is Invalid entry and the carat indicates where the problem is located in the syntax Here the problem is with the set keyword so the carat is located under set The error message states the nature of the problem that set is an invalid entry In order to enable IP routing you must find another command keyword because set is not valid Prefix Recognition Prefix Recognition is a CLI feature that reduces redundant command line entry by storing prefix information for certain network commands When you configure network services you may have to enter the same command prefix multiple times Entering the same prefix again and again can be cumbersome and prone to error The prefix recognition feature addresses the problem of redundant command entry by allowing the CLI to store commonly used prefix information This prefix information stored by the switch then becomes part of the next CLI command entered The following command families support the prefix recognition feature e AAA e Interface e Link Aggregation e QOS e Spanning Tree e VLAN Management When certain commands are entered from one of these families the CLI will retain the prefix information in a memory buffer Then if a valid related command is entered next the CLI will assume the stored prefix is part of the next command In this case you are o
117. SMI RFC 1493 the IEEE 802 1D standard between Local Area Net RFC1215 MIB work LAN segments DVMRP STD MIB The MIB module for management of Distance Vector SNMPv2 SMI Draft 11 Multicast Routing Protocol DVMRP routers SNMPv2 TC SNMPv2 CONF SNMP FRAMEWORK MIB IF MIB ALCATEL IND1 BASE EE8023 LAG MIB Link Aggregation module for managing IEEE SNMPv2 SMI IEEE 802 3ad Standard 802 3ad SNMPv2 TC SNMPv2 CONF IF MIB Q BRIDGE MIB ENTITY MIB RFC 2737 Entity MIB Version 2 Standardized set of managed SNMPv2 SMI objects representing logical and physical entities and SNMPv2 TC relationships between them SNMPv2 CONF SNMP FRAMEWORK MIB EtherLike MIB Definitions of Managed Objects for the Ethernet like SNMPv2 SMI RFC 2665 Interface Types SNMPv2 CONF IF MIB HCNUM TC RFC 2856 An MIB module containing textual conventions for SNMPv2 SMI high capacity data types This module addresses an SNMPv2 TC immediate need for data types not directly supported in the SMIv2 This short term solution is meant to be deprecated as a long term solution is deployed IANAifType MIB This MIB module defines the IANAifType Textual SNMPv2 SMI Convention and thus the enumerated values of the SNMPv2 TC ifType object defined in the MIB II Table IANA RTPROTO MIB This MIB module defines the IANAipRouteProtocol SNMPv2 SMI and IANAipMRouteProtocol textual conventions for SNMPv2 TC use in MIBs which need to identify unicast or multi
118. StpNumber The Spanning Tree number identifying this instance vStpRootPortNumber The port ifindex of the port which offers the lowest cost path from this bridge to the root bridge for this spanning tree instance 28 mirrorConfigError mirmonPrima pmm The mirroring configuration rySlot failed on an NI This trap is sent mirmonPrima when any NI fails to configure ryPort mirroring Due to this error port mirroringSlot mirroring session will be termi mirroringPort nated mirMonErrorNi mirMonError mirmonPrimarySlot Slot of mirrored or monitored interface mirmonPrimaryPort Port of mirrored or monitored interface mirroringSlot Slot of mirroring interface mirroringPort Port of mirroring interface mirMonErrorNi The NI slot number mirMonError tThe Error returned by the NI which failed to configure Mirroring Monitoring 29 mirrorUnlikeNi mirmonPrima pmm The mirroring configuration is rySlot deleted due to the swapping of mirmonPrima different NI board type The Port ryPort Mirroring session which was mirroringSlot active on a slot cannot continue mirroringPort with the insertion of different NI mirMonErrorNi type in the same slot mirmonPrimarySlot Slot of mirrored or monitored interface mirmonPrimaryPort Port of mirrored or monitored interface mirroringSlot Slot of mirroring interface mirroringPort Port of mirroring interface mirMonErrorNi The NI slot number mirMonError tThe Error re
119. Switch Security Switch security is provided on the switch for all available management interfaces console Telnet HTTP FTP Secure Shell and SNMP The switch may be set up to allow or deny access through any of these interfaces Note that users attempting to access the switch must have a valid username and password In This Chapter This chapter describes how to set up switch management interfaces through the Command Line Interface CLI CLI commands are used in the configuration examples for more details about the syntax of commands see the OmniSwitch CLI Reference Guide An overview of switch security is given in this chapter In addition configuration procedures described in this chapter include e Configuring Authenticated Switch Access on page 8 6 e Setting Up Management Interfaces for ASA on page 8 9 e Configuring Accounting for ASA on page 8 12 A user login procedure requires that users are authenticated for switch access via an external authentica tion server or the local user database For information about setting up user accounts locally on the switch see Chapter 7 Managing Switch User Accounts For information about setting up external servers that are configured with user information see the Managing Authentication Servers chapter in the OmniSwitch 6800 6850 9000 Network Configuration Guide This chapter describes how to enable disable access for management interfaces For information abo
120. TP VLAN Tag Priority S Flip i Status Type Status Status Mobile Port p icon Status Ensbled hoclve Enabled Disabled Enabled inactive Enabled Disabled Enabled inactive Enabled Disabled Enabled hhacive Enabled Disabled Enabled Inactive Enabled Disabled Enadled Inactive Enabled Disabled Enabled Inactive Enabled Disabled Enabled knactive Enabled Disabled Enabled nacie Enabled Orsabled Enabled inactive Enabled Enabled kactive Enabled Enabled inacive Enabled Disabled Disabled Disabled Q 2 2 2 2 2 Q2 2 2 22 2 2 Enabled Inactive Enabled Disabled Disabled F z a Enabled kacime Enabled g ie Yunis PTT O itant Table Sort Feature Initial Sort OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 9 15 Configuring the Switch With WebView Using WebView Sort on a different column HB bto 1 10 295 79 2iwebjoorentfiogn herd Eo ums VLAN Administration q belie nea Admin Traffle Status Type ancat Taina t WebView s Operational Flat STP 1x1 STP Authentication IP VLANTag y Mobile Port Status Status Status Status al EARE mm mm ms mi Advanced Sorting VLAN 73 VLAN 1 VLAN 33 VLAN 31 VLAN 36 VLAN M Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Active Active In
121. Tag v Status De Status Status Status Mobile Port Link Aggregation A i Port Security Networking Policy Security System mi E 1 Enabled Active Enabled Enabled Disabled Disabled 73 Enabled Active Enabled Enabled Disabled Disabled Summary View naa Admin Status Flat STP Status 1x1 STP Status Add SVLAN Enabled Enabled gt Enabled 7 Modify Delete Refresh Apply Apply Apply Adding a New Entry To add a new entry to the table Table Configuration Page 1 Click Add on the Configuration page The Add window appears e g Add IP Static Route 2 Complete the fields then click Apply The new configuration takes effect immediately and the new entry appears in the table 3 Repeat steps 1 and 2 to add additional entries Zjhttp 10 255 73 12 Add VLAN Microsoft Internet Explorer Add VLANs vaN Description C Admin Status Enabled gt STP Status J Flat STP Status Enabled 1x1 STP Status Enabled Authentication Disabled VLAN Tag Mobile Port Status Disabled v Restore Cancel Help Internet Add Window E page 9 12 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using WebView Configuring the Switch With WebView Modifying an Existing Entry To modify an existing entry 1 Click on the checkbox to the left of the entry on the Configuration page and click Modify The Modify window appears
122. The functionality described in this chapter is supported on the OmniSwitch 6800 6850 and 9000 switches unless otherwise stated in the following Specifications table or specifically noted within any section of this chapter Telnet clients supported Any standard Telnet client FTP clients supported Any standard FTP client HTTP WebView clients supported Internet Explorer for Windows NT Windows XP and Windows 2000 version 6 0 Netscape for Windows NT Windows XP and Windows 2000 version 7 1 Netscape for Sun OS 2 8 version 4 79 Netscape for HP UX 11 0 version 4 79 Secure Shell clients supported Any standard Secure Shell client Secure Shell Version 2 Secure Shell DSA public key authentication Password DSA Public Key SNMP clients supported Any standard SNMP manager such as HP Open View Login Defaults Access to managing the switch is always available for the admin user through the console port even if management access to the console port is disabled Parameter Description Command Default Session login attempts allowed session login attempt 3 attempts before the TCP connection is closed Time out period allowed for session login timeout 55 seconds session login before the TCP connection is closed Inactivity time out period The session timeout 4 minutes length of time the switch can remain idle during a login session before the switch will clos
123. Tree SHOW BRIDGE VLAN VLAN SHOW NO MAC ADDRESS TABLE DEBUG Link Aggregation STATIC SHOW NO LINKAGG LACP Miscellaneous HTTP TRACEROUTE SNMP SHOW RMON PORT POLICY PING NO MAC RANGE MAC LANPOWER IP IPV6 ICMP HTTPS HRE HEALTH GMAP DEBUG CLEAR ARP AMAP 802 1X AAA amp Configuration Manager USER SHOW PASSWORD NO END USER DEBUG CONFIGURATION AVLAN AAA Interface TRAP SHOW NO INTERFACES FLOW DEBUG 10GIG IP Routing amp Multicast DEBUG VRRP3 VRRP TRACEROUTE6 SHOW PING6 NO IPV6 IP CLEAR QoS SHOW QOS POLICY NO DEBUG Debug UPDATE SHOW NO DEBUG page 5 6 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using the CLI Command Help Tutorial for Building a Command Using Help The Help feature allows you to figure out syntax for a CLI command by using a series of command line inquiries together with some educated guesses If you do not know the correct CLI command you can use the Help feature to determine the syntax This tutorial shows you how to use help to find the CLI syntax to create a VLAN This VLAN will be given the ID number 33 and will be named test vlan 2 1 At the command prompt enter vlan followed by a space and a question mark The following will display gt vlan A ROUTER lt num gt Vlan Manager Command Set PORT NO lt num gt Group Mobility Command Set 802 10 lt
124. Using the Switch as an FTP Server The switch can act as an FTP server for receiving files transferred from your workstation You can trans fer software files to the switch by using standard FTP client software located on a host workstation This is normally done to load or upgrade the switch software Workstation OmniSwitch The FTP Client software E on the Workstation sends a file from the Workstation to the OmniSwitch FTP Client FTP Server OmniSwitch FTP Server The following describes how to transfer files where the switch is acting as an FTP server 1 Log into the switch Use your workstation s FTP client software just as you would with any FTP application To log in to the switch start your FTP client Where the FTP client asks for Name enter the IP address of your switch Where the FTP client asks for User ID enter the username of your login account on the switch Where the FTP client asks for Password enter your switch password Note If you are using Authenticated Switch Access ASA the port interface must be authenticated for FTP use and the username profile must have permission to use FTP Otherwise the switch will not accept an FTP login For information about ASA refer to Chapter 8 Managing Switch Security OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 1 21 Loading Software onto the Switch Managing System Files 2 Specify the transfer mode If you a
125. WITH ANY OTHER PROGRAMS EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES END OF TERMS AND CONDITIONS page A 8 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Software License and Copyright Statements Third Party Licenses and Notices Appendix How to Apply These Terms to Your New Programs If you develop a new program and you want it to be of the greatest possible use to the public the best way to achieve this is to make it free software which everyone can redistribute and change under these terms To do so attach the following notices to the program It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty and each file should have at least the copy right line and a pointer to where the full notice is found lt one line to give the program s name and a brief idea of what it does gt Copyright C 19yy lt name of author gt This program is free software you can redistribute it and or modify it under the terms of the GNU General Public License as published by the Free Software Foundation either version 2 of the License or at your option any later version This program is distributed in the hope that it will be useful but WITHOUT ANY WARRANTY without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE See the GNU General Public License for more details You should have
126. WebView page is divided into four areas e Banner Used to access global options e g global help telnet and log out An icon is also displayed in this area to indicate the current directory Certified or Working Certified Working B Toolbar Used to access WebView features e Feature Options Used to access specific configuration options for each feature displayed in drop down menus at the top of the page e View Configuration Area Used to view configure a feature OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 9 5 WebView Overview Using WebView i osoft Interne ol x Fie Edt View Favorites Tools Help O O ha Gla kre OB SE LASS O O address Empo 73azwebkontenon SG Links Configuration Alcatel Lucent Aae Banner ation Help About Telnet Log Out Feature Options Chassis Home Refresh SiteMap Print About Chassis The Chassis Management feature provides detailed information about switch hardware and software including specific information for each switch in a stack if applicable The feature is also used to reboot reload a single switch an individual switch in a stack or all switches in a stack View Configuration Area System Information IP Address 10 255 73 12 Name vxTarget Chassis Type OmniSwitch 6850 Stackable Chassis Location Unknown Contact Alcatel Lucent http alcatel lucent comMwps portalienterprise UpT
127. You do not enter enough characters prior to Tab to uniquely identify the command keyword In this case pressing Tab will have no effect e You enter characters that do not belong to a keyword that can be used in this instance In this case pressing Tab will remove the characters and place the cursor back to its previous position e You enter enough characters prior to Tab to uniquely identify a group of keywords such that all keywords in the group share a common prefix In this case pressing Tab will cause the CLI to complete the common prefix and place the cursor at the end of the prefix Note that in this case no space is placed at the end of the keyword Note The keyword completion feature will accept wildcards Command Help The CLI has an internal help feature you can invoke by using the question mark character as a command The CLI help feature provides progressive information on how to build your command syntax one keyword at a time If you do not know the first keyword of the command you need you can use a question mark character at the CLI system prompt The CLI responds by listing command keywords divided into command sets You can find the first keyword for the command you need by referring to the list on your screen The follow ing is a partial display ee WHOAMI WHO VIEW VI VERBOSE USER UPDATE TTY TELNET6 TELNET SYSTEM SWLOG SSH6 SSH SHOW SFTP6 SFTP SESSION RZ RMDIR RM RENAME PWD PROMPT NTP NSLOOKUP NO NEWFS MV
128. ace policyTrapEventCode The code of the event OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 10 11 SNMP Overview Using SNMP No Trap Name Objects Family Description 9 chassisTrapsStr chassisTrapsStr chassis A software trouble report STR Level was sent by an application chassis encountering a problem during TrapsStrAp its execution pID chassisTrapsStr SnapID chassisTrapsStr fileName chassisTrapsStr fileLineNb chassisTrapsStr ErrorNb chassis TrapsStrcom ments chassisTrapsStr datalInfo chassisTrapsStrLevel An enumerated value that provides the urgency level of the STR chassisTrapsStrA ppID The application identification number chassisTrapsStrSnapID The subapplication identification number You can have multiple snapIDs per Sub application task but only one is to be used to send STRs chassisTrapsStrfileName Name of the source file where the fault was detected This is given by the C ANSI macro FILE __ The path shouldn t appear chassisTrapsStrfileLineNb Line number in the source file where the fault was detected This is given by the C ANSI macro LINE_ chassisTrapsStrErrorNb The fault identificator The error number identifies the kind the detected fault and allows a mapping of the data contained in chassisTrapsdatalnfo chassisTrapsStrcomments Comment text explaining the fault chassis TrapsStrdataInfo Additional data provided to help to find out the or
129. ace fsck and newfs These commands are used to check memory and delete groups of files Displaying Free Memory Space The freespace command displays the amount of free memory space available for use in the switch s file system You may issue this command from any location in the switch s directory tree gt freespace flash 16480256 bytes free Performing a File System Check The fsck command performs a file system check and can automatically repair any errors found It displays diagnostic information in the event of file corruption When you enter the command you must specify the flash directory as follows gt fsck flash The screen displays the following prompt Do you want fsck to automatically repair any errors found lt CR gt No Press Enter to skip repairing files or enter yes to start file repair If you enter yes the screen displays simi lar to the following flash disk check in progress flash Volume is OK total of clusters 14 773 of free clusters 9 621 of bad clusters 0 total free space 19 242 Kb max contiguous free space 7 454 720 bytes of files 28 of folders 4 total bytes in files 10 262 Kb of lost chains 0 total bytes in lost chains 0 Deleting the Entire File System The newfs command deletes the flash file system and all the files and directories contained in it This command is used when you want to reload all files in the file system Caution This command will
130. active Inactive Inactive Inactive Inactive Inactive Inactive Inactive Inactive Inactive Inactive Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Table Sort Feature Modified Sort Disabled Disabled Disabled Disabled OF Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled You can also customize a sort by defining primary and secondary sort criteria To define primary and secondary column sorts click on the Sort icon in the upper right corner of the table the column head ings are highlighted Next click on the primary and secondary column headings the numbers 1 and 2 appear in the primary and secondary columns Click again on the Sort icon to sort the table Click on the Clear icon to clear the sort settings You can sort up to four columns at one time Then click on the primary and secondary column Ora O FD mee Feree rr Address hetp 10 255 73 12iwebleorteetfiogn hem Soe MAN Configuration oye PR ox vies pots headings VLAN
131. age 7 22 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing Switch User Accounts Verifying the User Configuration Verifying the User Configuration To display information about user accounts configured locally in the user database use the show commands listed here show user Displays information about all users or a particular user configured in the local user database on the switch show user password size Displays the minimum number of characters that are required for a user password show user password expiration Displays the expiration date for passwords configured for user accounts stored on the switch show user password policy Displays the global password settings configured for the switch show user lockout setting Displays the global user lockout settings configured for the switch show end user profile Displays information about end user profiles show aaa priv hexa Displays hexadecimal values for command domains families For more information about the resulting displays from these commands see the OmniSwitch CLI Refer ence Guide An example of the output for the show user command is also given in Quick Steps for Network Administrator User Accounts on page 7 6 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 7 23 Verifying the User Configuration Managing Switch User Accounts page 7 24 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 8 Managing
132. al CLI term will be supported as valid CLI terms For example if privilege is defined as an alias as shown above both privilege and attrib will work as CLI commands and both words are shown when you use the CLI help feature You can save command aliases for the current user account by executing the user profile save command If the aliases are not saved they will be stored until the user session ends In this case once you log off the switch substitute terms configured with the alias command are destroyed To display aliases use the show alias command To set all alias values back to their factory defaults use the user profile reset command page 5 4 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using the CLI Command Help Partial Keyword Completion The CLI has a partial keyword recognition feature that allows the switch to recognize partial keywords to CLI command syntax Instead of typing the entire keyword you may type only as many characters as is necessary to uniquely identify the keyword then press the Tab key The CLI will complete the keyword and place the cursor at the end of the keyword When you press Tab to complete a command keyword one of four things can happen e You enter enough characters prior to Tab to uniquely identify the command keyword In this case pressing Tab will cause the CLI to complete the keyword and place a space followed by the cursor at the end of the completed keyword e
133. ame asc n snap Here the character holds the place of a number indicating the order in which the snapshot file name is generated For example the following syntax may generate a file named ase 1 snap gt configuration snapshot all Subsequent snapshot files without a name specified in the command syntax will become asc 2 snap asc 3 snap etc The following command produces a snapshot file with the name testfile snap gt configuration snapshot testfile snap Editing Snapshot Files Snapshot files can be viewed edited and reused as a configuration file You also have the option of editing the snapshot file directly using the switch s Vi text editor or you may upload the snapshot file to a text editing software application on your workstation The snapshot file contains both command lines and comment lines You can identify the comment lines because they each begin with the exclamation point character Comment lines are ignored by the switch when a snapshot file is being applied Comment lines are located at the beginning of the snapshot file to form a sort of header They also appear intermittently throughout the file to identify switch features or applications that apply to the commands that follow them OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 6 11 Creating Snapshot Configuration Files Working With Configuration Files Example Snapshot File Text The following is the text of a sample snapsho
134. amples below illustrate a few likely scenarios and explain how the running configuration working directory and certified directory interoperate to facilitate the software rollback on a single switch Note This information applies to a switch stack however the manner in which CMM software is propa gated to all switches in a stack is explained in Redundancy Scenarios on page 4 9 In the examples below R represents the running configuration W represents the working directory and C represents the certified directory Note For the following scenarios it is important to remember the difference between where the switch boots from and where the switch is running from See Where is the Switch Running From on page 4 4 for more information Scenario 1 Running Configuration Lost After Reboot Switch X is new from the factory It is plugged in and booted up from the certified directory the contents of which are loaded into the running configuration Since the working and certified directories are exactly the same the switch is running from the working directory Through the course of several days changes are made to the configuration file in the running configuration Power to the switch is interrupted the switch reboots from the certified directory all the changes in the running configuration are overwritten and the switch rolls back to the certified directory which in this case is the factory setting This is illustrated in
135. anaged objects for the IEEE 802 1X SNMPv2 SMI DOT1IX MIB subsystem SNMPv2 TC ALCATEL IND1 Definitions of managed objects for the Dynamic Rout SNMPv2 SMI DRCTM MIB ing and Control DRC subsystems SNMPv2 CONF ALCATEL IND1 Definitions of managed objects for the Distance Vector SNMPv2 SMI DVMRP MIB Multicast Routing Protocol DVMRP subsystem SNMPv2 CONF ALCATEL IND1 Definitions of managed objects for Group Mobility SNMPv2 TC GROUP MOBILITY SNMPv2 SMI MIB SNMPv2 CONF ALCATEL IND1 Definitions of managed objects for the Health Moni SNMPv2 SMI HEALTH MIB toring subsystem SNMPv2 CONF page 10 38 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using SNMP SNMP MIB Information MIB Name Description Dependencies ALCATEL IND1 IGMP Definitions of managed objects for the IPv4 Multicast SNMPv2 TC MIB MIB SNMPv2 SMI SNMPv2 COMNF INET ADDRESS MIB IF MIB ALCATEL IND1 Definitions of managed objects for the Interswitch SNMPv2 SMI INTERSWITCH Protocol i e GMAP XMAP subsystem SNMPv2 TC PROTOCOL MIB SNMPv2 CONF IF MIB ALCATEL IND1 Definitions of managed objects for the IP Stack sub SNMPv2 SMI IP MIB system SNMPv2 TC SNMPv2 COMNF IP MIB ALCATEL IND1 Definitions of managed objects for IP Multicast Route SNMPv2 SMI IPMRM MIB Manager IPMRM global configuration parameters SNMPv2 CONF ALCATEL IND1 Definitions of managed objects for the IP Multicast SNMPv
136. ancel page 4 14 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing CMM Directory Content Managing the Directory Structure Non Redundant Checking the Status of a Scheduled Reboot You can check the status of a reboot set for a later time by entering the following command gt show reload or gt show reload status The reload command is described in detail in the OmniSwitch CLI Reference Guide OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 4 15 Managing the Directory Structure Non Redundant Managing CMM Directory Content Copying the Running Configuration to the Working Directory Once the switch has booted and is running a user can modify various parameters of switch functionality These changes are stored temporarily in the running configuration in the RAM of the switch In order to save these changes the running configuration must be saved to the working directory as shown gi oi Primary CMM ed In this diagram 1 The switch boots from the certified directory and the software is loaded to the RAM to create a running configuration 2 Changes are made in the running configuration and are saved to the working directory Now the boot cfg file in the running configuration and the boot cfg file in the working directory are identi cal Should the switch go down or reboot the configuration changes made can be re
137. and 6850 switches only this process continues down the line until all switches in the stack are synchronized If the secondary CMM fails to boot properly then the contents of the secondary CMM s certified direc tory overwrite the new software on the working directory of the secondary CMM This has the effect of denying the attempted synchronization process This process copies the files in the certified directory of the primary CMM to the certified directory of the secondary CMM This prevents the secondary CMM from rebooting using incorrect or out of date soft ware should the primary CMM go down On a stack this command will synchronize all switches in a stack of OmniSwitch 6800 or OmniSwitch 6850 switches OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 4 27 Managing Redundancy in a Stack and CMM Managing CMM Directory Content To synchronize the secondary CMM to the primary CMM enter the following command at the prompt gt copy flash synchro The copy flash synchro command is described in detail in the OmniSwitch CLI Reference Guide Note When synchronizing the primary and secondary CMMs it is important to remember that the boot params file and the switch date and time are not automatically synchronized See the Getting Started Guide for information on the boot params file and Chapter 1 Managing System Files for information on setting the switch date and time The date and time are synchronize
138. and Multicast Filtering defined by IEEE 802 1D SNMPv2 TC SNMPv2 CONF SNMP FRAMEWORK MIB BRIDGE MIB P BRIDGE MIB RIPv2 MIB Routing Information Protocol RIP Version 2 MIB SNMPv2 SMI RFC 1724 Extension NMPv2 TC NMPv2 CONF NMPv2 SMI MPv2 TC MPv2 CONF MPv2 SMI MPv2 CONF MIB MPv2 SMI MP FRAME ORK MIB NMP TARGET B NMPv2 CONF nN RMON MIB RFC 2819 Remote Network Monitoring RMON Management Information Base Ann ZZ RS 232 MIB RFC 1659 Definitions of Managed Objects for RS 232 like Hardware Devices by using SMIv 2 HNN T2 2 SNMP COMMUNITY This MIB module defines objects to help support coex MIB RFC 2576 istence between SNMPv1 SNMPv2c and SNMPv3 EP N OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 10 35 SNMP MIB Information Using SNMP MIB Name Description Dependencies NMPv2 SMI NMPv2 TC SNMP FRAMEWORK An Architecture for Describing SNMP Management S S SNMPv2 CONF S S MIB RFC 2571 Frameworks SNMP MPD MIB Message Processing And Dispatching For The Simple RFC 2572 Network Management Protocol SNMP SNMP NOTIFICATION SNMP Applications Notifications SNMP Entity S MIB RFC 2573 Remote Configuration S MPv2 SMI MPv2 CONF MPv2 SMI MPy2 TC SNMPv2 CONF SNMP FRAMEWORK MIB SNMP TARGET B M SNMP PROXY MIB SNMP Applications Proxy SNMP Entity Remote SNMPv2 SMI RFC 2573 Con
139. and its licensors are third party beneficiaries of the License Agreement and the provisions related to the Run Time Module are made expressly for the benefit of and are enforceable by Wind River and its licensors M Network Time Protocol Version 4 The following copyright notice applies to all files collectively called the Network Time Protocol Version 4 Distribution Unless specifically declared otherwise in an individual file this notice applies as if the text was explicitly included in the file KKEKKKKKKK KK KK KK KK KKK KK KK KK KK KK KK KKK KK KK KK KK KK KK KK KKK KKKKKKKKKKKKKKKKK KK Copyright c David L Mills 1992 2003 Permission to use copy modify and distribute this software and its documentation for any purpose and without fee is hereby granted provided that the above copyright notice appears in all copies and that both the copyright notice and this permission notice appear in supporting documentation and that the name University of Delaware not be used in advertising or publicity pertaining to distribution of the software without specific written prior permission The University of Delaware makes no representations about the suitability this software for any purpose It is provided as is without express or implied warranty t 4 FF FF F FF F F OF F 4 F HF FF F F HF F HF F KKEKKKKKKK KK KK KK KK KKK KK KK KK KK KK KKK KKK KKK KK KK KK KK KK KKK KKKKKKKKKKKKKKK KK KK KK page A 12 OmniSwitch 680
140. are can be used to manage the switch The MIB browser you use depends on the design and management requirements of your network Detailed information on working with MIB browsers is beyond the scope of this manual However you must know the configuration requirements of your MIB browser or other NMS installation before you can define the system to the switch as an SNMP station Setting Up an SNMP Management Station An SNMP management station is a workstation configured to recetve SNMP traps from the switch You must identify this station to the switch by using the snmp station CLI command The following information is needed to define an SNMP management station e The IP address of the SNMP management station device e The UDP destination port number on the management station This identifies the port to which the switch will send traps e The SNMP version used by the switch to send traps e A user account name that the management station will recognize Procedures for configuring a management station can be found in Quick Steps for Setting Up An SNMP Management Station on page 10 4 SNMP Versions The SNMP agent in the switch can communicate with multiple managers You can configure the switch to communicate with different management stations by using different versions of SNMP The switch supports three versions of SNMP v1 v2 and v3 SNMPv1 SNMPv1 is the original implementation of the SNMP protocol and network management mo
141. ation on setting the switch date and time The date and time are synchronized using the system time and date synchro command page 4 26 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing CMM Directory Content Managing Redundancy in a Stack and CMM Synchronizing the Primary and Secondary CMMs If you have a secondary CMM in your switch it will be necessary to synchronize the software between the primary and secondary CMMs If the primary CMM goes down for example during a reboot then the switch fails over to the secondary CMM If the software in the secondary CMM is not synchronized with the software in the primary CMM the switch will not function as configured by the administrator The synchronization process is shown in the diagram below Working Certified p Certified Primary CMM 2 Secondary CMM Running In the above diagram 1 The primary CMM copies its certified directory to the secondary CMM working directory remember that you cannot copy files directly to the certified directory they must first be copied to the working direc tory 2 An automatic reboot is then triggered on the secondary CMM loading the new contents of the work ing directory to the running configuration in OmniSwitch 9000 switches only 3 Ifno problems exist then the working directory is automatically copied to the certified directory of the secondary CMM On OmniSwitch 6800
142. ation with OmniVista The community string carried in the SNMP PDU identifies the request as an SNMPv1 or SNMPv2 request The way the community string is handled on the switch is determined by the setting of the snmp community map mode command If the community map mode is enabled the community string is checked against the community strings database populated by the snmp community map command If the community map mode is disabled then the community string value is checked against the user data base In either case if the check fails the request is dropped For more information about configuring SNMP globally on the switch see Chapter 10 Using SNMP The next sections describe how to configure SNMP access for users Note the following e SNMP access cannot be specified for the admin user e When modifying a user s SNMP access the user password must be re entered or a new one config ured This is required because the hash algorithm used to save the password in the switch depends on the SNMP authentication level SNMP Access Without Authentication Encryption To give a user SNMP access without SNMP authentication required enter the user command with the no auth option For example to give existing user thomas SNMP access without SNMP authentication enter the following gt user thomas password techpubs no auth page 7 18 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing Switch User Accounts Set
143. ax a file called command log is automatically created in the switch s flash directory Once enabled configuration commands entered on the command line will be recorded to this file until command logging is disabled The command log file has a 66402 byte capacity This capacity allows up to 100 of the most recent commands to be recorded Because all CLI command logging information is archived to the command log file command history information will be lost if the file is deleted Note The command log file cannot be deleted while the command logging feature is enabled Before attempting to remove the file be sure to disable command logging To disable command logging refer to the information below Disabling Command Logging To disable the command logging simply enter the following command gt command log disable Disabling command logging does not automatically remove the command log file from the flash direc tory All commands logged before the command log disable syntax was entered remains available for viewing For information on viewing logged commands along with the command entry results refer to Viewing Logged CLI Commands and Command Entry Results on page 5 16 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 5 15 Logging CLI Commands and Entry Results Using the CLI Viewing the Current Command Logging Status As mentioned above the command logging feature is disabled by default To view whe
144. bView on the switch Changing the HTTP Port The default HTTP port is 80 the well known port number for Web servers You can change the port to a number in the range 0 to 65535 using the http port command Well known port numbers which are in the range 0 to 1023 cannot be configured Note All WebView sessions must be terminated before the switch will accept the command For example gt http port 2000 This command changes the HTTP port to 2000 To restore an HTTP port to its default value use the default keyword as shown below gt http port default Enabling Disabling SSL Force SSL is disabled by default Use the http ssl command to enable Force SSL on the switch For exam ple gt http ssl Use the no http ss command to disable Force SSL on the switch Use the show http command to view WebView status OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 9 3 WebView CLI Commands Using WebView As an alternative you can use the https keyword instead of the http keyword to enable Force SSL For example gt https ssl When using this format of the command use the no https server command to disable Force SSL on the switch Changing the HTTPS Port The default secure HTTP HTTPS port is 443 the well known port number for SSL You can change the port to a number in the range 0 to 65535 using the https port command Well known port numbers which are in the range 0 to 1023 cannot be co
145. be issued The following diagram illustrates the process that occurs when using a copy flash synchro command The stack shown is a three switch stack Switch 1 Bn Switch 2 Switch 3 W C gt W C 1 A copy flash synchro com mand is issued on the primary CMM switch i gt W C 2 The contents of the certified direc tory ofthe primary CMM switch are copied to the working directory of the secondary CMM switch The working directory is then 3 The contents of the certified direc tory of the pri mary CMM switch are copied to the working directory of additional switches The working directory is then copied to copied to the certi the certified direc fied directory tory Synchronizing Switches in a Stack The copy flash synchro command described in Synchronizing the Primary and Secondary CMMs on page 4 27 can be issued on its own or in conjunction with the copy working certified command described in Copying the Working Directory to the Certified Directory on page 4 26 Note It is important to certify the working directory and synchronize the stack as soon as the validity of the software is established Stacks booted from the working directory or unsynchronized stacks are at risk of mismanaging data traffic due to incompatibilities in different versions of switch software Certifying the wor
146. be specified for a primary reboot a secondary reboot or all currently scheduled reboots For example to cancel the primary reboot set above enter the following gt reload secondary cancel Secondary CMM Fail Over While rebooting the switch during normal operation a secondary CMM is installed the switch will fail over to the secondary CMM Fail over means the secondary CMM takes the place of the primary CMM This prevents the switch from ceasing functionality during the boot process In OmniSwitch 6800 and 6850 switches only when the primary switch CMM in a stack fails over the secondary switch takes over the primary function If the stack comprises three or more switches then the original primary switch becomes idle and the next available idle switch becomes the secondary CMM For more information on stacks see the Managing Stacks chapter found in both the OmniSwitch 6800 Hardware Users Guide and the OmniSwitch 6850 Hardware Users Guide However in OmniSwitch 9000 switches if the versions of the software on the primary and secondary CMM are not synchronized the NI modules on the switch will restart causing severe packet loss OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 4 25 Managing Redundancy in a Stack and CMM Managing CMM Directory Content Synchronizing the primary and secondary CMMs is done using the copy flash synchro command described in Synchronizing the Primar
147. ber state is not 2 3 or 4 The agent MUST always return other 1 for MAU type dot3 MauTypeAUI The value unknown 2 is returned when the MAU s true state is unknown for example when it is being initialized If the MAU is not jabbering the agent returns noJabber 3 This is the normal state If the MAU is in jabber state the agent returns the jabbering 4 value sessionAc cessType sessionUser Name sessionUserl pAddress sessionAuth Failure 35 sessionAuthenticationTrap sessionAccessType tThe access type of the session sessionUser Name The user name of the user logged in sessionUserIpAddress tThe IP address of the user logged in session An authentication failure trap is sent each time a user authentica tion is refused 36 trapAbsorptionTrap trapAbsor TraplId trapAbsor Counter trapAbsorTime trapAbsorStamp The time stamp of the absorbed trap trapAbsorTrapId tThe trap identifier of the absorbed trap trapAbsorStamp none trapAbsorCounter The number of the iterations of the absorbed trap trapAbsorTime tThe time stamp of the last iteration The absorption trap is sent when a trap has been absorbed at least once alaStack MegrSlotNI Number 37 alaStackMgrDuplicateSlotTrap chassis Two or more slots claim to have the same slot number alaStackMgrSlotNINumber The numbers allocated for the stack NIs are from 1 to 8 Note This trap is not supported on OmniSwitch 90
148. bes various rules and techniques that will help you use the CLI to its best advantage This chapter includes the following sections e CLI Overview on page 5 2 e Command Entry Rules and Syntax on page 5 3 e CLI Services on page 5 9 e Logging CLI Commands and Entry Results on page 5 15 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 5 1 CLI Specifications Using the CLI CLI Specifications The following table lists specifications for the Command Line Interface Configuration Methods e Online configuration via real time sessions using CLI commands e Offline configuration using text file holding CLI commands Command Capture Feature Snapshot feature captures switch configurations in a text file User Service Features Command Line Editing Command Prefix Recognition CLI Prompt Option Command Help Keyword Completion Command History up to 30 commands Command Logging up to 100 commands detailed information Syntax Error Display Alias Command Option More Command CLI Overview The CLI uses single line text commands that are similar to other industry standard switch interfaces However the Alcatel Lucent CLI is different from industry standard interfaces in that the Alcatel Lucent uses a single level command hierarchy Unlike other switch interfaces the Alcatel Lucent CLI has no concept of command modes Other CLIs require you to step your way down a tree type h
149. borCapabili ties A non pruning neighbor has been detected in an implementation dependent manner This trap is generated at most once per gen eration ID of the neighbor For example it should be generated at the time a neighbor is first heard from if the prune bit is not set It should also be generated if the local system has the ability to tell that a neighbor which sets the prune bit is not pruning any branches over an extended period of time The trap should be gen erated if the router has no other neighbors on the same interface with a lower IP address than itself dvmrpInterfaceLocalAddress The IP address this system will use as a source address on this interface On unnumbered interfaces it must be the same value as dvmrpInterfaceLocalAddress for some interfaces on the system dvmrpNeighborCapabilities This object describes the neighboring router s capabilities The leaf bit indi cates that the neighbor has only one interface with neighbors The prune bit indicates that the neighbor supports pruning The generationID bit indicates that the neighbor sends its generationID in Probe messages The mtrace bit indicates that the neighbor can handle mtrace requests page 10 16 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using SNMP SNMP Overview No Trap Name Objects Family Description 24 risingAlarm alarmIndex rmon An Ethernet statistical variable alarm Variable has exceeded its rising
150. cast routing mechanisms OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 10 33 SNMP MIB Information Using SNMP MIB Name Description Dependencies TEEE8021 PAE MIB This MIB modules defines 802 1X ports used for port SNMPv2 SMI based access control SNMPv2 TC SNMPv2 CONF SNMP FRAMEWORK MIB IF MIB IF MIB RFC 2863 The Interfaces Group MIB Contains generic SNMPv2 SMI information about the physical interfaces of the entity SNMPv2 TC SNMPv2 CONF SNMPv2 MIB IANAifType MIB IGMP STD MIB Internet Group Management Protocol MIB SNMPv2 SMI RFC 2933 SNMPv2 TC SNMPv2 CONF IF MIB INET ADDRESS MIB Textual Conventions for Internet Network Addresses SNMPv2 SMI RFC 2851 SNMPv2 TC IP BRIDGE MIB The Bridge MIB Extension module for managing SNMPv2 SMI RFC 2674 Priority and Multicast Filtering defined by IEEE SNMPv2 TC 802 1D SNMPv2 CONF BRIDGE MIB IP FORWARD MIB IP Forwarding Table MIB SNMPv2 SMI RFC 2096 SNMPv2 TC IP MIB SNMPv2 CONF IP MIB RFC 2011 SNMPv2 Management Information Base for the SNMPv2 SMI Internet Protocol by using SMIv2 Includes Internet SNMPv2 TC work Control Message Protocol ICMP SNMPv2 CONF IPv6 TC RFC 2465 This MIB defines the management information for SNMPv2 SMI IPv6 Textual conventions and general group SNMPv2 TC IPv6 ICMP MIB Management Information base for IPv6 Group SNMPv2 SMI RFC 2466 SNMPv2 C
151. cated on the switch in the flash working directory page 1 30 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing System Files Application Examples for File Management 7 Reboot the switch to register the security file Ksecu img The following will be displayed gt install Ksecu img renaming file temp img gt flash working Krelease img Installation of Ksecu img was successful The features and services supported by the Ksecu img image file are now available on the switch Creating a File Directory on the Switch In this example the user wants to store several test files on the switch for use at a later date The user has loaded the files into the switch s flash working directory by using FTP Rather than leaving the files in the working directory the user may want to create a new directory The following steps describe how to create a directory on the switch how to transfer files into the directory and how to list the files 1 Log onto the switch and use the mkdir command to create a new directory called resources gt mkdir resources gt 2 Verify that the new directory was created using the ls command The resources directory is listed gt Ils Listing Directory flash rw 308 Aug 12 13 33 boot params drw 2048 Aug 14 10 45 certified drw 2048 Aug 15 16 24 working rw 64000 Aug 15 16 19 swlogl log rw 64000 Aug 15 14 05 swlog2 log drw 2048 Sep 24 07 57 switch rw 3
152. ch use the scp sftp command to enable it The following syntax copies all of the image files in the working directory from a remote switch 172 17 11 13 to the local working directory gt scp admin 172 17 11 13 flash working img flash working admin s password for keyboard interactive method This second example helps copy all the image files from the user s current working directory to the remote switch s working directory A copy of all the image files will appear in the flash working directory of the remote switch 172 17 11 13 once the following command is executed gt scp flash working img admin 172 17 11 13 flash working admin s password for keyboard interactive method Note The sep command prompts you to enter the admin password On entering the admin password the names and the path of the files being copied will be displayed SCP is not supported between OmniSwitch and Windows in the current release Note You must have write privileges in order to execute the sep command Move an Existing File or Directory The move and mv commands have the same function and use the same syntax Use these commands to move an existing file or directory to another location You can specify the path and name for the file or directory being moved If no path is specified the command assumes the current path You can also specify a path and a new name for the file or directory being moved If no name is specified the existing name will
153. ch Management Guide December 2007 Using SNMP Verifying the SNMP Configuration Verifying the SNMP Configuration To display information about SNMP management stations trap management community strings and security use the show commands listed in the following table show snmp station Displays current SNMP station information including IP address UDP Port number Enabled Disabled status SNMP version and user account names show snmp community map Shows the local community strings database including status commu nity string text and user account name show snmp security Displays current SNMP security status show snmp statistics Displays SNMP statistics Each MIB object is listed along with its status show snmp mib family Displays SNMP MIB information Information includes MIP ID num ber MIB table name and command family show snmp trap replay Displays SNMP trap replay information This includes the IP address of the SNMP station manager that replayed each trap and the number of the oldest replayed trap show snmp trap filter Displays the current SNMP trap filter status This includes the IP address of the SNMP station that recorded the traps and the identifica tion list for the traps being filtered show snmp authentication trap Displays the current authentication failure trap forwarding status e enable or disable show snmp trap config Displays SNMP tra
154. ch Managing System Files Note FTPv6 sessions are supported only on the OmniSwitch 6850 or 9000 It is mandatory to specify the name of the particular IPv6 interface if the FTPv6 server has been specified using its link local address 3 Set the client to binary mode with the bin command Enter a valid user name and password for the host you specified with the ftp command A screen similar to the following is displayed Name Jsmith 331 Password required for Jsmith Password 230 User Jsmith logged in 4 After logging in you will receive the ftp gt prompt You may enter a question mark to view available FTP commands as shown here ftp gt Supported commands ascii binary bye cd delete dir get help hash Ls put pwd quit remotehelp user lpwd mput mget prompt lIs rea user These are industry standard FTP commands Their definitions are given in the following table ascii Set transfer type to ASCII 7 bit binary Set transfer type to binary 8 bit bye Close session gracefully cd Change to a new directory on the remote machine delete Delete a file on the remote machine dir Obtain a long listing on the remote machine get Retrieve a file from the remote machine hash Print the hash symbol for every block of data transferred This command toggles hash enabling and disabling help Displays a list of FTP commands and their definitions ls Display
155. ch as an FTP client you can use standard FTP commands You can use the switch ftp command to start an FTP session followed by the relevant IP address or host name and the ftp6 command to start an FTPv6 session followed by relevant IPv6 address or hostname over an IPv6 environment You have to specify the name of the particular IPv6 interface if the target has been specified using the link local address FTPv6 sessions can be established only from an OmniSwitch 6850 and 9000 Note If you are using Authenticated Switch Access ASA the port interface must be authenticated for FTP use and the username profile must have permission to use FTP Otherwise the switch will not accept an FTP login For information about ASA refer to Chapter 8 Managing Switch Security The following is an example of how to start an FTP session to an OmniSwitch with an IP address of 198 23 9 101 gt ftp 198 23 9 101 Connecting to 198 23 9 101 connected 220 cosmo FTP server UNIX r System V Release 4 1 ready Name You need to enter a valid user name and password for the host you specified with the ftp command after which you will get a screen similar to the following display Name Jsmith 331 Password required for Jsmith Password 230 User Jsmith logged in The following is an example of how to start an FTPv6 session to an OmniSwitch with an IPv6 address of fe80 a00 20ff fea8 8961 gt ftp6 fe80 a00 20ff fea8 8961 intfl Connec
156. ch system clock to a time that is offset from standard UTC time For example you can set a time that is offset from UTC by increments of 15 30 or 45 minutes You must indicate by a plus or minus character whether the time should be added to or subtracted from the system time To set a time that offsets UTC by adding 5 hours and 45 minutes use the following command gt system timezone 05 45 Note that four digits must be used to specify an offset for minutes and the minutes must be specified in 15 30 or 45 minute increments To specify the number of hours offset from UTC such as ten hours use the following command syntax gt system timezone 10 Values to specify hours for offset range from 13 through 12 Time To display the current local time for your switch use the system time command If you do not specify a new time in the command line the current system time is displayed as shown gt system time 17 08 51 PST To modify the switch s current system time enter the system time command When you specify the time you must use the hh mm ss syntax where hh is the hour based on a 24 hour clock The mm syntax repre sents minutes and ss represents seconds You must use two digits to specify the minutes and two digits to specify the seconds The following command will set the switch s system time to 10 45 00 a m gt system time 10 45 00 gt The following command will set the switch s system time to 3
157. ck will move back one hour on the fourth Sunday of September at 11 00 p m and move forward on the fourth Sunday of March at 11 00 a m the following command should be used gt system daylight savings time start fourth sun in Sept at 23 00 end fourth sun in march at 11 00 by 1 For more details on syntax for this command please refer to the OmniSwitch CLI Reference Guide You can also use the question mark character in the command syntax to invoke the CLI s help feature as described in the Using the CLI chapter of this manual Note By default Daylight Savings Time is disabled OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 1 39 Setting the System Clock Managing System Files Enabling DST When Daylight Savings Time DST is enabled the switch s clock will automatically set the default DST parameters for the time zone specified on the switch or for the custom parameters you can specify with the system daylight savings time command In this case it is not necessary to change the time setting on the switch when your time zone changes to and from DST To verify the DST parameters for your switch use the system daylight savings time command A screen similar to the following will be displayed gt system daylight savings time Daylight Savings Time DST is DISABLED PST Coordinated Universal Time UTC 8 hours Daylight Savings Time DST DST begins on the first sunday in april 4 7 at 2 0
158. command If a configuration file is located in another directory be sure to specify the full path For example gt configuration syntax check flash working asc 1 snap Viewing Generated Error File Contents For error details you can view the contents of a generated error file To view the contents of an error file use the more command For example gt more asc 1l snap l err For more information refer to Displaying a Text File on page 6 9 page 6 8 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Working With Configuration Files Configuration Files Overview Verbose Mode Syntax Checking When verbose is specified in the command line all syntax contained in the configuration file is printed to the console even if no error is detected When verbose is not specified in the command line cursory information number of errors and error log file name will be printed to the console only if a syntax or configuration error is detected To specify verbose mode enter the verbose keyword at the end of the command line For example gt configuration syntax check asc 1l snap verbose Displaying a Text File The more command allows you to view a text file one screen at a time Use this command with the desired filename Specifying a path is optional The following command will display the textfile rtf text file located in the flash working directory gt more flash working textfile rtf The sw
159. command see the OmniSwitch CLI Reference Guide page 7 6 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing Switch User Accounts Overview of User Accounts Quick Steps for Creating Customer Login User Accounts 1 Set up a user profile through the end user profile command For example configure a profile called Profile1 that specifies read write access to the physical and basic ip routing command areas gt end user profile Profilel read write physical basic ip routing 2 Specify ports to which the profile will allow access In this example Profile1 will be configured with access to ports on slot 1 and slot 2 gt end user profile Profilel port list 1 1 2 1 4 5 2 1 8 3 Specify VLANs or VLAN ranges to which the profile will allow access In this example Profile1 will be configured with access to VLANs 3 through 8 gt end user profile Profilel vlan range 3 8 Note Optional To verify the end user profile enter the show end user profile command The display is similar to the following End user profile Profilel Area accessible with read and write rights physical basic ip routing Slot 1 ports allowed 1 2 4 5 Slot 2 ports allowed 1 8 Vlan Id 3 8 For more information about the show end user profile command see the OmniSwitch CLI Reference Guide 4 Associate the profile with a user account Enter the user command with the relevant username and password and specify Profile
160. counter can occur at re ini tialization of the management system and at other times as indicated by the value of ifCounterDiscontinuity Time esmDrvTrapDrops Partitioned port separated due to errors 21 pimNeighborLoss pimNeigh ipmr Signifies the loss of adjacency borIfIndex with a neighbor device This trap is generated when the neighbor time expires and the switch has no other neighbors on the same interface with a lower IP address than itself pimNeighborIfIndex tThe value of ifIndex for the interface used to reach this PIM neighbor OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 10 15 SNMP Overview Using SNMP No Trap Name Objects Family 22 dvmrpNeighborLoss dvmrpInterface ipmr LocalAddress dvmrpNeigh borState Description A 2 way adjacency relationship with a neighbor has been lost This trap is generated when the neighbor state changes from active to one way ignor ing or down The trap is sent only when the switch has no other neighbors on the same interface with a lower IP address than itself dvmrpInterfaceLocalAddress The IP address this system will use as a source address on this interface On unnumbered interfaces it must be the same value as dvmrpInterfaceLocalAddress for some interfaces on the system dvmrpNeighborState State of the neighbor adjacency 23 dvmrpNeighborNotPruning dvmrpInterface ipmr LocalAddress dvmrpNeigh
161. ct Oct flash working 14 14 14 12 14 14 LT ETs LTs TE 10 1 03 14 12 14 16 54 54 s A newdir1 boot cfg Kbase img Ksecu img flash working newdir 14 17 14 14 17 14 a sf Copying an Existing Directory The cp r command recursively copies directories as well as any associated subdirectories and files Before using this command you should make sure you have enough memory space in your target direc tory to hold the new material you are copying Note Your login account must have write privileges to execute the ep r command In this example a copy of the working directory and all its contents will be created in the certified direc tory of OmniSwitch 6800 The destination directory must exist before the cp r command will work gt cp r flash working flash certified working Flash Directory Working Directory Files boot cfg Kbase img Ksecu img Certified Directory Files newdir1 Directory TE Working Directory Kos img Krelease img Ksecu img Files s r boot cfg newdir1 Directory Kbase img Ksecu img Note The directories on OmniSwitch 6850 and OmniSwitch 9000 switches are similar OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 1 13 File and Directory Management Managing System Files To verify the creation of the new directory use the Is r command to produce a list of the contents of the certified directory
162. ctory Any information in the running configuration that has not been saved to the working directory will be lost To reboot the switch from the certified directory with a completed CMM reload enter the following command at the prompt gt reload with fabric Note On OmniSwitch 9000 switches only the CPM CFM and CPU can be reset independently If the local remote fabric module is in up good state only the CPM will be reset If the local remote fabric module is in a down bad state then the complete CMM will be reloaded Scheduling a Reboot It is possible to cause a reboot of the primary or secondary CMM at a future time by setting time parame ters in conjunction with the reload command using the in or at keywords To schedule a reboot of the primary CMM in 3 hours and 3 minutes you would enter gt reload primary in 3 03 To schedule a reboot of the primary CMM for June 30 at 8 00pm you would enter gt reload primary at 20 00 june 30 Note Scheduled reboot times should be entered in military format i e a twenty four hour clock Cancelling a Scheduled Reboot To cancel a scheduled reboot use the cancel keyword A cancel command can be specified for a primary reboot a secondary reboot or all currently scheduled reboots For example to cancel the primary reboot set above enter the following gt reload primary cancel To cancel all scheduled reboots with a single command enter the following gt reload c
163. curred this field is zero Otherwise the first byte of this two byte OCTET STRING contains the error code and the second byte contains the subcode bgpPeerState The BGP peer connection state 20 esmDrvTrapDropsLink esmPortSlot interface This trap is sent when the Ether esmPortIF net code drops the link because ifInErrors of excessive errors ifOutErrors esmDrvTrap Drops esmPortSlot tThe physical slot number for this Ethernet Port The slot number has been added to be used by the private trap esmPortIF The on board interface number for this Ethernet port The port number has been added to be used by the private trap if nErrors For packet oriented interfaces the number of inbound packets that contained errors preventing them from being deliverable to a higher layer protocol For character oriented or fixed length interfaces the number of inbound transmission units that contained errors preventing them from being deliverable to a higher layer protocol Discontinuities in the value of this counter can occur at re initialization of the management sys tem and at other times as indicated by the value of ifCounterDiscontinuityTime ifOutErrors For packet oriented interfaces the number of outbound packets that could not be transmitted because of errors For character oriented or fixed length interfaces the number of outbound transmission units that could not be transmitted because of errors Discontinuities in the value of this
164. d Certificate Error Navigation Blocked Windows Internet Explorer oj x Geo od Te https 10 255 73 13 ll si Live Search 2j Fle Edit View Favorites Tools Help Ww abe Certificate Error Navigation Blocked g S Feeds 2 h Print v Page G Tools Hep lt i There is a problem with this website s security certificate The security certificate presented by this website was not issued by a trusted certificate authority The security certificate presented by this website was issued for a different website s address Security certificate problems may indicate an attempt to fool you or intercept any data you send to the server We recommend that you close this webpage and do not continue to this website Click here to close this webpage Continue to this website not recommended More information Click on Continue to this website not recommended to continue the browser session A certificate error message similar to the one shown below will appear at the top of the WebView browser window Certificate Error At this point you can decide to do one of the following e Ignore the certificate error message and log into WebView Note that by doing so the certificate error message will always appear at the top of every WebView browser window or e Follow the steps below to install the Alcatel Lucent self signed certificate in the Trusted Root Certifi cation Authoriti
165. d manuals For more information on Alcatel Lucent s Service Programs see our web page at service esd alcatel lucent com call us at 1 800 995 2696 or email us at support ind alcatel com OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page xix page xx OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 1 Managing System Files This chapter describes the several methods of transferring software files onto the OmniSwitch and how to register those files for use by the switch This chapter also describes several basic switch management procedures and discusses the Command Line Interface CLI commands used e File Management copy secure copy edit rename remove change and display file attributes e Directory Management create copy move remove rename and display directory information e System Date and Time set system clock CLI commands are used in the configuration examples for more details about the syntax of commands see the OmniSwitch CLI Reference Guide In This Chapter Configuration procedures described in this chapter include e Loading Software onto the Switch on page 1 21 e Creating a File Directory on the Switch on page 1 31 e Registering Software Image Files on page 1 28 e Setting the System Clock on page 1 37 For related information about connecting a terminal to the switch see your Getting Started Guide For information about switch command privil
166. d using the system time and date synchro command Synchronizing the System Date and Time To synchronize the system date and time use the system time and date synchro command This command synchronizes the secondary CMM date and time to the primary CMM date and time Enter the command as shown gt system time and date synchro CMM Switching Fabric Each OS9000 CMM module contains hardware and software elements to provide management functions for the OS9000 system The OS9000 CMM module also contains the switch fabric for the OS9000 system User data flowing from one NI module to another passes through the switch fabric The OS9000 will operate with one or two CMM modules installed If there are two CMM modules one management processor is considered primary and is actively managing the system The other management processor is considered secondary and remains ready to quickly take over management in the event of hardware or software failure on the primary In the event of a failure the two processors exchange roles and the secondary takes over as primary The switch fabric on the CMM operates independently of the management processor If there are two CMM modules installed both fabric modules are normally active Two CMM modules must be installed in the OS9000 to provide full fabric capacity If there is one CMM module installed then there is a single management feature and performance as a dual CMM system but there is
167. del It is characterized by the Get Set GetNext and Trap protocol operations SNMPv1 uses a rudimentary security system where each PDU contains information called a community string The community string acts like a combination username and password When you configure a device for SNMP management you normally specify one community string that provides read write access to objects within the device and another community string that limits access to read only If the community string in a data unit matches one of these strings the request is granted If not the request is denied page 10 8 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using SNMP SNMP Overview The community string security standard offers minimal security and is generally insufficient for networks where the need for security is high Although SNMPv1 lacks bulk message retrieval capabilities and secu rity features it is widely used and is a de facto standard in the Internet environment SNMPv2 SNMPv2 2 is a later version of the SNMP protocol It uses the same Get Set GetNext and Trap operations as SNMPv1 and supports the same community based security standard SNMPv1 is incompatible with SNMPv2 2 in certain applications due to the following enhancements e Management Information Structure SNMPv2 includes new macros for defining object groups traps compliance characteristics and capability characteristics Protocol Operations SNMPv2 has
168. delete all of the switch s system files All configurations programmed into the switch will be lost Do not use this command unless you are prepared to reload all files page 1 20 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing System Files Loading Software onto the Switch Loading Software onto the Switch There are three common methods for loading software to and from your switch The method you use depends on your workstation software your hardware configuration and the location and condition of your switch These methods are discussed here e FTP Server You can use the switch as an FTP server If you have FTP client software on your work station you can transfer a file to the switch via FTP This is normally done to load or upgrade the switch s software or configurations For details see Using the Switch as an FTP Server on page 1 21 e FTP Client You can use the switch as an FTP client by connecting a terminal to the switch s console port and using standard FTP commands This feature is useful in cases where you do not have access to a workstation with an FTP client For details see Using the Switch as an FTP Client on page 1 23 e Zmodem Y ou can load software directly through the serial port with any terminal emulator that supports the Zmodem protocol Note that a Zmodem transfer of large files may take several minutes to complete For details see Using Zmodem on page 1 27
169. described Many chapters include tutorials or application examples that help convey how CLI commands can be used together to set up a particular feature Documentation Roadmap The OmniSwitch user documentation suite was designed to supply you with information at several critical junctures of the configuration process The following section outlines a roadmap of the manuals that will help you at each stage of the configuration process Under each stage we point you to the manual or manuals that will be most helpful to you Stage 1 Using the Switch for the First Time Pertinent Documentation Getting Started Guide Release Notes A hard copy Getting Started Guide is included with your switch this guide provides all the information you need to get your switch up and running the first time It provides information on unpacking the switch rack mounting the switch installing NI modules unlocking access control setting the switch s IP address and setting up a password It also includes succinct overview information on fundamental aspects of the switch such as hardware LEDs the software directory structure CLI conventions and web based management At this time you should also familiarize yourself with the Release Notes that accompanied your switch This document includes important information on feature limitations that are not included in other user guides OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page xv S
170. directory of the secondary CMM switch The working directory is then copied to the certi fied directory Powering Up a Stack 3 The contents of the certified direc tory of the pri mary CMM switch are copied to the working directory of addi tional switches The working direc tory is then copied to the certified directory OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 4 9 CMM Files Managing CMM Directory Content This process occurs automatically when the switch boots The working and certified directory relationship described above in Software Rollback Feature on page 4 4 still applies to the primary CMM switch Generally speaking the switch assigned the lowest stack number is the primary CMM switch the switch with the next lowest stack number is the secondary CMM switch and all other switches are idle For more information on stack numbering see the OmniSwitch 6800 Hardware Users Guide and the OmniSwitch 6850 Hardware Users Guide Scenario 2 Rebooting from the Working Directory Since changes to the boot cfg file and new img files are initially saved to the working directory some times it is necessary to boot from the working directory to check the validity of the new files The follow ing diagram illustrates the synchronization process of a working directory reboot The stack displayed is a three switch stack Switch 1 a Switch 2 Switch 3
171. directory was created or copied on April 19 at 06 12 hours The column on the right lists the file or directory name Note that directory names end with a slash character drw 512 Oct 25 14 17 WORKING rw 321 Oct 25 14 39 boot params Here the first entry shows a directory named WORKING the second entry shows a file named boot params The value shown at the bottom of the display indicates the amount of flash memory remaining for use in this directory 9 47 megabytes in the above example page 1 6 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing System Files File and Directory Management Using Wildcards Wildcards allow you to substitute symbols or for text patterns while using file and directory commands The asterisk takes the place of multiple characters and the question mark character takes the place of single characters More than one wildcard can be used within a single text string Multiple Characters An asterisk is used as a wildcard for multiple characters in a text pattern The following command will list all entries in the current directory that end with the log extension gt ls 10g Listing Directory flash rw 64000 Sep 21 19 49 swlogl log rw 64000 Aug 12 19 06 swlog2 log The following command lists all entries in the current directory that contain the i character P SV AES Listing Directory flash drw 2048 Aug 21 17 49 certified drw 2048 Aug 12 18
172. dmin Access type telnet Access port NI IP address 148 211 11 02 0x00000000 0x00000000 Oxffffffff Oxffffffff Read only rights Read Write rights Read only domains None Read only families Read Write domains All Read Write families This display indicates that the user is currently logged in as session number 4 under the username admin using a Telnet interface from the IP address of 148 211 11 02 Session Number User name Access type Access port Ip Address Read only rights Read Write rights Read only domains Read only families Read Write domains Read Write families The session number assigned to the user User name Type of access protocol used to connect to the switch Switch port used for access during this session User IP address The hexadecimal value of privileges configured for the user The hexadecimal value of privileges configured for the user The command domains available with the user s read only access See the table beginning on page 5 22 for a listing of valid domains The command families available with the user s read only access See the table beginning on page 5 22 for a listing of valid families The command domains available with the user s read write access See the table beginning on page 5 22 for a listing of valid domains The command families available with the user s read write access See the table beginning on page 5 22 for a listing of
173. dundancy Protocol VRRP SNMPv2 TC SNMPv2 CONF IF MIB OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 10 37 SNMP MIB Information Using SNMP Enterprise Proprietary MIBs The following table lists the enterprise proprietary MIBs supported by the OmniSwitch 6800 6850 9000 Note The ALCATEL IND1 BASE MIB is required for all MIBs listed in this table MIB Name Description Dependencies ALCATEL IND1 Definitions of managed objects for the Authentication SNMPv2 SMI AAA MIB Authorization and Accounting AAA subsystem SNMPv2 TC SNMP v2 CONF ALCATEL IND1 BASE This module provides base definitions for modules SNMPv2 SMI developed to manage Alcatel Lucent Internetworking networking infrastructure products ALCATEL IND1 Definitions of managed objects for the Border Gate SNMPv2 SMI BGP MIB way Protocol BGP subsystem SNMPv2 CONF ALCATEL IND1 Definitions of managed objects for the Chassis Man SNMPv2 SMI CHASSIS MIB agement subsystem SNMPv2 TC SNMPv2 CONF SNMP FRAMEWORK MIB ENTITY MIB ALCATEL IND1 Definitions of managed objects for the Configuration SNMPv2 SMI CONFG MGR MIB Manager subsystem SNMPv2 TC SNMPv2 CONF ALCATEL IND1 Definitions of chassis and modules SNMP SMI DEVICES ALCATEL IND1 Definitions of managed objects for the IEEE 802 1Q SNMPv2 SMI DOT1Q MIB subsystem SNMPv2 TC SNMPv2 CONF ALCATEL IND1 Definitions of m
174. e Errors 3 Log file name cfg_txt l err In this case the error message indicates that the application attempt was unsuccessful It also indicates that the switch wrote log messages into a file named efg_txt 1 err which now appears in your flash direc tory To view the contents of a generated error file use the view command For example view cfg_txt 1 err Note The keyword authkey along with a related alpha numeric text string are automatically included in many snapshot files e g configuration snapshot all The text string following the authkey keyword represents a login password that has been encrypted twice The first encryption occurs when a password is first created by a user the second encryption occurs when a configuration snapshot is taken This dual encryption further enhances switch security However it is important to note that any configuration file including a generated snapshot that includes this dual encrypted password information will result in an error whenever it is applied to the switch via the configuration apply command This is a valid switch function and does not represent a significant problem If an authkey related error is the on y error detected simply remove all authkey related syntax using a text editor If a new password is required for the switch include valid password syntax in the configuration file or immediately issue a new password using the password command at the command prompt For more inf
175. e flash file directory as shown in the directory on page 1 8 and that you want to move down the directory tree to the certified directory gt pwd flash gt cd certified gt To verify that your current directory has changed to flash certified use the pwd command and the following will be displayed gt pwd flash certified To move up the directory tree use the cd command Enter cd ed dot dot without specifying a direc tory name and your current directory will move up one directory level If you enter cd without the dots your current directory will move to the top of the tree The following example shows the cd command used where the current directory is flash certified gt pwd flash certified gt cd gt To verify that your current directory has moved up the directory tree use the pwd command to display your location The display shows you have moved up one level from the flash certified directory and that your current directory is flash gt pwd flash If you use the ed command while you are at the top of the directory tree the cd command will have no effect on the location of your login In other words if you use ed while your current directory is flash your current directory will remain flash after you execute the cd command OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 1 9 File and Directory Management Managing System Files Displaying Directory Co
176. e Minimum password character requirements e Password expiration e Password history e Minimum password age In addition to global password settings the switch also includes global user lockout settings that deter mine when a user account is locked out of the switch and the length of time the user account remains locked See Configuring Password Policy Settings on page 7 12 and Configuring Global User Lockout Settings on page 7 15 for more information page 7 8 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing Switch User Accounts Overview of User Accounts How User Settings Are Saved Unlike other settings on the switch user settings configured through the user and password commands are saved to the switch configuration automatically These settings are saved in real time in the local user database At bootup the switch reads the database file for user information rather than the boot cfg file The write memory copy running config working or configuration snapshot commands are not required to save user or password settings over a reboot Note Password settings configured through the user password policy commands are not automatically saved to the switch configuration For information about using the write memory copy running config working and configuration snapshot commands see Chapter 4 Managing CMM Directory Content Chapter 6 Working With Configuration Files and
177. e a lockout thresh old number use the user lockout threshold command For example gt user lockout threshold 3 Note that a locked user account is automatically unlocked when the lockout duration time see Configur ing the User Lockout Duration Time on page 7 16 is reached or the admin user manually unlocks the user account Configuring the User Lockout Duration Time The user lockout duration time specifies the number of minutes a user account remains locked until it is automatically unlocked by the switch This period of time starts when the user account is locked out of the switch Note that at any point during the lockout duration time the admin user can still manually unlock the user account By default the user lockout duration time is set to 0 this means that there is no automatic unlocking of a user account by the switch The locked user account remains locked until it is manually unlocked by the admin user To configure a lockout duration time use the user lockout duration command For example gt user lockout duration 60 Do not configure a lockout duration time that is less than the lockout window time period see Configur ing the User Lockout Window on page 7 15 Manually Locking and Unlocking User Accounts The user lockout unlock command is used to manually lock or unlock a user account This command is only available to the admin user or a user who has read write access privileges to the switch To
178. e information about these commands see the OmniSwitch CLI Reference Guide page 1 36 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing System Files Setting the System Clock Setting the System Clock The switch clock displays time by using a 24 hour clock format It can also be set for use in any time zone Daylight Savings Time DST is supported for a number of standard time zones DST parameters can be programmed to support non standard time zones and time off set applications All switch files and directories listed in the flash directory bear a time stamp This feature is useful for file management purposes Setting Date and Time You can set the local date time zone and time for your switch or you can also set the switch to run on Universal Time Coordinate UTC or GMT If applicable you can also configure Daylight Savings Time DST or Summertime parameters Note If you have multiple switches in a stack you must set the date and time on both the primary and the secondary switch Otherwise if you experience a fail over situation the secondary switch s time and date will not match You can use the takeover command to switch between primary and secondary switches to set time and date For more information on redundancy refer to Chapter 4 Managing CMM Directory Content Date To display the current system date for your switch use the system date command If you do not specify a new date in
179. e new directory Other wise the new directory will be created in your current directory The syntax for this command requires a slash and no space between the path and the new directory name Also a slash is required at the beginning of your path specification Note Your login account must have write privileges to execute the mkdir command The following command makes a new directory in the working directory on the OmniSwitch 6800 gt mkdir flash working newdirl Flash Directory Working Directory Files Ksecu img Kbase img boot cfg newdir1 Directory This drawing represents the content of the flash working directory after the new directory is added Note The output on OmniSwitch 6850 and OmniSwitch 9000 switches is similar page 1 12 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing System Files File and Directory Management Displaying Directory Contents Including Subdirectories The Is r command displays the contents of your current directory in addition to recursively displaying all subdirectories The following example shows the result of the Is r command where the flash working directory contains a directory named newdir1 Be sure to include a space between Is and r gt ls r flash working Listing Directory drw drw drw rw rw rw 2048 2048 2048 2636 123574 123574 Oct Oct Oct Oct Oct Oct Listing Directory drw drw 2048 2048 O
180. e primary switch in the stack The primary switch manages the current switch operations while the secondary switch provides backup also referred to as fail over Additional switches in a stack are set to idle for the purposes of redundancy For more information on managing a stack of switches see the Managing Stacks chapter found in both the OmniSwitch 6800 Hardware Users Guide and the OmniSwitch 6850 Hardware Users Guide When two CMMs are running in an OmniSwitch 9000 switch one CMM has the primary role and the other has the secondary role at any given time The primary CMM manages the current switch operations while the secondary CMM provides backup also referred to as fail over Redundancy Scenarios The following scenarios demonstrate how the CMM software is propagated to other switches in a stack for the purposes of coherent redundancy In the examples below W represents the working directory and C represents the certified directory Scenario 1 Booting the Stack The following diagram illustrates what occurs when a stack powers up The stack displayed is a three switch stack Switch 1 W C Switch 2 1 Stack is pow ered up and boots from the certified directory W C Switch 3 p W C 2 The contents of the certified direc tory of the primary CMM switch are copied to the working
181. e source for example a radio clock NTP can use any time source to synchronize time in the network Using NTP in a Network NTP operates on the premise that there is one true standard time defined by UTC and that if several servers claiming synchronization to the standard time are in disagreement then one or more of them must be out of synchronization or not functioning correctly The stratum gradiation is used to qualify the accu racy of a time source along with other factors such as advertised precision and the length of the network path between connections NTP operates with a basic distrust of time information sent from other network entities and is most effective when multiple NTP time sources are integrated together for checks and crosschecks To achieve this end there are several modes of operation that an NTP entity can use when synchronizing time in a network These modes help predict how the entity behaves when requesting or sending time information listed below e A switch can be a client of an NTP server usually of a lower stratum receiving time information from the server but not passing it on to other switches e A switch can be a client of an NTP server and in turn be a server to another switch or switches e A switch regardless of its status as either a client or server must be peered with another switch Peer ing allows NTP entities in the network of the same stratum to regard each other as reliable sources of time
182. e the session OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 2 3 Login Defaults Logging Into the Switch The following table describes the maximum number of sessions allowed on an OmniSwitch Session OS 9000 OS 6850 OS 6800 supports only v4 Telnet v4 or v6 FTP v4 or v6 4 4 4 SSH SFTP v4 or v6 secure 8 8 8 sessions HTTP 4 4 4 Total Sessions 20 20 20 SNMP 50 50 50 page 2 4 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Logging Into the Switch Quick Steps for Logging Into the Switch Quick Steps for Logging Into the Switch The following procedure assumes that you have set up the switch as described in your OmniSwitch Getting Started Guide and Hardware Users Guide Setup includes e Connecting to the switch via the console port e Setting up the Ethernet Management Port EMP through the switch s boot prompt e Enabling or unlocking management interfaces types Telnet FTP HTTP SNMP and Secure Shell through the aaa authentication command for the interface you are using Note that Telnet FTP and Secure Shell are used to log into the switch s Command Line Interface CLI For detailed infor mation about enabling session types see Chapter 8 Managing Switch Security 1 Ifyou are connected to the switch via the console port your terminal will automatically display the switch login prompt If you are connected remotely
183. e will cause any existing error file to be overwritten Syntax Checking The configuration syntax check command is used to detect potential syntax errors contained in a configuration file before it is applied to the switch It is recommended that you check all configuration files for syntax errors before applying them to your switch To run a syntax check on a configuration file use the configuration syntax check command For example gt configuration syntax check asc 1l snap Errors 3 Log file name check asc 1l snap l err In this example the proposed ase 1 snap configuration file contains three errors As with the configuration apply command an error file err is automatically generated by the switch whenever an error is detected By default this file is placed in the root flash directory Note The syntax mac alloc is automatically included in many snapshot files e g configuration snapshot all All mac alloc related syntax is valid during switch boot up only 1 e it cannot be applied while the switch is in run time operation Because snapshot files are commonly used as configuration files syntax checks may detect mac alloc syntax and issue an error along with a generated err file This is a valid switch function and does not represent a significant problem If a mac alloc related error is the only error detected simply remove the syntax using a text editor then re check the file using the configuration syntax check
184. eated the VLAN ID is 33 and the name is test vlan 2 page 5 8 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using the CLI CLI Services CLI Services There are several services built into the CLI that help you use the interface The Command Line Editing service makes it easy for you to enter and edit repetitive commands Other CLI services such as syntax checking command help prefix prompt and history assist you in selecting and using the correct command syntax for the task you are performing Command Line Editing CLI commands are entered from your keyboard and are executed when you press Enter The CLI also has several editing features that make it easier for you to enter the correct commands either by allowing you to correct entry mistakes or by helping you enter the correct command Deleting Characters You can delete CLI command characters by using the Backspace key or the Delete key The Backspace key deletes each character in the line one at a time from right to left Note the following command entry gt show macrocode The correct syntax is show microcode To change the spelling in this entry use the Backspace key to delete all of the characters after the m gt show m Type the correct syntax then press Enter to execute the command To change incorrect syntax with the Delete key use the Left Arrow key to move the cursor to the left of the character to be deleted then use the D
185. econds Delay 0 016 seconds Offset 180 232 seconds Dispersion 7 945 seconds Root distance 0 026 Precision 14 Reference IP 209 81 9 7 Status configured reachabl rejected Uptime count 1742 seconds Reachability 1 Unreachable count 0 Stats reset count 1680 seconds Packets sent 1 Packets received 1 Duplicate packets 0 Bogus origin 0 Bad authentication 0 Bad dispersion 0 Last Event peer changed to reachable 4 You can check the list of servers associated with this client using the show ntp client server list command as shown gt show ntp client server list IP Address Ver Key St Delay Offset Disp 1 2 5 6 4 0 2 0 06 0 673 0 017 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 3 3 NTP Quick Steps Configuring Network Time Protocol NTP 5 You can check the client configuration using the show ntp client command as shown gt show ntp client Current time THU SEP 15 2005 17 44 54 UTC Last NTP update THU SEP 15 2005 17 30 54 Client mode enabled Broadcast client mode disabled Broadcast delay microseconds 4000 page 3 4 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Configuring Network Time Protocol NTP NTP Overview NTP Overview Network Time Protocol NTP is used to synchronize the time of a computer client or server to another server or reference time source such as a radio or
186. ection OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 2 19 Modifying the Login Banner Logging Into the Switch Modifying the Login Banner The Login Banner feature allows you to change the banner that displays whenever someone logs into the switch This feature can be used to display messages about user authorization and security You can display the same banner for all login sessions or you can implement different banners for different login sessions You can display a different banner for logins initiated by FTP sessions than for logins initiated by a direct console or a Telnet connection The default login message looks similar to the following login userl23 password Welcome to the Alcatel Lucent OmniSwitch 6000 Software Version 6 3 1 733 R01 Development October 05 2007 Copyright c 1994 2007 Alcatel Lucent All Rights reserved OmniSwitch TM is a trademark of Alcatel Lucent registered in the United States Patent and Trademark Office Here is an example of a banner that has been changed login userl123 password Welcome to the Alcatel Lucent OmniSwitch 6000 Software Version 6 3 1 733 R01 Development October 05 2007 Copyright c 1994 2007 Alcatel Lucent All Rights reserved OmniSwitch TM is a trademark of Alcatel Lucent registered in the United States Patent and Trademark Office KKK KK KK KKK LOGIN ALERT KAEKKKKKKKKKKKKK KKK KK KK KK This switch i
187. ectory to working directory 4 22 4 27 running configuration to working directory 4 16 working directory to certified directory 4 21 4 26 displaying current configuration 4 23 4 30 displaying switch files 4 24 image files 4 3 managing 4 13 rebooting 4 13 4 25 rebooting from the working directory 4 18 4 26 running configuration 4 3 4 4 scheduling a reboot 4 14 4 25 specifications 4 2 swapping primary for secondary 4 29 synchronizing primary and secondary 4 26 4 27 working directory 4 3 CMM Conditions verify information about 4 33 CMM scenarios 4 5 lost running configuration 4 5 rollback to previous software 4 8 running configuration saved to working directory 4 6 working directory saved to certified directory 4 7 Command Line Interface see CLI community strings 10 27 configuration apply command 6 2 6 4 for a specific timeperiod 6 5 configuration cancel command 6 7 configuration error file limit command 6 8 configuration file application examples 6 2 specifications 6 2 configuration files 4 3 5 3 errors 6 7 configuration snapshot all command 6 12 configuration syntax check 6 8 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Index 1 Index console port 2 6 copy certified working command 4 22 copy flash synchro command 4 28 copy running config working command 4 17 copy working certified flash synchro command 4 26 cp command 4 32 customer login user accounts application examples 7 7 D date 1 37
188. ecu img Krelease img Base or Optional Software Optional Advanced Routing Base Software Base Software Base Software Base Software Optional Security Base Software Description Advanced Routing Base Software Diagnostics Ethernet Images Operating System Security AVLANS Release Archive Note Some OmniSwitch 6800 Series switches may also have AKdiag img and DKdiag img image files in flash memory These files can result from the manufacturing process and are not needed for the switch to function Therefore they can be safely deleted This table lists the image files for the OmniSwitch 6850 Series switches Most of the files listed here are part of the base switch configuration Files that support an optional switch feature are noted in the table Archive File Name Kadvrout img Kbase img K2diag img Keni img K2os img Ksecu img Krelease img Base or Optional Software Optional Advanced Routing Base Software Base Software Base Software Base Software Optional Security Base Software Description Advanced Routing Base Software Diagnostics Ethernet Images Operating System Security AVLANS Release Archive This table lists the image files for the OmniSwitch 9000 switches Most of the files listed here are part of the base switch configuration Files that support an optional switch feature are noted in the table Archive File Name Jadvrout img Jbase img Jdiag img Jeni img Jos img Jq
189. eed to understand the various methods of loading files onto the switch for software upgrades and new features Once the files are on the switch the CLI has commands that allow you to load copy and delete these files The CLI also has commands for displaying creating and editing ASCII files directly on the switch You may also want to establish a file directory structure to help organize your files on the switch All the files and directories on the switch bear a time stamp This is useful for switch administration because the time stamp allows you to tell at a glance which files are the most recent You can set the system clock that controls these time stamps as well as other time based switch functions File Transfer The switch can receive and send files by using industry standard local and remote transfer methods Each of these methods is defined and explained Because file transfers can involve logging onto the switch from a remote host security factors such as DNS resolver and Authenticated Switch Access requirements should be considered User s Host OmniSwitch J E File Transfer from User s Host to the OmniSwitch File Transfer to OmniSwitch It is not enough to simply transfer a file onto the switch Once files are on the switch they must be registered in order to become functional The OmniSwitch has a directory structure that allows you to install new software while maintaining a backup copy of your old config
190. eeee 4 16 Rebooting from the Working Directory cccccccescceeseeeneceeteeeeseeeeeeseeeeeeenseeensees 4 18 Copying the Working Directory to the Certified Directory cee eeeeseeeeeeeeees 4 21 Copying the Certified Directory to the Working Directory eceeseesseeetees 4 22 Show Currently Used Configuration 0 ccccccccsscssseesseeseeeessesseeeeeeeseeeeeesseeenes 4 23 SHOW S Witch Files urere no s A leche cade veebacctad vecvibedede uate ce tus AA N 4 24 Managing Redundancy in a Stack and CMM ou eeeecceessceeseeeesccesceeeeceeeeeenereeessesenseenes 4 25 Rebooting the Switch ccccccecscesccessseceseeeseecsseecsseesseecsececeeseeeseeeeseeenseeeneeenseeensaes 4 25 Copying the Working Directory to the Certified Directory 0 0 eeeeeseeeeeeeeees 4 26 Synchronizing the Primary and Secondary CMMs o oo ee esesececeseeseeneeneeseeeeeees 4 27 CMM Switching Fabric isrener aoo E E EE enS 4 28 Swapping the Primary CMM for the Secondary CMM nsssssessesseesessessrssessrsessesse 4 29 Show Currently Used Configuration 0 cccccccccssccssseesceceseeesseeeeeeeeeeseeeseeeseeenes 4 30 NI Module Behavior During Takeover sss nnssssesesseeseresseseessressresseeseessessseeses 4 31 Emergency Restore of the boot cfg File ccceccccesccesseeeseceeneceeeeeseeenseeeseeeseeesseeensaes 4 32 Can I Restore the boot file While Running from Certified 2 0 0 0 ccc eeeeeseetees 4 32 Displaying CMM Conditions esere p eo a a ai a EE aE 4 33
191. efault No default zm11 No standard name 11 00 No default No default No default OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 1 41 Setting the System Clock Managing System Files page 1 42 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 2 Logging Into the Switch Logging into the switch may be done locally or remotely Management tools include the Command Line Interface CLI which may be accessed locally via the console port or remotely via Telnet WebView which requires an HTTP client browser on a remote workstation and SNMP which requires an SNMP manager such as Alcatel Lucent s OmniVista or HP OpenView on the remote workstation Secure sessions are available using the Secure Shell interface File transfers can be done via FTP or Secure Shell FTP Note The current release supports IPv6 client session for Telnet FTP SSH SFTP and SNMP on OmniSwitch 6850 or 9000 In This Chapter This chapter describes the basics of logging into the switch to manage the switch through the CLI It also includes the information about using Telnet FTP and Secure Shell in both IPv4 and IPv6 environments for logging into the switch as well as information about using the switch to start a Telnet or Secure Shell session on another device It also includes information about managing sessions and specifying a DNS resolver For more details about the syntax of referenced commands see the OmniSwitch CLI Refe
192. effect The switch can be booted from the working directory by using the reload working command page 4 6 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing CMM Directory Content CMM Files Scenario 3 Saving the Working Directory to the Certified Directory After running the modified configuration settings and checking that there are no problems the network administrator decides that the modified configuration settings stored in the working directory are completely reliable The administrator then decides to save the contents of the working directory to the certified directory Once the working directory is saved to the certified directory the modified configura tion file is included in a normal reboot Since the working and certified directories are exactly the same the switch is running from the working directory R W C R W C 1 Switch boots from certified directory by using factory configura tion settings Since the working and certified directories are the same it will be running from the working direc tory 2 Changes are made to the run ning configura tion stored in the running configura tion saved to the working direc tory and then saved to the certi fied directory R W C 3 Power is inter rupted and the switch goes down
193. eges refer to Chapter 8 Managing Switch Security Terminal Ll A dumb terminal uses the FTP cli ent on the OmniSwitch to retrieve a file from a file server File Server OmniSwitch Gessusieessssbessssbssses 9 FTP Client FTP Server OmniSwitch FTP Client Use the switch ftp command to start its FTP client 1 Establish a connection to the switch as explained in your appropriate Getting Started Guide 2 Log on to the switch and enter the ftp command to start the FTP client Next enter a valid host name or IP address For information about enabling the DNS resolver for host names please refer to Chapter 2 Logging Into the Switch A screen similar to the following is displayed gt ftp 198 23 9 101 Connecting to 198 23 9 101 connected 220 cosmo FTP server UNIX r System V Release 4 1 ready Name Note You can only use a host name instead of an IP address if the DNS resolver has been configured and enabled If not you must specify an IP address You can use the ftp6 command followed by the IPv6 address or the hostname of the FTPv6 server to start an FTPv6 session over an IPv6 environment For example gt ftp6 fe80 a00 20ff fea8 8961 intfl Connecting to fe80 a00 20ff fea8 8961 connected 220 cosmo FTP server UNIX r System V Release 4 1 ready Name OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 1 23 Loading Software onto the Swit
194. eges see Chapter 8 Managing Switch Security OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 1 1 File Management Specifications Managing System Files File Management Specifications The following table lists specifications for the OmniSwitch flash directory and file system as well as the system clock Note The functionality described in this chapter is supported on the OmniSwitch 6800 6850 and 9000 switches unless otherwise stated in the following Specifications table or specifically noted within any section of this chapter File Transfer Methods Switch Software Utility FTP Zmodem OmniSwitch as an FTP Client The flash certified directory holds configurations that are certified as the default start up files for the switch They will be used in the event of a non specified reload Configuration Recovery Switch flash Directory e 64 MB flash memory available for switch files and directories OmniSwitch 6800 and 6850 e 128 MB flash memory available for switch files and directories OmniSwitch 9000 e Contains the certified and working directories File Directory Name Metrics e 32 characters maximum for directory and file names OmniSwitch 6800 and 6850 e 128 characters maximum for directory and file names OmniSwitch 9000 e 255 character maximum for a fully qualified path File Directory Name Characters Character types are limited to a z A Z 0 9 dashes dot
195. el Lucent and certifying to Alcatel Lucent in writing that all Licensed Materials and all copies thereof and extracts therefrom have been returned or erased by the memory of Licensee s computer or made non readable Alcatel Lucent may terminate this License Agreement upon the breach by Licensee of any term hereof Upon such termination by page A 2 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Software License and Copyright Statements Alcatel Lucent License Agreement Alcatel Lucent Licensee agrees to return to Alcatel Lucent or destroy the Licensed Materials and all copies and portions thereof 10 Governing Law This License Agreement shall be construed and governed in accordance with the laws of the State of California 11 Severability Should any term of this License Agreement be declared void or unenforceable by any court of competent jurisdiction such declaration shall have no effect on the remaining terms herein 12 No Waiver The failure of either party to enforce any rights granted hereunder or to take action against the other party in the event of any breach hereunder shall not be deemed a waiver by that party as to subsequent enforcement of rights or subsequent actions in the event of future breaches 13 Notes to United States Government Users Software and documentation are provided with restricted rights Use duplication or disclosure by the government is subject to i restrictions set forth in GSA ADP
196. elete key to remove characters to the right of the cursor Note the following command entry gt show macrocode The correct syntax is show microcode To change the spelling in this entry use the Left Arrow key to place the cursor between the m and the a gt show m acrocode Use the Delete key to remove the a and type i gt show microcode Press Enter to execute the command OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 5 9 CLI Services Using the CLI Recalling the Previous Command Line To recall the last command executed by the switch press either the Up Arrow key or the bang bang command at the prompt and the previous command will display on your screen You can execute the command again by pressing Enter or you can edit it first by deleting or inserting characters In the following example the Is command is used to list the contents of the switch s flash switch directory gt Ls Listing Directory flash switch drw 2048 Jan 1 1980 drw 2048 Jan 3 19 23 rw 308 Jan 1 1980 banner default txt 9850880 bytes free gt To enter this same command again use the Up Arrow key The Is command appears at the prompt To issue the Is command press Enter gt ls The Up Arrow key and the bang bang command will display the last command line entered even if the command was rejected by the switch For more details on using the com
197. en selecting sources for time synchronization It is suggested that at least three sources should be available and at least one should be close to you in terms of network topology It is also suggested that each NTP client is peered with at least three other same stratum clients so that time information crosschecking is performed Note Alcatel Lucent s current implementation of NTP only allows the OmniSwitch to act as a passive client not as a server A passive client only receives NTP information and adjusts its time accordingly In the above example an OmniSwitch could be either Server 3a or 3b An OmniSwitch as Server 3a or 3b would also not be able to peer with other servers on the same stratum OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 3 7 NTP Overview Configuring Network Time Protocol NTP When planning your network it is helpful to use the following general rules e Jtis usually not a good idea to synchronize a local time server with a peer in other words a server at the same stratum unless the latter is receiving time updates from a source that has a lower stratum than from where the former is receiving time updates This minimizes common points of failure e Peer associations should only be configured between servers at the same stratum level Higher Strata should configure lower Strata not the reverse e It is inadvisable to configure time servers in a domain to a single time source
198. ent Managing Redundancy in a Stack and CMM NI Module Behavior During Takeover In OmniSwitch 9000 switches only if there are no unsaved configuration changes and the flash directo ries on both the primary and secondary management modules have been synchronized via the copy flash synchro command no NIs will be reloaded if a management module takeover occurs As a result data flow is not interrupted on the NIs during the takeover If a configuration change is made to one or more NI modules e g a VLAN is configured on several different interfaces and the changes are not saved via the write memory command the corresponding Nis will automatically reload if a management module takeover occurs Data flow on the affected NIs will be interrupted until the reload is complete Note that the NIs will reload whether or not the flash synchro nization status shows SYNCHRONIZED This is because the unsaved changes have occurred in the running configuration i e RAM and have not been written to the flash directory s configuration file In this case a list of only the affected NIs is displayed in the table output e g 1 6 If the flash directories on the primary and secondary management modules are not synchronized e g a copy flash synchro command has not been issued recently all NIs will be reloaded automatically if a management module takeover occurs Data flow will be interrupted on all NIs until the reload is complete OmniSwitch 680
199. ent and server sides for debugging purposes At this point the protocol identification strings are in human readable form Later in the authentication process the client and the server switch to a packet based binary protocol which is machine readable only Algorithm and Key Exchange The OmniSwitch Secure Shell server is identified by one or several host specific DSA keys Both the client and server process the key exchange to choose a common algorithm for encryption signature and compression This key exchange is included in the Secure Shell transport layer protocol It uses a key agreement to produce a shared secret that cannot be determined by either the client or the server alone The key exchange is combined with a signature and the host key to provide host authentication Once the exchange is completed the client and the server turn encryption on using the selected algorithm and key The following elements are supported Host Key Type DSA Cipher Algorithms AES Blowfish Cast 3DES Arcfour Rijndael Signature Algorithms MDS SHA1 Compression Algorithms None Supported Key Exchange Algorithms diffie hellman group exchange shal diffie hellman group1 shal Note The OmniSwitch generates a 512 bit DSA host key at initial startup The DSA key on the switch is made up of two files contained in the flash network directory the public key is called ssh_host_dsa_key pub and the private key is called ssh_host_dsa_key T
200. ere loaded successfully To abort a Zmodem session enter Ctrl X five times in succession Note Files transferred via Zmodem are loaded into the flash directory Before the new files can be used by the switch you must transfer them to the switch s flash working directory and reboot the switch OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 1 27 Registering Software Image Files Managing System Files Registering Software Image Files New software transferred to the switch must go through a registration process before it can be used by the switch The registration process includes two tasks e Transfer the new software file s to the switch s flash working directory via remote connection e Restart the switch to register the software Directories on the Switch When you log into the switch your current directory is the flash directory For a factory default switch the flash directory contains three sub directories and several files It is important to understand the relation ship of these directories before you load software or edit any of the files The three directories are described here e Certified directory tThis directory contains configuration files that are certified as the default start up files for the switch These are the trusted configuration and binary image files They will be used in the event of a non specified reload Do not attempt to edit these files The path to this directory is
201. erent This difference if the CMM reboots causes the switch to boot and run from the certified directory When the switch is booted and run from the certified directory changes made to switch functionality cannot be saved and files cannot be moved between directories The boot cfg file saved on the working directory needs to be saved to the certified directory as shown gi oi Primary CMM eA In this diagram 1 The switch boots from the certified directory and changes are made to the running configuration 2 The changes are saved to the working directory as the boot cfg file 3 The contents of the working directory are saved to the certified directory Once the working directory is copied to the certified directory and the switch reboots it will reboot from the certified directory but run from the working directory When the switch runs in this fashion changes made to the running configuration can be saved to the working directory as described in Copying the Running Configuration to the Working Directory on page 4 16 Note Only software that has been thoroughly validated as viable and reliant software should be copied to the certified directory Once you copy software to the certified directory you will not be able to recover a previous version of the image or configuration files OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 4 21 Managing the D
202. ertified drw 2048 Jun 13 12 32 working drw 2048 Jul 12 16 22 switch rw 10000 Jun 12 15 58 swlogl log rw 10000 Jun 12 17 50 swlog2 log rw 445 Jun 21 11 43 aaasnap rw 7298 Jul 24 16 51 websnap1024 rw 2662306 Jun 28 16 44 cs_system pmd rw 543 Jun 28 12 02 aaapublic drw 2048 Jun 28 17 50 newdir rw 1452 Jun 29 12 50 nssnap76 rw 1452 Jun 29 12 42 iesnap76 16480256 bytes free 2 Use the cd command to change your current directory to flash working Use the Is or pwd command to verify gt cd working gt Ils Listing Directory flash working drw 2048 Aug 3 12 32 drw 2048 Aug 14 10 58 rw 450 Aug 13 10 02 rrtestl txt page 1 32 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing System Files Application Examples for File Management 3 Enter the FTP mode by using the ftp command followed by the IP address or the name of the host you are connecting to If you enter a host name please refer to Using Zmodem on page 1 27 gt ftp 10 255 11 101 220 Connecting to 10 255 11 101 connected Cosmo Windows FTP server ready Name Myhostl Note You can only use a host name instead of an IP address if the DNS resolver has been configured and enabled If not you must specify an IP address You can use the ftp6 command followed by the IPv6 address or hostname of the FTPv6 server to start an FTPV6 session over an IPv6 environment For example gt ftp6 fe80 a00 20ff fea8 8961
203. erview cccccsccsessceesseeseeeeseeeeeceseecsseeesseceeeceeeeesenseeeseeeenaes 1 3 Files Tran ster ciis 2 c ee te eich sce E E Son i disteueeetes rates 1 3 Switch DirectOrnes ss ssc s2eit068 eds trite oes eet eter ddl eeee ti heat neat oe It 1 4 File and Directory Management cccccecssccsscesseeeesceeseecescecesceeeneeesaeeenseesaeeseseeeseeeseees 1 5 Using Wildcards ss 2 no2ssitcet dee nannies tee hie ie Mee a 1 7 Multiple Characters icri nna nian oy ena 1 7 Single Characters Pecieg i eeccledead es nde aon AM nt nal alte a 1 7 Directory Commands iei Maki Ha a A aes 1 8 Determining Your Location in the File Structure 0 0 ceceesceceeeceeeeeeeeeeeeeees 1 8 han eine DireCtOresii ies cexicchesadenciendes nen tes ieetiencdetses WOM ee keel 1 9 Displaying Directory Contents ccccccecssccessceseeeeseeeeseecseeenseecseeeenesesereeeeneees 1 10 Making a New Directory siinseid hi oteslitine he are 1 12 Displaying Directory Contents Including Subdirectories cc ceeeeeeereeeees 1 13 Copying an Existing Directory essiens rie A R A A 1 13 Removing a Directory and its Contents ccccccsccesseesseceessceteeeeeeeeseeeseeeneees 1 14 File Commands 2 2 460ses ie seat ies a hates a ee I ess 1 15 Creating or Modifying Files eceso neneiia aa a 1 15 Copyan Existing Bile 36 3 ci0 fossccded een a te Solaet ewes A E 1 15 Secure Copy an Existing File eesseesseessessseesesseesseessessressressrseesseesseesseese
204. es 8 4 Authentication only ACE Server cccceccccesccssseceeseeeeceeseecssceeseecseneessneeeseeeeeeenseees 8 4 Interaction With the User Database c ccc cecccccsescesscesseeeeeceseceeseeeneeenseceeeenseeenes 8 5 ASA and Authenticated VLANS cccceccccesccessceeseeeeneeeeseeeseecsseecsscesneeseseeesseenseeenseees 8 5 Configuring Authenticated Switch ACCESS ccccscccesseesseesseceseeeeseeeeseceeaeesesenseeeneeeeaes 8 6 Quick Steps for Setting Up ASA oo eccceccccsseesscesseecesseenseesseeesaeeeseesereceeseeesseeneeeneeenes 8 7 Setting Up Management Interfaces for ASA oo cecccceceseseceeneeeeeeeeeesseeesecesneeneneeeaes 8 9 Enabling Switch Access enced ews hance tte Send AN Ree es 8 10 Configuring the Default Setting eee cecccssscssecseneeeeeeseeeesseeeeecesseeeeseeneeeneeenss 8 10 Usine Secure Shell seimeni a nde wes etter dew a eS 8 11 Configuring Accounting for ASA ceeccccsssessecssnecseeceseceeseeenseeceeeenseeensaeeeeseseeeeneneees 8 12 Verifying the ASA Configuration cccccccccssessssesseceeeesseeeeseeesseenseecnseeenseecnseeneeensaes 8 13 Using WebView ruanin ining niin En ENNEN ORON 9 1 H TuS Chapter tice AL a en eS ee ee ee ee 9 1 WebView CLI Defaults i 3 2 s ccccessescicvudegsdecvdacd gid irna E E EE E outs ees 9 2 BLO WSERS CUUP ct scii ss soceiactccel seston techs hice eel ted ott aes oe ace hata elt abt es Seeks et e he ooh 9 2 WebView CLI Commands dessinent ee e Meets estes oeat e ieat 9 3
205. es and Notices Software License and Copyright Statements verbatim or with modifications and or translated into another language Hereinafter translation is included without limitation in the term modification Each licensee is addressed as you Activities other than copying distribution and modification are not covered by this License they are outside its scope The act of running the Program is not restricted and the output from the Program is covered only if its contents constitute a work based on the Program independent of having been made by running the Program Whether that is true depends on what the Program does 1 You may copy and distribute verbatim copies of the Program s source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copy right notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and give any other recipients of the Program a copy of this License along with the Program You may charge a fee for the physical act of transferring a copy and you may at your option offer warranty protection in exchange for a fee 2 You may modify your copy or copies of the Program or any portion of it thus forming a work based on the Program and copy and distribute such modifications or work under the terms of Section 1 above provided that you also meet all of these conditi
206. es store Doing so will clear the certificate error message 1 Click on the certificate error message A Certificate Invalid popup window displays 2 Click on View Certificates at the bottom of the Certificate Invalid popup window A Certifi cate Information popup window displays 3 Click on the Install Certificate button at the bottom of the Certificate Information window This step launches the Certificate Import Wizard 4 Click the Next button to continue with the Certificate Import Wizard process The Certificate Store window displays 5 Select Place all certificates in the following store and click on the Browse button This will display a list of certificate stores 6 Select Trusted Root Certification Authorities from the list of stores and continue with the wizard installation process A Security Warning window will display containing a warning about installing the certificate 7 Click the Yes button in the Security Warning window to finish installing the certificate After the certificate is installed the browser window no longer displays the certificate error message OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 9 9 Configuring the Switch With WebView Using WebView Home Page The first page displayed for each feature is the Home Page e g IP Home The Home Page describes the feature and provides an overview o
207. eseseseneeeeseeeaes 6 6 Applying Configuration Files to the Switch cccececccssceesceeseneeeeteeeeeeseeesseesseees 6 6 Verifying Timed Session s s ciccseceseteseccescesccesdesecteeesedeccvaecdascesssaeedveressnedseneedes 6 6 Cancelling a Timed Session ccccccecssccsssesseecesseeeseeeeceesseeeneeeeseeenseeeeeenseeensees 6 7 Configuration File Error Reporting ccccccccscessseceececeeteeeeceeeeeeeeeeeenseeensees 6 7 Setting the Error File Limit ssie cece cccccessceeneeeeseeeeeeeeeeeeesseeeeseeenseeseeeeenenes 6 8 Syntax Checkit neninn n tasers eters tans ate e 6 8 Displaying a Text File sssr nennen ase Bere e e a a a 6 9 Text Editing on the Switehi aseeni Ra e a RR ae eel en ee 6 9 Invoke the VI Editor s 3 2c3s c8n cane io ee a Ee ee 6 9 Creating Snapshot Configuration Files ccccccecssscsessceseeeeneeeeneeeeeeeneeenseeeseeeeseeeneneees 6 10 Snapshot Feature List sercan i a a E R a ii 6 10 User Defined Naming Options ccccecsscssseesereesseeeereeeeeceseeeeseeesseeneeensaees 6 11 Editing Snapshot Files ccccccccecsssessccssceesereceseceeecenseeeneeenseeeseesseeenseeeneneees 6 11 Verifying File Configuration 0 ccccccccesceeseseneceeseecesceeseeceseecseeessaeensceseeeeseseesseseneeeaes 6 14 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 vii Contents Chapter 7 Managing Switch User Accounts eccecceesceseseeeeeseeseeeccenseeseeeeeeetseenseneeaes 7 1
208. essrssoe 1 16 Move an Existing File or Directory cccccecescesessescceeeneeeeeeeseeeeeeenseesteeenseees 1 16 Change File Attribute and Permissions cccccccsssessseeesceeseeeeseeeeeseeseeneneees 1 18 Delete an Existing File s cccccsicesscihesseiens eee aa deveet tates E EEE N aR i 1 18 Managing Files on Switches ccccccccsessscesseeseeesceceeseeeeeceseeeseeesseeeseeenseees 1 19 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 iii Contents Utility Commands y a a a aa a aE a aa aa O TREA 1 20 Displaying Free Memory Space ceecccecssccsceesecesseeeeseeececseecsseesseeesesessneenes 1 20 Performing a File System Check s ssnnsseseeseeseeesesssesssessessessessersssesssesresseessrese 1 20 Deleting the Entire File System cccecccccsssesseeeesceeseeeeseeesseecneeenseeeneseseneenes 1 20 Loading Software onto the Switch ccecccessceeseceseceeseeeeeecseeeeeeeeseeseeeessseeseseeeeeeeaes 1 21 Using the Switch as an FTP Server 0 ccceesccccssccseseesceceeseeeeseenseeeeseeenseeeneeenseeensaes 1 2 Using the Switch as an FTP Client 20 ccccccccscccssceeseeseeeeeseeeseeeeeeeseeenseenseeensnes 1 23 Using Secure Shell FTP pe ests ev csssseeee eines eyed vaste ae eae ea a a Maw 1 25 Closing a Secure Shell FTP Session ccccccescesssessseceeseeseeeeneeeeeeeeeeeeeeeeeeseeenss 1 26 Usine Zmod enn i 2 ip 0se Sa ie et ee A in ee ees 1 27 Registering Software Image Files
209. f that feature s current configuration If applicable home pages display the feature s current configuration and can also be used to configure global parameters Each Home Page also provides a Site Map shown below which displays all of the configuration options available for that feature These are the same configuration options available in the drop down menus at the top of the page Webview 10 255 73 12 Microsoft Internet Explorer File Edit View Favorites Tools Help Click to display spl Displays feature Home play s Site Ma Page p IP Home Refresh SiteMap Print Global Parameters About IP P Configunaiion Faranaiare Internet Protocol IP is a network layer Layer 3 protocol that contains addressing information and some E Configuration Parameters control information that enables packets to be forwarded IP is documented in RFC 791 and is the primary Feature network layer protocol in the Internet protocol suite Along with the Transmission Control Protocol TCP IP IP Default TTL 64 represents the heart of the Internet protocols IP has two primary responsibilities providing connectionless Overview LIP Forwarding Yes best effort delivery of datagrams through an internetwork and providing fragmentation and reassembly of datagrams to support data links with different maximum transmission unit MTU sizes More Dynamic Routing Protocol Protocol Loading 3 es OSPF BGP RIP IP Multicast Protoco
210. fabric module is in a down bad state then the complete CMM will be reloaded The takeover command is described in detail in the OmniSwitch CLI Reference Guide On OmniSwitch 6800 and 6850 switches only in a stack with three or more switches the secondary CMM takes over as primary and the original primary becomes idle The next available idle switch becomes the new secondary CMM For more information on stacks see the Managing Stacks chapter found in the appropriate Hardware Users Guide Note The saved boot cfg file will be overwritten if the takeover command is executed after the copy running config working or write memory command on an OmniSwitch 6800 6850 9000 switch set up with redundant CMMs OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 4 29 Managing Redundancy in a Stack and CMM Managing CMM Directory Content Show Currently Used Configuration In a chassis with a redundant CMM the display for the currently running configuration tells the user if the primary and secondary CMMs are synchronized To check the directory from where the switch is currently running and if the primary and secondary CMMs are synchronized enter the following command on OmniSwitch 6800 and 6850 switches gt show running directory CONFIGURATION STATUS Running CMM PRIMARY CMM Mode DUAL CMMs Current CMM Slot s Ly Running configuration WORKING Certify Restore Status CERTIFY NEEDED
211. fault No default No default zm3 No standard name 03 00 No default No default No default nst Newfoundland 03 30 lst Sunday in Apr at Last Sunday in Oct 1 00 2 00 a m at 2 00 a m ast Atlantic Standard 04 00 2nd Sunday in Mar 1st Sunday in Nov at 1 00 Time at 2 00 a m 2 00 a m est Eastern Standard 05 00 2nd Sunday in Mar 1st Sunday in Nov at 1 00 Time at 2 00 a m 2 00 a m cst Central Standard 06 00 2nd Sunday in Mar 1st Sunday in Nov at 1 00 Time at 2 00 a m 2 00 a m mst Mountain Standard 07 00 2nd Sunday in Mar 1st Sunday in Nov at 1 00 Time at 2 00 a m 2 00 a m pst Pacific Standard 08 00 2nd Sunday in Mar 1st Sunday in Nov at 1 00 Time at 2 00 a m 2 00 a m astcam Atlantic Standard 04 00 Ist Sunday in Apr at Last Sunday in Oct 1 00 Time 2 00 a m at 2 00 a m Central America estcam Eastern Standard 05 00 Ist Sunday in Apr at Last Sunday in Oct 1 00 Time 2 00 a m at 2 00 a m Central America cstcam Central Standard 06 00 Ist Sunday in Apr at Last Sunday in Oct 1 00 Time 2 00 a m at 2 00 a m Central America mstcam Mountain Standard 07 00 Ist Sunday in Apr at Last Sunday in Oct 1 00 Time 2 00 a m at 2 00 a m Central America pstcam Pacific Standard 08 00 Ist Sunday in Apr at Last Sunday in Oct 1 00 Time 2 00 a m at 2 00 a m Central America akst Alaska 09 00 Ist Sunday in Apr at Last Sunday in Oct 1 00 2 00 a m at 2 00 a m hst Hawaii 10 00 No default No d
212. figuration SNMPv2 TC SNMPv2 CONF SNMP FRAMEWORK MIB SNMP TARGET MIB NMPv2 SMI NMPv2 TC NMPv2 CONF NMP FRAMEWORK MIB SNMP USER BASED User based Security Model USM for version 3 of the SNMPv2 SMI SM MIB RFC 2574 Simple Network Management Protocol SNMPv3 SNMPv2 TC SNMPv2 CONF SNMP FRAMEWORK MIB NMPv2 SMI NMPv2 TC NMPv2 CONF S S S SNMP VIEW BASED View based Access Control Model VACM for the SNMPv2 SMI S S S N N ZZZ Z SNMP TARGET MIB SNMP Applications Proxy SNMP Entity Remote RFC 2573 Configuration S S S S SNMPv2 MIB Management Information Base for Version 2 of the RFC 1907 Simple Network Management Protocol SNMPv2 ACM MIB RFC 2575 Simple Network Management Protocol SNMP NMPv2 TC NMPv2 CONF NMP FRAMEWORK MIB TCP MIB RFC 2012 SNMPv2 Management Information Base for the SNMPv2 SMI Transmission Control Protocol by using SMIv2 SNMPv2 CONF page 10 36 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using SNMP SNMP MIB Information MIB Name Description Dependencies TUNNEL MIB IP Tunnel MIB SNMPv2 SMI RFC 2667 SNMPv2 TC SNMPv2 CONF IF MIB UDP MIB RFC 2013 SNMPv2 Management Information Base for the User SNMPv2 SMI Datagram Protocol by using SMIv2 SNMPv2 CONF VRRP MIB RFC 2787 Definitions of Managed Objects for the Virtual Router SNMPv2 SMI Re
213. figuration apply using the at keyword with the relevant date and time gt configuration apply bncom_cfg txt at 09 00 04 july page 6 4 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Working With Configuration Files Quick Steps for Applying Configuration Files Note Optional To verify that the switch received this configuration apply request enter the show configuration status command The display is similar to the one shown here gt show configuration status File configuration lt flash working bncom cfg txt gt scheduled at 07 04 02 09 00 For more information about this display see Configuration File Manager Commands in the OmniSwitch CLI Reference Guide Setting an Application Session for a Specified Time Period You can set a future timed session to apply a configuration file after a specified period of time has elapsed In the following example the amzncom_cfg txt will be applied after 6 hours and 15 minutes have elapsed 1 Verify that there are no current timer sessions pending on the switch gt show configuration status File configuration none scheduled 2 Apply the file by executing the configuration apply command using the in keyword with the relevant time frame specified gt configuration apply amzncom_cfg txt in 6 15 Note Optional To verify that the switch received this configuration apply request enter the show configuration status command The display is similar to the o
214. files customer login are mutually exclu sive Both types of users may exist on the switch but any given user account can only be one type network administrator or customer login The CLI in the switch prevents you from configuring both privi leges and a profile for the same user End user profiles also cannot be configured on an authentication server however users configured on an external authentication server may have profile attributes which the switch will attempt to match to profiles configured locally Note that if user information is configured on an external server rather than locally on the switch through the CLI with both functional privilege attributes and profile attributes the user is seen by the switch as an end user and will attempt to match the profile name to a profile name configured on the switch If there is no match the user will not be able to log into the switch Note For information about setting up user information on an authentication AAA server see the Managing Authentication Servers chapter of the OmniSwitch 6800 6850 9000 Network Configuration Guide Users typically log into the switch through one of the following methods e Console port A direct connection to the switch through the console port e Telnet Any standard Telnet client may be used for logging into the switch e FTP Any standard FTP client may be used for logging into the switch e HTTP The switch has a Web browser manageme
215. fined text string you must enclose the entry in quotation marks e Ifyou receive a syntax error i e ERROR Invalid entry double check your command as written and re enter it exactly as described in the OmniSwitch CLI Reference Guide Be sure to include all syntax option parameters e To exit the CLI type exit and press Enter Text Conventions The following table contains text conventions and usage guidelines for CLI commands as they are documented in this manual bold text Indicates basic command and keyword syntax Example show snmp station Quotation Marks Used to enclose text strings that contain spaces Example vlan 2 name new test vlan OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 5 3 Command Entry Rules and Syntax Using the CLI Using Show Commands The CLI contains show commands that allow you to view configuration and switch status on your console screen The show syntax is used with other command keywords to display information pertaining to those keywords For example the show vlan command displays a table of all VLANs currently configured along with pertinent information about each VLAN Different forms of the show vlan command can be used to display different subsets of VLAN information For example the show vlan rules command displays all rules defined for a VLAN Using the No Form The OmniSwitch CLI Reference Guide defines all CL
216. first shipment of this product The OpenLDAP Public License Version 2 4 8 December 2000 Redistribution and use of this software and associated documentation Software with or without modi fication are permitted provided that the following conditions are met 1 Redistributions of source code must retain copyright statements and notices 2 Redistributions in binary form must reproduce applicable copyright statements and notices this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution 3 Redistributions must contain a verbatim copy of this document 4 The names and trademarks of the authors and copyright holders must not be used in advertising or otherwise to promote the sale use or other dealing in this Software without specific written prior permis sion 5 Due credit should be given to the OpenLDAP Project 6 The OpenLDAP Foundation may revise this license from time to time Each revision is distinguished by a version number You may use the Software under terms of this license revision or under the terms of any subsequent revision of the license THIS SOFTWARE IS PROVIDED BY THE OPENLDAP FOUNDATION AND CONTRIBUTORS AS IS AND ANY EXPRESSED OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE OPENLDAP FOUNDATION OR ITS CONTRIBUTORS
217. formation from a CLI table by displaying only those lines containing a specified text pattern up to 80 characters Once the filter command has been executed the filter mode remains active until you reach the end of the CLI table or until you exit the table by using the q command The filter command is case sensitive When using the slash command you must type the text exactly as it would appear in the CLI table For additional information about filtering refer to Using a Wildcard to Filter Table Information on page 5 23 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 5 19 Multiple User Sessions Using the CLI Multiple User Sessions Several CLI commands give you information about user sessions that are currently operating on the OmniSwitch including your own session These commands allow you to list the number and types of sessions that are currently running on the switch You can also terminate another session provided you have administrative privileges Listing Other User Sessions The who command displays all users currently logged into the OmniSwitch The following example shows use of the who command and a resulting display gt who Session number 0 User name at login Access type console Access port Local IP address 0 0 0 0 Read only rights Read Write rights Read only domains Read only families Read Write domains Read Write families Session number 1 U
218. from the local OmniSwitch to IP address 10 222 30 125 gt sftp 10 222 30 125 login as Note If SFTP is not enabled on the switch use the scp sftp command to enable it You can use the sftp6 command followed by the IPv6 address or hostname of the SFTPv6 server to start an SFTPv6 session over an IPv6 environment For example gt sftp6 fe80 a00 20ff fea8 8961 intl login as Note SFTPVv6 sessions are supported only on OmniSwitch 6850 or 9000 It is mandatory to specify the name of the particular IPv6 interface if the SFTPv6 server has been specified using its link local address 2 You must have a login and password that is recognized by the IP address you specify When you enter your login the device you are logging in to will request your password as shown here gt sftp 10 222 30 125 login as rrlogin2 rrlogin2 s password for keyboard interactive method 3 After logging in you will receive the sftp gt prompt You may enter a question mark to view available Secure Shell FTP commands and their definitions as shown here sftp gt Available commands cd path Change remote directory to path lcd path Change local directory to path chmod mode path Change permissions of file path to mode help Display this help text get remote path local path Download file OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 1 25 Loading Software onto the Switch Managing System Files lls pat
219. functionality and includes information about the following procedures e Configuring the Switch with WebView WebView Login see page 9 8 Home Page see page 9 9 Configuration Page see page 9 10 e Using WebView Help Global Configuration Page see page 9 10 Table Configuration Page see page 9 11 Note For detailed configuration information on each feature see other chapters in this guide or the OmniSwitch 6800 6850 9000 Network Configuration Guide or Advanced Routing Configuration Guide OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 9 1 WebView CLI Defaults Using WebView WebView CLI Defaults Web Management Command Line Interface CLI commands allow you to enable disable WebView enable disable Secure Socket Layer SSL and view basic WebView parameters These configuration options are also available in WebView The following table lists the defaults for WebView configuration through the http and https commands Description Command Default WebView Status http server enabled Force SSL http ssl disabled HTTPS port https port 443 HTTP port http port 80 Browser Setup Your browser preferences or options should be set up as follows e Cookies should be enabled Typically this is the default e JavaScript must be enabled supported e Java must be enabled e Style sheets must be enabled that is the colors fonts backgrounds etc of web pages should always be
220. fy sublicense or distribute the Program is void and will automatically terminate your rights under this License However parties who have received copies or rights from you under this License will not have their licenses terminated so long as such parties remain in full compliance 5 You are not required to accept this License since you have not signed it However nothing else grants you permission to modify or distribute the Program or its derivative works These actions are prohibited by law if you do not accept this License Therefore by modifying or distributing the Program or any work based on the Program you indicate your acceptance of this License to do so and all its terms and conditions for copying distributing or modifying the Program or works based on it 6 Each time you redistribute the Program or any work based on the Program the recipient automati cally receives a license from the original licensor to copy distribute or modify the Program subject to these terms and conditions You may not impose any further restrictions on the recipients exercise of the rights granted herein You are not responsible for enforcing compliance by third parties to this License 7 If as a consequence of a court judgment or allegation of patent infringement or for any other reason not limited to patent issues conditions are imposed on you whether by court order agreement or other wise that contradict the conditions of this License the
221. g e IP spoofing e IP source routing e DNS spoofing e Interception of clear text passwords and other data by intermediate hosts e Manipulation of data by users on intermediate hosts Note The OmniSwitch supports Secure Shell Version 2 only Secure Shell Components The OmniSwitch includes both client and server components of the Secure Shell interface and the Secure Shell FTP file transfer protocol SFTP is a subsystem of the Secure Shell protocol All Secure Shell FTP data are encrypted through a Secure Shell channel Since Secure Shell provides a secure session the Secure Shell interface and SFTP are recommended instead of the Telnet program or the FTP protocol for communications over TCP IP for sending file transfers Both Telnet and FTP are available on the OmniSwitch but they do not support encrypted passwords Note Secure Shell may only be used to log into the switch to manage the switch It cannot be used for Layer 2 authentication through the switch Secure Shell Interface The Secure Shell interface is invoked when you enter the ssh command and the Secure Shellv6 interface is invoked by using the ssh6 command in an IPv6 environment After the authentication process between the client and the server is complete the remote Secure Shell interface runs in the same way as Telnet Refer to Starting a Secure Shell Session on page 2 15 to for detailed information Secure Shell File Transfer Protocol Secure Shell FTP is
222. gers and SNMP agents on an IPv4 as well as on an IPv6 network Network administrators use SNMP to monitor network performance and to manage network resources SNMP functionality over IPv6 environment can be configured only on an OmniSwitch 6850 and 9000 In This Chapter This chapter describes SNMP and how to use it through the Command Line Interface CLI CLI commands are used in the configuration examples for more details about the syntax of commands see the OmniSwitch CLI Reference Guide Configuration procedures described in this chapter include e Setting Up An SNMP Management Station on page 10 4 e Setting Up Trap Filters on page 10 5 e Using SNMP For Switch Security on page 10 27 e Working with SNMP Traps on page 10 30 This chapter also includes lists of Industry Standard and Enterprise Proprietary MIBs used to manage the OmniSwitch OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 10 1 SNMP Specifications Using SNMP SNMP Specifications The following table lists specifications for the SNMP protocol RFCs Supported for SNMPv2 1902 through 1907 SNMPv2c Management Framework 1908 Coexistence and transitions relating to SNMPv1 and SNMPv2c RFCs Supported for SNMPv3 2570 Version 3 of the Internet Standard Network Management Framework 2571 Architecture for Describing SNMP Management Frameworks 2572 Message Processing and Dispatching for S
223. ggIfIndex Port of the Link Aggregate group 65 pktDrop pktDropType IP The pktDrop trap indicates that pktDropIfIndex the sending agent has dropped pktDropCount certain packets to blocked IP pktDropFrag ports from spoofed addresses etc pktDropType Reason index for why the packet was dropped pktDropIfIndex Interface index if_index of the ingress port of the dropped pkt pktDropCount The number of packet drops within a configured time interval of the pktDropType that trig gered this particular trap instance pktDropFrag Less than or equal to 512 bytes of the dropped packet dsmac 12 tag 4 etype 2 pay load 512 0 if DropCount only 66 monitorFileWritten mirmonPrima pmm A File Written Trap is sent when rySlot the amount of data requested by mirmonPrima the user has been written by the ryPort port monitoring instance monitorFile Name monitorFileSize mirmonPrimarySlot Slot of mirrored or monitored interface mirmonPrimaryPort Port of mirrored or monitored interface monitorFileName tThe name of the file in which the traffic will be stored the default is PMONITOR ENC monitorFileSize The number of bytes in 16K 16384 increments allowed for the file default 16384 bytes The file contains only the last monitorFileName bytes of the current port monitoring instance OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 10 25 SNMP Overview Using SNMP
224. gured in the OmniSwitch The Advanced Routing Configuration Guide includes configuration information for networks using advanced routing technologies OSPF and BGP and multicast routing protocols DVMRP and PIM SM Anytime The OmniSwitch CLI Reference Guide contains comprehensive information on all CLI commands supported by the switch This guide includes syntax default usage example related CLI command and CLI to MIB variable mapping information for all CLI commands supported by the switch This guide can be consulted anytime during the configuration process to find detailed and specific information on each CLI command page xvi OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Related Documentation The following are the titles and descriptions of all the related OmniSwitch 6800 6850 9000 user manuals OmniSwitch 6800 Series Getting Started Guide Describes the hardware and software procedures for getting an OmniSwitch 6800 Series switch up and running Also provides information on fundamental aspects of OmniSwitch software and stacking architecture OmniSwitch 6850 Series Getting Started Guide Describes the hardware and software procedures for getting an OmniSwitch 6850 Series switch up and running Also provides information on fundamental aspects of OmniSwitch software and stacking architecture OmniSwitch 6800 Series Hardware Users Guide Detailed technical specifications and procedures for the OmniSwi
225. h ln oldpath newpath Imkdir path lpwd ls path mkdir path put local path remote path pwd exit quit rename oldpath newpath rmdir path rm path symlink oldpath newpath version 9 Display local directory listing Symlink remote file Create local directory Print local working directory Display remote directory listing Create remote directory Upload file Display remote working directory Quit sftp Quit sftp Rename remote fil Remove remote directory Delete remote fil Symlink remote file Show SFTP version Synonym for help Note Although Secure Shell FTP has commands similar to the industry standard FTP the underlying protocol is different Closing a Secure Shell FTP Session To terminate the Secure Shell FTP session issue the exit command The following will display gt exit Connection to 11 333 30 135 closed This display indicates the Secure Shell FTP session with IP address 11 333 20 135 is closed The user is now logged into the OmniSwitch as a local device with no active remote connection page 1 26 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing System Files Loading Software onto the Switch Using Zmodem A Zmodem application has been included with your switch software so that new programs and archives can be uploaded through the switch s serial console port There are generally two situations that would require you to use the sw
226. h services and applications are either not being using or are using default settings OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 6 13 Verifying File Configuration Working With Configuration Files Verifying File Configuration You can verify the content and the status of the switch s configuration files with commands listed in the following table show configuration status Displays whether there is a pending timer session scheduled for a con figuration file and indicates whether the running configuration and the saved configuration files are identical or different This command also displays the number of error files that will be held in the flash directory show configuration snapshot Generates a snapshot file of the switch s non default current running configuration A snapshot can be generated for all current network fea tures or for one or more specific network features A snapshot is a sin gle text file that can be viewed edited and reused as a configuration file write terminal Displays the switch s current running configuration for all features page 6 14 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 7 Managing Switch User Accounts Switch user accounts may be set up locally on the switch for users to log into and manage the switch The accounts specify login information combinations of usernames and passwords and privilege or profile information depend
227. h the no prefix as shown gt no ntp server 1 1 1 1 Enabling Disabling NTP Server Synchronization Tests To enable an NTP client to invoke NTP server synchronization tests as specified by the NTP protocol enter the ntp server synchronized command as shown gt ntp server synchronized NTP synchronization is enabled by default Note The NTP protocol discards the NTP servers that are unsynchronized To disable an NTP client from invoking tests for NTP server synchronization enter the ntp server unsynchronized command as shown gt ntp server unsynchronized Disabling peer synchronization tests allows the NTP client to synchronize with either an NTP peer that is not synchronized with an atomic clock or a network of NTP servers that will finally synchronize with an atomic clock Setting the Minimum Poll Time The minimum poll time is the number of seconds that the switch waits before requesting a time synchroni zation from the NTP server This number is determined by raising 2 to the power of the number entered using the ntp server command with the server IP address or domain name and the minpoll keyword For example to set the minimum poll time to 128 seconds enter the following gt ntp server 1 1 1 1 minpoll 7 This would set the minimum poll time to 2 128 seconds page 3 10 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Configuring Network Time Protocol NTP Configuring NTP Setting
228. he author to ask for permission For software which is copyrighted by the Free Soft ware Foundation write to the Free Software Foundation we sometimes make exceptions for this Our decision will be guided by the two goals of preserving the free status of all derivatives of our free soft ware and of promoting the sharing and reuse of software generally NO WARRANTY 11 BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE THERE IS NO WARRANTY FOR THE PROGRAM TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE PROGRAM AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU SHOULD THE PROGRAM PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION 12 IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARIS ING OUT OF THE USE OR INABILITY TO USE THE PROGRAM INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE
229. he first Before you schedule a timed session you should use the show configuration status command to see if another session is already running The following displays where the timed session was set on March 10 2002 at 01 00 using the configuration apply group_config in 6 10 syntax gt show configuration status File configuration lt group_config gt scheduled at 03 10 02 07 10 page 6 6 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Working With Configuration Files Configuration Files Overview Cancelling a Timed Session You may cancel a pending timed session by using the configuration cancel command To confirm that your timer session has been cancelled use the show configuration status command The following will display gt configuration cancel gt show configuration status File configuration none scheduled For more details about the CLI commands used to apply configuration files or to use timer sessions refer to Configuration File Manager Commands in the OmniSwitch CLI Reference Guide Configuration File Error Reporting If you apply a configuration file to the switch that contains significant errors the application may not work In this case the switch will indicate the number of errors detected and print the errors into a text file that will appear in the flash directory The following display will result where the efg_txt file contains three errors gt configuration apply cfg fil
230. he key format and the third is the key itself The text following a is not counted as part of the key and is used merely for description The key format indicates an MD5 key written as a 1 to 31 character ASCII string with each character standing for a key octet The key file with identical MD5 keys must be located on both the local NTP client and the client s server page 3 8 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Configuring Network Time Protocol NTP Configuring NTP Configuring NTP The following sections detail the various commands used to configure and view the NTP client software in an OmniSwitch Configuring the OmniSwitch as a Client The NTP software is disabled on the switch by default To activate the switch as an NTP client enter the ntp client command as shown gt ntp client enable This sets the switch to act as an NTP client in the passive mode meaning the client will receive updates from a designated NTP server To disable the NTP software enter the ntp client command as shown gt ntp client disable Setting the Client to Broadcast Mode It is possible to configure an NTP client to operate in the broadcast mode Broadcast mode specifies that a client switch listens on all interfaces for server broadcast timestamp information It uses these messages to update its time To set an OmniSwitch to operate in the broadcast mode enter the ntp broadcast command as sh
231. hot command is entered The key is indicated in the file by the syntax authkey key See Chapter 6 Working With Config uration Files for information about using the snapshot command The key is not displayed in the CLI Removing SNMP Access From a User To deny SNMP access enter the user command with the no snmp option gt user thomas no snmp This command results in thomas no longer having SNMP access to manage the switch OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 7 19 Setting Up End User Profiles Managing Switch User Accounts Setting Up End User Profiles End user profiles are designed for user accounts in the carrier market With end user profiles a network administrator can configure customer login accounts that restrict users to particular command areas over particular ports and or VLANs End user profiles are only managed and stored on the switch profiles are not stored on external servers Note End user profiles cannot be used in conjunction with user partitioned management the features are mutually exclusive The following table shows the end user command areas and the commands associated with each area Area Keyword Available Commands physical trap port link interfaces alias flow interfaces flow wait interfaces no L2 statistics interfaces admin show interfaces vlan table vlan vlan dhcp mac vlan stp vlan dhcp mac range vlan authentication vlan router ipx vla
232. hronizing a Stack with Three More Switches 3 The contents of the certified direc tory of the pri mary CMM switch are copied to the working directory of additional switches The working directory is then copied to the certified direc tory W C 4 In a stack of four or more switches the sec ondary CMM switch assists in the synchroniza tion process after it has been syn chronized with the primary CMM switch page 4 12 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing CMM Directory Content Managing the Directory Structure Non Redundant Managing the Directory Structure Non Redundant The following sections define commands that allow the user to manipulate the files in the directory struc ture of a single CMM in an OmniSwitch 9000 or of a single OmniSwitch 6800 6850 switch Note All of the commands described in the following sections work on OmniSwitch 6800 and 6850 switches in a stack with redundancy enabled These commands also work on OmniSwitch 9000 switches with redundant CMMs However there may be special circumstances that apply when modifying parame ters on a switch in a stack OmniSwitch 6800 and 6850 that do not apply to a single switch The same special circumstances that apply when modifying parameters on a switch with a redundant CMM OmniSwitch 9000 do not apply to a switch without a redundant CMM Redundant command usage is covered in
233. iSwitch s directory sftp gt ls 287 boot params 2048 certified 2048 working 64000 swlogl log 64000 swlog2 1log30 policy cfg 2048 network 206093 cs_system pmd 2048 LPS 256 random seed 4 Use the mkdir command to create a new directory entitled newssdir in the target OmniSwitch Remember you must specify the path for the new directory as follows sftp gt mkdir flash newssdir 5 Use the Is command again to list the contents of the current flash directory Note that the newssdir directory appears toward the bottom of the following list sftp gt ls page 1 34 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing System Files Application Examples for File Management 287 boot params 2048 certified 2048 working 64000 swlogl log 64000 swlog2 log30 policy cfg 2048 network 206093 cs_system pmd 2048 LPS 2048 newssdir 256 random seed OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 1 35 Verifying Directory Contents Managing System Files Transfer a File Using Secure Shell FTP To demonstrate how to transfer a file by using the Secure Shell FTP this application example continues from the previous example where a new directory named newssdir was created on a remote OmniSwitch 1 Use the Secure Shell FTP put command to transfer the file testfile1 rr from the local OmniSwitch to the newssdir directory on the remote OmniSwitch You must specify the loca
234. icense whose permissions for other licensees extend to the entire whole and thus to each and every part regardless of who wrote it Thus it is not the intent of this section to claim rights or contest your rights to work written entirely by you rather the intent is to exercise the right to control the distribution of derivative or collective works based on the Program In addition mere aggregation of another work not based on the Program with the Program or with a work based on the Program on a volume of a storage or distribution medium does not bring the other work under the scope of this License 3 You may copy and distribute the Program or a work based on it under Section 2 in object code or executable form under the terms of Sections and 2 above provided that you also do one of the following a Accompany it with the complete corresponding machine readable source code which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software inter change or page A 6 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Software License and Copyright Statements Third Party Licenses and Notices b Accompany it with a written offer valid for at least three years to give any third party for a charge no more than your cost of physically performing source distribution a complete machine readable copy of the corresponding source code to be distributed under the terms of Sections 1
235. icking an adjacent switch will show a list of IP addresses that the adjacent switch maintains and if a route from this switch to the selected IP of the adjacent switch exists may allow for Webview to be launched for subsequent configuration Click to display Mouse Adjacencies 7 Page switch to i display switch Remote VLAN 73 Remote Ifc 1 2 MAC 00 00 95 9C C6 E0 Layer 2 Networking Policy vw 24 Security System E z E Time sncelastrefeshi0000003 2 ff fff fig internet Z Adjacencies View page 9 18 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using WebView WebView Help WebView Help A general help page for using WebView is available from the banner at the top of the page In addition on line help is available on every WebView page Each help page provides a description of the page and specific instructions for each configurable field General WebView Help To display general help for WebView click the Help option in the WebView banner For information about the banner see WebView Page Layout on page 9 5 The information in the help page is similar to the information given in this chapter Specific page Help Each help page provides a description of the page and a description for each field To access help from any global configuration page table page or Add or Modify window 1 Click the Help button at the bottom of the page
236. ide page 2 24 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 3 Configuring Network Time Protocol NTP Network Time Protocol NTP is used to synchronize the time of a computer client or server to another server or reference time source such as a radio or satellite receiver It provides client time accuracies within a millisecond on LANs and up to a few tens of milliseconds on WANs relative to a primary server synchronized to Universal Coordinated Time UTC via a Global Positioning Service receiver for exam ple In This Chapter This chapter describes the basic components of the OmniSwitch implementation of Network Time Proto col and how to configure it through Command Line Interface CLI CLI commands are used in the configuration examples for more details about the syntax of commands see the OmniSwitch CLI Refer ence Guide Configuration procedures described in this chapter include e Enabling the NTP client and selecting the NTP mode See Configuring the OmniSwitch as a Client on page 3 9 Selecting an NTP server for the NTP client and modifying settings for communicating with the server See NTP Servers on page 3 10 e Enabling authentication in NTP negotiations See Using Authentication on page 3 12 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 3 1 NTP Specifications Configuring Network Time Protocol NTP NTP Specifications RFCs supported
237. ide Modifications to the switch parameters affect or change the configuration file The image files are static for the purposes of running the switch though they can be updated and revised with future releases or enhancements Image and configuration files are stored in the Flash memory which is equivalent to a hard drive memory in specified directories When the switch is running it loads the image and configura tion files from the Flash memory into the RAM When changes are made to the configuration file the changes are first stored in the RAM The procedures for saving these changes via the CLI are detailed in the sections to follow CMM Software Directory Structure The directory structure that stores the image and configuration files is divided into two parts e The certified directory contains files that have been certified by an authorized user as the default files for the switch Should the switch reboot it would reload the files in the certified directory to reactivate its functionality e The working directory contains files that may or may not be altered from the certified directory The working directory is a holding place for new files Files in the working directory must be tested before committing them to the certified directory You can save configuration changes to the working direc tory You can reboot the switch from the working directory by using the reload working command as described in Rebooting from the Working Di
238. ierarchy to access commands Once you enter a command mode you must step your way back to the top of the hierarchy before you can enter a command in a different mode The Alcatel Lucent switch will answer any CLI command at any time because there is no hierarchy Online Configuration To configure parameters and view statistics you must connect the switch to a terminal such as a PC or UNIX workstation using terminal emulation software This connection can be made directly to the switch s serial port through a modem or over a network via Telnet For information about connecting a terminal to the switch see the appropriate Getting Started Guide Note If you are using an OmniSwitch 6800 or an OmniSwitch 6850 switch in a stacked configuration you must be connected to the console port of the primary switch For detailed information on primary switch status refer to the Managing Stacks chapter in the appropriate Hardware Users Guide Once you are logged in to the switch you may configure the switch directly using CLI commands Commands executed in this manner normally take effect immediately The majority of CLI commands are independent single line commands and therefore can be entered in any order However some functions may require you to configure specific network information before other commands can be entered For example before you can assign a port to a VLAN you must first create the VLAN For information about CLI command requi
239. iew of User Accounts Managing Switch User Accounts Quick Steps for Network Administrator User Accounts 1 Configure the user with the relevant username and password For example to create a user called thomas with a password of techpubs enter the following gt user thomas password techpubs For information about creating a user and setting up a password see Creating a User on page 7 10 2 Configure the user privileges and SNMP access if the user should have privileges that are different than those set up for the default user account For example gt user thomas read write domain network ip helper telnet For information about the default user settings see the next section For information about setting up privi leges see Configuring Privileges for a User on page 7 17 Note Optional To verify the user account enter the show user command The display is similar to the following User name admin Read Only for domains None Read Write for domains All Snmp not allowed User name public Read Only for domains None Read Write for domains All Snmp authentication NONE Snmp encryption NONE User name thomas Read Only for domains None Read Write for domains Network Read Write for families telnet ip helper Snmp not alloweds User name default Read Only for domains None Read Write for domains None Snmp not allowed For more information about the show user
240. ified Enter the user command with default as the user name Note that the default user may only store default functional privileges or a default end user profile The default user cannot be configured with both privileges and a profile The following example modifies the default user account with read write access to all CLI commands gt user default read write all In this example any new user that is created will have read and write access to all CLI commands unless a specific privilege or SNMP access is configured for the new user For more information about configur ing privileges see Setting Up End User Profiles on page 7 20 The privilege default is particularly important for users who are authenticated via an ACE Server which only supplies username and password information or for users who are authenticated viaa RADIUS or LDAP server on which privileges are not configured For more information about these servers see the Managing Authentication Servers chapter of the OmniSwitch 6800 6850 9000 Network Configuration Guide Account and Password Policy Settings The switch includes global password settings that are used to implement and enforce password complex ity when a password is created modified and used These user configurable settings apply the following password requirements to all user accounts configured for the switch e Minimum password size e Whether or not a password can contain the account username
241. ig command Sending Traps to WebView When WebView forwarding is enabled all traps sent by switch applications are also forwarded to WebView The following command allows a WebView session to retrieve the trap history log gt snmp trap to webview enable OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 10 31 SNMP MIB Information Using SNMP SNMP MIB Information MIB Tables You can display MIB tables and their corresponding command families by using the show snmp mib family command The MIB table identifies the MIP identification number the MIB table name and the command family If a command family is not valid for the entire MIB table the command family will be displayed on a per object basis For a list and description of system MIBs refer to Industry Standard MIBs on page 10 33 and Enter prise Proprietary MIBs on page 10 38 For a list and description of traps refer to the SNMP Traps Table on page 10 10 The following is a partial display gt show snmp mib family MIP ID MIB TABLE NAME FAMILY a at ie a a es te 4 tt eee esmConfTrap NO SNMP ACCESS alcetherStatsTable interface dot3ControlTable interface dot3PauseTable interface dot3StatsTable interface esmConfTable interface healthModuleTable rmon healthPortTable rmon healthThreshInfo rmon vrrpAssolpAddrTable vrrp vrrpOperTable vrrp vrrpOperations vrrp vrrpRou
242. igin of the fault The contained and the significant portion are varying in accordance with chassisTrapsStrErrorNb The length of this field is expressed in bytes 10 chassisTrapsAlert physicalIndex chassis A notification that some change chassisTrap has occurred in the chassis sObjectType chassisTrap sObjectNum ber chassisTrapsA lertNumber chassisTrapsA lertDescr physicalIndex The physical index of the involved object chassisTrapsObjectType An enumerated value that provides the object type involved in the alert trap chassisTrapsObjectNumber A number defining the order of the object in the set e g the number of the considered fan or power supply This is intended to clarify as much as possible the location of the failure or alert An instance of the appearance of the trap could be failure on a module Power supply 3 chassisTrapsAlertNumber This number that identifies the alert among all the possible chassis alert causes chassisTrapsAlertDescr The description of the alert matching ChassisTrapsAlertNumber page 10 12 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using SNMP SNMP Overview No Trap Name Objects Family Description 11 chassisTrapsStateChange physicalIndex chassis An NI status change was chassisTrap detected sObjectType chassisTrap sObjectNum ber chasEntPhys OperStatus physicalIndex tThe physical index of the involved object chassisTrapsObjectType
243. igured using the following user password policy commands Command Configures user password policy min uppercase The minimum number of uppercase characters required in all passwords user password policy min lowercase The minimum number of lowercase characters required in all passwords user password policy min digit The minimum number of base 10 digits required in all passwords user password policy min nonalpha The minimum number of non alphanumeric char acters symbols required in all passwords Specifying zero with any of the these commands disables the requirement For example if the number of minimum uppercase characters is set to zero the default then there is no requirement for a password to contain any uppercase characters Configuring Password Expiration By default password expiration is disabled on the switch A global default password expiration may be specified for all users or password expiration may be set for an individual user Note When the current user s password has less than one week before expiration the switch will display an expiration warning after login If a user s password expires the user will be unable to log into the switch through any interface the admin user must reset the user s password If the admin user s password expires the admin user will have access to the switch through the console port with the currently configured password Default Password Expiration
244. ile into the new directory by using Secure Shell FTP 1 Log on to the switch and issue the sftp CLI command with the IP address for the device you are connecting to The following command establishes a Secure Shell FTP interface from the local OmniSwitch to another OmniSwitch at IP address 10 222 30 125 gt sftp 10 222 30 125 login as Note If SFTP is not enabled use the scp sftp command to enable it You can use the sftp6 command followed by the IPv6 address or hostname of the SFTPv6 server to start an SFTPv6 session over an IPv6 environment For example gt sftp6 fe80 a00 20ff fea8 8961 intl login as Note SFTPv6 sessions are supported only on OmniSwitch 6850 or 9000 It is mandatory to specify the name of the particular IPv6 interface if the SFTPv6 server has been specified using its link local address 2 You must have a login and password that is recognized by the IP address you are logging in to When you enter your login the device will request your password Here the login rrlogin2 is used the system requests a password gt sftp 10 222 30 125 login as rrlogin2 rrlogin2 s password for keyboard interactive method Once the correct password is given and the login is completed the sftp gt prompt is displayed This indi cates that you are in the Secure Shell FTP mode and must therefore use the Secure Shell FTP commands as listed on page 1 25 3 Use the Is command to display the contents of the target Omn
245. iles and the accompanying user documentation collectively the Licensed Materials only as authorized in this License Agreement Licensee subject to the terms of this License Agreement may use one copy of the Licensed Files on the Licensee s system Licensee agrees not to assign sublicense transfer pledge lease rent or share their rights under this License Agreement Licensee may retain the program media for backup purposes with retention of the copyright and other proprietary notices Except as authorized under this paragraph no copies of the Licensed Materials or any portions thereof may be made by Licensee and Licensee shall not modify decompile disassemble reverse engineer or otherwise attempt to derive the Source Code Licensee is also advised that Alcatel Lucent products contain embedded software known as firmware which resides in silicon Licensee may not copy the firmware or transfer the firmware to another medium 2 Alcatel Lucent s Rights Licensee acknowledges and agrees that the Licensed Materials are the sole property of Alcatel Lucent and its licensors herein its licensors protected by U S copyright law trade mark law and are licensed on a right to use basis Licensee further acknowledges and agrees that all rights title and interest in and to the Licensed Materials are and shall remain with Alcatel Lucent and its licen sors and that no such right license or interest shall be asserted with respect to
246. ime O00days OOhours LOminutes 19seconds Running Version Working Software Version 6 1 5 393 R01 Development April 24 2007 Certify Status Need to Certify Synchronization Status One CMM E Time since last refresh 0 00 00 01 Internet Group WN ChassisMomt Toolbar ka Health Ethemet z x Console Port Configuration me Feature EL ead Adiacendes Banner WebView Chassis Home Page The following features are available in the WebView Banner e Options Brings up the User Options Page which is used to change the user login password e Save Config Brings up the Save Configuration Screen Click Apply to save the switch s running configuration for the next startup e Help Brings up general WebView Help Specific help pages are also available on each configuration page e About Provides basic WebView product information e Telnet Brings up a Telnet session window through which you can access the switch for CLI configu ration e Log Out Logs the user out of the switch and ends the user session After logout the login screen appears The user can log back into the switch or just close the login screen Toolbar Switch configuration is divided into configuration groups in the toolbar for example Physical Layer 2 etc Under each configuration group are switch features identified by a name and an icon For detailed configuration information on each feature see other chapters
247. in this guide or the OmniSwitch 6800 6850 9000 Network Configuration Guide or Advanced Routing Configuration Guide Help pages are also available in WebView page 9 6 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using WebView WebView Overview Feature Options Feature configuration options are displayed as drop down menus at the top of each feature page For more information on using the drop down menus see Configuration Page on page 9 10 View Configuration Area The View Configuration area is where switch configuration information is displayed and where configura tion pages appear After logging into WebView a real time graphical representation of the switch displays all of the switch s current components The feature configuration options on this page are used to config ure the switch OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 9 7 Configuring the Switch With WebView Using WebView Configuring the Switch With WebView The following sections provide an overview of WebView functionality For detailed configuration proce dures see other chapters in this guide the OmniSwitch 6800 6850 9000 Network Configuration Guide or the OmniSwitch 6800 6850 9000 Advanced Routing Configuration Guide Accessing WebView WebView is accessed using any of the browsers listed on page 9 1 All of the necessary WebView files are stored on the switch To access WebView and login to a s
248. ing FTP to Log Into the Switch oo ccccccesccseseeeeseeeseeeeeeesecseeenseeeeseenseeeeaes 2 10 iv OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Contents Chapter 3 Chapter 4 LOEN ae ee ia e T l D i secs ged satchel tne S Sea sae Soothes sede ee tc hse dt set oot 2 12 Secure Shell Components 0 ccccecssccssssceseeseneceenseesseeeeeeeseecsecseecseneeeseeeeseeseeenas 2 12 Secure Shell Interface cccceccccsccsssecesseeeeseeeeeeeseeesseeeseecsseeeeseeeeeeeeeesaeenes 2 12 Secure Shell File Transfer Protocol cccccccssceeseeessceeneeeeeeeseeesseecnseesseeensnes 2 12 Secure Shell Application Overview cccccecsssesssesseeesseceseeeseceesssesseeeseneeeseeseeeesaes 2 13 Secure Shell Authentication ccccccecesccesecssssceeseeesseeeeeeeseecescesseeesseeeeeeeteeesseeenes 2 14 Protocol Identification cccecscceeseeseceeseeeseeeeseeeseecesecsseeeeeecseeesseeeseeeseeeees 2 14 Algorithm and Key Exchange ccccccccccsssessseeseseceeeeesseceeseeeseeesaeeeseeeneeenseees 2 14 Authentication Phase cccccecccccssceesseeseceeseeeseeeseeesseecssaecnseesseeeseeesneeseaeensneees 2 14 Connection Phaser s sc crete s crs ceaee sarees wcheeteneeiiey netic event eee 2 15 Using Secure Shell DSA Public Key Authentication occ ceseesesecereeeneeneeeneees 2 15 Starting a Secure Shell Session cccccecsscessseeseceeseeeesecsseeeesceesseeseeeeseeeeseessteeennes 2 15 Closing a Secure Shell Sessio
249. ing on the type of user The switch has several interfaces console Telnet HTTP FTP Secure Shell and SNMP through which users may access the switch The switch may be set up to allow or deny access through any of these inter faces See Chapter 8 Managing Switch Security for information about setting up management inter faces In This Chapter This chapter describes how to set up user accounts locally on the switch through the Command Line Inter face CLI CLI commands are used in the configuration examples for more details about the syntax of commands see the OmniSwitch CLI Reference Guide This chapter provides an overview of user accounts In addition configuration procedures described in this chapter include e Creating a User on page 7 10 e Configuring Password Policy Settings on page 7 12 e Configuring Privileges for a User on page 7 17 e Setting Up SNMP Access for a User Account on page 7 18 e Setting Up End User Profiles on page 7 20 For information about enabling management interfaces on the switch see Chapter 8 Managing Switch Security For information about connecting a management station to the switch see Chapter 1 Managing System Files and the appropriate Getting Started Guide User information may also be configured on external servers in addition to or instead of user accounts configured locally on the switch except end user profiles which may only
250. iption Dependencies ALCATEL IND1 Definitions of managed objects for the Port Mirroring SNMPv2 SMI PORT MIRRORING and Monitoring subsystem SNMPv2 TC MONITORING MIB SNMPv2 CONF ALCATEL IND1 Definitions of managed objects for the Quality of Ser SNMPv2 SMI QOS MIB vice QoS subsystem SNMPv2 TC ALCATEL IND1 Definitions of managed objects for the Router Discov SNMPv2 SMI RDP MIB ery Protocol RDP subsystem SNMPv2 TC SNMPv2 CONF ALCATEL IND1 Definitions of managed objects for the Routing Infor SNMPv2 SMI RIP MIB mation Protocol RIP subsystem SNMPv2 TC SNMPv2 CONF ALCATEL IND1 Definitions of managed objects for the Routing Infor SNMPv2 SMI RIPNG MIB mation Protocol RIPng subsystem SNMPv2 TC SNMPv2 CONF IPv6 TC ALCATEL IND1 Definitions of managed objects for the User Session SNMPv2 SMI SESSION MGR MIB Manager subsystem SNMPv2 TC SNMPv2 CONF ALCATEL IND1 Definitions of managed objects for the Server Load SNMPv2 SMI SLB MIB Balancing SLB subsystem SNMPv2 TC SNMPv2 CONF ALCATEL IND1 Definitions of managed objects for the Simple Net SNMPv2 SMI SNMP AGENT MIB work Management Protocol SNMP Agent sub SNMPv2 TC system SNMPv2 CONF ALCATEL IND1 Definitions of the managed objects for Stack Manager SNMPv2 SMI STACK MANAGER Chassis Stack Manager Statistics and Stack Manager SNMPv2 TC Traps SNMPv2 CONF ALCATEL IND1 Definitions of managed objects for the System Ser SNMPv2 SMI SYSTEM MIB vices subsystem SNMPv2
251. irectory Structure Non Redundant Managing CMM Directory Content When the software on the working directory of a switch has proven to be effective and reliable eventually the contents of the working directory should be copied into the certified directory To copy the contents of the working directory to the certified directory enter the following command at the prompt gt copy working certified The copy working certified command is only valid if the switch is running from the working directory If you attempt to copy the working directory to the certified directory when the switch is running from the certified directory nothing will happen and the files in the certified directory will remain unchanged Note In order for this command to work the amount of free space in flash must equal the size of the files being copied If there isn t enough free space the copy attempt will fail and an error message will be generated Only image files the boot cfg file and the certs pem file should be kept in the working direc tory Note In OmniSwitch 6800 and 6850 switches only it is important to synchronize the stack as soon as the validity of the software is established Unsynchronized stacks are at risk of mismanaging data traffic due to incompatibilities in different versions of switch software Synchronizing the switch is described in Synchronizing the Primary and Secondary CMMs on page 4 27 Copying the Certified Directory to
252. iscovery SNMPv2 SMI MLD MIB MLD subsystem SNMPv2 TC SNMPv2 CONF INET ADDRESS MIB IF MIB ALCATEL IND1 Definitions of the Network Time Protocol NTP sub SNMPv2 SMI NTP MIB system SNMPv2 TC ALCATEL IND1 Definitions of managed objects for the Open Shortest SNMPv2 SMI OSPF MIB Path First OSPF subsystem SNMPv2 TC SNMPv2 CONF ALCATEL IND1 Definitions of managed objects for the Open Shortest SNMPv2 SMI OSPF3 MIB Path First 3 OSPF3 subsystem SNMPv2 CONF ALCATEL IND1 Definitions of the user Partitioned Manager sub SNMPv2 SMI PARTITIONED MGR system SNMPv2 TC MIB SNMPv2 CONF Q BRIDGE MIB SNMP FRAMEWORK MIB SNMPv2 TC ALCATEL IND1 Definition of managed objects for the Coronado SNMPv2 SMI PCAM MIB Layer3 Hardware Routing Engine HRE SNMPv2 TC SNMPv2 CONF ALCATEL IND1 PIM Definitions of managed objects for the Protocol Inde SNMPv2 SMI MIB pendent Multicast Sparse Mode PIM SM and Proto SNMPv2 TC col Independent Multicast Dense Mode PIM DM SNMPv2 CONF subsystem ALCATEL IND1 BASE ALCATEL IND1 Definitions of managed objects for the Policy Manager SNMPv2 SMI POLICY MIB subsystem SNMPv2 TC SNMPv2 CONF ALCATEL IND1 Definitions of managed objects for the Port Manager SNMPv2 SMI PORT MIB subsystem SNMPv2 CONF IF MIB page 10 40 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using SNMP SNMP MIB Information MIB Name Descr
253. it more useful to permit linking proprietary appli cations with the library If this is what you want to do use the GNU Library General Public License instead of this License URLWatch For notice when this page changes fill in your email address Maintained by Webmaster Linux Online Inc Last modified 09 Aug 2000 02 03AM Views since 16 Aug 2000 177203 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page A 9 Third Party Licenses and Notices Software License and Copyright Statements Material copyright Linux Online Inc Design and compilation copyright c 1994 2002 Linux Online Inc Linux is a registered trademark of Linus Torvalds Tux the Penguin featured in our logo was created by Larry Ewing Consult our privacy statement URLWatch provided by URLWatch Services All rights reserved E University of California Provided with this product is certain TCP input and Telnet client software developed by the University of California Berkeley F Carnegie Mellon University Provided with this product is certain BOOTP Relay software developed by Carnegie Mellon University G Random c PR 30872 B Kesner created May 5 2000 PR 30872 B Kesner June 16 2000 moved batch_entropy_process to own task iWhirlpool to make code more efficient random c A strong random number generator Version 1 89 last modified 19 Sep 99 Copyright Theodore Ts o 1994 1995 1996 1997 1998 1999 All rights reserved Redi
254. itch s console serial port to load software by using Zmodem e Your system is having problems and the FTP transfer method does not work e The switch s Ethernet Management port is either not functioning or not configured To use Zmodem you must have a terminal emulator that supports the Zmodem protocol There are many Zmodem products available that operate differently You should consult the user manual that came with your terminal emulation software for details Note If a file you are transferring already exists in the switch s flash memory you must remove the file before transferring the new file via Zmodem Workstation OmniSwitch Ld L EEA Zmodem is used to transfer a file from a workstation to Zmodem the OmniSwitch Zmodem File Transfer To transfer a file via Zmodem complete the following steps 1 Connect your terminal emulation device containing the Zmodem protocol to the switch s console port 2 Start the Zmodem process on your switch by executing the rz command gt TZ A screen similar to the following will appear Upload directory flash rz ready to receive file please start upload or send 5 CTRL X s to abort B000000023be50 3 Transfer the files by using your terminal emulation software The following will be displayed ZMODEM file transfer successful Hit lt RETURN gt to exit When the transfer is complete you can use the Is command to verify that the new files w
255. itch Access Authenticated Switch Access ASA is a way of authenticating users who want to manage the switch With authenticated access all switch login attempts using the console or modem port Telnet FTP SNMP or HTTP require authentication via the local user database or via a third party server This section describes how to configure management interfaces for authenticated access as well as how to specify external servers that the switch can poll for login information The type of server may be an authentication only mechanism or an authentication authorization and accounting AAA mechanism AAA Servers RADIUS or LDAP AAA servers are able to provide authorization for switch management users as well as authentication they also may be used for accounting The AAA servers supported on the switch are Remote Authentication Dial In User Service RADIUS or Lightweight Directory Access Protocol LDAP servers User login information and user privileges may be stored on the servers Privileges are used for network administrator accounts Instead of user privileges an end user profile may be associated with a user for customer login accounts User information configured on an external server may include a profile name attribute The switch will attempt to match the profile name to a profile stored locally on the switch The following illustration shows the two different user types attempting to authenticate with a AAA server Network Ad
256. itch will display the file text on your terminal screen until the entire screen is full After that when you press Enter the switch will scroll the file text until it fills up another screen or until the end of the file The more mode assumes a screen that is 80 columns wide and 24 lines long Text Editing on the Switch The switch software includes a standard UNIX type line editor called V1 The Vi editor is available on most UNIX systems No attempt is being made to document Vi in this manual because information on it is freely available on the Internet Invoke the Vi Editor You can invoke the Vi editor from the command line Use the following syntax to view the switchlog txt file located in the flash working directory gt vi flash working switchlog txt You can invoke the Vi editor in read only mode by using the following syntax gt view To exit the Vi editor use the Cap ZZ key sequence OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 6 9 Creating Snapshot Configuration Files Working With Configuration Files Creating Snapshot Configuration Files You can generate a list of configurations currently running on the switch by using the configuration snapshot command A snapshot is a text file that lists commands issued to the switch during the current login session Note A user must have read and write permission for the configuration family of commands to generate a snapshot file for
257. king directory is described in Copying the Working Directory to the Certified Directory on page 4 21 while synchronizing the switch is described in Synchronizing the Primary and Secondary CMMs on page 4 27 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 4 11 CMM Files Managing CMM Directory Content Scenario 4 Adding a New Switch to a Stack Since the OmniSwitch 6800 and 6850 switches are designed to be expandable it is very likely that new switches will be added to stacks The OmniSwitch 6800 and 6850 automatically detects new switches added to the stack and new switches can pass traffic without a complete reboot of the stack However a new switch added to the stack may not have the same software as the rest of the stack In this case the new switch will need to be synchronized with the stack software The following diagram illustrates this idea The diagram shows a stack of three switches to which a fourth switch is added W C Se 1 Stack is pow ered up and boots from the certified directory or a copy flash synchro com mand is issued l p W C W C 2 The contents of the certified direc tory of the primary CMM switch are copied to the working directory of the secondary CMM switch The working directory is then copied to the certi fied directory Sync
258. l local radl local radl local radl local radl local radl local page 8 8 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing Switch Security Setting Up Management Interfaces for ASA Setting Up Management Interfaces for ASA By default authenticated access is available through the console port Access through other management interfaces is disabled Other management interfaces include Telnet FTP HTTP Secure Shell and SNMP This chapter describes how to set up access for management interfaces For more details about particular management interfaces and how they are used see Chapter 2 Logging Into the Switch To give switch access to management interfaces use the aaa authentication command to allow or deny access to each interface type the default keyword may be used to configure access for all interface types Specify the server s to be used for authentication through the indicated management interface Keywords used for specifying management interfaces are listed here keywords console ssh telnet snmp ftp default http Note that ssh is the keyword used to specify Secure Shell To specify an external authentication server or servers use the RADIUS or LDAP server name or the keyword ace for an ACE Server To specify that the local user database should be used for authentication use the local keyword Up to four servers total may be specified RADIUS and LDAP se
259. l Load a Not Loaded Not Loaded 7 Not Loaded Not Loaded Apply Restore Apply Restore Apply Restore Not Loaded UDP Relay Adminis trative Stat OSPF Disabled not loaded A BGP Disabled not loaded RIP __ Disabled not loaded Services Policy Securty System hetp 10 255 73 12 ipfcontentfip_ctxt html IP Home Page ee Webview 10 255 73 12 Microsoft Internet Explorer File Edit View Favorites Tools Help Q O x A GD seer Derne 2 Address http 10 255 73 12 web content login html 2 5 Click on a Alcatel Lucent WebView figuration Help About Telnet Log Out configuration option to display the i configuration T RIPRIPV2 page Home RIP Not Loaded Global Routes 8 OSPF Forwarding Global Parameter OSPF Not Loaded 4 Static interfe Click on the a spear ii clare Interfaces sla SS BGP Not Loaded browser Back Denial of Service ELEIT apa BUCS SMD View ARP Table 40 Redistribution button to return Ebi Create ARP Pv4 Protocols Service Permanent Route Maps IP Multicast Proxy to the Home utica Lee oes IPv4 Access Lists Page G WRRP VRRP2 Je Global Configuration UDP Relay Virtual Routers Addresses Statistics Tracks Track Associations IP Site Map page 9 10 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using WebView Configuring the Switch With WebView Configuration Page Featu
260. l allow you to configure more advanced switching features later What is in this Manual This configuration guide includes information about the following features e Basic switch administrative features such as file editing utilities procedures for loading new software and setting up system information name of switch date time e Configurations files including snapshots off line configuration time activated file download e The CLI including on line configuration command building help syntax error checking and line edit ing e Basic security features such as switch access control and customized user accounts e SNMP e Web based management WebView What is Not in this Manual The configuration procedures in this manual primarily use Command Line Interface CLI commands in examples CLI commands are text based commands used to manage the switch through serial console port connections or via Telnet sessions This guide does include introductory chapters for alternative methods of managing the switch such as web based WebView and SNMP management However the primary focus of this guide is managing the switch through the CLI Further information on WebView can be found in the context sensitive on line help available with that application page xiv OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 This guide does not include documentation for the OmniVista network management system However
261. l path where the file originates and the remote path where the file is going in the command syntax The following command is used sftp gt put flash testfilel rr flash newssdir The following will be displayed to indicate that the file was successfully transferred to the flash newss dir on the target OmniSwitch Uploading flash testfilel rr to flash newssdir testfilel rr 2 To verify that the file was transferred to the correct destination use the Secure Shell FTP ed command to move your login to the newssdir directory Then use the Is command to list the contents of the directory The copied file is listed in the correct directory as shown here sftp gt cd newssdir sftp gt ls 2048 2048 31 testfilel rr Closing a Secure Shell FTP Session To terminate the Secure Shell FTP session issue the exit command The following will be displayed gt exit Connection to 11 333 30 135 closed This display indicates the Secure Shell FTP session with IP address 11 333 20 135 is closed The user is now logged into the OmniSwitch as a local device with no active remote connection Verifying Directory Contents To display a list of files the following CLI commands may be used Is Displays the contents of a specified directory or the current working directory dir Displays the contents of a specified directory or the current working directory rls Displays the content of a non primary switch in a stack For mor
262. led Enobled Enabled Modity Delete Retesh Appty Appiy Apply x E intenet a Table Paging Feature OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 9 17 Configuring the Switch With WebView Using WebView Adjacencies WebView provides a graphical representation of all AMAP supported Alcatel Lucent switches and IP phones adjacent to the switch The following information for each device is also listed e IP address e MAC address e Remote slot port By clicking on a device the Web based device manager if available is displayed for that device If a Web based device manager is not available a Telnet session may be launched A route to the adjacent switch must exist in the IP routing table in order for a Web based device manager or Telnet session to be launched To display the adjacencies click on the Adjacencies button under the Physical group The page displays similar to the following z 0 aaa antn 0j x File Edt View Favorites Tools Help amp Q O 2G Pow grs O 2 a UA Address http 10 255 73 12 web content login html gt Be Links Alcatel Lucent lt epvie Physical Adjacencies Home Refresh SiteMap Print The switch is able to discover and advertise adjacent switch information using one of its Interswitch Protocols AIP called the Mapping Adjacency Protocol AMAP Below you will see all the AMAP supported switches adjacent to this switch Right cl
263. lient attempts to log into the switch The DSA key on the switch is made up of two files contained in the flash network directory the public key is called ssh_host_dsa_key pub and the private key is called ssh_host_dsa_key To generate a different DSA key use the Secure Shell tools available on your Unix or Windows system and copy the files to the flash network directory For more information about Secure Shell see Chapter 2 Logging Into the Switch Note Secure Shell cannot be used for Authenticated VLANs OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 8 11 Configuring Accounting for ASA Managing Switch Security Configuring Accounting for ASA Accounting servers track network resources such as time packets bytes etc and user activity when a user logs in and out how many login attempts were made session length etc The accounting servers may be located anywhere in the network Note the following e Up to 4 servers may be configured e The servers may be different types e ACE cannot be used as an accounting server e The keyword local must be specified if you want accounting to be performed via the Switch Logging feature in the switch If local is specified it must be the last server in the list Note that external accounting servers are configured through the aaa radius server and aaa tacacs server commands These commands are described in Managing Authentication Servers in
264. lient may be used for remote login to the switch This method is not secure See Using FTP on page 2 10 e Secure Shell Any standard Secure Shell client may be used for remote login to the switch See Using Secure Shell on page 2 12 page 2 6 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Logging Into the Switch Overview of Switch Login Components Using the WebView Management Tool e HTTP The switch has a Web browser management interface for users logging in via HTTP This management tool is called WebView For more information about using WebView see Chapter 9 Using WebView Using SNMP to Manage the Switch e SNMP Any standard SNMP browser may be used for logging into the switch See Chapter 10 Using SNMP User Accounts User accounts may be configured and stored directly on the switch and user accounts may also be config ured and stored on an external authentication server or servers The accounts include a username and password In addition they also specify the user s privileges or end user profile depending on the type of user account In either case the user is given read only or read write access to particular commands e Local User Database The user command creates accounts directly on the switch See Chapter 7 Managing Switch User Accounts for information about creating accounts on the switch e External Authentication Servers The switch may be se
265. m the date of commencement of this License Agreement referred to as the Warranty Period be free from defects in material and workmanship Alcatel Lucent further warrants for Licensee benefit alone that during the Warranty Period the Licensed Files shall operate substantially in accordance with the functional specifications in the User Guide If during the Warranty Period a defect in the Licensed Files appears Licensee may return the Licensed Files to Alcatel Lucent for either replacement or if so elected by Alcatel Lucent refund of amounts paid by Licensee under this License Agreement EXCEPT FOR THE WARRANTIES SET FORTH ABOVE THE LICENSED MATERIALS ARE LICENSED AS IS AND ALCATEL LUCENT AND ITS LICENSORS DISCLAIM ANY AND ALL OTHER WARRANTIES WHETHER EXPRESS OR IMPLIED INCLUD ING WITHOUT LIMITATION ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE SOME STATES DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES SO THE ABOVE EXCLUSIONS MAY NOT APPLY TO LICENSEE THIS WARRANTY GIVES THE LICENSEE SPECIFIC LEGAL RIGHTS LICENSEE MAY ALSO HAVE OTHER RIGHTS WHICH VARY FROM STATE TO STATE 6 Limitation of Liability Alcatel Lucent s cumulative liability to Licensee or any other party for any loss or damages resulting from any claims demands or actions arising out of or relating to this License Agreement shall not exceed the license fee paid to Alcatel Lucent for the Licensed Materials IN NO EVENT SHALL ALCATEL LUC
266. mand refer to Command History on page 5 13 Inserting Characters To insert a character between characters already typed use the Left and Right Arrow keys to place the cursor into position then type the new character Once the command is correct execute it by pressing Enter In the following example the user enters the wrong syntax to execute the show microcode command The result is an error message gt show microcode ERROR flash no such directory To correct the syntax without retyping the entire command line use the command to recall the previous 6699 syntax Then use the Left Arrow key to position the cursor between the r and the c characters To IPR insert the missing character type o gt gt show microcode To execute the corrected command press Enter page 5 10 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using the CLI CLI Services Syntax Checking If you make a mistake while entering command syntax the CLI gives you clues about how to correct your error Whenever you enter an invalid command two indicators are displayed e The Error message tells you what the error is e The caret character tells you where the error is in your syntax The following example of the syntax checking feature shows an attempt to set IP routing If you enter the command set ip routing the following will display gt set ip routing enable A ERRO
267. me it boot params bak enter gt rep cmm b flash boot params boot params bak To delete a file on a secondary management module of the non primary switch use the rrm command To use this command enter rrm followed by the path and file name of the file on the secondary management module of the non primary switch to be deleted For example to delete the boot params file in the flash directory on a secondary management module of the non primary switch enter gt rrm 4 flash boot params To list the directory contents of a secondary management module of the non primary switch use the rls command by entering rls followed by the path name of the directory you want to display As an option you can also specify a specific file name to be displayed For example to display the contents of the flash directory on a secondary management module non primary switch enter gt rls 4 flash A screen similar to the following will be displayed rw 327 Sep 13 16 46 boot params drw 1024 Sep 13 16 46 certified drw 1024 Sep 13 16 45 working rw 64000 Sep 13 16 46 swlog1 log rw 64000 Sep 8 21 24 swlog2 log drw 1024 Sep 13 16 45 switch drw 1024 Sep 10 17 34 network rw 256 Sep 13 16 41 random seed drw 1024 Jun 22 1986 tk dir OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 1 19 File and Directory Management Managing System Files Utility Commands The utility commands include freesp
268. ment Guide December 2007 page 10 13 SNMP Overview Using SNMP No Trap Name Objects healthMonRx Status healthMonRx TxStatus healthMon MemorySta tus healthMonC puStatus 15 healthMonDeviceTrap healthMonCm mTempStatus healthMonCm mCpuTemp Status Family health Description Indicates a device level threshold was crossed healthMonRxStatus Rx threshold status indicating if threshold was crossed or no change healthMonRxTxStatus RxTx threshold status indicating if threshold was crossed or no change healthMonMemoryStatus Memory threshold status indicating if threshold was crossed or no change healthMonCpuStatus CPU threshold status indicating if threshold was crossed or no change healthMonCmmTempStatus CMM temperature threshold status indicating if threshold was crossed or no change healthMonCmmCpuTempStatus CMM CPU temperature threshold status indicating if threshold was crossed or no change 16 healthMonModuleTrap healthModule Slot healthMonRx Status healthMonRx TxStatus healthMon MemorySta tus healthMonC puStatus health Indicates a module level thresh old was crossed healthModuleSlot The one based front slot number within the chassis healthMonRxStatus Rx threshold status indicating if threshold was crossed or no change healthMonRxTxStatus RxTx threshold status indicating if threshold was crossed or no change healthMonMemoryStatus Memory
269. ments of 50 or 100 entries If the table reaches this threshold the first group of entries is displayed and a Next button appears at the bottom of the page Click Next to view the next group of entries Click Previous to view the previous group of entries F Webview 10 255 73 12 Microsoft Internet Explorer Fie Ed Yew Favorkes Tou Help O O 2 2 Dawe vero O oS BL a OB Address 48 hetp 10 255 73 12 webjcontent login hem WebView e Configuraticn Help About Teinat Log Ou 2 E Enabled Inactive Enabled Enabled Disabled Disabled VLAN Mgnt L 93 VLAN 93 Enabled Inactive Enabled Enabled Disabled Off Disabled 94 VLAN 94 Enabled Inactive Enabled Enabled Disabled Off Disabled 95 VLAN 96 Enabled Inactive Enabled Enabled Disabled Off Disabled r 96 VLAN 96 Enabled Inactive Enabled Enabled Disabled Of Disabled E m n VLAN 97 Enabled Inactive Enabled Enabled Disabled Off Disabled Link Aggregation im 96 VLAN 90 Enabled Inactive Enabled Enabled Disabled Off Disabled x 99 VLAN 99 Enabled Inactive Enabled Enabled Disabled Off Disabled m 100 VLAN 100 Enabled Inactive Enabled Enabled Disabled Of Disabled Summary View R s Click Next to view wan the next group of Noate the Prev or Next arrow centered below the table is nat visible use the scrollbar entries Admin Status Hat STP Status 1x1 STP Status Aad Add SVLAN Enob
270. ministrator Customer login request login request LDAP or RADIUS LDAP or RADIUS Server end user y The switch polls the server AZ rofi le and receives login and privi OmniSwitch for login information which OmniSwitch lege information about the may reference a profile user name end user profiles are stored on the switch The switch polls the server AAA Server LDAP or RADIUS For more information about types of users see Chapter 7 Managing Switch User Accounts Authentication only ACE Server Authentication only servers are able to authenticate users for switch management access but authoriza tion or what privileges the user has after authenticating are determined by the switch Authentication only servers cannot return user privileges or end user profiles to the switch The authentication only server supported by the switch is ACE Server which is a part of RSA Security s SecurID product suite RSA Security s ACE Agent is embedded in the switch page 8 4 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing Switch Security Authenticated Switch Access The following illustration shows the two different user types attempting to authenticate with an ACE Server Network Administrator Customer login request login request ACE Server ACE Server Z Gomme User a end user The switch polls the server to g The switch polls the
271. move a user from the local database use the no form of the command gt no user thomas The user account for thomas is removed from the local user database User Configured Password Users may change their own passwords by using the password command In this example the current user wants to change her password to my_passwd Follow these steps to change the password 1 Enter the password command The system displays a prompt for the new password gt password enter old password 2 Enter the old password The password is concealed with asterisks A prompt displays for the new password gt password enter old password enter new password page 7 10 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing Switch User Accounts Creating a User 3 Enter the desired password The system then displays a prompt to verify the password gt password enter old password enter new password k x x reenter new password 4 Enter the password again gt password enter old password enter new password k x reenter new password x x x x gt The password is now reset for the current user At the next switch login the user must enter the new pass word Note A new password cannot be identical to the current password it cannot be identical to any of the three passwords that preceded the current password Also the exclamation point is not a valid pas
272. n c c ccccccsecccsssssetseseseseesesececsetevecscenseveceeesnesenteesees 2 17 Log Into the Switch with Secure Shell FTP ooo cee ccceccesseceeseceteeeeteeesseeenseesseees 2 17 Closing a Secure Shell FTP Session cccccccescesssessseceeseeseeesneeeneeeeeeeseeseeeseeenss 2 19 Modifying the Login Banner cccecsscessecsseeesseeesceceseesscecessecnaeeesseecsseeeeeseseeeneeenseees 2 20 Modifying the Text Display Before Login ccc eeceescceeseceeeeeseeeeeeeseeenseeeeneees 2 21 Configuring Login Parameters 0 cccccccccsssceeseeesseeeseeeseeeeseecssecsseecsececeseeeeaeeenseeeseeensaees 2 22 Configuring the Inactivity Timer cc ceccececessecssceeeeeceseeeeseeeeseeeneeeeseeeseeesesesseeeeeneees 2 22 Enabling the DNS R solVet sissies niceties ies he Bann dees 2 23 Verifying Doom Settings onana het hee ee ee tal es ile 2 24 Configuring Network Time Protocol NTP cccccccccsccsecsscesesecseeeseesees 3 1 In This Chapter eer aenta eaa hated dc e eh ea la Reet a 3 1 NTP Specifications inini r n E Ea A EE E A E E ERS 3 2 NTP Defaults D 0 EE E E 3 2 N E QUICK Steps E A ee 3 3 NIP OVERVIEWS 22d Siecle oo et SON a aa ele beeen chee a 3 5 Stratis eee Re eer PO ee Reg ee ER ee 3 6 Using NIP ima NetWork ece il esta Se eA ee LA aie Ea ee 3 6 Authentication roiie aan aan See eect a deine dealee a hcl teed eed 3 8 Configuring NTP sareetan E A E E a R a 3 9 Configuring the OmniSwitch as a Client ssssss
273. n Files to the Switch Once you have a configuration file located in the switch s file system you must load the file into running memory to make it run on the switch You do this by using configuration apply command You may apply configuration files to the switch immediately or you can specify a timer session In a timer session you schedule a file to be applied in the future at a specific date and time or after a specific period of time has passed like a countdown Timer sessions are very useful for certain management tasks espe cially synchronized batch updates e For information on applying a file immediately refer to Setting a File for Immediate Application on page 6 4 e For information on applying a file at a specified date and time refer to Setting an Application Session for a Date and Time on page 6 4 e For information on applying a file after a specified period of time has elapsed refer to Setting an Application Session for a Specified Time Period on page 6 5 Verifying a Timed Session To verify that a timed session is running use the show configuration status command The following displays where the timed session was set using the configuration apply qos_pol at 11 30 october 31 syntax gt show configuration status File configuration lt qos pol gt scheduled at 01 10 31 11 30 Note Only one session at a time can be scheduled on the switch If two sessions are set the last one will overwrite t
274. n file but a path must be specified for the original file The screen displays a warning that the file is being renamed gt move flash testfiles testfile2 newfile2 WARNING renaming file flash testfiles testfile2 gt flash testfiles newfile2 In each of the above examples a new file will be written to the specified or assumed path with the new filename In each case the file being copied will be removed from its original location OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 1 17 File and Directory Management Managing System Files Change File Attribute and Permissions The chmod and attrib commands have the same function and use the same syntax Use these commands to change read write privileges for the specified file The following syntax sets the privilege for the config1 txt file to read write In this example the user s current directory is the flash file directory Note You must have read write privileges to a file to change that file s privileges To set the permission for the config1 txt file to read only use the following syntax gt chmod w flash configl txt To set the permission for the config1 txt file to read write use the following syntax gt chmod w flash configl txt Delete an Existing File The delete command deletes an existing file If you use the delete command from the directory containing the file you do not need to specify a path If you are in anothe
275. n for the NTP server must be specified on and labeled as trusted on the client side Setting the Key ID for the NTP Server Enabling authentication requires the following steps 1 Make sure the key file is located in the networking directory of the switch This file must contain the key for the server that provides the switch with its timestamp information 2 Make sure the key file with the NTP server s MDS key is loaded into the switch memory by issuing the ntp key load command as shown gt ntp key load 3 Set the server authentication key identification number using the ntp server command with the key keyword This key identification number must be the one the server uses for MD5 encryption For exam ple to specify key identification number 2 for an NTP server with an IP address of 1 1 1 1 enter gt ntp server 1 1 1 1 key 2 4 Specify the key identification set above as trusted A key that has been labeled as trusted is ready for use in the authentication process To set a key identification to be trusted enter the ntp key command with the key identification number and trusted keyword For example to set key ID 5 to trusted status enter the following gt ntp key 5 trusted Untrusted keys even if they are in the switch memory and match an NTP server will not authenticate NTP messages 5 A key can be set to untrusted status by using the ntp key command with the untrusted keyword For example to set key ID 5 to unt
276. n information e g default prompt banner file name and inactivity timer show alias Lists all current commands defined by the use of the alias CLI com mand show prefix Shows the command prefix if any currently stored by the CLI Prefixes are stored for command families that support the prefix recognition fea ture show history Displays commands you have recently issued to the switch The com mands are displayed in a numbered list show more Shows the enable status of the more mode along with the number of lines specified for the screen display For more information about the resulting displays from these commands see the OmniSwitch CLI Refer ence Guide Additional information can also be found in Using Show Commands on page 5 4 page 5 24 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 6 Working With Configuration Files Commands and settings needed for the OmniSwitch 6800 6850 9000 can be contained in an ASCII based configuration text file Configuration files can be created in several ways and are useful in network environments where multiple switches must be managed and monitored This chapter describes how configuration files are created how they are applied to the switch and how they can be used to enhance OmniSwitch usability In This Chapter Configuration procedures described in this chapter include Tutorial for Creating a Configuration File on page 6 2 Applying Config
277. n port default show vlan show vlan port show vlan router mac status vlan 802 1q vlan 802 1q frame type vlan 802 1q force tag internal show 802 1q vlan dhcp port vlan dhcp generic vlan binding mac ip port vlan binding mac port protocol vlan binding mac port vlan binding mac ip vlan binding ip port vlan mac vlan mac range vlan ip vlan ipx vlan protocol vlan user vlan port vlan port mobile vlan port default vlan restore vlan port authenticate show vlan rules show vlan port mobile mac filtering table mac address table mac address table aging time show mac address table show mac address table count show mac address aging time spantree show spantree show spantree ports basic ip routing show arp ip routes table show ip route page 7 20 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing Switch User Accounts Setting Up End User Profiles Creating End User Profiles To set up an end user profile use the end user profile command and enter a name for the profile Specify read only or read write access to particular command areas The profile can also specify port ranges and or VLAN ranges The port ranges and VLAN ranges must be configured on separate command lines and are discussed in the next sections In this example a profile is created with access to physical commands on the switch gt end user profile Profile3 read write physical A pr
278. n the state TEST MODE A value of denyLowPriority 8 indicates that the port was disabled by the power management system in order to keep active higher priority ports Note This trap is not supported on OmniSwitch 6800 and 6850 switches in the current release OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 10 21 SNMP Overview Using SNMP No Trap Name Objects Family Description 48 pethPsePortPowerMaintenanceStatus pethPsePort module Indicates the status of the power PowerMain maintenance signature for inline tenanceStatus power pethPsePortPowerMaintenanceStatus The value ok 1 indicates the Power Maintenance Signature is present and the overcurrent condition has not been detected The value overCurrent 2 indicates an overcurrent condition has been detected The value mPSAbsent 3 indicates that the Power Maintenance Signature is absent Note This trap is not supported only on OmniSwitch 6800 and 6850 switches in the current release 49 pethMainPowerUsageOn pethMainPseC module Indicates that the power inline onsumption usage is above the threshold Power pethMainPseConsumptionPower Measured usage power expressed in Watts Note This trap is not supported only on OmniSwitch 6800 and 6850 in the current release 50 pethMainPowerUsageOff pethMainPseC module Indicates that the power inline onsumption usage is below the threshold Power pethMainPseConsumptionPower Measured usage po
279. nagement Guide December 2007 page A 11 Third Party Licenses and Notices Software License and Copyright Statements L Wind River Systems Inc Provided with this product is certain software Run Time Module licensed from Wind River Systems Inc Licensee is prohibited from i copying the Run Time Module except for archive purposes consis tent with Licensee s archive procedures ii transferring the Run Time Module to a third party apart from the product iii modifying decompiling disassembling reverse engineering or otherwise attempting to derive the source code of the Run Time Module iv exporting the Run Time Module or underlying tech nology in contravention of applicable U S and foreign export laws and regulations and v using the Run Time Module other than in connection with operation of the product In addition please be advised that 1 the Run Time Module is licensed not sold and that Alcatel Lucent and its licensors retain ownership of all copies of the Run Time Module 11 WIND RIVER DISCLAIMS ALL IMPLIED WARRANTIES INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE iii The SOFTWARE LICENSE AGREEMENT EXCLUDES LIABILITY FOR ANY SPECIAL INDIRECT PUNITIVE INCIDENTAL AND CONSE QUENTIAL DAMAGES and iv any further distribution of the Run Time Module shall be subject to the same restrictions set forth herein With respect to the Run Time Module Wind River
280. nario SNMP access is not enabled because only RADIUS servers have been included in the default setting If servers of different types are configured and include LDAP or local SNMP will be enabled through those servers For example gt aaa authentication default radl ldap2 local In this case SNMP access is enabled and users will be authenticated through Idap2 and the local data base The default keyword may also be used to reset a specified interface to the default interface setting For example gt aaa authentication telnet default In this example Telnet users will now be authenticated through the servers that are specified for the default interface Using Secure Shell Secure Shell is recommended instead of Telnet and FTP as a method for accessing the switch Telnet and FTP are not secure Secure Shell contains a secure FTP application that may be used after a Secure Shell session is initiated If Secure Shell is enabled it is recommended that Telnet and FTP be disabled For example gt no aaa authentication telnet gt no aaa authentication ftp gt aaa authentication ssh radl ldap2 local In addition to enabling Secure Shell on the switch you may want to replace the DSA key on the switch The DSA key is generated at initial switch startup and copied to the secondary CMM it includes a private key that generates a digital signature against a public key The Secure Shell client will verify this signa ture when the c
281. national Customer Support 818 878 4507 Internet service esd alcatel lucent com OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Contents Chapter 1 About This Guide ooo ccecccccesceseeeceseeseeseesseeseeecscesecseeseeseceeeaeeaeneseeeeaeeaeeeenes xiii Supported Platforms Sreser o e Ea San ees a RE xiii Who Should Read this Manual encerrona a a a a xiv When Should I Read this Manual ccccceccccssessseceeeeeeneeeeeeeeeeeeeeeeeneeenseeesseesseeenes xiv What is in this Manual s soenseeneneesessseeseeesssseessressressreesseessresessseesesssessessresseesseesesseessees xiv Whatis Notin this Manual siceraria aa a E E S E xiv How is the Information Organized ccccescceeseeeseeeeseeeeseeeseeeeseecsseeeseecsesecenseeeaeeeseeesgs xV Documentation Roadmap cccccccccssccssssssseeeeneceeseeceeeseecssceeesecseceeeeeeeeseeeeeenseesneeensneenes XV Related Documentation cccccccccesseesssceseecssseeeeseesceceeaeeceseeeseecsseecseeenseeesseeeseeeseaeeneneees xvii Wser Manual CD a r a ea e etree Mas eset i a XIX Technical Support ias oien alah Se raiael Ae ee es led as ale een Cates XIX Managing System Files ce ccceccecceseeseeseeseeseeeesecsececeeseeecseeeaeesecaeeeetaeeeeneeaes 1 1 Tn Bhs Chapter sci cong ities iio ee So ee ge 1 1 File Management Specifications cccccccccessscessseeseeesseecsseecneecssceessaeeeeeeeeseeeeeeenseeeaeees 1 2 Switch Administration Ov
282. ne shown here gt show configuration status File configuration lt flash working amzncom cfg txt gt scheduled at 03 07 02 05 02 The scheduled at date and time show when the file will be applied This value is 6 hours and 15 minutes from the date and time the command was issued For more information about this display see Configuration File Manager Commands in the OmniSwitch CLI Reference Guide OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 6 5 Configuration Files Overview Working With Configuration Files Configuration Files Overview Instead of using CLI commands entered at a workstation you can configure the switch using an ASCII based text file You may type CLI commands directly into a text document to create a configuration file that will reside in your switch s flash directory Configuration files are created in the following ways e You may create edit and view a file using a standard text editor such as MS WordPad or Notepad on a workstation The file can then be uploaded to the switch s flash file directory e You can invoke the switch s CLI configuration snapshot command to capture the switch s current configuration into a text file This causes a configuration file to be created in the switch s flash direc tory e You can use the switch s text editor to create or edit a configuration file located in the switch s flash file directory Applying Configuratio
283. nfigured Note All WebView sessions must be terminated before the switch accepts the command For example gt https port 2500 This command changes the secure HTTP port to 2500 To restore an HTTPS port to its default value use the default keyword as shown below gt https port default page 9 4 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using WebView Quick Steps for Setting Up WebView Quick Steps for Setting Up WebView 1 Make sure you have an Ethernet connection to the switch 2 Configure switch management for HTTP using the aaa authentication command Enter the command the port type that you are authenticating http and the name of the LDAP RADIUS ACE or local server that is being used for authentication For example to configure switch management for HTTP using the local authentication server you would enter gt aaa authentication http local 3 Open a web browser 4 Enter the IP address of the switch you want to access in the Address field of the browser and press Enter The WebView login screen appears 5 Enter the appropriate user ID and password the initial user name is admin and the initial password is switch After successful login the Chassis Management Home Page appears WebView Overview The following sections provide an overview of WebView page layouts For information on configuring the switch with WebView see page 9 8 WebView Page Layout As shown below each
284. nge views click on the toggle switch e g Expanded View For example if the table is in summary view click on Expanded View to change to the expanded view From the expanded view click on Summary View to return to the summary view For example Fle Edt Pavortes Took Help Ow O AA lmn ers O Z B JA OB h tp 10 255 73 12 webjcortaet joga hiai WebView fr VLAN SVLAN Description Admin Status Operational Status Flat STP Status dxi STP Status Authentication IP li k r 1 VLAN 1 Enabled Active Enabled Enabled Disabled oF Click to expand r n VLAN 73 Enabled Active Enabled Enabled Disabled On the table Expanded View Admin Status Flat STP Status txi STP Status Ba DSA ea Ea Enema a alata a e Apoty Apply Appty 2 CCT Or Table View Feature Summary View A Wwebview 10 255 73 12 Microsoft Internet Explorer Fie Edt View Favorites Tools Help a Om O AG Dane ines O B AGS WebView uration Help About Telnet Log Out VLAN Mgmt Ej SVLAN Description Admin Operational Flat STP 1x1 STP Authentication VLAN Tag E Vv Status Type Status Status Status Mobile Port 2 Spanning Tree Status n g E 1 VLAN 1 Enabled Active Enabled Enabled Disabled Off Disabled o Click to return to a 73 VLAN 73 Enabled Active Enabled Enabled Disabled On Disabled o Summary vie Summary View Admin Status
285. nly required to enter the suffix information for the next command OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 5 11 CLI Services Using the CLI Example for Using Prefix Recognition This example shows how the Prefix Recognition feature is used for entering multiple commands that have the same prefix This table lists the tasks to be accomplished in this example and the CLI syntax required for each task Task CLI Syntax 1 Create a VLAN with an identification number of 501 vlan 501 enable 2 Enable the spanning tree protocol for VLAN 501 vlan 501 stp enable 3 Enable authentication for VLAN 501 vlan 501 authentication enable To create VLAN 501 and configure its attributes using the CLI commands you could enter the vlan 501 prefix three times However VLAN commands support the prefix recognition capability so redundant entry of this prefix is not necessary For example when you enter gt vlan 501 enable the CLI will automatically store the prefix vlan 501 Now if you enter a related command for the same VLAN you are only required to enter suffix information In this case you can enter the commands to accomplish tasks 2 and 3 as follows gt stp enable gt authentication enable Prefix information will be remembered by the CLI until you enter a command with a new prefix Note If you want to create or configure another VLAN you must reenter the full command prefix including
286. no secondary CMM Hardware or software failures in the CMM will result in a system reboot The System fabric capacity is on half of the fabric capacity of a dual CMM system page 4 28 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing CMM Directory Content Managing Redundancy in a Stack and CMM Swapping the Primary CMM for the Secondary CMM If the primary CMM is having problems or if it needs to be shut down then the secondary CMM can be instructed to take over the switch operation as the primary CMM is shut down Note It is important that the software for the secondary CMM has been synchronized with the primary CMM before you initiate a secondary CMM takeover If the CMMs are not synchronized the takeover could result in the switch running old or out of date software Synchronizing the primary and secondary CMMs is described in Synchronizing the Primary and Secondary CMMs on page 4 27 To instruct the secondary CMM to takeover switch functions from the primary CMM enter the following command at the prompt gt takeover To instruct the secondary CMM to takeover switch functions from the primary CMM with a complete CMM reload enter the following command at the prompt gt takeover with fabric Note On OmniSwitch 9000 switches only the CPM CFM and CPU can be reset independently If the local remote fabric module is in up good state only the CPM will be reset If the local remote
287. nserting Characters atea eta alles Reseed ded tans Sadetedehusded tae EE i Teed 5 10 Syntax Checkin G nore dechinieanstb tan Noes ele Natier i SA dee ia ie 5 11 Prefix RECOpNION sorseiserotereri e e a a a Aa E mee aer e 5 11 Example for Using Prefix Recognition es sssesssesesssesssessressessesssesssesresseesseese 5 12 PrefIX PLOMPE 306 nr anet e i el a i As e 5 13 Command History sn r e aE a E TE EREN A EEEE FEE REF 5 13 vi OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Contents Logging CLI Commands and Entry Results cccccsccsessesceceeneeeeeeeeeeeeeenseeseeensaees 5 15 Enabling Command Logging ccccecccccsscessceeneeeeseeeneeesseeesscecseeesseeeneneneneenes 5 15 Disabling Command Logging ccceeccccessceseeeeneeeesceeeeeeseecseeenseeessaeeeeenseeenes 5 15 Viewing the Current Command Logging Status cccccccesseeeseeeeteeereeeeeees 5 16 Viewing Logged CLI Commands and Command Entry Results 5 16 Customizing the Screen Display cccccsccccseesseeeeseeeeseeeseecsseecsesecsseeesaeeesseeeneeenseeensnes 5 17 Changing the Scerech Sie seniii na Gauss a eeheshdente St 5 17 Changing the CLI Prompt peisir ertrini e a teo aes 5 17 Displaying Table Information ssoeensoeosesesseseeeseessesseeseeseesssesssesressressresseesesseessees 5 18 Filtering Table Information e nnen aE a a a a 5 19 Multiple User Sessions seniii i eoat EE EE E 5 20 Listing Other User Sessions cccccc
288. nt interface for users logging in via HTTP This management tool is called WebView page 7 4 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing Switch User Accounts Overview of User Accounts e Secure Shell Any standard Secure Shell client may be used for logging into the switch e SNMP Any standard SNMP browser may be used for logging into the switch For more information about connecting to the switch through one of these methods see Chapter 2 Logging Into the Switch and the appropriate Getting Started Guide For information about setting up the switch to allow user access through these interfaces see Chapter 8 Managing Switch Security Startup Defaults By default a single user management account is available at the first bootup of the switch This account has the following user name and password e user name admin e password switch Initially the admin user can only be authorized on the switch through the console port Management access through any other interface is disabled The Authenticated Switch Access commands may be used to enable access through other interfaces services Telnet HTTP etc however SNMP access is not allowed for the admin user Also the admin user cannot be modified except for the password Password expiration for the admin user is disabled by default See Configuring Password Expiration on page 7 13 In addition another account default is a
289. ntents The Is and dir commands have the same function These two commands display the contents of the current directory If you use the Is or dir command while logged into the flash file directory of the switch as shown on page 1 8 the following will be displayed gt dir Listing Directory drw 512 Oct drw 512 Jul drw 512 Oct rw 321 Oct rw 163258 Oct rw 11 Jul rw 693 Oct rw 0 Oct rw 64000 Oct flash 25 14 39 certified 15 14 59 NETWORK 25 14 17 WORKING 25 14 39 boot params 2 11 04 cs_system pmd 30 14 09 boot slot cfg 9 11 55 boot cfg l err 28 11 14 swlogl log 29 09 12 swlog2 log 9467904 bytes free If you specify a path as part of the Is or dir command your screen will list the contents of the directory at the specified path gt ls flash certified Listing Directory drw 2048 Oct drw 2048 Oct rw 2636 Oct rw 860086 Oct rw 123574 Oct rw 123574 Oct flash certified 12 11 16 2 15 258 23 12 11 16 boot cfg 26 11 07 Kos img 14 10 54 Ksecu img 14 10 54 Krelease img If you use the Is or dir command while logged into the flash file directory of OmniSwitch 9000 Series the following will be displayed gt dir Listing Directory drw 1024 Nov rw 276 Nov rw 4890749 Oct rw 256 Nov rw 64000 Nov drw 1024 Nov drw 1024 Nov drw 1024 Nov rw 222 Nov rw 524288 Oct rw 834497 Oct rw 64000 Nov rw 719 Nov rw 199567 Nov flash 08 30 WORKING
290. ny other system and a licensee cannot impose that choice This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License 8 If the distribution and or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries so that distribution is permitted only in or among countries not thus excluded In such case this License incorporates the limitation as if written in the body of this License 9 The Free Software Foundation may publish revised and or new versions of the General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and condi tions either of that version or of any later version published by the Free Software Foundation If the Program does not specify a version number of this License you may choose any version ever published by the Free Software Foundation 10 If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different write to t
291. o a single OmniSwitch which acts as a Secure Shell client is an entry point to the network In this scenario the client portion of the Secure Shell software is used on the connecting OmniSwitch and the server portion of Secure Shell is used on the switches or servers being managed Secure Shell Access Protocol Secure Shell iy ser errr AL ail 7 T inal OmniSwitch Secure Secure Shell ermine Shell Client Server OmniSwitch as a Secure Shell Client OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 2 13 Using Secure Shell Logging Into the Switch Secure Shell Authentication Secure Shell authentication is accomplished in several phases using industry standard algorithms and exchange mechanisms The authentication phase is identical for Secure Shell and Secure Shell FTP The following sections describe the process in detail Protocol Identification When the Secure Shell client in the OmniSwitch connects to a Secure Shell server the server accepts the connection and responds by sending back an identification string The client will parse the server s identi fication string and send an identification string of its own The purpose of the identification strings is to validate that the attempted connection was made to the correct port number The strings also declare the protocol and software version numbers This information is needed on both the cli
292. o generate a different DSA key use the Secure Shell tools available on your Unix or Windows system and copy the files to the flash network directory on your switch The new DSA key will take effect after the OmniSwitch is rebooted Authentication Phase When the client tries to authenticate the server determines the process used by telling the client which authentication methods can be used The client has the freedom to attempt several methods listed by the server The server will disconnect itself from the client if a certain number of failed authentications are attempted or if a time out period expires Authentication is performed independent of whether the Secure Shell interface or the SFTP file transfer protocol will be implemented page 2 14 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Logging Into the Switch Using Secure Shell Connection Phase After successful authentication both the client and the server process the Secure Shell connection protocol The OmniSwitch supports one channel for each Secure Shell connection This channel can be used for a Secure Shell session or a Secure Shell FTP session Using Secure Shell DSA Public Key Authentication The following procedure is used to set up Secure Shell SSH DSA public key authentication between an OmniSwitch and a client device 1 Use the PuTTYgen SSH software on the client device to generate a type SSH2 DSA private and public key pair 2 Do not save
293. o synchronize software between the primary and secondary CMMs Rebooting the Switch On OmniSwitch 6800 and 6850 switches when you reload the primary switch CMM in a stack the secondary switch takes over the primary function If the stack is comprised of three or more switches then the original primary switch becomes idle and the next available idle switch becomes the secondary CMM For more information on stacks see the Managing Stacks chapter found in both the OmniSwitch 6800 Hardware Users Guide and the OmniSwitch 6850 Hardware Users Guide On OmniSwitch 6800 6850 9000 switches you can specify a reboot of the secondary CMM by using the secondary keyword in conjunction with the reload command For example to reboot the secondary CMM enter the reload command as shown gt reload secondary In this case the current primary CMM continues to run while the secondary CMM reboots Scheduling a Reboot It is possible to cause a reboot of the primary or secondary CMM at a future time by setting time parame ters in conjunction with the reload command For example to schedule a reboot of the secondary CMM in 8 hours and 15 minutes on the same day enter the following at the prompt gt reload secondary in 08 15 Note Scheduled reboot times should be entered in military format i e a twenty four hour clock Cancelling a Scheduled Reboot To cancel a scheduled reboot use the cancel keyword A cancel command can
294. ocedures and descriptive information on all the major software features and protocols included in the base software package Chapters cover Layer 2 information Ethernet and VLAN configuration Layer 3 information routing protocols such as RIP security options authenticated VLANs Quality of Service QoS and link aggregation OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page xvii OmniSwitch 6800 6850 9000 Advanced Routing Configuration Guide Includes network configuration procedures and descriptive information on all the software features and protocols included in the advanced routing software package Chapters cover multicast routing DVMRP and PIM SM and OSPF OmniSwitch Transceivers Guide Includes information on Small Form Factor Pluggable SFPs and 10 Gbps Small Form Factor Plugga bles XFPs transceivers e Technical Tips Field Notices Includes information published by Alcatel Lucent s Customer Support group e Release Notes Includes critical Open Problem Reports feature exceptions and other important information on the features supported in the current release and any limitations to their support page xviii OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 User Manual CD All user guides are included on the User Manual CD that accompanied your switch This CD also includes user guides for other Alcatel Lucent data enterprise products In addition it contains a
295. ofile named Profile3 is now available on the switch and may be associated with a user through the user command Note that if port ranges or VLAN ranges are not configured a user with this profile will not be able to use any commands that require port or VLAN values or view any show outputs that contain port or VLAN values Setting Up Port Ranges in a Profile To set up port ranges for a profile enter the end user profile port list command with the relevant profile name and the desired slots ports For example gt end user profile Profile3 port list 2 3 1 4 In this example the port list includes all ports in slot 2 and ports 1 through 4 on slot 3 A user with this profile will be able to manage these ports depending on the command areas specified in the profile To remove a port list use the no form of the command with the relevant slot number s All ports in the port list on a given slot will be removed For example gt end user profile Profile3 no port list 3 In this example all ports on slot 3 are removed from the profile Setting Up VLAN Ranges in a Profile To set up VLAN ranges for a profile enter the end user profile vlan range command with the relevant profile name and the desired VLAN range For example gt end user profile Profile3 vlan range 2 4 7 8 In this example the VLAN range includes VLANs 2 3 4 7 and 8 A user with this profile will be able to manage these VLANs depending on the command areas s
296. ogging feature in that command logging stores up to 100 of the most recent commands in a separate command log file Also the command logging feature includes additional information such as full command syntax login user name entry date and time session IP address and entry results For more information on command logging refer to Logging CLI Commands and Entry Results on page 5 15 You can display the commands in a numbered list by using the show history command The following is a sample list gt show history show cmm show fan show sensor show temp ip load dvmrp show arp clear arp show ip config 9 ip helper max hops 5 10 ip bgp pn 11 show ip bgp 12 show history aAarArNaA OF WN FE In the example above the show history command is listed last because it is the command that was executed most recently OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 5 13 CLI Services Using the CLI You can recall commands shown in the history list by using the exclamation point character also called bang To recall the command shown in the history list at number 4 enter 4 bang 4 The CLI will respond by printing the number four command at the prompt Using the history list of commands above the following would display gt 4 gt show temp You can recall the last command in the history list by issuing the bang bang syntax The CLI will respond by printing the last command in
297. ogin is complete the OmniSwitch welcome banner will display as follows login admin password Welcome to the Alcatel Lucent OmniSwitch 6000 Software Version 6 3 1 733 R01 Development October 05 2007 Copyright c 1994 2007 Alcatel Lucent All Rights reserved OmniSwitch TM is a trademark of Alcatel Lucent registered in the United States Patent and Trademark Office OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 2 9 Using FTP Logging Into the Switch Using FTP The OmniSwitch can function as an FTP server Any standard FTP client may be used Note An FTP connection is not secure Secure Shell is recommended instead of FTP or Telnet as a secure method of accessing the switch Using FTP to Log Into the Switch You can access the OmniSwitch with a standard FTP application To login to the switch start your FTP client Where the FTP client asks for Name enter the IP address of your switch Where the FTP client asks for User ID enter the username of your login account on the switch Where the FTP client asks for Password enter your switch password You can use the switch as an FTP client in a case where you do not have access to a workstation with a FTP client You can establish an FTP session locally by connecting a terminal to the switch console port You can also establish an FTP session to a remote switch by using a Telnet session Once you are logged into the swit
298. ons a You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change b You must cause any work that you distribute or publish that in whole or in part contains or is derived from the Program or any part thereof to be licensed as a whole at no charge to all third parties under the terms of this License c If the modified program normally reads commands interactively when run you must cause it when started running for such interactive use in the most ordinary way to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty or else saying that you provide a warranty and that users may redistribute the program under these conditions and telling the user how to view a copy of this License Exception if the Program itself is interactive but does not normally print such an announcement your work based on the Program is not required to print an announcement These requirements apply to the modified work as a whole If identifiable sections of that work are not derived from the Program and can be reasonably considered independent and separate works in them selves then this License and its terms do not apply to those sections when you distribute them as sepa rate works But when you distribute the same sections as part of a whole which is a work based on the Program the distribution of the whole must be on the terms of this L
299. onsole port even if access is denied through the console port To remove a server from the authenticated switch access configuration enter the aaa authentication command with the relevant server names s and leave out the names of any servers you want to remove For example gt aaa authentication telnet radl local The server Idap2 is removed for Telnet access and will not be polled for user information when users attempt to log into the switch through Telnet Note SNMP can only use LDAP servers or the local user database for authentication Configuring the Default Setting The default keyword may be used to specify the default setting for all management interfaces except those that have been explicitly denied For example gt no aaa authentication ftp gt aaa authentication default ldap2 local In this example all management interfaces except FTP are given switch access through Idap2 and the local user database Since SNMP can only use LDAP servers or the local database for authentication RADIUS or ACE Server are not valid servers for SNMP management access If the default interface setting includes only RADIUS and or ACE server the default setting will not be used for SNMP For example gt no aaa authentication ftp gt aaa authentication default radl rad2 page 8 10 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing Switch Security Setting Up Management Interfaces for ASA In this sce
300. ormation on configuration snapshots refer to Creating Snapshot Configuration Files on page 6 10 For more information on passwords refer to User Configured Password on page 7 10 Note When you enter a command using debug set or debug show keyword syntax the switch writes the command output to a separate file that also ends with the err extension This does not mean that a config uration apply error has occurred it is merely the switch s standard method for displaying debug set or debug show command output OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 6 7 Configuration Files Overview Working With Configuration Files Setting the Error File Limit The number of files ending with the err extension present in the switch s flash directory is set with the configuration error file limit command You can set the switch to allow up to 25 error files in the flash directory Once the error file limit has been reached the next error file generated will cause the error file with the oldest time stamp to be deleted The following command sets the error file limit to 5 files gt configuration error file limit 5 If you need to save files with the err extension you can either rename them so they no longer end with the err extension or you may move them to another directory Note The default error file limit is one file Unless you set the error file limit to a higher number any subsequent error fil
301. os img Jrout img Jsecu img Jrelease img Base or Optional Software Optional Advanced Routing Base Software Base Software Base Software Base Software Base Software Base Software Optional Security Base Software Description Q MM Advanced Routing MM Base MM Diagnostics zogo image for all Ethernet type NIs MM Operating System MM Quality of Service MM Routing IP and IPX MM Security AVLANS Release Archive QO QO OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 1 29 Application Examples for File Management Managing System Files Application Examples for File Management The following sections provide detailed examples of managing files and directories on the switch Transferring a File to the Switch Using FTP In this example the user is adding the AVLAN security feature to an OmniSwitch 6800 Series switch To do this the user must load the Ksecu img image file onto the switch and then register the file by reboot ing the switch The following steps describe how to transfer the file from the user workstation to the switch by using an FTP client on the workstation 1 Load the Ksecu img file onto a workstation that contains an FTP client You will normally receive the file from the Internet via E mail or on CD media Place the file on your workstation where it can be easily downloaded 2 Run the FTP client software on your workstation Most workstations ha
302. ou want the login banner in the text file to apply to HTTP switch sessions execute the following CLI command where the text filename is thirdbanner txt gt session banner http flash thirdbanner txt The banner files must contain only ASCII characters and should bear the txt extension The switch will not reproduce graphics or formatting contained in the file Modifying the Text Display Before Login By default the switch does not display any text before the login prompt for any CLI session At initial bootup the switch creates a pre_banner txt file in the flash directory The file is empty and may be edited to include text that you want to display before the login prompt For example Please supply your user name and password at the prompts login userl123 password In this example the pre_banner txt file has been modified with a text editor to include the Please supply your user name and password at the prompts message The pre banner text cannot be configured for FTP sessions To remove a text display before the login prompt delete the pre_banner txt file it will be recreated at the next bootup and will be empty or modify the pre_banner txt file OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 2 21 Configuring Login Parameters Logging Into the Switch Configuring Login Parameters You can set the number of times a user may attempt unsuccessfully to log in to the switch s CLI by using
303. outer s IP interface addresses ospfVirtNbrArea The Transit Area Identifier ospfVirtNbrRtrId A 32 bit integer uniquely identifying the neighboring router in the Autonomous System ospfVirtNbrState The state of the Virtual Neighbor Relationship page 10 22 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using SNMP SNMP Overview No Trap Name Objects Family Description 53 httpServerDoSAttackTrap httpConnection webmgt This trap is sent to management Stats station s when the HTTP server httpsConnec is under Denial of Service attack tionStats The HTTP and HTTPS connec tions are sampled ata 15 second interval This trap is sent every 1 minute while the HTTP server detects it is under attack httpConnectionStats The number of HTTP connection attempts over the past 15 seconds 54 alaStackMgrDuplicateRoleTrap alaStack chassis The element identified by MegrSlotNI alaStackMegrSlotNINumber Number detected the presence of two ele alaStackMer ments with the same primary or ChasRole secondary role as specified by alaStackMegrChasRole on the stack alaStackMgrSlotNINumber Numbers allocated for the stack NIs as follows 0 invalid slot number 1 8 valid and assigned slot numbers corresponding to values from the entPhysicalTable 1001 1008 switches operating in pass through mode 255 unassigned slot number alaStackMgrChasRole The current role of the chassis as follows unassigned
304. ow microcode command 4 24 5 10 show microcode history command 4 24 show ntp client command 3 4 show ntp client server list command 3 3 show ntp server status command 3 3 show prefix command 5 12 show reload command 4 15 show running directory command 4 23 4 30 show snmp community map command 10 27 show snmp mib family command 5 23 10 32 show snmp station command 10 4 show snmp trap replay command 10 31 show user command 7 6 10 5 10 28 snapshots 6 10 6 14 SNMP access for user accounts 7 19 agent 10 7 application examples 10 4 browser 2 7 defaults 10 2 management station 10 8 manager 10 7 security 10 27 10 29 specifications 10 2 traps table 10 10 versions 10 8 snmp community map mode command 7 18 SNMP configuration verify information about 10 43 snmp security command 7 18 10 29 snmp trap filter command 10 6 software rollback configuration scenarios 4 5 specifications CLI 5 2 CMM 4 2 configuration file 6 2 file management 1 2 login 2 3 NTP 3 2 SNMP 10 2 switch security 8 2 user database 7 2 ssh command 2 15 2 17 SSL HTTPS port 9 4 see Secure Socket Layer startup defaults 7 5 switch rebooting 4 13 4 25 switch security defaults 8 2 specifications 8 2 syntax 5 3 syntax checking 5 11 System Clock 1 37 system date command 1 37 system time command 1 38 system timezone command 1 37 T tables displays 5 18 filters 5 23 takeover command 4 29 Telnet 2 6 2 8 telnet command 2
305. own gt ntp broadcast enable A client in the broadcast mode does not need to have a specified server Setting the Broadcast Delay When set to the broadcast mode a client needs to advertise a broadcast delay The broadcast mode is intended for operation on networks with numerous workstations and where the highest accuracy is not required In a typical scenario one or more time servers on the network broadcast NTP messages which are received by NTP hosts The correct time is determined from an NTP message based on a pre config ured latency or broadcast delay in the order of a few milliseconds To set the broadcast delay enter the ntp broadcast delay command as shown gt ntp broadcast delay 1000 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 3 9 Configuring NTP Configuring Network Time Protocol NTP NTP Servers An NTP client needs to recetve NTP updates from an NTP server Each client must have at least one server with which it synchronizes unless it is operating in broadcast mode There are also adjustable server options Designating an NTP Server To configure an NTP client to receive updates from an NTP server enter the ntp server command with the server IP address or domain name as shown gt ntp server 1 1 1 1 or gt ntp server spartacus It is possible to remove an NTP server from the list of servers from which a client synchronizes To do this enter the ntp server command wit
306. p http or ssh Specify the server and backup servers to be used for checking user login and privilege information Multiple servers of different types may be speci fied For example gt aaa authentication telnet radl ldap2 local The order of the server names is important The switch uses the first available server in the list In this example the switch would use rad1 to authenticate Telnet users If rad1 becomes unavailable the switch will use Idap2 If Idap2 then becomes unavailable the switch will use the local user database to authenti cate users 4 Repeat step 3 for each management interface to which you want to configure access or use the default keyword to specify access for all interfaces for which access is not specifically denied For example if you want to configure access for all management interfaces except HTTP you would enter gt no aaa authentication http gt aaa authentication default radl local Note the following e SNMP access may only use LDAP servers or the local user database If you configure the default management access with only RADIUS and or ACE SNMP will not be enabled e It is recommended that Telnet and FTP be disabled if Secure Shell ssh is enabled e Ifyou want to use WebView to manage the switch make sure HTTP is enabled 5 Specify an accounting server if a RADIUS or LDAP server will be used for accounting Specify local if accounting may be done on the switch through the Switch Logging
307. p information including trap ID numbers trap names command families and absorption rate This command also dis plays the Enabled Disabled status of SNMP absorption and the Traps to WebView service For more information about the resulting displays from these commands see the OmniSwitch CLI Refer ence Guide OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 10 43 Verifying the SNMP Configuration Using SNMP page 10 44 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 A Software License and Copy right Statements This appendix contains Alcatel Lucent and third party software vendor license and copyright statements Alcatel Lucent License Agreement ALCATEL LUCENT SOFTWARE LICENSE AGREEMENT IMPORTANT Please read the terms and conditions of this license agreement carefully before opening this package By opening this package you accept and agree to the terms of this license agreement If you are not willing to be bound by the terms of this license agreement do not open this package Please promptly return the product and any materials in unopened form to the place where you obtained it for a full refund 1 License Grant This is a license not a sales agreement between you the Licensee and Alcatel Lucent Alcatel Lucent hereby grants to Licensee and Licensee accepts a non exclusive license to use program media and computer software contained therein the Licensed F
308. p trap replay command This command lists the traps along with their sequence number The sequence number is a record of the order in which the traps were previously sent out You may want to replay traps that have been stored on the switch for testing or troubleshooting purposes This is useful in the event when any traps are lost in the network To replay stored traps use the snmp trap replay command followed by the IP address for an SNMP management station This command replays or re sends all stored traps from the switch to the specified management station on demand If you do not want to replay all of the stored traps you can specify the sequence number from which the trap replay will start The switch will start the replay with a trap sequence number greater than or equal to the sequence number given in the CLI command The number of traps replayed depends on the number of traps stored for this station Absorbing Traps The switch may send the same traps to the management station many many times You can suppress the transmission of identical repetitive traps by issuing the snmp trap absorption command When trap absorption is enabled traps that are identical to traps previously sent will be suppressed and therefore not forwarded to the SNMP management station The following command will enable SNMP trap absorption gt snmp trap absorption enable To view or verify the status of the Trap Absorption service use the show snmp trap conf
309. path to mode help Display this help text get remote path local path Download file lls path Display local directory listing ln oldpath newpath Symlink remote file Imkdir path Create local directory lpwd Print local working directory ls path Display remote directory listing mkdir path Create remote directory put local path remote path Upload file pwd Display remote working directory exit Quit sftp quit Quit sftp rename oldpath newpath Rename remote fil rmdir path Remove remote directory rm path Delete remote fil symlink oldpath newpath Symlink remote file version Show SFTP version Synonym for help Note Although Secure Shell FTP has commands similar to the industry standard FTP the underlying protocol is different See Chapter 1 Managing System Files for a Secure Shell FTP application exam ple page 2 18 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Logging Into the Switch Using Secure Shell Closing a Secure Shell FTP Session To terminate the Secure Shell FTP session issue the exit command The following will display gt exit Connection to 11 133 30 135 closed This display indicates the Secure Shell FTP session with IP address 11 133 20 135 is closed The user is now logged into the OmniSwitch as a local device with no active remote connection Note Establishing and closing the Secure Shell FTPv6 connection is similar to that of the Secure Shell FTP conn
310. pecified in the profile To remove a VLAN range from a profile use the no form of the command and the VLAN ID of the start of the range to be removed For example gt end user profile Profile3 no vlan range 7 This command removes VLANs 7 and 8 from Profile3 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 7 21 Setting Up End User Profiles Managing Switch User Accounts Associating a Profile With a User To associate a profile with a user enter the user command with the end user profile keywords and the relevant profile name For example gt user Customer2 end user profile Profile3 Profile3 is now associated with Customer2 When Customer logs into the switch Customer2 will have access to command areas port ranges and VLAN ranges specified by Profile3 Note that user information stored on an external server may include a profile name When the user attempts to log into the switch the switch will attempt to match the profile name to a profile stored on the switch Removing a Profile From the Configuration To delete a profile from the configuration enter the no form of the end user profile command with the name of the profile you want to delete For example gt no end user profile Profile3 Profile3 is deleted from the configuration Note If the profile name is associated with a user and the profile is deleted from the configuration the user will not have access to the switch p
311. r ACE Server E Servers supply login infor mation about the user User D privilege information is also e available on RADIUS and OmnisSwitch LDAP servers Authenticated Switch Access Setup An external RADIUS or LDAP server can supply both user login and authorization information ACE Server can provide login information user authorization information is available through the switch s local user database External servers may also be used for accounting which includes logging statistics about user sessions For information about configuring the switch to communicate with external servers see the Managing Authentication Servers chapter in the OmniSwitch 6800 6850 9000 Network Configu ration Guide If an external server is not available or is not configured user login information and user authorization may be provided through the local user database on the switch The user database is described in Chapter 7 Managing Switch User Accounts Logging may also be accomplished directly on the switch For information about configuring local logging for switch access see Configuring Accounting for ASA on page 8 12 For complete details about local logging see the Using Switch Logging chapter in the OmniSwitch 6800 6850 9000 Network Configuration Guide OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 8 3 Authenticated Switch Access Managing Switch Security Authenticated Sw
312. r directory you must specify the path and name for the file being deleted The user of this command must have write privileges for any file being deleted gt delete flash config txt page 1 18 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing System Files File and Directory Management Managing Files on Switches On OmniSwitch 6800 and 6850 switches you can copy a file from a non primary switch to the primary switch in a stack using the rep command To use this command enter rep followed by the slot number of the non primary switch the path and file name of the source file on the non primary switch and the desti nation file name on the primary switch For example to copy the boot params file to the flash directory on Switch 4 in a stack to the primary switch and name it boot params bak enter gt rep 4 flash file txt file txt On OmniSwitch 9000 Series switches you can copy a file from a secondary management module to a primary management module or from a primary management module to a secondary management module with the rep command To use this command enter rep followed the secondary management module of the switch the path and file name of the source file on the secondary management module of the switch and the destination file name on the primary management module of the switch For example to copy the boot params file to the flash directory on primary management module in a switch and na
313. ration To display information about management interfaces used for Authenticated Switch Access use the show commands listed here show aaa authentication Displays information about the current authenticated switch session show aaa accounting Displays information about accounting servers configured for Authenti cated Switch Access or Authenticated VLANs show aaa server Displays information about a particular AAA server or AAA servers For more information about the resulting displays from these commands see the OmniSwitch CLI Refer ence Guide An example of the output for the show aaa authentication command is also given in Quick Steps for Setting Up ASA on page 8 7 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 8 13 Verifying the ASA Configuration Managing Switch Security page 8 14 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 9 Using WebView The switch can be monitored and configured using WebView Alcatel Lucent s web based device management tool The WebView application is embedded in the switch and is accessible via the following web browsers e Internet Explorer 6 0 and later for Windows NT 2000 XP 2003 e Netscape 7 1 for Windows NT 2000 XP e Netscape 7 0 for Solaris SunOS 5 8 Note For information about setting up browser preferences and options see Browser Setup on page 9 2 In This Chapter This chapter provides an overview of WebView and WebView
314. re configuration options are displayed in the drop down menus at the top of each page The same menus are displayed on every configuration page within a feature To configure a feature on the switch select a configuration option from the drop down menu There are two types of configuration pages in WebView a Global configuration page and a Table configuration page Global Configuration Page Global configuration pages display drop down menus and fields that you complete to configure global parameters The fields display the current configuration To change the configuration 1 Select a new value from one of the drop down lists or enter a new value in a field 2 Click Apply to apply the changes to the switch The new configuration takes effect immediately 3 Repeat the procedure to make additional configuration changes Note If you update a field and want to return it to the previous configuration click Restore However you must click Restore before applying the new configuration If you apply the new configuration and want to return to the previous configuration you must re enter the old configuration in the applicable fields 0 loj x Fie Edt View Favorites Tools Help amp Oi O x 2 A search e Favontes 2L a Jags Address http 10 255 73 12 web con in html go Links gt on WebView Options Save Configuration Help About Telnet Log Out Alcatel Lucent Ceti vxTarget 10 255 7
315. re transferring a switch image file you must specify the binary transfer mode on your FTP client If you are transferring a configuration file you must specify the ASCII transfer mode 3 Transfer the file Use the FTP put command or click the client s download button to send the file to the switch When you use FTP to transfer a file to the switch the file is automatically placed in the switch s flash working directory For details on using CLI commands to managing files once they are on the switch see File and Directory Management on page 1 5 Note You must use the binary mode bin to transfer files via FTP page 1 22 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing System Files Loading Software onto the Switch Using the Switch as an FTP Client Using the switch as an FTP client is useful in cases where you do not have access to a workstation with an FTP client You can establish an FTP session locally by connecting a terminal to the switch console port You can also establish an FTP session to a remote switch by using a Telnet session Once you are logged into the switch as an FTP client you can use standard FTP commands Note If you are using Authenticated Switch Access ASA the port interface must be authenticated for FTP and Telnet use The login profile must also have permission to use FTP Otherwise the switch will not accept an FTP login For information about ASA and user privil
316. received a copy of the GNU General Public License along with this program if not write to the Free Software Foundation Inc 675 Mass Ave Cambridge MA 02139 USA Also add information on how to contact you by electronic and paper mail If the program is interactive make it output a short notice like this when it starts in an interactive mode Gnomovision version 69 Copyright C 19yy name of author Gnomovision comes with ABSOLUTELY NO WARRANTY for details type show w This is free software and you are welcome to redistribute it under certain conditions type show c for details The hypothetical commands show w and show c should show the appropriate parts of the General Public License Of course the commands you use may be called something other than show w and show c they could even be mouse clicks or menu items whatever suits your program You should also get your employer if you work as a programmer or your school if any to sign a copy right disclaimer for the program if necessary Here is a sample alter the names Yoyodyne Inc hereby disclaims all copyright interest in the program Gnomovision which makes passes at compilers written by James Hacker lt signature of Ty Coon gt 1 April 1989 Ty Coon President of Vice This General Public License does not permit incorporating your program into proprietary programs If your program is a subroutine library you may consider
317. rectory on page 4 18 The running configuration is the current operating parameters of the switch obtained from information from the image and configuration files The running configuration is in the RAM OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 4 3 CMM Files Managing CMM Directory Content Where is the Switch Running From When a switch has booted and is running the software used will come either from the certified directory or the working directory In most instances the switch boots from the certified directory A switch can be specifically booted from the working directory by using the reload working config command described in Rebooting from the Working Directory on page 4 18 Once the switch is booted and functioning the switch is said to be running from a particular directory either the working or certified directory Where the switch is running from is determined at the time of the switch s boot up At the time of a normal boot by turning the switch power on or by using the reload command a compar ison is made between the working directory and the certified directory If the directories are completely synchronized i e all files are the same in both directories the switch will be running from the working directory If there is any discrepancy between the two directories even as small as a different file size or file date the switch will be running from the certified directory
318. rements refer to the OmniSwitch CLI Reference Guide page 5 2 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using the CLI Command Entry Rules and Syntax Offline Configuration Using Configuration Files CLI configuration commands can be typed into a generic text file When the text file is placed in the switch flash working directory its commands are applied to the switch when the configuration apply command is issued Files used in this manner are called configuration files A configuration file can be viewed or edited offline using a standard text editor It can then be uploaded and applied to additional switches in the network This allows you to easily clone switch configurations This ability to store comprehensive network information in a single text file facilitates troubleshooting testing and overall network reliability See Chapter 6 Working With Configuration Files for detailed information about configuration files Command Entry Rules and Syntax When you start a session on the switch you can execute CLI commands as soon as you are logged in The following rules apply e Enter only one command per line e No command may be extended across multiple lines e Passwords are case sensitive e Commands are not case sensitive The switch accepts commands entered in upper case lower case or a combination of both e Press Enter to complete each command line entry e To use spaces within a user de
319. rence Guide Configuration procedures described in this chapter include e Quick Steps for Logging Into the Switch on page 2 5 e Using Telnet on page 2 8 e Using FTP on page 2 10 e Using Secure Shell on page 2 12 e Modifying the Login Banner on page 2 20 e Configuring Login Parameters on page 2 22 e Enabling the DNS Resolver on page 2 23 Management access is disabled except through the console port unless specifically enabled by a network administrator For more information about management access and methods use the table here as a guide For more information about See Enabling or unlocking management interfaces Getting Started Guide or on the switch Chapter 8 Managing Switch Security Authenticating users to manage the switch Chapter 8 Managing Switch Security OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 2 1 In This Chapter Logging Into the Switch For more information about See Creating user accounts directly on the switch Chapter 7 Managing Switch User Accounts Using the CLI Chapter 5 Using the CLI Using WebView to manage the switch Chapter 9 Using WebView Using SNMP to manage the switch Chapter 10 Using SNMP page 2 2 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Logging Into the Switch Login Specifications Login Specifications Note
320. rior to the reboot are lost Changes to the configuration file must be initially saved to the working directory by using the copy running config working or the write memory commands Once the configuration file is saved to the working directory the switch can be rebooted from the working directory by using the reload working command described in Rebooting from the Working Directory on page 4 18 Likewise new image files are always placed in the working directory first The switch can then be reboo ted from the working directory When this is done the contents of the working directory are loaded and used to set up the running configuration which is used to control switch functionality New image or configuration files can now be tested for a time to decide whether they are reliable Should the configuration or images files prove to be less reliable than their older counterparts in the certi fied directory then the switch can be rebooted from the certified directory and rolled back to an earlier version Once the contents of the working directory are established as good files then these files can be saved to the certified directory and used as the most reliable software to which the switch can be rolled back in an emergency situation page 4 4 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing CMM Directory Content CMM Files Software Rollback Configuration Scenarios for a Single Switch The ex
321. rting a Telnet Session from the Switch At any time during a login session on the switch you can initiate a Telnet session to another switch or some other device by using the telnet CLI command and the relevant IP address or hostname You can also establish a Telnetv6 session by using the telnet6 command and the relevant IPv6 address or host name Telnetv6 sessions are supported only on OmniSwitch 6850 or 9000 The following shows an example of telnetting to another OmniSwitch with an IP address of 10 255 10 123 gt telnet 10 255 10 123 Trying 10 255 1L0 L23 sars Connected to 10 255 10 123 Escape character is login The following is an example of telnetting to another OmniSwitch with an IPv6 address of fe80 a00 20ff fea8 8961 gt telnet6 fe80 a00 20ff fea8 8961 intfl Trying fe80 a00 20ff fea8 8961 Connected to fe80 a00 20ff fea8 8961 Escape character is login Note It is mandatory to specify the name of the particular IPv6 interface if the target has been specified using the link local address page 2 8 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Logging Into the Switch Using Telnet Note You can establish up to 5 concurrent IPv4 or IPv6 telnet client sessions You can establish up to 4 concurrent IPv4 or IPv6 telnet sessions towards an OmniSwitch 6850 or 9000 i e when the switch acts as a telnet server Here you must enter a valid username and password Once l
322. rusted status enter the following gt ntp key 5 untrusted page 3 12 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Configuring Network Time Protocol NTP Verifying NTP Configuration Verifying NTP Configuration To display information about the NTP client use the show commands listed in the following table show ntp client Displays information about the current client NTP configuration show ntp server status Displays the basic server information for a specific NTP server or a list of NTP servers show ntp client server list Displays a list of the servers with which the NTP client synchronizes show ntp keys Displays information about all authentication keys For more information about the resulting displays from these commands see the NTP Commands chap ter in the OmniSwitch CLI Reference Guide Examples of the show ntp client show ntp server status and show ntp client server list command outputs are given in the section NTP Quick Steps on page 3 3 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 3 13 Verifying NTP Configuration Configuring Network Time Protocol NTP page 3 14 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 4 Managing CMM Directory Content The CMM Chassis Management Module software runs the OmniSwitch 6800 6850 9000 switches Each OmniSwitch 9000 chassis can run with two CMMs to provide redundancy also full traffic thro
323. rvers are set up to communicate with the switch via the aaa radius server and aaa tacacs server commands ACE Servers do not require any configuration but you must FTP the sdconf rec file from the server to the switch s network directory For more information about configur ing the switch to communicate with these servers see the Managing Authentication Servers chapter of the OmniSwitch 6800 6850 9000 Network Configuration Guide Note RADIUS or LDAP servers used for authenticated switch access may also be used with authenti cated VLANs Authenticated VLANs are described in the Configuring Authenticated VLANs chapter of the OmniSwitch 6800 6850 9000 Network Configuration Guide The order of the specified servers is important The switch uses only one server for authentication the first available server in the list All authentication attempts will be tried on that server Other servers are not tried even if they are available If local is specified it must be last in the list since the local user data base is always available when the switch is up Servers may also be used for accounting or logging of authenticated sessions See Configuring Account ing for ASA on page 8 12 The following table describes the management access interfaces or methods and the types of authentica tion servers that may be used with them Server Type Management Access Method RADIUS Telnet FTP HTTP Secure Shell LDAP Telnet
324. s and underlines _ Maximum Number of Maximum of 244 files and or directories allowed in the root flash Files Directories directory Sub Directories Up to seven sub directories allowed including flash Text Editing Vi standard UNIX editor The Ed standard UNIX editor is available in the debug mode System Clock Set local date time and time zone Universal Time Coordinate UTC Daylight Savings DST or summertime System Date Default Value THU JAN 01 1970 Thursday January 1 1970 page 1 2 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing System Files Switch Administration Overview Switch Administration Overview The OmniSwitch has a variety of software features designed for different networking environments and applications Over the life of the switch it is very likely that your configuration and feature set will change because the needs of your network are likely to expand Also software updates become available from Alcatel Lucent If you change your configuration to upgrade your network you must understand how to install switch files and to manage switch directories The OmniSwitch 6800 and 6850 switches have 64 MB and the OmniSwitch 9000 switches have 128 MB of usable flash memory You can use this memory to store files including executable files used to oper ate switch features and applications configuration files and log files You n
325. s word character and specifying an asterisk as one or more characters in a password is allowed as long as every character is not an asterisk For example password 123456 is allowed password js not allowed OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 7 11 Configuring Password Policy Settings Managing Switch User Accounts Configuring Password Policy Settings The global password policy settings for the switch define the following requirements that are applied to all user accounts e Minimum password size e Whether or not the password can contain the username e The minimum number of uppercase characters required in a password e The minimum number of uppercase characters required in a password e The minimum number of base 10 digits required in a password e The minimum number of non alphanumeric characters symbols required in a password e Password expiration e The maximum number of old passwords that are saved in the password history e The minimum number of days during which a user is not allowed to change their password Password policy settings are applied when a password is created or modified The following subsections describe how to configure these settings using CLI commands To view the current policy configuration use the show user password policy command For more infor mation about this command and those used in the configuration examples throughout this section see
326. s the Switch Running From on page 4 4 for an explanation The copy running config working and write memory commands are described in detail in the OmniSwitch CLI Reference Guide Note The saved boot cfg file will be overwritten if the takeover command is executed after the copy running config working or write memory commands in an OmniSwitch set up with redundant CMMs Note It is important to certify the working directory and synchronize the stack as soon as the validity of the working directory software is established in OmniSwitch 6800 and 6850 switches only Stacks booted from the working directory or unsynchronized stacks are at risk of mismanaging data traffic due to incom patibilities in different versions of switch software Certifying the working directory is described in Copying the Working Directory to the Certified Directory on page 4 21 while synchronizing the switch is described in Synchronizing the Primary and Secondary CMMs on page 4 27 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 4 17 Managing the Directory Structure Non Redundant Managing CMM Directory Content Rebooting from the Working Directory Besides a regular boot of the switch from the certified directory you can also force the switch to boot from the working directory This is useful for checking whether a new configuration or image file will boot the switch correctly before committing it to the certified directory
327. s 9 18 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 ix Contents Chapter 10 Using SNMP ooo ccccccccscesscnsseesecesesseceseceseceseeseceseceseceseesecesseesecesseseeeseeeseens 10 1 In This Chapter eode ne r ios ead edvsdteat a Bescave des Meatsh Sons hi eases 10 1 SNMP Speciicati ons asia err eles tec aden a ae ated otal aerate bet 10 2 SNMP Defaults oyin nera A EF AE a EAEE Eea Se y FE EEEE RR a 10 2 Quick Steps for Setting Up An SNMP Management Station 0 0 cecesseeesteeeeeeteees 10 4 Quick Steps for Setting Up Trap Filters 200 0 ccccccsccssscceeneceeeeeeeeeeseeeseeeseeeeeeeneeenseees 10 5 Filtering by Trap Families siint nern a tr R 10 5 Filtering by Individual Traps 0 cccccccccssesscessseeeneeeseceeeeeeeecneeeeeeenseeeseseseseeseneees 10 6 SNMP OVEIVI EW a A a eh ete E 10 7 SNMP Operations neirinne i e o a a o r r a A 10 7 Using SNMP for Switch Management ccccccessesseceeneeeeneceeeeeseeenseeeneeenseeensnes 10 8 Setting Up an SNMP Management Station s ssssssssssessssseessestssessessesessrssessesee 10 8 SNMP Versions ie E r R E N T Tar A aai 10 8 SNMPYV I na E Ea E A Es aieeaa EIR Eaa aaO EE 10 8 SNMP V2 e n E a E A EEE E 10 9 SNMPW3 ouni nnn aa a EE EE A E E E S 10 9 SNMP Traps Table cts cccccccseeeeecdoditeesvieninievesladevesessieideseenvstedevintesetdneavesdotueees ees 10 10 Using SNMP For Switch Security ccccccccccesccesecseseceeneeeeeeeeeceeeeeeesseeesseeenseesseeenes 10 27
328. s A 11 L Wind River Systems Inc e ssesosesseeeeesseeseeesseseesreesreesrtesessressresresessresseesseeseese A 12 M Network Time Protocol Version 4 cceccccecssccsssesseeeeeeenseeesseeeeseseseeeseeeseeenaes A 12 gt Gane eee ee eee pre eee er eer reer Index 1 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 xi Contents OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 About This Guide This OmniSwitch 6800 6850 9000 Switch Management Guide describes basic attributes of your switch and basic switch administration tasks The software features described in this manual are shipped standard with your OmniSwitch 6800 Series OmniSwitch 6850 Series and OmniSwitch 9000 Series switches These features are used when readying a switch for integration into a live network environment Supported Platforms This information in this guide applies to the following products e OmniSwitch 9000 Series e OmniSwitch 6850 Series e OmniSwitch 6800 Series Note This OmniSwitch Switch Management Guide covers Release 6 3 1 which is supported on OmniSwitch 6800 Series OmniSwitch 6850 Series and OmniSwitch 9000 Series switches OmniSwitch 6600 Family OmniSwitch 7700 7800 and OmniSwitch 8800 switches use Release 5 x Please refer to the 5 x user guides for those switches Unsupported Platforms The information in this guide does not apply to the following products e OmniSwitch original version wi
329. s Family Description 0 coldStart none chassis The SNMP agent in the switch is reinitiating and its configuration may have been altered 1 warmsStart none chassis The SNMP agent in the switch is reinitiating itself and its configu ration is unaltered 2 linkDown IfIndex interface The SNMP agent in the switch ifAdminStatus recognizes a failure in one of the ifOperStatus communications links configured for the switch IfIndex A unique value greater than zero for each interface It is recommended that values are assigned con tiguously starting from 1 The value for each interface sub layer must remain constant at least from one re ini tialization of the entity s network management system to the next re initialization ifAdminStatus tThe desired state of the interface The testing 3 state indicates that no operational packets can be passed When a managed system initializes all interfaces start with ifAdminStatus in the down 2 state As a result of either explicit management action or per configuration information retained by the managed sys tem ifAdminStatus is then changed to either the up 1 or testing 3 states or remains in the down 2 state ifOperStatus The current operational state of the interface The testing 3 state indicates that no operational packets can be passed If ifAdminStatus is down 2 then ifOperStatus should be down 2 If ifAdminStatus is changed to up 1 then ifOperStatus should change to up
330. s a request packet referred to as a Protocol Data Unit PDU to the SNMP agent in the switch The SNMP agent complies with the request and sends a response PDU to the manager The types of management requests are Get GetNext and GetBulk requests These transactions are used to request information from the switch Get GetNext or GetBulk or to change the value of an object instance on the switch Set In an unsolicited notification the SNMP agent in the switch sends a trap PDU to the SNMP manager to inform it that an event has occurred The SNMP manager normally does not send confirmation to the agent acknowledging receipt of a trap OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 10 7 SNMP Overview Using SNMP Using SNMP for Switch Management The Alcatel Lucent switch can be configured using the Command Line Interface CLI SNMP or the WebView device management tool When configuring the switch by using SNMP an NMS application such as Alcatel Lucent s OmniVista or HP OpenView is used Although MIB browsers vary depending on which software package is used they all have a few things in common The browser must compile the Alcatel Lucent switch MIBs before it can be used to manage the switch by issuing requests and reading statistics Each MIB must be checked for dependencies and the MIBs must be compiled in the proper order Once the browser is properly installed and the MIBs are compiled the browser softw
331. s a secure device Unauthorized use of this switch will go on your permanent record Two steps are required to change the login banner These steps are listed here e Create a text file that contains the banner you want to display in the switch s flash switch directory e Enable the text file by entering the session banner CLI command followed by the filename To create the text file containing the banner text you may use the vi text editor in the switch See Chapter 1 Managing System Files for information about creating files directly on the switch This method allows you to create the file in the flash directory without leaving the CLI console session You can also create the text file using a text editing software package such as MS Wordpad and transfer the file to the switch s flash directory For more information about file transfers see Chapter 1 Managing System Files If you want the login banner in the text file to apply to FTP switch sessions execute the following CLI command where the text filename is firstbanner txt gt session banner ftp flash firstbanner txt If you want the login banner in the text file to apply to CLI switch sessions execute the following CLI command where the text filename is secondbanner txt gt session banner cli flash secondbanner txt page 2 20 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Logging Into the Switch Modifying the Login Banner If y
332. s ago then that attempt has aged beyond the lockout window time and is not counted In addition the failed login count is decremented when the failed attempt ages out By default the lockout window is set to 0 this means that there is no observation window and failed login attempts are not counted The user is allowed an unlimited number of failed login attempts To configure the lockout window time in minutes use the user lockout window command For example gt user lockout window 30 Do not configure an observation window time period that is greater than the lockout duration time period see Configuring the User Lockout Duration Time on page 7 16 Configuring the User Lockout Threshold Number The lockout threshold number specifies the number of failed login attempts allowed during any given lockout window period of time see Configuring the User Lockout Window on page 7 15 For exam ple if the lockout window is set for 30 minutes and the threshold number is set for 3 failed login attempts then the user is locked out when 3 failed login attempts occur within a 30 minute time frame OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 7 15 Configuring Global User Lockout Settings Managing Switch User Accounts By default the lockout threshold number is set to 0 this means that there is no limit to the number of failed login attempts allowed even if a lockout window time period exists To configur
333. s of a connection or other significant events You can configure the switch so that traps are forwarded to or suppressed from transmission to the management station under different circumstances Trap Filtering You can filter SNMP traps in at least two ways You can filter traps by limiting user access to trap families or you can filter according to individual traps Filtering by Trap Families Access to SNMP traps can be restricted by withholding access privileges for user accounts to certain command families or domains Designation of particular command families for user access is sometimes referred to as partition management SNMP traps are divided into functional families as shown in the SNMP Traps Table on page 10 10 These families correspond to switch CLI command families When read only privileges for a user account are restricted for a command family that user account is also restricted from reading traps associated with that family Procedures for filtering traps according to command families can be found in the Quick Steps for Filter ing by Trap Families on page 10 5 For a list of trap names command families and their descriptions refer to the SNMP Traps Table on page 10 10 Filtering By Individual Trap You can configure the switch to filter out individual traps by using the snmp trap filter command This command allows you to suppress specified traps from the management station The following information
334. s protocol user 199 199 100 200 8010 enable v3 NMSuserV3MD5DES 199 199 101 201 111 disable v2 NMSuserV3MD5 199 199 102 202 8002 enable v1 NMSuserV3SHADES gt show snmp station ipAddress udpPort status protocol user 4 172 21 160 32 4000 enable v3 abc 172 21 160 12 5000 enable v3 userl 0300 0000 0000 0000 0211 d8ff fe47 470b 4001 enable v3 user2 0300 0000 0000 0000 0211 d8ff fe47 470c 5001 enable v2 abc For more information about this display see the SNMP Commands chapter in the OmniSwitch CLI Reference Guide page 10 4 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using SNMP Quick Steps for Setting Up Trap Filters Quick Steps for Setting Up Trap Filters You can filter traps by limiting user access to trap command families You can also filter according to individual traps Filtering by Trap Families The following example will create a new user account This account will be granted read only privileges to three CLI command families snmp chassis and interface Read only privileges will be withheld from all other command families 1 Set up a user account named usermark2 by executing the user CLI command gt user usermark2 password x 2 Remove all read only privileges from the user account gt user usermark2 read only none
335. scccssssesseceeseeeeeeeseeeeeeeeseecneeceeecnseeesesesseeeseneees 5 20 Listing Your Current Login Session ccccccccsseeesseeseceeseeeeeecneecseeenseeeeeseeeeeeeneees 5 21 Terminating Another Session cccccscccssccsssecesceeseeeesceeeecenecessecesecesseeenseeeesensaees 5 22 Application Example ccccccccccssscssseeeeseesseeeeceeseeenseeessecsseecssceeseceseeeseseeeeseeeeeeneeenes 5 23 Using a Wildcard to Filter Table Information 0 0 0 0 ccccccceeeseesceesecseteeeeensteeenaes 5 23 Verifying CLI Usage annaa E e a enero tty Mere ce ents deeds 5 24 Chapter 6 Working With Configuration Files 2 00 0 ccceeseesetseeeseeseeeeeeeeneeseeseeeenees 6 1 Manns na teres 42 soe Aico et acs fea hte fete eects ee E etc toe et 6 1 Configuration File Specifications cccccccccssccesseesseeeeneeeeseeeeeeeseeceeeeeseeeseeeeeeseeeeeeneeenes 6 2 Tutorial for Creating a Configuration File cccccecesccesseeeseeeeneeeeseeeeeeeeeesseeenseensneenes 6 2 Quick Steps for Applying Configuration Files cccccccscecsscsssseeeneceseeeeeeeeeeeteeeneeenes 6 4 Setting a File for Immediate Application 20 0 ccccccccseesceceeeeseeeeseeesereeeseenseeeenenes 6 4 Setting an Application Session for a Date and Time eee eeccceeseeeteeeeseeeteeeeeees 6 4 Setting an Application Session for a Specified Time Period cceecceeeseesteeeeeees 6 5 Configuration Files Overview cccccccsscessceeseeeesceeseeesseeesseecneeesseecnseesseeesce
336. sceeseeeseceeseeeeseeeseecececsececseeeesneeeeeeeneeeaes 10 38 Verifying the SNMP Configuration ccccccesceeessceeseeeseeeeseecseceneeessceseeesseeeeseensneenes 10 43 x OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Contents Appendix A Software License and Copyright Statements ccccccccsceeeseeseeeeeeseees A 1 Alcatel Lucent License Agreement snsosessosseesseeseeesessressresseertesetsssessreseesreesreesseesessees A 1 ALCATEL LUCENT SOFTWARE LICENSE AGREEMENT c cccsssceeseees A 1 Third Party Licenses and Notices Mannonen a a E A 4 A Booting and Debugging Non Proprietary Software ccccccceesceseseeeteeeteeeenes A 4 B The OpenLDAP Public License Version 2 4 8 December 2000 006 A 4 EE LENI ENI EEN PA IAE E IN I E I T E E sted A 5 D GNU GENERAL PUBLIC LICENSE Version 2 June 1991 oo A 5 E University of California kinene era er e ere a a E a A 10 F Carnegie Mellon University ccccccccsesssceessceeseceseceeseeeeeeeseeeneeceseeeneeessaeensees A 10 Gi Random sov cccccecdesesscisieeccetecavecvecetecaveceecevecavecedeaedevecebecensavedededabecencebecabecedectes A 10 H Apptitudes Ine oeninnson eien i a hase nites teenies A 11 Ti Agranat oeio aE vera eesbestee heavens eee gto onde A 11 J RSA Security Ine ccccissesicivevs tiiececsecviessnee ties isons Sats tee vider A A 11 K Sun Microsystems Ine osiin nii ceveceesecteessesutveveeaeescdovad
337. sed from Agranat Systems Inc Agranat Agranat has granted to Alcatel Lucent certain warranties of performance which warranties or portion thereof Alcatel Lucent now extends to Licensee INNO EVENT HOWEVER SHALL AGRANAT BE LIABLE TO LICENSEE FOR ANY INDIRECT SPECIAL OR CONSEQUENTIAL DAMAGES OF LICENSEE OR A THIRD PARTY AGAINST LICENSEE ARIS ING OUT OF OR IN CONNECTION WITH THIS DISTRIBUTION OF EMWEB PRODUCT TO LICENSEE In case of any termination of the Software License Agreement between Alcatel Lucent and Licensee Licensee shall immediately return the EMWEB Product and any back up copy to Alcatel Lucent and will certify to Alcatel Lucent in writing that all EMWEB Product components and any copies of the software have been returned or erased by the memory of Licensee s computer or made non read able RSA Security Inc Provided with this product is certain security software RSA Software licensed from RSA Security Inc RSA SECURITY INC PROVIDES RSA SOFTWARE AS IS WITHOUT ANY WARRANTY WHAT SOEVER RSA SECURITY INC DISCLAIMS ALL WARRANTIES EXPRESS IMPLIED OR STAT UTORY AS TO ANY MATTER WHATSOEVER INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE AND NON INFRINGEMENT OF THIRD PARTY RIGHTS Sun Microsystems Inc This product contains Coronado ASIC which includes a component derived from designs licensed from Sun Microsystems Inc OmniSwitch 6800 6850 9000 Switch Ma
338. seeessceeseeeteeeeseeesseeeneees 7 13 Configuring Password Expiration cccsccccessceesseessceeseeeeeecseeesseeceseeeesseeseeeeeneees 7 13 Default Password Expiration cccccecscesssscsseeseeeesceeeereceseeesneceeseeesseeneeenseees 7 13 Specific User Password Expiration cccccssccsssessseessecesseeeeeeseeeeeeeseeesseeenss 7 14 Configuring the Password History cccecsccsssscessceeseceeseeeeeecneeceseecneneeeeseseaeeseneees 7 14 Configuring the Minimum Age for a Password c ccssccsesscesseeereeeeneeeeeeeneeeseees 7 14 Configuring Global User Lockout Settings cccccccssccessecsneeeeneeeeneeeeeesseeeneeesseeensaes 7 15 Configuring the User Lockout Window ccccccecssscssseeseceeceeeeseceseeeeseeenseenseeeeaaees 7 15 Configuring the User Lockout Threshold Number c ccccssesseeeseeesseeteeeeseees 7 15 Configuring the User Lockout Duration Time 0 ccceccccesseeessceteeeeneeeeseeenseenseees 7 16 Manually Locking and Unlocking User Accounts 0 cceseeseesseseeeneeeeeneeeaeeeneees 7 16 Configuring Privileges for a User cccccccscccsseessseeeseeeeseeeeecnseeeseaeceseeeeneeenseeeseeenseeensaes 7 17 Setting Up SNMP Access for a User Account ccccecsccesceeseeeeseeeeeeeeseeeeseeesssesseeeeeneees 7 18 SNMP Access Without Authentication Encryption cccccecceessecsteeeeeeseteeeeeeees 7 18 SNMP Access With Authentication Encryption cccecsscecseeeseceeseeeeseeseeenseeenes 7
339. ser Accounts for more information about setting up the user data base ASA and Authenticated VLANs Layer 2 Authentication uses Authenticated VLANs to authenticate users through the switch out to a subnet Authenticated Switch Access authenticates users into the switch to manage it The features are independent of each other however user databases for each feature may be located on the same authenti cation server For more information about Authenticated VLANs see Configuring Authenticated VLANs in the OmniSwitch 6800 6850 9000 Network Configuration Guide For more information about authentication servers see Configuring Authentication Servers in the OmniSwitch 6800 6850 9000 Network Configu ration Guide OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 8 5 Configuring Authenticated Switch Access Managing Switch Security Configuring Authenticated Switch Access Setting up Authenticated Switch Access involves the following general steps 1 Set Up the Authentication Servers This procedure is described briefly in this chapter See the Managing Authentication Servers chapter of the OmniSwitch 6800 6850 9000 Network Configuration Guide for complete details 2 Set Up the Local User Database Set up user information on the switch if user login or privilege infor mation will be pulled from the switch See Chapter 7 Managing Switch User Accounts 3 Set Up the Management Interfaces
340. ser name admin Access type http Access port NS IP address 123 251 Read only rights Read Write rights Read only domains Read only families Read Write domains Read Write families Session number 3 User name admin 0x00000000 0x00000000 0x00000000 0x00000000 None None 12 51 0x00000000 0x00000000 Oxffffffff Oxffffffff None a Access type telnet Access port NI IP address Read only rights Read Write rights Read only domains Read only families Read Write domains Read Write families 123251 All 12 61 0x00000000 0x00000000 Oxffffffff Oxffffffff None All The above display indicates that three sessions are currently active on the OmniSwitch Session number 0 always shows the console port whenever that port is active and logged in The other sessions are identified by session number user name the type of access port type IP address and user privileges The output definitions are defined in the table on page 5 21 page 5 20 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using the CLI Multiple User Sessions Listing Your Current Login Session In order to list information about your current login session you may either use the who command and identify your login by your IP address or you may enter the whoami command The following will display gt whoami Session number 4 User name a
341. serl enable 3 Verify that the community string mapping mode is enabled By default the community strings database is enabled If community string mapping is not enabled the community string configuration will not be checked by the switch If the community string mapping mode is disabled use the following command to enable it gt snmp community map mode enable Note Optional To verify that the community string is properly mapped to the username enter the show snmp community map command The display is similar to the one shown here gt show snmp community map Community mode enabled status community string user name es ee 4 4 enabled comstring2 community userl This display also verifies that the community map mode is enabled OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 10 27 Using SNMP For Switch Security Using SNMP Encryption and Authentication SNMPv3 Two important processes are used to verify that the message contents have not been altered and that the source of the message is authentic These processes are encryption and authentication A typical data encryption process requires an encryption algorithm on both ends of the transmission and a secret key like a code or a password The sending device encrypts or scrambles the message by running it through an encryption algorithm along with the key The message is then transmitted over the network in i
342. sesenseosesessesseeseeseesssessressessesssessresees 3 9 NTP SeryersS eonen a a E EE EE E OS 3 10 Using Authentication cceccccssccsssecssscesseessceceseesecesseecseceseecsseeeseaeeeseseeeeeneeenes 3 12 Verifying NTP Configuration sarene eieaa a a a ets 3 13 Managing CMM Directory Content 0 0 0 ccc ccccsccessceeeeeeeseeeseenseeseeeseenseees 4 1 In This Chapter i aara r a Aa A E EIES EEEE EEN S 4 1 CMM Specifications a N E Sh SE Me A ee es 4 2 CMM Bile cre dexsttestede rience abies cote siede teak eaates eaieia eaten cies terete ate Reavio Webra 4 3 CMM Software Directory Structure cccccccsccecsceeseeeesceeseeeeseecseeenseeesereeeeseeeeeeaes 4 3 Where is the Switch Running From ccccecsscesseeeseeeeeceeseeeseeeeesseeseeeeeeenes 4 4 Software Rollback Feature cccccccsescssscssseceeseeeesseeeeceseeceseeeseecsseecseeessreeseeeseseees 4 4 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 v Contents Software Rollback Configuration Scenarios for a Single Switch ee 4 5 Redundancy tees he tierce Mth Lt haa cceete a ree et auth eh Re eens 4 9 Redundancy Scenarios cccssccssscsssecsseessseceeseceseeeeseeenseecseeeseecseaeeesseeeeeeneeenes 4 9 Managing the Directory Structure Non Redundant 0 0 ececeeseceseceececeeeeeeeeceneeeeeeees 4 13 Rebooting the S witch 0 ch ee went ait Me Ra nae a aes 4 13 Copying the Running Configuration to the Working Directory eceeee
343. sion to copy distribute and or modify the software Also for each author s protection and ours we want to make certain that everyone understands that there is no warranty for this free software If the software is modified by someone else and passed on we want its recipients to know that what they have is not the original so that any problems introduced by others will not reflect on the original authors reputations Finally any free program is threatened constantly by software patents We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses in effect making the program proprietary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION 0 This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License The Program below refers to any such program or work and a work based on the Program means either the Program or any derivative work under copyright law that is to say a work containing the Program or a portion of it either OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page A 5 Third Party Licens
344. stored Note If the switch is rebooted at this point in the process since the certified and working directory boot cfg files are not the same the switch will boot and run from the certified directory See Where is the Switch Running From on page 4 4 for a description of this process The modifications made to the functionality of the switch are recorded in the running configuration in the RAM These changes in the RAM are only valid until the switch is rebooted At that time the switch reboots from the certified directory If the running configuration is not saved to the working directory before a reboot then the changes made in the running configuration are lost To save these changes it is necessary to save the contents of the running configuration to the working directory page 4 16 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing CMM Directory Content Managing the Directory Structure Non Redundant To save the running configuration to the working directory enter the copy running config working or write memory command at the prompt as shown gt copy running config working or gt write memory The above commands perform the same function When these commands are issued the running configu ration with all modifications made is saved to a file called boot cfg in the working directory Note This command will not function if the switch is running from the certified directory See Where i
345. stribution and use in source and binary forms with or without modification are permitted provided that the following conditions are met 1 Redistributions of source code must retain the above copyright notice and the entire permission notice in its entirety including the disclaimer of warranties 2 Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution 3 The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission ALTERNATIVELY this product may be distributed under the terms of the GNU Public License in which case the provisions of the GPL are required INSTEAD OF the above restrictions This clause is necessary due to a potential bad interaction between the GPL and the restrictions contained in a BSD style copyright THIS SOFTWARE IS PROVIDED AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ALL OF WHICH ARE HEREBY DISCLAIMED IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROF ITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY TH
346. sword policy cannot con disabled word tain username Minimum number of uppercase char user password policy min upper 0 disabled acters allowed in a password case Minimum number of lowercase char user password policy min lower 0 disabled acters allowed in a password case Minimum number of base 10 digits user password policy min digit 0 disabled allowed in a password Minimum number of non alphanu user password policy min nonal 0 disabled meric characters allowed in a pass pha word Maximum number of old passwords user password history 4 to retain in the password history Minimum number of days user is user password min age 0 disabled blocked from changing password page 7 2 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing Switch User Accounts User Account Defaults e Global user account lockout defaults are as follows Parameter Description Command Length of time during which failed user lockout window login attempts are counted Default 0 all attempts are counted Length of time a user account user lockout duration remains locked out of the switch 0 account remains locked until manually before the account is automatically unlocked unlocked Maximum number of failed login user lockout threshold 0 no limit to the num attempts allowed during the lockout window time period ber of failed login attempts OmniSwitch 6800 6850 9000 S
347. t a password is dropped from the password history when it no longer falls within the number of passwords that are retained by the switch Configuring the Minimum Age for a Password The password minimum age setting specifies the number of days during which a user is not allowed to change their password Note that it is necessary to configure a password minimum age value that is less than the password expiration value The default minimum age is set to zero which means that there is no minimum age requirement for a pass word To configure a minimum password age use the user password min age command For example gt user password min age 7 This command specifies that the user is prevented from changing their password for seven days from the time the password was created or modified page 7 14 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing Switch User Accounts Configuring Global User Lockout Settings Configuring Global User Lockout Settings The following user lockout settings configured for the switch apply to all user accounts e Lockout window the length of time a failed login attempt is aged before it is no longer counted as a failed attempt e Lockout threshold the number of failed login attempts allowed within a given lockout window period of time e Lockout duration the length of time a user account remains locked until it is automatically unlocked In addition to the above lockout set
348. t file created with the configuration snapshot all command File asc 1l snap l I Chassis system name FujiCmm mac alloc 91 0 1 00 d0 95 6b 09 41 Configuration VLAN VLAN SL IP ip service all icmp unreachable net unreachable disable ip interface vlan 1 address 10 255 211 70 mask 255 255 255 192 vlan 1 mtu 1500 ifindex 1 IPX IPMS AAA aaa authentication default local aaa authentication console local PARTM AVLAN 802 1x QOS Policy manager Session manager SNMP snmp security no security snmp community map mode off IP route manager ip static route 0 0 0 0 mask 0 0 0 0 gateway 10 255 211 65 metric 1 RIP OSPF BGP IP multicast IPv6 RIPng Health monitor Interface Link Aggregate VLAN AGG 802 10 Spanning tree bridge mode 1x1 Bridging source learning chassis hardware Bridging Port mirroring UDP Relay Server load balance System service VRRP Web AMAP GMAP Module page 6 12 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Working With Configuration Files Creating Snapshot Configuration Files Lan Power NTP RDP This file shows configuration settings for the Chassis IP AAA SNMP IP route manager Spanning tree and Bridging services Each of these services have configuration commands listed under their heading All other switc
349. t number 1 8 valid and assigned slot numbers corresponding to values from the entPhysicalTable 1001 1008 switches operating in pass through mode 255 unassigned slot number Note This trap is not supported on OmniSwitch 9000 switches 58 alaStackMgrOutOfPassThruSlotsTrap N A chassis There are no pass through slots available to be assigned to an ele ment that is supposed to enter the pass through mode Note This trap is not supported on OmniSwitch 9000 switches in the current release 59 gmHwVlanRuleTableOverloadAlert gmOverloadRu vlan An overload trap occurs when leTable ever a new entry to the hardware gmOverloadRu VLAN tule table gets dropped leType due to the overload of the table gmOverloadRu leVlanId gmOverloadRu leMacAd dress gmOverloadRu leIpAddress gmOverloadRu leProtocol gmOverloadRu leIpxNetwork gmOverloadRuleTable Overloaded hardware VLAN rule table gmOverloadRuleType VLAN rule types that are not configured due to the overload of the hardware VLAN tule table gmOverloadRuleVlanId tThe overloaded VLAN ID gmOverloadRuleMacAddress The overloaded MAC address gmOverloadRuleIpAddress The overloaded IP address gmOverloadRuleProtocol The overloaded protocol type gmOverloadRuleIpxNetwork The overloaded IPX network address 60 InkaggAggUp trapInkaggld linkaggre Indicates the link aggregate is trapInkaggPor gation active This trap is sent when any tifIndex one port of
350. t up to communicate with external authentication servers that contain user informa tion The user information includes usernames and passwords it may also include privilege information or reference an end user profile name For information about setting up the switch to communicate with external authentication servers see the OmniSwitch 6800 6850 9000 Network Configuration Guide OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 2 7 Using Telnet Logging Into the Switch Using Telnet Telnet may be used to log into the switch from a remote station All of the standard Telnet commands are supported by software in the switch When Telnet is used to log in the switch acts as a Telnet server If a Telnet session is initiated from the switch itself during a login session then the switch acts as a Telnet client Logging Into the Switch Via Telnet Before you can log into the OmniSwitch using a Telnet interface the telnet option of the aaa authentication command must be enabled Once enabled any standard Telnet client may be used to log into the switch To log into the switch open your Telnet application and enter the switch s IP address the IP address will typically be the same as the one configured for the EMP The switch s welcome banner and login prompt is displayed Note A Telnet connection is not secure Secure Shell is recommended instead of Telnet or FTP as a secure method of accessing the switch Sta
351. tage 2 Gaining Familiarity with Basic Switch Functions Pertinent Documentation Hardware Users Guide Switch Management Guide Once you have your switch up and running you will want to begin investigating basic aspects of its hard ware and software Information about switch hardware is provided in the Hardware Guide This guide provide specifications illustrations and descriptions of all hardware components such as chassis power supplies Chassis Management Modules CMMs Network Interface NI modules and cooling fans It also includes steps for common procedures such as removing and installing switch components The Switch Management Guide is the primary users guide for the basic software features on a single switch This guide contains information on the switch directory structure basic file and directory utilities switch access security SNMP and web based management It is recommended that you read this guide before connecting your switch to the network Stage 3 Integrating the Switch Into a Network Pertinent Documentation Network Configuration Guide Advanced Routing Configuration Guide When you are ready to connect your switch to the network you will need to learn how the OmniSwitch implements fundamental software features such as 802 1Q VLANs Spanning Tree and network routing protocols The Network Configuration Guide contains overview information procedures and examples on how standard networking technologies are confi
352. tch 6800 Series chassis and compo nents Also includes comprehensive information on assembling and managing stacked configurations OmniSwitch 6850 Series Hardware User Guide Complete technical specifications and procedures for all OmniSwitch 6850 Series chassis power supplies and fans Also includes comprehensive information on assembling and managing stacked configurations OmniSwitch 9000 Series Getting Started Guide Describes the hardware and software procedures for getting an OmniSwitch 9000 Series up and running Also provides information on fundamental aspects of OmniSwitch software architecture OmniSwitch 9000 Series Hardware Users Guide Complete technical specifications and procedures for all OmniSwitch 9000 Series chassis power supplies fans and Network Interface NI modules OmniSwitch CLI Reference Guide Complete reference to all CLI commands supported on the OmniSwitch 9000 Series Includes syntax definitions default values examples usage guidelines and CLI to MIB variable mappings OmniSwitch 6800 6850 9000 Switch Management Guide Includes procedures for readying an individual switch for integration into a network Topics include the software directory architecture image rollback protections authenticated switch access managing switch files system configuration using SNMP and using web management software WebView OmniSwitch 6800 6850 9000 Network Configuration Guide Includes network configuration pr
353. tch Security Community Strings SNMPv1 and SNMPv2 The switch supports the SNMPv1 and SNMPv2c community strings security standard When a commu nity string is carried over an incoming SNMP request the community string must match up with a user account name as listed in the community string database on the switch Otherwise the SNMP request will not be processed by the SNMP agent in the switch Configuring Community Strings To use SNMPv1 and v2 community strings each user account name must be mapped to an SNMP community string Follow these steps 1 Create a user account on the switch and define its password Enter the following CLI syntax to create the account community_user1 gt user community userl password no auth Note A community string inherits the security privileges of the user account that creates it A user account can be created locally on the switch by using CLI commands For detailed information on setting up user accounts refer to the Using Switch Security chapter of this manual 2 Map the user account to a community string A community string works like a password so it is defined by the user It can be any text string up to 32 characters in length If spaces are part of the text the string must be enclosed in quotation marks The following CLI command maps the username community_user1 to the community string comstring2 gt snmp community map comstring2 user community _u
354. terStatsTable vrrp vacmContextTable snmp vacmSecurityToGroupTable snmp vacmAccessTable snmp vacmViewTreeFamilyTable snmp MIB Table Description If the user account has no restrictions the display shown by the show snmp mib family command can be very long For documentation purposes a partial list is shown above and three entry examples are defined e The first entry in the MIB Table shows an MIP identification number of 6145 The MIB table name is esmConfTrap This table is found in the AlcatelIND1Port MIB which defines managed objects for the ESM Driver subsystem e For MIP Id number 77828 the MIB table name is healthModuleTable This table is found in the AlcatelIND1Health MIB which defines managed objects for the health monitoring subsystem For MIB Id number 87042 the MIB table name is vacmContextTable This table is found in the SNMP VIEW BASED ACM MIB which serves as the view based access control model VACM for the SNMP page 10 32 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using SNMP SNMP MIB Information Industry Standard MIBs The following table lists industry standard MIBs supported by the OmniSwitch 6800 6850 9000 switches MIB Name Description Dependencies BGP4 MIB RFC 1657 Definitions of Managed Objects for the Fourth Version SNMPv2 SMI of the Border Gateway Protocol BGP 4 by using SMIv 2 BRIDGE MIB The Bridge MIB for managing MAC bridges based on SNMPv2
355. terface vlan 68 address 168 14 12 120 vlan 68 syntax is the most recent Command Shows the exact syntax of the command as entered by the user UserName Shows the name of the user session that entered the command For more information on different user session names refer to Chapter 7 Managing Switch User Accounts Date Shows the date and time down to the second when the command was originally entered IP Addr The IP address of the terminal from which the command was entered Result The outcome of the command entry If a command was entered successfully the syntax SUCCESS displays in the Result field If a syntax or configuration error occurred at the time a command was entered details of the error display For example Result ERROR Ip Address must not belong to IP VLAN 67 subnet page 5 16 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using the CLI Customizing the Screen Display Customizing the Screen Display The CLI has several commands that allow you to customize the way switch information is displayed to your screen You can make the screen display smaller or larger You can also adjust the size of the table displays and the number of lines shown on the screen Note Screen display examples in this chapter assume the use of a VT 100 ASCII emulator Changing the Screen Size You may specify the size of the display shown on your terminal screen by using the tty command This command is
356. th no numeric model name e OmniSwitch 6600 Family e OmniSwitch 7700 7800 e OmniSwitch 8800 e Omni Switch Router e OmniStack e OmniAccess OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page xiii Who Should Read this Manual The audience for this user guide are network administrators and IT support personnel who need to config ure maintain and monitor switches and routers in a live network However anyone wishing to gain knowledge on how fundamental software features are implemented in the OmniSwitch 6800 Series OmniSwitch 6850 Series and OmniSwitch 9000 Series switches will benefit from the material in this configuration guide When Should I Read this Manual Read this guide as soon as your switch is up and running and you are ready to familiarize yourself with basic software functions You should have already stepped through the first login procedures and read the brief software overviews in the OmniSwitch 6800 Series Getting Started Guide OmniSwitch 6850 Series Getting Started Guide or OmniSwitch 9000 Series Getting Started Guide You should have already set up a switch password and be familiar with the very basics of the switch soft ware This manual will help you understand the switch s directory structure the Command Line Interface CLD configuration files basic security features and basic administrative functions The features and procedures in this guide will help form a foundation that wil
357. the OmniSwitch CLI Reference Guide OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 7 9 Creating a User Managing Switch User Accounts Creating a User To create a new user enter the user command with the desired username and password Use the password keyword For example gt user thomas password techpubs In this example a user account with a user name of thomas and a password of techpubs is stored in the local user database Typically the password should be a string of non repeating characters The CLI uses the first occurrence of the character series to uniquely identify the password For example the password tpubtpub is the same as tpub A better password might be tpub3457 Note The exclamation point is not a valid password character In addition specifying an asterisk as one or more characters in a password is allowed as long as every character is not an asterisk For example password 123456 is allowed password is not allowed If privileges are not specified for the user the user will inherit all of the privileges of the default user account See Default User Settings on page 7 8 Note that the password will not display in clear text in an ASCII configuration file produced by the snapshot command Instead it will display in encrypted form See Chapter 6 Working With Configura tion Files for information about using the snapshot command Removing a User To re
358. the Version Number There are currently four versions of NTP available numbered one through four The version that the NTP server uses must be specified on the client side To specify the NTP version on the server from which the switch receives updates use the ntp server command with the server IP address or domain name version keyword and version number as shown gt ntp server 1 1 1 1 version 3 The default setting is version 4 Marking a Server as Preferred If a client receives timestamp updates from more than one server it is possible to mark one of the servers as the preferred server A preferred server s timestamp will be used before another unpreferred server timestamp To specify an NTP as preferred use the ntp server command with the server IP address or domain name and the prefer keyword as shown gt ntp server 1 1 1 1 prefer OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 3 11 Configuring NTP Configuring Network Time Protocol NTP Using Authentication Authentication is used to encrypt the NTP messages sent between the client and server The NTP server and the NTP client must both have a text file containing the public and secret keys This file should be obtained from the server administrator For more information on the authentication file see Authentica tion on page 3 8 Once both the client and server share a common MDS encryption key the MD5 key identificatio
359. the Working Directory It is possible to copy the contents of the certified directory to the working directory This is done by using the following CLI command gt copy certified working If this command is executed all files in the working directory will be permanently overwritten by the contents of the certified directory The copy working certified command is described in detail in the OmniSwitch CLI Reference Guide Note In order for this command to work the amount of free space in flash must equal the size of the files being copied If there isn t enough free space the copy attempt will fail and an error message will be generated Only image files the boot cfg file and the certs pem file should be kept in the certified direc tory page 4 22 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing CMM Directory Content Managing the Directory Structure Non Redundant Show Currently Used Configuration When a switch is booted the certified and working directories are compared If they are the same the switch runs from the working directory If they are different the switch runs from the certified directory A switch running from the certified directory cannot modify directory contents This topic is covered in Where is the Switch Running From on page 4 4 To check the directory from where the switch is currently running enter the following command on OmniSwitch 6800 and 6850 switches
360. the command line the switch will display the current system date To modify the switch s current system date enter the new date with the command syntax The following command will set the switch s system date to June 23 2002 gt system date 06 23 2002 When you specify the date you must use the mm dd yyyy syntax where mm is the month dd is the day and yyyy is the year Months are specified as numbers from 01 to 12 Days are specified as numbers from 1 to 31 You must use two digits to define the month and the day You must use four digits to specify the year Time Zone To determine the current time zone or to specify a new time zone for your switch use the system timezone command This specifies the time zone for the switch and sets the system clock to run on UTC time or Greenwich Mean Time The following is displayed for the Pacific standard time zone gt system timezone PST Coordinated Universal Time UTC 8 hours To set a new time zone for the system clock use the system timezone command along with the appropri ate time zone abbreviation Refer to the table in Enabling DST on page 1 40 for time zone abbrevia tions The following command sets the system clock to run on Pacific standard time gt system timezone pst PST Coordinated Universal Time UTC 8 hours OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 1 37 Setting the System Clock Managing System Files You may set the swit
361. the link aggregate group goes into the attached state trapInkaggId Index value of the Link Aggregate group trapInkaggIfIndex Port of the Link Aggregate group page 10 24 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using SNMP SNMP Overview No Trap Name Objects Family Description 61 InkaggAggDown traplnkagegld linkaggre Indicates the link aggregate is not trapInkaggPor gation active This trap is sent when all tIfIndex ports of the link aggregate group are no longer in the attached state trapInkaggId Index value of the Link Aggregate group trapInkaggIfIndex Port of the Link Aggregate group 62 InkaggPortJoin trapInkaggld linkaggre This trap is sent when any given trapInkaggPor gation port of the link aggregate group tIfIndex goes to the attached state trapInkaggId Index value of the Link Aggregate group trapInkaggIfIndex Port of the Link Aggregate group 63 InkaggPortLeave trapInkaggld linkaggre This trap is sent when any given trapInkaggPor gation port detaches from the link tIfIndex aggregate group trapInkaggId Index value of the Link Aggregate group trapInkaggIfIndex Port of the Link Aggregate group 64 InkaggPortRemove trapInkaggld linkaggre This trap is sent when any given trapInkaggPor gation port of the link aggregate group tIfIndex is removed due to an invalid con figuration trapInkaggId Index value of the Link Aggregate group trapInka
362. the management interface and specifying the servers and or local user database to be used for the interface aaa accounting session Optional Specifies servers to be used for accounting page 8 6 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing Switch Security Quick Steps for Setting Up ASA Quick Steps for Setting Up ASA 1 Ifthe local user database is used for user login information set up user accounts through the user command User accounts may include user privileges or an end user profile In this example user privi leges are configured gt user thomas password pubs read write domain network ip helper telnet If SNMP access is configured for the user the global SNMP setting for the switch may have to be config ured through the snmp security command See Chapter 7 Managing Switch User Accounts for more information about setting up user accounts 2 If an external RADIUS or LDAP server will is used for user login information use the aaa radius server or aaa tacacs server commands to configure the switch to communicate with these servers For example gt aaa radius server radl host 10 10 1 2 timeout 3 For more information see the Managing Authentication Servers chapter in the OmniSwitch 6800 6850 9000 Network Configuration Guide 3 Use the aaa authentication command to specify the management interface through which switch access is permitted such as console telnet ft
363. the session login attempt command as follows gt session login attempt 5 In this example the user may attempt to log in to the CLI five 5 times unsuccessfully If the user attempts to log in the sixth time the switch will break the TCP connection You may also set the length of time allowed for a successful login by using the session login timeout command as follows gt session login timeout 20 In this example the user must complete the login process within 20 seconds This means that the time between a user entering a login name and the switch processing a valid password must not exceed 20 seconds If the time out period exceeds the switch will break the TCP connection Configuring the Inactivity Timer You can set the amount of time that a user must be inactive before the session times out By default the time out for each session type is 4 minutes To change the setting enter the session timeout command with the type of session cli http or ftp and the desired number of minutes In the following example the CLI time out is changed from the default to 8 minutes gt session timeout cli 8 This command changes the inactivity timer for new CLI sessions to 8 minutes Current CLI sessions are not affected In this example current CLI sessions will be timed out after 4 minutes CLI sessions are initiated through Telnet Secure Shell or through the switch console port For information about connecting to the CLI through
364. the standard file transfer protocol used with Secure Shell version 2 Secure Shell FTP is an interactive file transfer program similar to the industry standard FTP which performs all file transfer operations over a Secure Shell connection You can invoke the Secure Shell FTP session by using the sftp command and the SFTPv6 session by using the sftp6 command in an IPv6 environment Once the authentication phase is complete the Secure Shell FTP subsystem runs Secure Shell FTP connects and logs into the specified host then enters an inter active command mode Refer to Starting a Secure Shell Session on page 2 15 for detailed information page 2 12 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Logging Into the Switch Using Secure Shell Secure Shell Application Overview Secure Shell is an access protocol used to establish secured access to your OmniSwitch The Secure Shell protocol can be used to manage an OmniSwitch directly or it can provide a secure mechanism for managing network servers through the OmniSwitch The drawing below illustrates the Secure Shell being used as an access protocol replacing Telnet to manage the OmniSwitch Here the user terminal is connected through the network to the switch Secure Shell HHHH HHHH n E Terminal OmniSwitch Secure Shell Used as an Access Protocol ie m The drawing below shows a slightly different application Here a terminal connected t
365. ther the feature is currently enabled or disabled on the switch use the show command log status command For example gt show command log status CLI command logging Enable In this case the feature has been enabled by the user via the command log command For more informa tion on enabling and disabling command logging refer to the sections above Viewing Logged CLI Commands and Command Entry Results To view a list of logged commands along with the corresponding information including entry results enter the show ssh config command For example gt show command log Command ip interface vlan 68 address 168 14 12 120 vlan 68 UserName admin Date MON APR 28 01 42 24 Ip Addr 128 251 19 240 Result SUCCESS Command ip interface vlan 68 address 172 22 2 13 vlan 68 UserName admin Date MON APR 28 01 41 51 Ip Addr 128 251 19 240 Result ERROR Ip Address must not belong to IP VLAN 67 subnet Command ip interface vlan 67 address 172 22 2 12 vlan 67 UserName admin Date MON APR 28 01 41 35 Ip Addr 128 251 19 240 Result SUCCESS Command command log enable UserName admin Date MON APR 28 01 40 55 Ip Addr 128 251 19 240 Result SUCCESS The show command log command lists up to 100 CLI commands in descending order In other words the most recent commands are listed first In the example above the command log enable syntax is the least recent command logged the ip in
366. those commands See the Switch Security chapter of this manual for further informa tion on permissions to specific command families Snapshot Feature List You can specify the snapshot file so that it will capture the CLI commands for one or more switch features or for all network features To generate a snapshot file for all network features use the following syntax gt configuration snapshot all To generate a snapshot file for specific features select the appropriate syntax from the following list Snapshot Keywords 802 1Q ipx snmp aaa ip routing stp aip linkagg system all module slb bgp ntp vrrp bridge ospf vlan chassis ospf3 webmgt health pmm ip policy ipms qos ipv6 rip ipmr ripng ip helper rdp interface session You may enter more than one network feature in the command line Separate each feature with a space and no comma The following command will generate a snapshot file listing current configurations for the vlan qos and snmp command families gt configuration snapshot vlan qos snmp You can verify that a new snapshot file is created by using the ls command to list all files in the flash directory page 6 10 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Working With Configuration Files Creating Snapshot Configuration Files User Defined Naming Options When the snapshot syntax does not include a file name the snapshot file is created using the default file n
367. thresh alarmSample old The variable s rising thresh Type old and whether it will issue an alarm Value SNMP trap for this condition are alarmRisingTh configured by an NMS station reshold running RMON alarmIndex An index that uniquely identifies an entry in the alarm table Each such entry defines a diagnos tic sample at a particular interval for an object on the device alarmVariable The object identifier of the particular variable to be sampled Only variables that resolve to an ASN 1 primitive type of INTEGER INTEGER Integer32 Counter32 Counter64 Gauge or TimeTicks may be sampled alarmSampleType tThe method of sampling the selected variable and calculating the value to be compared against the thresholds If the value of this object is absoluteValue 1 the value of the selected variable will be compared directly with the thresholds at the end of the sampling interval If the value of this object is deltaValue 2 the value of the selected variable at the last sample will be subtracted from the current value and the differ ence compared with the thresholds alarmValue The value of the statistic during the last sampling period For example if the sample type is deltaValue this value will be the difference between the samples at the beginning and end of the period If the sample type is absoluteValue this value will be the sampled value at the end of the period alarmRisingThreshold A threshold for the sampled statistic
368. ting Authentication for a User Account User account names and passwords must be a minimum of 8 characters in length when authentication and encryption are used The following syntax sets authentication type MD5 with DES encryption for user account user_auth1 gt user user authl password md5 des SNMP authentication types SHA and MDS are available with and without type DES encryption The sha md5 shat des and md5 des keywords may be used in the command syntax Note Optional To verify the authentication and encryption type for the user enter the show user command The following is a partial display gt show user User name user _authl Read right 0x0000a200 0x00000000 Write right 0x00000000 0x00000000 Read for domains Read for families snmp chassis interface Write for domains None Snmp authentication MD5 Snmp encryption DES The user s SNMP authentication is shown as MDS and SNMP encryption is shown as DES page 10 28 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using SNMP Using SNMP For Switch Security Setting SNMP Security By default the switch is set to privacy all which means the switch accepts only authenticated and encrypted v3 Sets Gets and Get Nexts You can configure different levels of SNMP security by entering snmp security followed by the command parameter for the desired security level For example the following syntax sets the
369. ting Up SNMP Access for a User Account For this user if the SNMP community map mode is enabled the default the SNMP community map must include a mapping for this user to a community string In this example the community string is our_group gt snmp community map our group user thomas In addition the global SNMP security level on the switch must allow non authenticated SNMP frames through the switch By default the SNMP security level is privacy all this is the highest level of SNMP security which allows only SNMPv3 frames through the switch Use the snmp security command to change the SNMP security level For more information about configuring SNMP globally on the switch see Chapter 10 Using SNMP SNMP Access With Authentication Encryption To configure a user with SNMP access and authentication enter the user command with the desired authentication type sha md5 sha des and md5 des gt user thomas password techpubs sha des When SNMP authentication is specified an SNMP authentication key is computed from the user pass word based on the authentication encryption setting In this example the switch would use the SHA authentication algorithm and DES encryption on the techpubs password to determine the SNMP authenti cation key for this user The key is in hexadecimal form and is used for encryption de encryption of the SNMP PDU The authentication key is only displayed in an ASCII configuration file if the snaps
370. ting to fe80 a00 20ff fea8 8961 connected 220 cosmo FTP server UNIX r System V Release 4 1 ready Name page 2 10 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Logging Into the Switch Using FTP You have to enter a valid user name and password for the host you specified with the ftp6 command after which you will get a screen similar to the following display Name Jsmith 331 Password required for Jsmith Password 230 User Jsmith logged in Note It is mandatory to specify the name of the particular IPv6 interface if the target has been specified using the link local address After logging in you will receive the ftp gt prompt where you can execute the FTP commands that are supported on the switch For further information refer to the OmniSwitch 6850 9000 CLI guide Note You must use the binary mode bin to transfer image files via FTP OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 2 11 Using Secure Shell Logging Into the Switch Using Secure Shell The OmniSwitch Secure Shell feature provides a secure mechanism that allows you to log in to a remote switch to execute commands on a remote device and to move files from one device to another Secure Shell provides secure encrypted communications even when your transmission is between two untrusted hosts or over an unsecure network Secure Shell protects against a variety of security risks including the followin
371. tings the network administrator also has the ability to manually lock and unlock user accounts The following subsections describe how to configure user lockout settings and how to manually lock and unlock user accounts Note Only the admin user is allowed to configure user lockout settings The admin account is protected from lockout therefore it is always available Lockout settings are saved automatically that is these settings do not require the write memory copy running config working or configuration snapshot command to save user settings over a reboot To view the current lockout settings configured for the switch use the show user lockout setting command For more information about this command and those used in the configuration examples throughout this section see the OmniSwitch CLI Reference Guide Configuring the User Lockout Window The lockout window is basically a moving observation window of time in which failed login attempts are counted If the number of failed login attempts exceeds the lockout threshold setting see Configuring the User Lockout Threshold Number on page 7 15 during any given observation window period of time the user account is locked out of the switch Note that if a failed login attempt ages beyond the observation window of time that attempt is no longer counted towards the threshold number For example if the lockout window is set for 10 minutes and a failed login attempt occurred 11 minute
372. to three Pv4 domain name servers and three IPv6 domain name servers that will be queried in turn to resolve the host name If all servers are queried and none can resolve the host name to an IP address the DNS fails If the DNS fails you must either enter an IP or IPv6 address in place of the host name or specify the necessary lookup tables on one of the specified servers Note You do not need to enable the DNS resolver service unless you want to communicate with the switch by using a host name If you use an IP or IPv6 address rather than a host name the DNS resolver service is not needed You must perform three steps on the switch to enable the DNS resolver service 1 Set the default domain name for DNS lookups with the ip domain name CLI command gt ip domain name mycompanyl com 2 Use the ip domain lookup CLI command to enable the DNS resolver service gt ip domain lookup You can disable the DNS resolver by using the no ip domain lookup command For more information refer to the OmniSwitch CLI Reference Guide 3 Specify the IP addresses of up to three servers with the ip name server CLI command These servers will be queried when a host lookup is requested gt ip name server 189 202 191 14 189 202 191 15 189 255 19 1 You can also specify IPv6 DNS servers to query on a host lookup The following example describes the steps to enable the IPv6 DNS resolver service on the switch 1 Set the default domain name for IPv6 DNS look
373. ts encrypted state The receiving device then takes the transmitted message and un scram bles it by running it through a decryption algorithm The receiving device cannot un scramble the coded message without the key The switch uses the Data Encryption Standard DES encryption scheme in its SNMPv3 implementation For DES the data is encrypted in 64 bit blocks by using a 56 bit key The algorithm transforms a 64 bit input into a 64 bit output The same steps with the same key are used to reverse the encryption The authentication process ensures that the switch receives accurate messages from authorized sources Authentication is accomplished between the switch and the SNMP management station through the use of a username and password identified via the snmp station CLI syntax The username and password are used by the SNMP management station along with an authentication algorithm SHA or MD5 to compute a hash that is transmitted in the PDU The switch receives the PDU and computes the hash to verify that the management station knows the password The switch will also verify the checksum contained in the PDU Authentication and encryption are combined when the PDU is first authenticated by either the SHA or MDS method Then the message is encrypted using the DES encryption scheme The encryption key is derived from the authentication key which is used to decrypt the PDU on the switch s side Configuring Encryption and Authentication Set
374. turned by the NI which failed to configure Mirroring Monitoring 30 slPCAMStatusTrap sIPCAMSlot bridge The trap status of the Layer 2 Number pesudoCAM for this NI sIPCAMSlice Number sIPCAMStatus sIPCAMSlotNumber The slot number of this Coronado switching routing ASIC sIPCAMSliceNumber The slice number of this Coronado switching routing ASIC sIPCAMStatus The Layer 2 pesudoCAM status of this Coronado switching routing ASIC 31 unused N A N A 32 unused N A N A page 10 18 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using SNMP SNMP Overview Family load balancing No Trap Name Objects Description 33 slbTrapOperStatus slbTrapInfoEn tityGroup slbTrapInfoOp erStatus slbTrapInfo ClusterName slbTrapInfoS erverIpAddr A change occurred in the opera tional status of the server load balancing entity slbTrapInfoEntityGroup tThe entity group inside SLB management slbTrapInfoOperStatus tThe operational status of an SLB cluster or server slbTrapInfoClusterName A change occurred in the operational status of an SLB entity slbTrapInfoServerIpAddr the IP address of a server Note This trap is not supported on OmniSwitch 6800 6850 9000 switches in the current release 34 ifMauJabberTrap ifMauJabber interface State This trap is sent whenever a man aged interface MAU enters the jabber state ifMauJabberState The value other 1 is returned if the jab
375. two new PDUs not supported by SNMPv1 The GetBulkRequest PDU enables the manager to retrieve large blocks of data efficiently In particular it is well suited to retrieving multiple rows in a table The InformRequest PDU enables one manager to send trap information to another manager SNMPv3 SNMPv3 supports the View Based Access Control Model VACM and User Based Security Model USM security models along with these added security features Message integrity Ensuring that a packet has not been tampered with in transit Time Frame Protection Limiting requests to specified time frames The user can specify a time frame so that any PDU bearing an out of date timestamp will be ignored Encryption Scrambling the contents of a packet to prevent it from being learned by an unauthorized source Authentication Determining that the message is from a valid source holding the correct privileges OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 10 9 SNMP Overview Using SNMP SNMP Traps Table The following table provides information on all SNMP traps supported by the switch Each row includes the trap name its ID number any objects if applicable its command family and a description of the condition the SNMP agent in the switch is reporting to the SNMP management station You can generate a list of SNMP traps that are supported on your switch by using the show snmp trap config command No Trap Name Object
376. ue the sftp CLI command The command syntax requires you to OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 2 17 Using Secure Shell Logging Into the Switch identify the IP address or hostname for the device to which you are connecting The following command establishes a Secure Shell FTP interface from the local OmniSwitch to IP address 10 222 30 125 gt sftp 10 222 30 125 login as Note If SFTP is not enabled use the scp sftp command to enable it 2 You must have a login and password that is recognized by the IP address you specify When you enter your login the device you are logging in to will request your password as shown here gt sftp 10 222 30 125 login as rrlogin2 rrlogin2 s password for keyboard interactive method Note You can use the sftp6 command followed by the IPv6 address or hostname of the SFTPv6 server to start an SFTPV6 session It is mandatory to specify the name of the particular IPv6 interface if the SFTP v6 server has been specified using its link local address SFTPv6 sessions are supported only on OmniSwitch 6850 or 9000 3 After logging in you will receive the sftp gt prompt You may enter a question mark to view available Secure Shell FTP commands and their definitions as shown here sftp gt Available commands cd path Change remote directory to path lcd path Change local directory to path chmod mode path Change permissions of file
377. ughput one CMM is designated as the primary CMM and the other is designated as the secondary CMM One CMM or the other runs the switch or both at the same time to provide full traffic throughput The directory struc ture of the CMM software is designed to prevent corrupting or losing switch files It also allows you to retrieve a previous version of the switch software In addition to working as standalone switches the OmniSwitch 6800 Series switches can be linked together as a stack For example you could have a stack of four 6800 24 models a stack of three 6800 48 models or a combination of the two modules An OmniSwitch 6800 Series stack can provide CMM redundancy one switch is designated as the primary CMM and one is designated as the secondary CMM One CMM or the other runs the switch but never at the same time All other switches in a stack are desig nated idle for the purposes of CMM control This stacking capability and CMM redundancy is also available with the OmniSwitch 6850 Series Note Mixing OmniSwitch 6800 and 6850 switches together in the same stack is not supported Management of the stack is run by the stack configuration software A detailed description of the stack configuration software and how it works is provided in the Managing Stacks chapter found in both the OmniSwitch 6800 Hardware Users Guide and the OmniSwitch 6850 Hardware Users Guide In This Chapter This chapter describes the basic functions of
378. ups with the ip domain name CLI command gt ip domain name mycompanyl com 2 Use the ip domain lookup CLI command to enable the IPv6 DNS resolver service gt ip domain lookup You can disable the IPv6 DNS resolver by using the no form of the ip domain lookup command For more information refer to the OmniSwitch CLI Reference Guide 3 Specify the IPv6 addresses of up to three servers with the ipv6 name server CLI command These IPv6 servers will be queried when a host lookup is requested gt ipv6 name server fe2d 2c 302 3del 1 flbc 202 f d40 3 Note You cannot use multicast loopback link local and unspecified IPv6 addresses for specifying IPv6 DNS servers You can specify IPv6 DNS servers only on an OmniSwitch 6850 or 9000 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 2 23 Verifying Login Settings Logging Into the Switch Verifying Login Settings To display information about login sessions use the following CLI commands who Displays all active login sessions e g console Telnet FTP HTTP Secure Shell Secure Shell FTP whoami Displays the current user session show session config Displays session configuration information e g default prompt ban ner file name inactivity timer login timer login attempts show dns Displays the current DNS resolver configuration and status For more information about these commands refer to the OmniSwitch CLI Reference Gu
379. ur freedom to share and change free software to make sure the software is free for all its users This General Public License applies to most of the Free Software Foundation s software and to any other program whose authors commit to using it Some other Free Software Foundation software is covered by the GNU Library General Public License instead You can apply it to your programs too When we speak of free software we are referring to freedom not price Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software and charge for this service if you wish that you receive source code or can get it if you want it that you can change the soft ware or use pieces of it in new free programs and that you know you can do these things To protect your rights we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights These restrictions translate to certain responsibilities for you if you distribute copies of the software or if you modify it For example if you distribute copies of such a program whether gratis or for a fee you must give the recipients all the rights that you have You must make sure that they too receive or can get the source code And you must show them these terms so they know their rights We protect your rights with two steps 1 copyright the software and 2 offer you this license which gives you legal permis
380. uration This directory structure is explained in the Switch Directories section on page 1 4 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 1 3 Switch Administration Overview Managing System Files Switch Directories You can create your own directories in the switch flash directory This allows you to organize your config uration and text files on the switch You can also use the vi command to create files This chapter tells you how to make copy move and delete both files and directories Listing Directory flash Directory flash certified Directory flash network Files P boot params Files Files ajaaa Directory flash working boot slot cfg boot cfg 1 err Files swlog1 log swlog2 log Switch Flash Directory page 1 4 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing System Files File and Directory Management File and Directory Management A number of CLI commands allow you to manage files on your switch by grouping them into sub directories within the switch s flash directory These commands perform the same functions as file management software applications such as Microsoft Explorer perform on a workstation For documentation purposes we have categorized the commands into the following three groups e Directory commands allow you to create copy move remove rename and display directories e File commands allow you copy secure cop
381. uration Files to the Switch on page 6 6 Configuration File Error Reporting on page 6 7 Text Editing on the Switch on page 6 9 Creating Snapshot Configuration Files on page 6 10 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 6 1 Configuration File Specifications Working With Configuration Files Configuration File Specifications The following table lists specifications applicable to Configuration Files Creation Methods for e Create a text file on a word processor and upload it to the switch Configuration Files e Invoke the switch s snapshot feature to create a text file e Create a text file using one of the switch s text editors Timer Functions Files can be applied immediately or by setting a timer on the switch Command Capture Feature Snapshot feature captures switch configurations in a text file Error Reporting Snapshot feature includes error reporting in the text file Text Editing on the Switch Vi standard UNIX editor The Ed standard UNIX editor is available in the debug mode Tutorial for Creating a Configuration File This example creates a configuration file that includes CLI commands to configure the DHCP Relay appli cation on the switch For this example the forward delay value is set to 15 seconds the maximum number of hops is set to 3 and the IP address of the DHCP server is 128 251 16 52 This tutorial shows you how to accomplish the following tasks
382. ure Non Redundant Note If the switch is rebooted before using the copy certified working command the switch will be running from the certified directory as the working and certified directories are not the same This behav ior is described in Where is the Switch Running From on page 4 4 To reboot the switch from the working directory enter the following command at the prompt along with a timeout period in minutes as shown gt reload working rollback timeout 5 At the end of the timeout period the switch will reboot again normally as if a reload command had been issued Note It is important to certify the working directory and synchronize the stack as soon as the validity of the software is established in OmniSwitch 6800 and 6850 switches only Stacks booted from the working directory or unsynchronized stacks are at risk of mismanaging data traffic due to incompatibilities in different versions of switch software Certifying the working directory is described in Copying the Work ing Directory to the Certified Directory on page 4 21 while synchronizing the switch is described in Synchronizing the Primary and Secondary CMMs on page 4 27 Rebooting the Switch from the Working Directory with No Rollback Timeout It is possible to reboot from the working directory without setting a rollback timeout in the following manner gt reload working no rollback timeout Scheduling a Working Directory Reboot It
383. useful when you have a small display screen or you want to limit the number of lines scrolled to the screen at one time For example to limit the number of lines to 10 and the number of columns to 150 enter the following gt tty 10 150 The first number entered after tty defines the number of lines on the screen It must be a number between 10 and 150 The second number after tty defines the number of columns on the screen It must be a number between 20 and 150 You may view the current setting for your screen by using the show tty command Changing the CLI Prompt You can change the system prompt that displays on the screen when you are logged into the switch The default prompt consists of a dash greater than gt text string To change the text string that defines the prompt from gt to gt use the session prompt command as follows gt gt session prompt default gt t gt The switch displays the new prompt string after the command is entered Several building blocks are provided that can automatically display system information along with the prompt string You can set a switch to display any combination of the current username system time system date and system prefix along with the prompt string The following command will define the prefix to display the system time and date along with the prompt string defined in the above example gt prompt time date string gt 01 31 01 04 29 02 gt For an e
384. ut basic login on the switch see Chapter 2 Logging Into the Switch OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 8 1 Switch Security Specifications Managing Switch Security Switch Security Specifications The following table describes the maximum number of sessions allowed on an OmniSwitch Session OS 9000 OS 6850 OS 6800 supports only v4 Telnet v4 or v6 FTP v4 or v6 SSH SFTP v4 or v6 secure 8 8 8 sessions HTTP 4 4 4 Total Sessions 20 20 20 SNMP 50 50 50 Note The current release supports IPv6 client session for Telnet FTP SSH SFTP and SNMP on OmniSwitch 6850 or 9000 Switch Security Defaults Access to managing the switch is always available for the admin user through the console port even if management access to the console port is disabled for other users page 8 2 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing Switch Security Switch Security Overview Switch Security Overview Switch security features increase the security of the basic switch login process by allowing management only through particular interfaces for users with particular privileges Login information and privileges may be stored on the switch and or an external server depending on the type of external server you are using and how you configure switch access The illustration here shows the components of switch security End User RADIUS LDAP o
385. vailable on the switch for default settings only this account cannot be used to log into the switch It is used to store and modify default settings for new users Note Up to 64 users may be configured in the local switch database To set up a user account use the user command which specifies the following e Password tThe password is required for new users or when modifying a user s SNMP access The password will not appear in an ASCII configuration file created via the snapshot command e Privileges The user s read and write access to command domains and families See Configuring Privileges for a User on page 7 17 for more details e SNMP access Whether or not the user is permitted to manage the switch via SNMP See Setting Up SNMP Access for a User Account on page 7 18 for more details e End User Profile The user s read and write access to command areas port ranges and VLAN ranges used for customer login accounts See Setting Up End User Profiles on page 7 20 Typically options for the user privileges or end user profile SNMP access are configured at the same time the user is created An example of creating a user and setting access privileges for the account is given here gt user thomas techpubs read write domain policy md5 des For more details about command syntax see the OmniSwitch CLI Reference Guide OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 7 5 Overv
386. valid families OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 5 21 Multiple User Sessions Using the CLI Possible values for command domains and families are listed here domain families domain admin file telnet debug domain system system aip snmp rmon webmgt config domain physical chassis module interface pmm health domain network ip rip ospf bgp vrrp ip routing ipx ipmr ipms rdp ospf3 ipv6 domain layer2 vlan bridge stp 802 1q linkagg ip helper domain service dns domain policy qos policy slb domain security session avlan aaa Terminating Another Session If you are logged in under the user name admin or diag you can terminate the session of another user by using the kill command The following command will terminate login session number 4 gt kill 4 The command syntax requires you to specify the number of the session you want to kill You can use the who command for a list of all current user sessions and their numbers The kill command takes effect immediately page 5 22 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using the CLI Application Example Application Example Using a Wildcard to Filter Table Information The wildcard character allows you to substitute the asterisk character for text patterns while using the filter mode Note You must type the wildcard character in front of and after the filter text pattern unless
387. ve an FTP client installed Refer to your manufacturer s instructions for details on running the FTP application 3 Log in to the switch from your FTP client Where the FTP client asks for Name enter the IP address of your switch Where the FTP client asks for User ID enter admin Where the FTP client asks for Password enter switch or your custom config ured password 4 Transfer the file from the workstation to the switch by using the FTP client If you have a GUI FTP client select the Ksecu img file on your desktop and click the download button If you have a text only FTP client use the FTP put command to move the file from your desktop to the switch In either case you must specify a binary file transfer because the Ksecu img file is a binary file Once the transfer is complete the file will appear in the switch s flash working directory 5 Close the FTP session with the switch 6 To verify that the Ksecu img file is in the flash working directory on the switch Log onto the switch and list the files in the flash working directory gt ls flash working Listing Directory flash working drw 2048 Aug drw 2048 Aug rw 670979 Aug rw 2877570 Aug 4 AS 47 5 5 4 1 rw 217119 Aug 4 1 4 4 31 LO 4 05 4 44 Ksecu img 0 33 Kbase img 0 33 Kdiag img rw 727663 Aug 0 rw 5519 Aug 0 rw 880 Sep 1 33 Keni img 10 34 Krelease img 3 05 boot cfg This list verifies that the file is lo
388. viewed using the show microcode command This command displays the files currently in the specified directory To display files on a switch enter the show microcode command with a directory as shown gt show microcode certified Package Release Size Description 4 f 5 5 5 5 5 5 Kadvrout img 5 3 1 311 R01 823614 Alcatel Advanced Routing Kbase img Jees ILLS ROL 7372509 Alcatel Base Software Kdiag img Sede Les LL ROL 5215 Alcatel Diagnostics Archive Keni img 5 3 1 3L R01 2486643 Alcatel Ethernet Network Interface S Kos img soe Ls 311 ROL 941331 Alcatel Operating System Ksecu img 5 302 311 R01 371661 Alcatel Security If no directory is specified the files that have been loaded into the running configuration are shown Note The output on OmniSwitch 6800 6850 9000 switches is similar to that shown above To display the date when the archive was last updated enter the show microcode command with the history keyword as shown gt show microcode history Archive Created 10 1 04 6 49 34 page 4 24 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Managing CMM Directory Content Managing Redundancy in a Stack and CMM Managing Redundancy in a Stack and CMM The following section describe circumstances that the user should be aware of when managing the CMM directory structure on a switch with redundant CMMs It also includes descriptions of the CLI commands designed t
389. wer expressed in Watts Note This trap is not supported on OmniSwitch 6800 and 6850 in the current release 51 ospfNbrStateChange ospfRouterld ospf Indicates a state change of the ospfNbrIpAddr neighbor relationship ospfNbrAd dressLessIn dex ospfNbrRtrId ospfNbrState ospfRouterId A 32 bit integer uniquely identifying the router in the Autonomous System By convention to ensure uniqueness this should default to the value of one of the router s IP interface addresses ospfNbrIpAddr tThe IP address this neighbor is using in its IP Source Address Note that on address less links this will not be 0 0 0 0 but the address of another of the neighbor s interfaces ospfNbrAddressLessIndex On an interface having an IP Address zero On address less interfaces the cor responding value of ifIndex in the Internet Standard MIB On row creation this can be derived from the Instance ospfNbrRtrId A 32 bit integer represented as a type IpAddress uniquely identifying the neighboring router in the Autonomous System ospfNbrState The State of the relationship with this Neighbor 52 ospfVirtNbrStateChange ospfRouterld ospf Indicates a state change of the ospfVirtN virtual neighbor relationship brArea ospfVirtN brRtrId ospfVirtN brState ospfRouterId A 32 bit integer uniquely identifying the router in the Autonomous System By convention to ensure uniqueness this should default to the value of one of the r
390. will appear in the flash certified directory once the following command is executed gt cp Kos img flash certified This third example presumes that the user s current directory is the flash directory To copy a file into the same directory where the file currently exists the user must specify a new filename The following command will result in the Kbase img file being copied into the flash working directory under the new name of newfile img Both Kos img and its copy newfile img will appear in the flash working directory gt cp flash working Kbase img newfile img In these examples a new file will be written to the specified or assumed path with the new filename If you do not specify a new filename the new file will have the same name as the copied file If you copy a file to its own directory you must specify a new filename In each case the file being copied will remain in its original location Note You must have write privileges in order to execute the ep command OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 1 15 File and Directory Management Managing System Files Secure Copy an Existing File Use the sep command to copy an existing file in a secure manner You can specify the path and filename for the original file being copied as well as the path and filename for a new copy being created If no path is specified the command assumes the current directory If SCP is not enabled on the swit
391. witch 1 Open a web browser 2 Enter the IP address of the switch you want to configure in the browser Address field and press Enter The login screen appears ew Logon Page osoft Internet Explore ioj x File Edit View Favorites Tools Help a Qe D gt x 2 seah Se Favorites oe UJ Address http 10 255 73 12 web content login html zE Links AAE Alcatel Lucent Login EJ Done TTT TT internet Y WebView Login Page 3 Enter the appropriate user ID and password at the login prompt the initial user name is admin and the initial password is switch and click Login After successful login the Chassis Management Home Page appears Note You can access WebView through any NI on the switch To configure a feature in WebView click on the feature icon in the toolbar on the left side of the screen The first page displayed is the Home Page Each configuration feature in WebView has a Home Page and a number of configuration pages The Home Page provides an overview of the feature and its current configuration The configuration pages are used to configure the feature page 9 8 OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 Using WebView Configuring the Switch With WebView Accessing WebView with Internet Explorer Version 7 When using Windows Internet Explorer Version 7 IE7 browser software to access WebView with HTTPS the following certificate warning message is displaye
392. witch Management Guide December 2007 page 7 3 Overview of User Accounts Managing Switch User Accounts Overview of User Accounts A user account includes a login name password and user privileges The account also includes privilege or profile information depending on the type of user account There are two types of accounts network administrator accounts and end user or customer login accounts Network administrator accounts are configured with user sometimes called functional privileges These privileges determine whether the user has read or write access to the switch and which command domains and command families the user is authorized to execute on the switch Customer login accounts are configured with end user profiles rather than functional privileges Profiles are configured separately and then attached to the user account A profile specifies command areas to which a user has access as well as VLAN and or port ranges to which the user has access The designation of particular command families domains or command families for user access is some times referred to as partitioned management The privileges and profiles are sometimes referred to as authorization Note End user command areas are different from the command domains families used for network administrator accounts In general command areas are much more restricted groups of commands see page 7 20 Functional privileges network administration and end user pro
393. witch based on the SNMP setting specified for the default user account The user command however may be used to configure SNMP access for a particular user SNMP access may be configured without authentication and encryption required supported by SNMPv1 SNMPv2 or SNMPy3 Or it may be configured with authentication or authentication encryption required SNMPv3 only SNMP authentication specifies the algorithm that should be used for computing the SNMP authentication key It may also specify DES encryption The following options may be configured for a user s SNMP access with authentication or authentication encryption e SHA tThe SHA authentication algorithm is used for authenticating SNMP PDU for the user e MD5 The MDS authentication algorithm is used for authenticating SNMP PDU for the user e SHA and DES The SHA authentication algorithm and DES encryption standard is used for authenti cating and encrypting SNMP PDU for the user e MDS and DES The MDS authentication algorithm and the DES encryption standard is used for authenticating and encrypting SNMP PDU for the user The user s level of SNMP authentication is superseded by the SNMP version allowed globally on the switch By default the switch allows all SNMP requests Use the snmp security command to change the SNMP security level on the switch Note At least one user with SHA MDS authentication and or DES encryption must be configured on the switch for SNMPv3 communic
394. xample of using a stored prefix as part of the prompt refer to Prefix Prompt on page 5 13 For more general information on the session prompt command refer to the OmniSwitch CLI Reference Guide OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 5 17 Customizing the Screen Display Using the CLI Displaying Table Information The amount of information displayed on your console screen can be extensive especially for certain show commands By default the CLI will immediately scroll all information to the screen The more mode can be used to limit the number of lines displayed to your screen To use the more mode requires two steps as follows e Specify the number of lines displayed while in the more mode e Enter the more mode The more size command specifies the number of lines displayed to the screen while in the more mode The following syntax will set the switch to display six lines of data to the screen while in the CLI is in more mode gt more size 6 The following command enables the more feature gt more After these commands are executed the CLI will display no more than 6 lines to the screen at a time followed by the More prompt The following is a sample display gt show snmp mib family MIP ID MIB TABLE NAME FAMILY a i i en eid 4 te eee 6145 esmConfTrap NO SNMP ACCESS 6146 alcetherStatsTable interface 6147 esmConfTable interface
395. y edit rename remove change and display file attributes e Utility commands display memory and system diagnostic information The following illustration represents a sample flash directory that contains three directories and six files at the top level The sample working directory and the certified directory both hold five files The sample network directory holds one file This sample flash directory is used in the explanations of the directory file and utility CLI commands described in the following section The switch may show files and directories different from the ones shown in this example boot params Sample Flash Directory cs_system pmd Flash Files Network Directory boot slot cfg boot cfg 1 err policy cfg swlog1 log swlog2 log Working Directory Certified Directory IKadvrout img Ksecu img Ksecu img Krelease img Kbase img Kos img Kos img Kbase img boot cfg boot cfg OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page 1 5 File and Directory Management Managing System Files To list all the files and directories in your current directory use the Is command Here is a sample display of the flash directory gt ls Listing Directory flash rw 315 Jan 5
396. y and Secondary CMMs on page 4 27 Note If a switch fails over to the secondary CMM it is necessary to have a management interface connec tion to the secondary CMM such as an Ethernet port or a console port Copying the Working Directory to the Certified Directory Synchronizing the Primary and Secondary CMMs At the same time that you copy the working directory to the certified directory you can synchronize the secondary CMM with the primary CMM In the case of redundant CMMs this ensures that the two modules are booting from the same software To copy the working directory to the certified directory of the primary CMM and at the same time synchronize the software of the primary and secondary CMM use the following command gt copy working certified flash synchro Note This command will not function if the switch is running from the certified directory See Where is the Switch Running From on page 4 4 for an explanation The copy working certified command will synchronize all switches in a stack of OmniSwitch 6800 or OmniSwitch 6850 switches This command is described in detail in the OmniSwitch CLI Reference Guide Note When synchronizing the primary and secondary CMMs it is important to remember that the boot params file and the switch date and time are not automatically synchronized See the appropriate Getting Started Guide for information on the boot params file and Chapter 1 Managing System Files for inform
397. y do not excuse you from the conditions of this License If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations then as a consequence you may not distribute the Program at all For example if a patent license would not permit royalty free redistribution of the Program by all those who receive copies directly or indirectly through you then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program If any portion of this section is held invalid or unenforceable under any particular circumstance the balance of the section is intended to apply and the section as a whole is intended to apply in other circum stances It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices Many people have made generous contributions to the wide range of software distributed through that system in reliance on OmniSwitch 6800 6850 9000 Switch Management Guide December 2007 page A 7 Third Party Licenses and Notices Software License and Copyright Statements consistent application of that system it is up to the author donor to decide if he or she is willing to distrib ute software through a
Download Pdf Manuals
Related Search
Related Contents
Catalogue Restom Whirlpool MT4110SPB0 User's Manual Clevo D480V Laptop User Manual Betriebsanleitung Operating Instructions Instructions de service 8月号 No.189 - 長野県トラック協会 Tech air Z0515 Prexiso P20 JAMMER KB Keyboard Amplifier 取扱説明書 Copyright © All rights reserved.
Failed to retrieve file