Describes the OmniAccess SafeGuard Controller. The guide provides detailed
installation instructions and technical specifications for the OmniAccess
SafeGuard Controller.
■
OmniVista SafeGuard Manager Administration Guide
Describes how to manage the OmniAccess SafeGuard Controller using the
OmniVista SafeGuard Manager software.
■
ICS Dissolvable Agent for SafeGuard Administration Guide
Describes how to configure the Integrity Clientless Security (ICS) module of the
Alcatel-Lucent Network Admission Control (NAC).
Preface
Additional Resources
Alcatel-Lucent publishes documents for Alcatel-Lucent customers at:
www.Alcatel-Lucent.com
Guide Organization
Ta b le 2 briefly describes each chapter in this guide.
Table 2Guide Organization
Chapter or AppendixContents
Chapter 1, SafeGuard OS
Overview
Chapter 2, Accessing and
Managing the System
Provides an overview to the Alcatel-Lucent SafeGuard
OS, the basic feature overview, and how it supports the
Alcatel-Lucent SafeGuard product line. Also, describes
typical deployment models for SafeGuard devices; they
can be deployed in either a standard topology or in a
High Availability (HA) topology.
Describes connecting display devices, such as a
terminal, PC, or laptop computer, to the SafeGuard
device and logging in to the system.
Chapter 3, Working with
Configuration Files and
Upgrading Images
OmniAccess SafeGuard OS Administration Guide
Describes functions and commands related to
configuration files and upgrade processes.
17
Preface
Table 2Guide Organization (continued)
Chapter or AppendixContents
Chapter 4, Configuring
SafeGuard Controllers
Chapter 5, Setting Up
SafeGuard Switches
Chapter 6, Configuring
Authentication and Role
Derivation
Describes features specific to SafeGuard Controllers.
Describes numerous configurations specific to
SafeGuard switches, including:
■ setting up Virtual Local Area Networks (VLANs)
■ setting up IP unicast or multicast routing.
This chapter describes the commands used for
configuring authentication, including their names,
descriptions, prototypes, arguments, and argument
descriptions. SafeGuard OS supports two types of user
authentication: active and passive.
Describes the different types of user authentication
available in SafeGuard OS as well as applicable CLI
commands for implementing authentication.
Describes how to configure special authentication lists
used for circumventing the normal authentication
processes, as needed.
Explains the different types of user authentication
available in SafeGuard OS. It also explains how to
configure the SafeGuard device using the CLI to
achieve the maximum benefit in a deployment.
Describes how to configure IEEE 802.1x, port-based
authentication, on the SafeGuard Switch.
Chapter 7, Establishing a
Security Policy
Discusses the key concepts of policy, how to develop a
Policy workflow, and procedures for coding Policy
commands.
Chapter 8, VisualizationDescribes the concepts and procedures for configuring
the Visualization component.
Chapter 9, End Point
Validation
Chapter 10, Detecting
and Isolating Malware
Security Threats
Chapter 11,
Troubleshooting
Describes the concepts and procedures for configuring
End Point Validation (EPV) commands.
Provides an overview of the malware detection process
and provides procedures for coding the commands
used for detecting and remedying malware.
Describes the commands used for configuring logging,
including their names, descriptions, prototypes,
arguments, and argument descriptions.
18
OmniAccess SafeGuard OS Administration Guide
chapter
SafeGuard OS Overview
1
In this chapter:
■Alcatel-Lucent Solution and Product Overview
■Deployment Models
■Understanding Protection Modes
■SafeGuard OS Overall Feature Summary
Chapter 1: SafeGuard OS Overview
Alcatel-Lucent enables enterprises to secure their LANs with purpose-built devices based
on custom silicon. IT can control who is allowed onto the LAN, restrict what users can do
on the LAN, and prevent threats from disrupting network services or compromising
data.
Customers can embed security directly in their LAN infrastructure using Alcatel-
Lucent’s network device products: the SafeGuard Controller and SafeGuard Switch.
This chapter reviews Alcatel-Lucent’s devices and products which make up the complete
Alcatel-Lucent solution.
Alcatel-Lucent Solution and Product Overview
Alcatel-Lucent’ solution and products are comprised of:
■SafeGuard device(s)
A SafeGuard device, such as a SafeGuard Controller and/or SafeGuard Switch, is a
network infrastructure device for inline policy enforcement. The hardware is
designed with custom security silicon consisting of multi-core processors and
custom traffic-processing programmable ASICs. The flexible architecture of these
devices is the backbone for the SafeGuard operating system (OS).
The SafeGuard Controller is available in two models:
— The OmniAccess 1000 SafeGuard supports up to 800 authenticated users
across four gigabit uplinks, with deep packet inspection at 4 Gbps, with
appropriate licensing.
— The OmniAccess 2400 SafeGuard supports up to 2000 authenticated users
across ten 1-Gb uplinks, with 10 Gbps of deep packet inspection, with
appropriate licensing.
The OAG4048X Switch includes 10/100/1000 Mbps ports and 10 Gbps ports. A
similar model, the OAG4048X-PoE, includes additional Power over Ethernet. As
an enterprise-class switch, it has the performance, resiliency, and software
features expected of a network switch connecting user machines into the core or
distribution layer of the LAN. It has dual-homed uplinks, Rapid-Spanning Tree
for fast failover, and hot-swappable power supplies and fans.
While user and application-based controls are available for both the SafeGuard
Controller and SafeGuard Switch devices, the SafeGuard Switch provides perport control. The SafeGuard Controller provides per-uplink control.
■SafeGuard OS
The operating system that runs on Alcatel-Lucent SafeGuard devices is the
SafeGuard OS. The SafeGuard OS drives the device, providing traffic usage
monitoring, access, and malware controls. The SafeGuard OS provides all of the
20
OmniAccess SafeGuard OS Administration Guide
Chapter 1: SafeGuard OS Overview
following capabilities in the same device, ensuring that there is no centralized
point of failure:
— Device Management – Administrators can set up, manage, and diagnose
problems for the device as a network device.
— Authentication – With Network Access Control (NAC) capabilities,
authentication and posture check is provided to control who can enter the
LAN. NAC leverages an organization’s existing authentication servers and
identity stores with flexibility to provide either passive or active
authentication using Active Directory, RADIUS, or Captive Portal web logon.
— End Point Validation (EPV) – As an optional component of NAC to validate
health or posture of end-user host machines, EPV policies use a temporary or
dissolvable client to check for out-of-date OS, anti-virus software, etc. Hosts
that are not in compliance with corporate security standards are redirected to
an appropriate site to download patches and fixes before accessing the
internet.
— Security Policy – Role-based provisioning learned from the authentication
component, the defined policy component allows the administrator to assign
ACLs (Access Control Lists) at Layer 4 and Layer 7 to individual users. This
capability is especially useful in the post admission separation of users
regardless of point of entry (for example, separation of employees, contractors
and business partners). While initiating policy enforcement on TCP
connections or groupings of UDP packets, a stateful deep packet inspection of
all flows is allowed.
— Threat Control – An essential part of LAN control, Alcatel-Lucent threat
control algorithms monitor application connection patters for signs of
malicious behavior. Because these algorithms do not rely on signatures, they
can detect zero-day malware. The threat detection algorithms are built with a
goal of preventing network meltdown by detecting the malicious activity in
the quickest amount of time with very low false-positive rates.
— Visualization – Collects information about users and applications and how
those users and applications impact the network. Visualization serves as the
conduit between other SafeGuard OS components and the Alcatel-Lucent
OmniVista SafeGuard Manager Command Center.
■OmniVista SafeGuard Manager Command Center
OmniVista SafeGuard Manager is a central command center that displays data
flow information collected from the SafeGuard OS visualization component. The
OmniVista SafeGuard Manager interface, a graphical user interface, provides at-aglance views of network usage and security violations, which enables the IT
administrator to properly define security policies—global access and malware
policies—relevant to the unique characteristics, trends, and usage patterns and
characteristics of users on the network.
OmniAccess SafeGuard OS Administration Guide
21
Chapter 1: SafeGuard OS Overview
OmniVista SafeGuard Manager compiles information based on user transactions,
presenting all of the activities and access violations tied to usernames. It provides
traffic views on a per-user and per-flow basis, allowing for detailed auditing,
reporting, and forensics. For example, OmniVista SafeGuard Manager could
display all users running Instant Messenger or detail every application, computer,
and file a particular user has touched.
OmniVista SafeGuard Manager also supports role-based provisioning, allowing
IT to define access controls for broad groups of users, such as employees,
contractors, and guests, or for smaller groups, such as the finance department.
OmniVista SafeGuard Manager gives IT flexible malware control, allowing traffic
to be stopped on a per-user or per-application basis if malware is detected.
Using the Alcatel-Lucent OmniVista SafeGuard Manager command center, IT is
provided with full LAN visibility, policy creation capabilities and distribution.
The SafeGuard product family provides the full set of capabilities needed to protect
enterprise assets.
Deployment Models
In terms of deployment, the SafeGuard Controller sits between access switches and the
distribution or core layer, aggregating uplinks from the wiring closets and enforcing
access policies on all traffic. As a transparent device, the Controller requires no changes to
network design or user behavior, simplifying deployment and IT’s cost of operations.
The Controller supports high availability and resiliency modes. Enterprises that have
dual-homed wiring closet switches can deploy two SafeGuard Controllers as peers—the
two platforms would share state and preserve user authentications in case of failover. The
Controller runs in fail pass-through mode following a failure, where all LAN traffic will
traverse the Controller untouched, or protect mode, where all traffic is stopped (based on
security policy settings).
While the Controller sits behind existing switches, which suits environments not
upgrading their switches, the SafeGuard Switch provides an integrated secure switch
ideal for customers in the midst of a switch upgrade or building a new LAN for
enterprises to secure the fabric of their LAN.
The integrated platform with both the SafeGuard Controller and SafeGuard Switch
reduces the number of platforms customers need to buy and manage, lowering capital
and operational costs. The SafeGuard Switch also provides per-port control, vs. the per-
uplink control in the SafeGuard Controller. While user- and application-based controls
are available in both SafeGuard platforms, the switch’s per-port control means worms are
contained to a single user rather than all users connected to one uplink port.
22
OmniAccess SafeGuard OS Administration Guide
CST_055
Internet
LAN Core
Data Center
Distribution Layer
OmniAccess
switch
OmniAccess
SafeGuard
10 Gigabit
uplinks
Remediation
servers
Active Directory
RADIUS servers
Alcatel-Lucent
OmniVista
SafeGuard
Manager
Access Layer
Transparent
Deployment
Chapter 1: SafeGuard OS Overview
Figure 1SafeGuard Controller and Switch in a Typical Deployment
With the preferred standard and typical deployment model, the SafeGuard Controller
device is a multi-port “bump-in-the-wire” device between the edge switch and the next
layer switch, whether that be the distribution layer or the core switch. The uplinks can
either be fiber or copper. A SafeGuard Switch is deployed like any other switch device,
but it can link directly to the distribution layer.
When deploying SafeGuard devices using this model, all SafeGuard OS features are
supported, including policy enforcement, captive portal, IP header validity, and malware
enforcement. Further, devices can be deployed without disrupting existing wiring closet
configurations. Figure 1 shows SafeGuard devices in the typical deployment model.
System recovery and high availability (HA) can be configured when deploying
SafeGuard Controllers. To, it requires an additional (redundant) SafeGuard Controller of
the same model, running the same software release, and configured with the same port
configuration.
In HA mode, the authentication state is propagated to the peer device before there is a
failure so that users do not have to re-authenticate. For example, end users do not need to
log in to the captive portal feature again if there is a system failure. Figure 2 shows this
type of deployment (for details on configuring high availability, see Configuring High
Ingress and egress data traffic is managed by SafeGuard devices based on the level of
protection mode set within the device. Based on the established protection mode—Pass-
thru mode, Monitor mode, or Protect mode. For details on setting protection modes, see
Changing the Protection Mode of Ports on page 95.
When UsedSafeGuard ControllerSafeGuard Switch
First time set up
and cabling
Testing and
trials
Table 3Supported Protection Modes
Protection
Mode
Pass-thru
Mode
Monitor Mode
Acts as a transparent
bridge. All security
functionality is
bypassed.
Authentication, captive portal, visualization,
malware detection and protection and userbased policy checking is applied to all data
Acts as a standard L2/
L3 switch. All security
functionality is
bypassed.
traffic, but enforcement is ignored.
24
OmniAccess SafeGuard OS Administration Guide
Table 3Supported Protection Modes (continued)
Chapter 1: SafeGuard OS Overview
Protection
Mode
Protect Mode
When UsedSafeGuard ControllerSafeGuard Switch
Typical
Deployment
Authentication, captive portal, visualization,
malware detection and protection and userbased policy checking is applied to all data
traffic, and actively enforced.
OmniAccess SafeGuard OS Administration Guide
25
User/Machine Authentication
■ Authentication via 802.1X or
MAC address
■ Passive Active Directory
authentication snooping
■ Passive RADIUS
authentication snooping
■ Captive portal
authentication
■ Trusted DHCP serve
Role Derivation
■ RADIUS attributes
■ Active Directory attributes
■ Physical location
■ Combination of above
Role-Based Policy (Access
Control By)
■ User group
■ Application
■ Select application attributes
■ Destination port
■ Resource (e.g. servers)
Host Posture Check
■ Dissolvable agent
■ Scan for known threats, anti-
virus definition, service
packs, and custom registry
keys and files
Enforcement Actions
■ Allow
■ Deny
■ TCP reset
■ Mirroring, logging
Threat Detection/Mitigation
■ Zero-hour threat detection
■ No signature updates
necessary
■ Drops malformed packets
■ Block by: physical port, SRC
MAC, offending application
Visualization
■ Ties usernames to
applications and security
violations
■ Identifies applications and
application content
■ Reports application details
to centralized policy center
Centralized Visualization
■ Ties into Alcatel-Lucent
OmniVista SafeGuard
Manager Command Center
■ User and application usage
repository
■ Real-time alert dashboard
■ Fully drillable forensics
capability
■ Reporting and scheduler
■ Full policy and role-
derivation configuration GUI
Logging and Reporting
■ Direct syslog reporting
■ Detailed security log
messages
■ Formatted for SIEM
integration
■ Formatted syslog to multiple
destinations
Management and Control
■ Industry-standard
Command Line Interface
(CLI)
■ Managed by Alcatel-Lucent
OmniVista SafeGuard
Manager Command Center
■ SNMP v1/v2
■ Telnet
■ SSH
■ TFTP
■ Standard and privileged
access modes
Administrator Authentication
■ RADIUS authentication
Performance (Switch Only)
■ Switching capacity: 101
million pps
■ Secure Switching Rate: 10
Gbps
Protocols (Switch Only)
■ 802.1D Bridging
■ 802.1D Spanning Tree
■ 802.1Q/p VLAN Tagging and
Priority
■ 802.1w Rapid Spanning Tree
■ 802.1S MSTP
■ 802.1X Port-based
authentication
■ 802.3 10Base-T
■ 802.3u 100Base-T
■ 802.3z 1000Base-SX/T
■ 802.3ae 10 Gbps Ethernet
■ 802.3af Power-over-Ethernet
Layer 2 Features (Switch Only)
■ 4,096 VLANs
■ 16,000 MAC Addresses
■ Protocol VLAN (802.1v)
■ Port Security (MAC address
locking)
■ Mirror/monitor ports
■ IGMP v1/v2 snooping
Layer 3 Features (Switch Only)
■ Static routing
■ Additional L3 capabilities
due in future software
releases
Chapter 1: SafeGuard OS Overview
SafeGuard OS Overall Feature Summary
The following table summarizes SafeGuard OS features supported by SafeGuard devices.
26
OmniAccess SafeGuard OS Administration Guide
chapter
Accessing and
2
Managing the System
In this chapter:
■Connecting to a SafeGuard Device Console
■Accessing the SafeGuard Device Command Line Interface
■Configuring Management Users
■Managing Out-of-Band Management Port
■Setting Up the System Time and Date (SNTP)
■Managing Device Information
■Managing Network Information
■Configuring the Network Protocol
■Configuring SNMP on the Device
■Configuring Domain Name Servers
■Resetting the Device
■Configuring Data Traffic Ports
■Configuring High Availability Support
Chapter 2: Accessing and Managing the System
This chapter describes the tasks associated with managing the SafeGuard Controller or
the SafeGuard Switch as a device in the network.
Connecting to a SafeGuard Device Console
SafeGuard devices can be managed using a PC or laptop computer connected to the
SafeGuard Controller or SafeGuard Switch.
To connect a SafeGuard device console:
1Using a null cable, connect a PC or laptop computer to the DCE port on the back
of the device.
2Launch a terminal emulation program and configure the settings as shown in
Ta b le 4 .
3The login prompt is displayed.
Table 4PC Terminal Emulator Settings
PC or LaptopSetting
Emulation typevt100
Bits per second9600
Data bits8
Parity bitsNone
Stop bits1
Flow controlNone
See the following sections for details on accessing the SafeGuard device command line
interface.
Accessing the SafeGuard Device Command Line
Interface
The first time that you log into a SafeGuard device, use the default ‘Admin’ as a
username (and no [null] password). Upon first logging into the command interface, you
are in Non-Privileged mode. To perform management and configuration functions, you
need to be in Privileged mode.
28
To access Privileged mode, use the
enable command in Non-Privileged mode.
OmniAccess SafeGuard OS Administration Guide
Chapter 2: Accessing and Managing the System
enable
This command has no parameters or variables.
For example:
(SafeGuardOS) #?
(SafeGuardOS) #enable
(SafeGuardOS) #
(SafeGuardOS) #configure terminal
(SafeGuardOS) (config) #
See the following sections for more details on accessing SafeGuard devices:
■Using Telnet
■Using Secure Shell (SSH)
■Customizing and Working with the Command Line Interface Default Settings
Using Telnet
A SafeGuard device can be accessed via a Telnet session.
This section describes basic Telnet commands that may be useful when first accessing a
SafeGuard device via a Telnet session. See the following sections for more details:
■Enabling and Disabling Telnet
■Displaying the Current Telnet and Serial Port Connections
■Closing a Telnet or SSH Session
■Specifying the Maximum Number of Telnet Connections Allowed
■Setting the Telnet Connection Session Timeout
Enabling and Disabling Telnet
Telnet access is enabled by default. If Telnet has been disabled, use the ip telnet
command in Privileged Exec mode. To disable Telnet, use the
ip telnet
no ip telnet
no form of the command.
The commands have no parameters or variables.
Displaying the Current Telnet and Serial Port Connections
To display the current Telnet and serial port connections, use the show sessions
command in Privileged Exec mode.
OmniAccess SafeGuard OS Administration Guide
29
Chapter 2: Accessing and Managing the System
show sessions
An example of this output and explanation of the fields is described in Tracking an
Authenticated User Session on page 219.
Closing a Telnet or SSH Session
To close a Telnet or SSH session, use the disconnect command in Privileged Exec mode.
disconnect [sessionID | all]
Syntax DescriptionsessionIDDisconnects the session specified by the
allDisconnects all remote sessions.
The following example disconnects session ID 10:
session identifier. Use the show sessions
command to find the session ID.
(SafeGuardOS) # disconnect 10
(SafeGuardOS) #
Specifying the Maximum Number of Telnet Connections Allowed
To specify the maximum number of Telnet connection sessions that can be established,
use the ip telnet maxsessions command in Global Configuration mode. Use the
no
version of the command to restore the default value.
ip telnet maxsessions number
no ip telnet maxsessions
Syntax DescriptionnumberSets the number of Telnet sessions. Valid range
is from 1 to 5. The default value is 5.
The following example sets the number of Telnet sessions to 3:
(SafeGuardOS) # configure terminal
(SafeGuardOS) (config) # ip telnet maxsessions 3
(SafeGuardOS) (config) #
Setting the Telnet Connection Session Timeout
30
To set the Telnet connection session timeout value (in minutes), use the ip telnet timeout
command in Global Configuration mode. Use the
no version of the command to restore
the default value.
ip telnet timeout timeout
OmniAccess SafeGuard OS Administration Guide
no ip telnet timeout
Syntax DescriptiontimeoutSets the number of minutes that a session can
The following example sets the Telnet connection timer to never expire:
(SafeGuardOS)# configure terminal
(SafeGuardOS) (config) # ip telnet timeout 0
(SafeGuardOS) (config) #
Using Secure Shell (SSH)
Like Telnet, Secure Shell (SSH) is a protocol that allows the logging into of another
computer over a network to execute commands in a remote machine, and to move files
from one machine to another. Unlike Telnet that sends text in a clear text format, however,
SSH encrypts the connection session.
Chapter 2: Accessing and Managing the System
be idle. Valid range is a decimal value from 0
to 160. A value of 0 indicates that the session
remains active indefinitely. The default value is
5.
SSH provides more security fo
r remote connections than Telnet by providing strong
encryption when a device is authenticated. The SafeGuard OS supports:
■SSH version 1 (SSHv1)
■SSH version 2 (SSHv2)
■Rivest, Shamir and Adleman (RSA) keys, versions 1 and 2
■Digital Signature Standard (DSA) keys
■A maximum of 5 SSH sessions
NOTE: SafeGuard OS does not support SSH passwords or passkeys.
This section describes basic SSH commands that may be useful when first accessing a
SafeGuard device via a SSH session.
See the following sections:
■Enabling an SSH Session
■Downloading SSH Key Files from TFTP Server
■Generating DSA, RSA, RSA Keys
■Deleting DSA, RSA, RSA Keys
OmniAccess SafeGuard OS Administration Guide
31
Chapter 2: Accessing and Managing the System
■Changing SSH Protocols
■Limiting SSH Sessions
■Setting the SSH Timer
■Displaying SSH Configuration Information
Enabling an SSH Session
To enable an SSH session on the device:
1Enable SSH on the device by entering the ip ssh command in Global
Configuration mode. The no version of the command disables SSH, which is the
default state.
ip ssh
no ip ssh
The commands have no parameters or variables. The first time that SSH is
enabled on a device, SafeGuard OS detects that keys are not present and generates
the keys automatically.
2Verify the configuration using the show ip ssh command.
Downloading SSH Key Files from TFTP Server
T o download private key files from a T rivial File T ransfer Protocol (TFTP) server for SSH (that do
not contain passkeys), use the Privileged Exec copy command to download a key file.
NOTE: If you want to TFTP your own keys instead of having them generated
by the SafeGuard device, you must TFTP all three types of keys (DSA, RSA1,
AND RSA). All three keys are required for proper SSH functionality.
The first time that SSH is enabled, the SafeGuard OS generates keys for DSA, RSA and
RSA1 which are not installed. The key deciphers the SSH encryption. To generate new
SSH keys, in Global Configuration mode use the ip ssh key generate command.
NOTE: In order to be in export compliance, the SafeGuard OS generates keys
that are just 56-bits in length. If you need a key that is larger than this, create
the key externally.
ip ssh key generate key
Syntax DescriptionkeyKey to generate. Valid entries are:
■ DSA
■ RSA
■ RSA1
■ all
Specifying all generates all SSH keys.
If key is not specified, the command
generates any keys not currently installed.
The following example generates all SSH keys:
(SafeGuardOS) #configure terminal
(SafeGuardOS) (config) #ip ssh key generate all
(SafeGuardOS) (config) #exit
(SafeGuardOS) #
Deleting DSA, RSA, RSA Keys
To delete all installed SSH keys, in Global Configuration mode enter the ip ssh key delete
command. The command has no parameters or variables.
The following example deletes all installed keys:
OmniAccess SafeGuard OS Administration Guide
33
Chapter 2: Accessing and Managing the System
(SafeGuardOS) #configure terminal
(SafeGuardOS) (config) #ip ssh key delete
(SafeGuardOS) (config) #exit
(SafeGuardOS) #
Changing SSH Protocols
By default, SafeGuard OS supports both SSH versions 1 and 2. The protocols can be
deleted or added as necessary by explicitly defining one or both. Use the ip ssh protocol
command in Global Configuration mode to change the protocol support.
ip ssh protocol protocol_level{protocol_level}
Syntax Descriptionprotocol_levelSpecifies one or both SSH protocols. Valid
entries are:
■ 1 – SSH version 1
■ 2 – SSH version 2
■ 1 2 – for both
The following example limits the SSH protocol to SSH version 2:
(SafeGuardOS) #configure terminal
(SafeGuardOS) (config) #ip ssh protocol 2
(SafeGuardOS) (config) #exit
(SafeGuardOS) #
Limiting SSH Sessions
The default for SSH sessions is set to the maximum of 5 sessions. To reduce the number of
sessions, in Global Configuration mode use the ip sshmaxsessions command.
ip ssh maxsessions sessions
Syntax DescriptionsessionsSpecifies the maximum number of SSH
sessions allowed. Valid entries are 1 to 5.
The following example limits the SSH sessions to 3:
(SafeGuardOS) #configure terminal
(SafeGuardOS) (config) #ip ssh maxsessions 3
(SafeGuardOS) (config) #exit
(SafeGuardOS) #
34
OmniAccess SafeGuard OS Administration Guide
Chapter 2: Accessing and Managing the System
Setting the SSH Timer
SSH connections time out at 5 minutes, by default. To change the timeout timer from 1 to
160 minutes, in Global Configuration mode use the ip ssh timeout command.
NOTE: A session is active as long as the session is idle for the value set.
Changing the timeout value for active sessions does not become effective until
the session is re-accessed. Also, any keystroke activates the new timeout
duration.
ip ssh timeout minutes
Syntax DescriptionminutesSpecifies the connection timer in minutes.
Valid entries are 1 to 160.
The following example limits the idle time for SSH connections to 20 minutes:
(SafeGuardOS) #configure terminal
(SafeGuardOS) (config) #ip ssh timeout 20
(SafeGuardOS) (config) #exit
(SafeGuardOS) #
Displaying SSH Configuration Information
To display the current SSH configuration, use the show ip ssh command in Privileged
Exec mode:
show ip ssh
The command has no parameters or variables.
The following example is representative of the command output:
Operational ModeDisplays the operational status of SSH and indicates
whether SSH is currently enabled or disabled.
Protocol Levels
Displays
whether the administrative state of SSH has
.
the protocol level. This field may have the
values of version 1, version 2 or both versions 1 and
version 2
SSH Sessions Currently
Active
Max SSH Sessions Allowed
Displays the
connections
Displays the
allowed
SSH TimeoutDisplays the idle timer for connection time. This field can
be from 1 to 160 minutes.
SSH Keys InstalledDisplays which keys are currently installed. Possible keys
are: RSA1, RSA and DSA.
.
number currently active SSH
. This field can be from 0 to 5.
maximum number of SSH connections
. This field can be from 0 to 5. The default is 5.
Customizing and Working with the Command Line Interface Default
Settings
36
See the following sections for details on how to customize the command line interface
default settings:
■Changing the System Command Prompt
■Setting a Maximum Serial Console Connect Time
■Enabling and Disabling CLI Display Paging
■Uploading a New CLI Banner File
■Uploading the CLI Log File
■Copying the System Diagnostics File
■Copying the System Debug File
■Displaying the Current HTTP Information
OmniAccess SafeGuard OS Administration Guide
Chapter 2: Accessing and Managing the System
Changing the System Command Prompt
To change the command line interface prompt, use the set prompt command in enable
mode. The length of the prompt can be up to 64 alphanumeric characters.
set prompt string
Syntax DescriptionstringSets the command prompt to an
alphanumeric string up to 64 characters and
numbers. The prompt is case sensitive
The following example sets the command prompt to OmniAccess 2400 SafeGuard:
To set a maximum connect time (in minutes) without console activity for the serial
console, use the serial timeout command in Line Configuration submode. Line
Configuration Mode is entered by using the lineconfig command in Global
Configuration mode.
serial timeout time
Syntax DescriptiontimeSets the number of minutes that a serial
console can be idle. Valid range is a decimal
value from 0 to 160. A value of 0 indicates that
the console remains active indefinitely. The
default value is 5.
The following example sets the console timeout to 10 minutes:
The following example disables CLI display paging:
(SafeGuardOS)# paging disable
(SafeGuardOS)#
Uploading a New CLI Banner File
To upload the CLI banner file, use the copy nvram:clibanner command in Global
Configuration mode.
copy nvram:clibanner
Syntax DescriptionipSpecifies the IP address of the TFTP server.
tftp://ip/{filepath/}filename
filepath(Optional) Specifies the directory path to the file.
filenameSpecifies the filename of the file being saved.
Uploading the CLI Log File
To upload the log file, use the copy nvram:log command in Global Configuration mode.
copy nvram:log
Syntax DescriptionipSpecifies the IP address of the TFTP server.
tftp://ip/{filepath/}filename
filepath(Optional) Specifies the directory path to the file.
filenameSpecifies the filename of the file being saved.
Copying the System Diagnostics File
38
To copy a system diagnostics file, use the copy system:diag-info command in Global
Configuration mode.
copy system:diag-info
Syntax DescriptionipSpecifies the IP address of the TFTP server.
tftp://ip/{filepath/}filename
filepath(Optional) Specifies the directory path to the file.
filenameSpecifies the filename of the file being saved.
OmniAccess SafeGuard OS Administration Guide
Chapter 2: Accessing and Managing the System
Copying the System Debug File
To copy a system debug file, use the copy system:dump command in Global
Configuration mode.
copy system:dump
Syntax DescriptionipSpecifies the IP address of the TFTP server.
://ip/{filepath/}filename
filepath(Optional) Specifies the directory path to the file.
filenameSpecifies the filename of the file being saved.
Displaying the Current HTTP Information
To display the current HTTP information, use the show ip http command in Privileged
Exec mode.
show ip http
This command has no parameters or variables.
Exiting or Logging Out of a Command Line Session
To exit or log out of a command level session, use either the exit or logout command in
any mode.
exit
logout
The command has no options or parameters. For example:
(SafeGuardOS) # logout
Configuring Management Users
The Admin user has full access to all CLI both from the front-panel ports and from the
rear-panel management port.
■Management Users – A management user can be defined as having three levels of
authority:
— Admin-user has full access to all commands.
— Privilege-user has permission to execute action, clear and configure
commands, with the exception of the user management commands.
—Exec-user has access to limited commands.
OmniAccess SafeGuard OS Administration Guide
39
Chapter 2: Accessing and Managing the System
■Network Users – Network users are end-users defined in the SafeGuard local
authentication database. Network users do not have authority to execute
commands at the command line. For more information on managing network
users, see Maintaining Users on page 258.
This section describes setting up administrator and network user access to SafeGuard
devices. By default, an “Admin” user is configured with the initial configuration. See the
following sections for more details:
■Configuring Management Users
■Assigning a Login List to the Default Login User
■Configuring RADIUS Users for Management Users
■Clearing All Passwords
For more information on managing network users, see Maintaining Users on page 258.
Configuring Management Users
This section describes adding and changing management accounts. See the following
sections for more details:
■Adding Management Users to the Database
■Displaying the Management Users
■Setting a Password for the Default Admin Account
■Configuring Local Authentication for Management Users
Adding Management Users to the Database
Management users are the administrators who will be logging in from the service/front
panel port and manage SafeGuard. To add a management user to the database, in the
Global Configuration mode use the
When a password is changed, a prompt asks for the former password. If none exists,
press the Enter key. The passwords are stored in encrypted format for protection.
The system contains a default “Admin” administrator user that cannot be deleted. The
default administrative password (set to null by default), however, can be changed and
encrypted.
Displaying the Management Users
To display the management users, in the Global Configuration mode use the show aaa
mgmt-users
show aaa mgmt-users
The command has no parameters.
The following example shows sample output from the
(SafeGuardOS) #show aaa mgmt-users
command.
show aaa mgmt-users command:
SNMPv3 SNMPv3 SNMPv3
User Name User Access Mode Access Mode Authentication Encryption
---------- ---------------- ----------- -------------- ----------
admin Admin Read/Write None None
guest Exec Read Only None None
execuser Exec Read Only None None
admin1 Admin Read Only None None
OmniAccess SafeGuard OS Administration Guide
41
Chapter 2: Accessing and Managing the System
abcd Exec Read Only None None
priv-user Exec Read Only None None
(SafeGuardOS) #
NOTE: SafeGuard OS will support SNMPv3 will be supported in a future
release.
The fields in the output represent:
FieldDescription
User NameUsername as detected by its authentication.
User Access ModeThe user’s access mode.
SNMPv3 Access ModeThe SNMPv3 access mode.
SNMPv3 AuthenticationWhether the user has SNMPv3 authentication.
SNMPv3 EncryptionWhether the user has SNMPv3 Encryption.
Setting a Password for the Default Admin Account
To set the password for the default administrator (admin) account, use the aaa mgmt-
user passwd admin
is enabled, the password must be at least eight alphanumeric characters in length.
The username and password are not case sensitive. When a password is changed, a
prompt asks for the former password. If none exists, press the Enter key. Use the no
version of the command to set the password to blank.
command. If a user is authorized for authentication or encryption
42
OmniAccess SafeGuard OS Administration Guide
Chapter 2: Accessing and Managing the System
Configuring Local Authentication for Management Users
Users are set up in the authentication database by assigning them to a set of roles usually
defined by group and then by mapping a set of authentication protocol-specific attributes
and their values to a role. The attributes are first obtained by user authentication against
the local authentication database. If the user does not authenticate against the local
database, you can configure the user to authenticate against a centralized RADIUS
database as a backup.
Creating Authentication Lists
In most instances, users are assigned roles based on their group or job responsibilities. To
identify those groups of users, you need to create a list for each distinct user group.
Use the aaa mgmt-user authentication login command in Global Configuration mode to
create a user group or organizational list.
Syntax DescriptionlistnameThe name of the list being created. A list
name can be up to 15 characters long.
methodsOne or more authentication methods used to
authenticate this group of users. You may
specify up to 3 non-repeating methods. If not
specified, the system uses the default-list. If
less than 3 methods are specified, the
remaining methods are classified as
undefined. Specify the method in the order
of precedence you want to run. Valid values
for methods are:
■ local – Use local authentication.
■ RADIUS – Use remote RADIUS
authentication.
■ Reject – Deny the user.
The following example creates an authentication list for a group of sales people. The
group uses local authentication as the only authentication method and users who are
unable to authenticate using that method are denied access to the network:
To verify the contents and methods being used for authentication, use the show aaa
mgmt-users authentication-list command in Privileged Exec mode:
OmniAccess SafeGuard OS Administration Guide
43
Chapter 2: Accessing and Managing the System
show aaa mgmt-users authentication list
This command has no options or parameters. The following is sample output from the
command:
Authentication Login List Method 1 Method 2 Method 3
------------------------- -------- -------- --------
defaultList local undefined undefined
list123 reject undefined undefined
authLoginList radius local reject
radius-list radius local reject
salesList radius local reject
The fields of the output represent:
FieldDescription
Authentication LoginThe name of the authentication login list.
Method 1The primary method of authentication.
Method 2This method of authentication is used if the primary
method is unavailable. If a secondary method is not
used, this field is undefined.
Method 3This method of authentication is used if the secondary
method is unavailable. If a secondary method is not
used, this field is undefined.
Assigning a Login List to the Default Login User
To ensure that any non-configured users who attempt to log into the management port
are forced to authenticate against the RADIUS server, use the
defaultlogin
authentication, use the
aaa mgmt-user defaultlogin listname
no aaa mgmt-user defaultlogin
Syntax DescriptionlistnameName of the authentication list or group name
command in the Global Configuration mode. To disable RADIUS
no version of the command.
listname
being authenticated.
aaa mgmt-user
44
The following example assigns salesList to the defaultLogin list:
In order to provide administrative privileges to remote RADIUS users, the Service-Type
field in RADIUS must be configured to return the appropriate value. Configure the
RADIUS server to return Service-Type = 1 or Login
NAS Prompt for exec-user. For FreeRadius, Service-Type = NAS-Prompt-User and
Service-Type = Login-User.
Different implementations of RADIUS might have slight variations on how to set this
field. See Ta b le 5 for some examples of this field, and see your RADIUS product
documentation for further help.
for priv-user, Service-Type = 7 or
Table 5RADIUS Service-Type Settings
ImplementationService-Type
FreeRADIUS6 or Administrative-User
Microsoft IASAdministrative
SteelBelt RADIUSAdministrative
In the following example, MyCompany uses FreeRADIUS. Users Moe and Larry are
setup for administrative privileges while user Curley logs in as priv-user has most of the
privileges of the administrative user.
To clear all user passwords and reset them to the factory defaults (null) without powering
off the device, use the clear pass command in Privileged Exec mode. When prompted to
confirm that the password reset should proceed, enter y for Yes.
clear pass
The following example clears all user passwords and reinstates the system defaults:
(SafeGuardOS) #clear pass
Are you sure you want to reset all passwords? <n/y> y
Passwords reset
(SafeGuardOS) #
Managing Out-of-Band Management Port
This section describes the tasks and commands used for configuring and displaying
information for the out-of-band management port on SafeGuard devices. The
management port is also referred to as the service port.
See the following sections for more details:
■Setting the IP Configuration Protocol
■Enabling or Disabling the Management Port
■Setting Speed and Duplex for the Management Port
■Displaying Configuration Information for the Management Port
Setting the IP Configuration Protocol
To set the configuration protocol for the management port, use the serviceport protocol
command in Global Configuration mode.
When using this command, it is suggested to run the command twice: once with the
none, and once with the value desired for the management port’s protocol support
value
(either
For more details on bootstrap and DHCP protocols, see Configuring Bootstrap or DHCP
Relay on page 194.
serviceport protocol [none | bootp | dhcp]
bootp or dhcp). When modified, the change takes effect immediately.
46
Syntax DescriptionnoneSpecifies no protocol.
bootpSpecifies BOOTP as the protocol.
OmniAccess SafeGuard OS Administration Guide
Chapter 2: Accessing and Managing the System
dhcp(Default) Specifies DHCP as the protocol.
The following command example changes the protocol to bootstrap:
(SafeGuardOS) # configure terminal
(SafeGuardOS) (config) # service protocol none
(SafeGuardOS) (config) # service protocol bootp
(SafeGuardOS) (config) #
Setting the IP Address, Netmask, and Gateway of the System
To set the IP address, netmask, and gateway of the management port, use the serviceport
ip command in Global Configuration mode. Before running this command, however, the
service port protocol must be set to
page 46).
serviceport ip ipaddr netmask [gateway]
none first (see Setting the IP Configuration Protocol on
Syntax DescriptionipaddrIP address for the service port.
netmaskNetwork mask for the service port.
gatewayOptional for Controller only. Gateway IP
address. (To set the default gateway on the
Switch, use ip route.)
The following example sets the service port configuration:
The management port is enabled, by default, and so therefore is not explicitly displayed
in the show running-config command output. The serviceport enable command enables
the PHY and lights the management port link LED. The no version of the command
disables the PHY and extinguishes the management port link LED. The Global
Configuration commands use the following syntax:
serviceport enable
no serviceport enable
The commands have no parameters or variables.
OmniAccess SafeGuard OS Administration Guide
47
Chapter 2: Accessing and Managing the System
Setting Speed and Duplex for the Management Port
The management port can operate at a variety of speeds and duplex settings. The default
settings are to auto-negotiate with the link partner. For auto-negotiation to succeed, the
management port and the link partner must both be set for auto-negotiating. Otherwise,
the management port attempts to auto-negotiate but could fail if traffic does not match
the auto-negotiated speed.
Use the serviceport speed command in Global Configuration mode to override the autonegotiation and set the speed and duplex for the management port using the following
syntax:
Use the show serviceport command in Privileged Exec mode to verify the configuration.
See Displaying Configuration Information for the Management Port on page 48.
Use the serviceport auto-negotiate command in Global Configuration mode to override
the speed and duplex settings on the management port. The no version of the command
disables auto-negotiation.
serviceport auto-negotiate
no serviceport auto-negotiate
Displaying Configuration Information for the Management Port
48
To display service port configuration information, use the show serviceport command in
Privileged Exec mode. For example:
show serviceport
OmniAccess SafeGuard OS Administration Guide
Chapter 2: Accessing and Managing the System
The command has no options or parameters.
The following output is representative of the show serviceport command on a SafeGuard
Switch. This command’s output on a SafeGuard Controller would be similar, but with the
addition of “Gateway Address” following the “Subnet Mask” line:
(SafeGuardOS) #show serviceport
Current ServicePort IP configuration
IP Address..................................... 172.16.1.10
Displaying Address Resolution Protocol Information
SafeGuard Controllers have a preset configuration for the address resolution protocol
(ARP) table and the ARP cache. SafeGuard Switches allow modification of the ARP
settings. For details on configuring ARP on the SafeGuard Switch, see Configuring Address
Resolution Protocol on page 184. To display ARP information, see Displaying ARP
Information on page 189
Setting Up the System Time and Date (SNTP)
If a Simple Network Time Protocol (SNTP) server is used to synchronize time settings in
the network, it is not necessary to manually configure clock settings for the SafeGuard
device(s). SNTP setup is discussed in Configuring SNTP on page 54.
See the following sections for more details:
■Manually Setting the Time and Date
■Configuring SNTP
■Optional SNTP Client Configurations
Manually Setting the Time and Date
SafeGuard devices have an on-board real-time clock. The following settings can be
manually adjusted:
■Timezone setting. Setting the timezone is a recommended step during product
installation.
■Automatic changeover for daylight savings settings
■Software system clock settings
NOTE: The order in which clock settings are configured can affect the
accuracy of the time setting.
To manually configure the time and date on the device:
1Set the timezone. Skip this step if the timezone was set up during installation.
OmniAccess SafeGuard OS Administration Guide
51
Chapter 2: Accessing and Managing the System
To set the device to the correct timezone, use the clock timezone command in
either Privileged Exec or Global Configuration modes.
If no other time sources are available to set the current time and date, use the set clock command in Privileged Exec mode. The time specified in this command is
relative to Universal Time Clock (UTC) time zone. The system can then be
synchronized to an external Network Time Protocol (NTP) clock source.
This command also updates the real time clock chip so it is preserved across
reboots.
clock set time month day year
Syntax DescriptiontimeTime using 24 hour format
(military).
monthMonth abbreviated to 3
characters, for example, Jan for
January or Jun for June.
dayDate in the month, for example, 29
for October 29th.
52
year4-digit year, for example, 2006.
The following example sets the time to November 29, 2007 at 4:25:37 PM:
(SafeGuardOS) # clock set 16:25:37 NOV 29 2007
(SafeGuardOS) #
OmniAccess SafeGuard OS Administration Guide
Chapter 2: Accessing and Managing the System
3Set up Daylight Savings Time.
In many countries, clocks are set back an hour in the Summer when the days
become longer. Often referred to as Daylight Savings Time, system clocks must be
reset for this seasonal adjustment. Use the clock summer-time command in
Global Configuration modes to adjust for this seasonal change.
4To display the system time, use the show clock command in Privileged Exec
mode using the following syntax:
show clock
The command has no parameters or variables.
Configuring SNTP
Simple Network Time Protocol (SNTP) is an adaptation of the Network Time Protocol
(NTP) used to synchronize computer clocks across the Internet. For a stand-alone system
that sets and synchronizes the time for the network, configure SNTP on the SafeGuard
device.
endtimeHour to change the time back.
The format is hh:mm.
To configure SNTP:
1Designate a SNTP server using the sntp server command in Global Configuration
mode. Up to 3 SNTP servers can be configured.
sntp server ipaddr {priority {version {portid}}}
Syntax DescriptionipaddrSpecifies the poll interval for SNTP
unicast clients in seconds as a
power of two. Valid values are 6 to
30 seconds.
priority(Optional) Ranks or prioritizes the
server among other servers. Up to 3
SNTP servers may be specified.
Valid values are 1 to 3.
version(Optional) Specifies the version of
SNTP. Valid values are 1 to 4.
portid(Optional) Specifies the port
identification number. Valid values
are 1 to 65535.
The following example configures an SNTP server running SNTPv4 on port ID 25.
54
(SafeGuardOS) # configure terminal
(SafeGuardOS) (config) # sntp server 172.82.45.23
OmniAccess SafeGuard OS Administration Guide
Chapter 2: Accessing and Managing the System
(SafeGuardOS) (config) # exit
(SafeGuardOS) #
To delete this server, use the no version of the command.
2Validate the SNTP server setup using the show sntp server command in
Privileged Exec mode.
show sntp server
This command has no options or parameters.
The following example is representative of the command output:
(SafeGuardOS) #show sntp server
Most recent SNTP response
-------------------------
Server IP Address: 172.16.3.100
Server Type: ipv4
Server Stratum: 15
Server Reference Id:
Server Mode: Server
Server Maximum Entries: 3
Server Current Entries: 1
SNTP Servers
------------
IP Address: 172.16.3.100
Address Type: IPV4
Priority: 1
Version: 4
Port: 123
Last Update Time: Jul 28 00:01:46 2006 UTC
Last Attempt Time: Jul 28 00:01:46 2006 UTC
Last Update Status: Success
Total Unicast Requests: 5888
Failed Unicast Requests: 164
(SafeGuardOS) #
The fields in the show sntp server output represent:
DisplayDescription
Server IP AddressDisplays the address of the configured SNTP server.
Server TypeDisplays the address type of server.
Server StratumDisplays the claimed stratum of the server for the
last received valid packet.
OmniAccess SafeGuard OS Administration Guide
55
Chapter 2: Accessing and Managing the System
DisplayDescription
Server Reference IDDisplays the reference clock identifier of the server
Server ModeDisplays the SNTP server mode.
Server Maximum EntriesDisplays the total number of SNTP servers allowed.
Server Current EntriesDisplays the total number of SNTP servers
IP AddressDisplays the IP address of the SNTP server.
Address TypeDisplays the address type of the configured server.
PriorityDisplays the IP priority type of the configured server.
VersionDisplays the SNTP version number of the server. The
PortDisplays the server port number.
for the last received valid packet.
configured.
protocol version used to query the server in unicast
mode.
Last Attempt TimeDisplays the last server attempt time for the
specified server.
Last Update StatusDisplays the last server attempt for the server.
Total Unicast RequestsDisplays the number of requests to the server.
Failed Unicast RequestsDisplays the number of failed requests to the server.
3Enable SafeGuard devices to operate as an SNTP client. Allow the client to either
broadcast or unicast to synchronize clocks using the sntp client mode command.
The Global Configuration command has the following syntax:
sntp client mode [broadcast | unicast]
broadcastSpecifies the SNTP client mode is broadcast.
unicastSpecifies the SNTP client mode is unicast.
The no version of the command disables SNTP client mode.
The following example enables SNTP client mode for unicast:
The fields in the show sntp client output represent:
DisplayDescription
Client Supported Modes Displays the supported SNTP Modes (Broadcast
or Unicast).
SNTP Version Displays the highest SNTP version the client
supports.
Port Displays the SNTP client port.
Client ModeDisplays the configured SNTP client mode.
Poll IntervalDisplays the poll interval value for SNTP clients in
seconds as a power of two.
Poll TimeoutDisplays the poll timeout value in seconds for
SNTP clients.
Poll RetryDisplays the poll retry value for SNTP clients.
To display SNTP information, use the show sntp info command in Privileged Exec mode.
show sntp info
The following example shows a sample output from the show sntp info command:
(SafeGuardOS) #show sntp info
Last Update Time: Never
Last Unicast Attempt Time: Dec 16 11:35:10 2006 PST
Last Attempt Status: Request Timed Out
Broadcast Count: 0
OmniAccess SafeGuard OS Administration Guide
57
Chapter 2: Accessing and Managing the System
Optional SNTP Client Configurations
SafeGuard OS also allows for optional SNTP configuration. The poll interval can be set
for either broadcast or unicast clients. The poll retry and the poll timeout values can also
be set for the clients.
See the following sections for more details:
■Setting the Poll Interval
■Setting the Poll Retry and Poll-Timeout Timers for Unicast Clients
■Setting the Port ID for the Port Client
Setting the Poll Interval
Set the poll interval for either broadcast or unicast clients using the following Global
Configuration commands. The no version of the command resets the poll interval back to
the default of 64 seconds.
sntp broadcast client poll-interval seconds
no sntp broadcast client poll-interval
sntp unicast
client poll-intervalseconds
no sntp unicast client poll-interval
secondsSpecifies the poll interval for SNTP clients in seconds as a power
of two. Valid values for both broadcast and unicast clients are:
■ 6 = 64 seconds
■ 7 = 128 seconds
■ 8 = 256 seconds
■ 9 = 512 seconds
■ 10 = 1024 seconds
■ The default is 6, for both commands
The following example sets the poll-interval to 8 seconds for a broadcast client.
Setting the Poll Retry and Poll-Timeout Timers for Unicast Clients
Set the poll retry using the following Global Configuration command. The no version of
the command resets the poll retry times for SNTP unicast clients to the default value of 1.
OmniAccess SafeGuard OS Administration Guide
Chapter 2: Accessing and Managing the System
sntp unicast client poll-retry retry
no sntp unicast client poll-retry
retrySpecifies the number of retries for SNTP client polling. Valid
To set the poll-timeout timers for unicast clients, use the sntp unicast client poll-timeout
Global Configuration command. The no form of this command resets the poll time-out
for SNTP unicast clients to its default value of 5 seconds.
sntp unicast client poll-timeout seconds
no sntp unicast client poll-timeout
secondsSpecifies the number of seconds for polling. Valid values are 1
to 30 seconds. The default is 5 seconds.
The following example sets the timer to 10 seconds.
To set the port ID for the client port, use the sntp client port command in Global
Configuration mode. The no version of the command resets the client port back to the
default value of 123.
sntp client port portid
no sntp client port
portidSpecifies the SNTP client port ID. Valid values are 1 to 65535.
The following example configures SNTP clients to use port 1200.
This section describes the commands used for managing the Alcatel-Lucent SafeGuard
device, including their names, description, arguments, and argument descriptions.
See the following information for more details:
■Clearing the Counters
■Checking for Another Computer on the Network
■Displaying Version Information
■Displaying Hardware Information
■Displaying the Serial Communication Settings for the Device
■Setting Up a Trace Route
Clearing the Counters
To clear the statistics for a specified slot or port, all ports, or the entire device based on the
argument, use the clear command in Privileged Exec mode.
clear counters [slot/port | all]
Syntax Descriptionslot/portClears the counters for the specified port.
allClears the counters for all ports on the device.
The following example clears port 8 of the counters:
To check whether another node is alive on the network, use the ping command in
Privileged Exec mode. To use this command, configure the device for network (in-band)
connection. The source and target devices must have the ping utility enabled and be
running on top of TCP/IP.
60
The SafeGuard device can be pinged from any IP workstation with which the device is
connected through the default VLAN (VLAN 1), as long as a physical path exists between
the device and workstation. The terminal interface sends three pings to the target device.
OmniAccess SafeGuard OS Administration Guide
ping ipaddr
Syntax DescriptionipaddrTarget IP address to ping.
The following example pings the device at IP address 10.1.1.0:
(SafeGuardOS) # ping 10.1.1.0
(SafeGuardOS) #
Displaying Version Information
To display the SafeGuard OS version information, use the show version command in
Privileged Exec mode.
show version
The command has no options or parameters.
Chapter 2: Accessing and Managing the System
The following sample output is representative of the show version command:
(SafeGuardOS) #show version
Manufacturer................................... Alcatel-Lucent Inc.
System Description............................. OmniAccess 2400 SafeGuard
Serial Number.................................. 0538FCS002
Burned In MAC Address.......................... 00:12:36:FF:DA:FE
ManufacturerIdentifies the device as manufactured by Alcatel-Lucent
System DescriptionFactory-assigned description of the system
Serial NumberSerial number of the device.
Burned In MAC AddressBurned-in MAC address. Used as the MAC address for the
serviceport.
Software VersionVersion of SafeGuard OS. The version is in the format of:
version.release.maintence_level.build_number
Software Build DateWhen the build was created
Image SelectedPrimary or secondary image being run
Image BootedMethod used to boot the device. Valid entries are primary,
secondary and TFTP
Primary ImageRelease information of the primary image
Secondary ImageRelease information of the secondary image
Bootstrap VersionBootrom version number. The current release of SafeGuard
OS supports a simple boot loader or a two-stage boot
loader. If both boot loaders are on the system, the simple
boot loader cannot read version information from the two-
stage boot loader. In that case, the show version
command does not display bootRom information.
Active Bootrom VersionThe active bootrom version number.
Bootrom SelectedWhich bootrom is selected, primary or secondary.
Bootrom BootedWhich bootrom was used to boot the device.
Primary Bootrom
Version of primary bootrom version.
Version
Secondary Bootrom
Version of secondary bootrom version.
Version
System TimeDate and time stamp.
CPU UtilizationPercentage being used by the user, system and the
remaining percentage for idle.
Free MemoryAmount of free memory in megabytes; amount of total
memory in megabytes.
62
UptimeElapsed time since the last reboot.
OmniAccess SafeGuard OS Administration Guide
Displaying Hardware Information
To display the device hardware information for either a SafeGuard Controller or a
SafeGuard Switch, use the show hardware command in Privileged Exec mode.
show hardware
The command has no options or parameters. The following sample output is
representative of the command on a controller:
(SafeGuardOS) #show hardware
Manufacturer................................... Alcatel-Lucent Inc.
System Description............................. OmniAccess 2400 SafeGuard
Serial Number.................................. 123-45-6789
Part Number.................................... 9000004
Fan 1 Speed.................................... 5066 RPM
Fan 2 Speed.................................... 5066 RPM
Power Supply 1 (AC)............................ OFF
Power Supply 2 (AC)............................ PASS
(SafeGuardOS) #
The fields in the output represent:
Field Description
ManufacturerIdentifies the device as manufactured by Alcatel-Lucent
System DescriptionThe factory-assigned description of the system
Serial NumberThe factory-assigned serial number
Part NumberThe Alcatel-Lucent part number for the device
Hardware RevisionAlcatel-Lucent internal revision code
System MemoryThe total memory available for the system, fixed at 256 MB
Flash MemoryInternal Flash memory for system images; size in
megabytes.
CAM SizeTable space available in Content Addressable Memory
Switching Chip RevisionAlcatel-Lucent internal revision code
Internal TemperatureThe internal temperature of the device. Valid ranges are
from 0 to 40
o
degrees Celsius. Typically, the internal
temperature is 5-10 degrees warmer than ambient.
Fan SpeedCooling fan speed. Valid range is from 2000 to 10000 RPM
OmniAccess SafeGuard OS Administration Guide
Chapter 2: Accessing and Managing the System
Field Description
Power SupplySafeGuard Controllers have one power supply that cannot
be hot swapped. The SafeGuard Switch has two power
supplies that can be hot swapped.
If the power supply is present and operating, it displays as
PASS. If the power supply is absent or not operating, it
displays as FAIL.
To display the device compact flash memory information for either a SafeGuard
Controller or a SafeGuard Switch, use the show hardware media command in Privileged
Exec mode.
show hardware media
The command has no options or parameters.
The following example is representative of the command output:
Baud RateThe default baud rate at which the serial port tries to
Character SizeThe number of bits in a character. The number of bits is
Flow ControlWhether hardware flow control is enabled or disabled.
Stop BitsThe number of stop bits for each character. The number
Parity TypeThe parity method used on the serial port. The parity
Setting Up a Trace Route
To set up a trace route, that is, to discover the routes that packets actually take when
traveling to their destination through the network on a hop-by-hop basis, use the
traceroute command. The Privileged Exec mode command has the following syntax:
The time (in minutes) of inactivity on a serial port
connection, after which the device closes the
configured connection. Any numeric value between 0
and 160 is allowed. The factory default is 5. A value of 0
disables the timeout.
connect. The available bauds are 1200, 2400, 4800,
9600, 19200, 38400, 57600, and 115200. The factory
default is 9600 baud.
always 8.
Hardware flow control is always disabled.
of stop bits is always 1.
method is always none.
66
traceroute ipaddr port
Syntax DescriptionipaddrIP address.
portDecimal integer in the range of 0(zero) to 65535.
The default value is 33434. This argument is the UDP
port used as the destination of packets sent as part
of the traceroute. This port should be an unused
port on the destination system.
The following example performs a trace route for port 8080 on IP address 10.10.10.2:
To designate the person or the organization responsible for SNMP on the network, use
the snmp-server sysinfo contact command. The syntax for the Global Configuration
command is:
snmp-server sysinfo contact contact
Syntax DescriptioncontactText used to identify a contact person or
The following example indicates that the SNMP server maintained by Joe in the IT
department:
organization for the device. It can be up to 31
alphanumeric characters. The factory default is
blank.
Configuring SNMP Communities
Adding and Naming a New SNMP Community
To add and name a new SNMP community, use the snmp-server community command.
A community name is a name associated with the device and a set of SNMP managers
that manage it with a specified privileged level.
No default community strings exist; SNMP access is disabled by default on the device.
On initial installation, the read-only and read-write community strings must be
configured. Configure OmniVista SafeGuard Manager with the device names.
snmp-server community name
Syntax DescriptionnameName for an SNMP server community. By default,
The following example creates a community string with the name public.
(SafeGuardOS) # configure terminal
(SafeGuardOS) (config) # snmp-server community public
(SafeGuardOS) (config) #
this community string is read only. The name can
be up to 16 case-sensitive characters.
70
OmniAccess SafeGuard OS Administration Guide
Chapter 2: Accessing and Managing the System
Establishing Access for the SNMP Community
To change an existing community string to read-write access privileges, use the snmpservice community rw command.
snmp-server community [rw name| ro name]
Syntax Descriptionro(Default) Indicates that the specified name has
read-only privileges.
rwIndicates that the specified name has read-write
privileges.
nameName of an SNMP server community.
The following example shows how to configure the well-known standard community
strings “public” and “private”:
(SafeGuardOS) (config) #no snmp-server community public
(SafeGuardOS) (config) #no snmp-server community private
(SafeGuardOS) (config) #snmp-server community public
(SafeGuardOS) (config) #snmp-server community private
(SafeGuardOS) (config) #snmp-server community rw private
(SafeGuardOS) (config) #show snmpcommunity
SNMP Community Name Client IP Address Client IP Mask Access Mode Status
To set a client IP address for an SNMP community, use the snmp-server community
ipaddr command. The address is the associated community SNMP packet-sending
address and is used along with the client IP mask to denote a range of IP addresses from
which SNMP clients may use that community to access the device. A value of 0.0.0.0
allows access from any IP address. Otherwise, this value is ANDed with the mask to
determine the range of allowed client IP addresses. The name is the applicable
community name.
snmp-server community ipaddr addr name
Syntax Descriptionip_addrIP address (or portion thereof) from which this
device accepts SNMP packets with the
associated community.
nameSNMP community name.
OmniAccess SafeGuard OS Administration Guide
71
Chapter 2: Accessing and Managing the System
Setting a Client Netmask SNMP Community
To set a client netmask for an SNMP community, use the snmp-server community
netmask command.
snmp-server community netmask mask name
Syntax DescriptionmaskThe netmask.
nameSNMP community name.
Configuring a SNMP Target
The SafeGuard device allows authorized SNMP community trap receivers to be one or
more network management stations on the network.
Creating the Trap Receiver
To create and enable a trap receiver use the snmp-server target command in Global
Configuration mode.
snmp-server target trapcomm ipaddr
Syntax DescriptiontrapcommThe name for this SNMP community trap
receiver.
ipaddrIP address of the trap receiver.
The following example assigns community “public” to the trap receiver 172,16.140.90:
The IP address of the trap receiver can be changed by using the snmp-server target
ipaddr command. This Global Configuration command acts as a toggle to switch
Syntax DescriptiontrapcommThe name for this SNMP community trap
receiver.
old-ipaddrThe existing IP address of the trap
receiver.
OmniAccess SafeGuard OS Administration Guide
Chapter 2: Accessing and Managing the System
new-ipaddrThe new IP address of the trap receiver.
The following example changes the address of the trap receiver with the community
“public” and the IP address of 172.16.140.90 to have an IP Address of 172.16.230.10:
The following example disables the multiple users login trap:
(SafeGuardOS) (config) # no snmp-server traps multiusers
(SafeGuardOS) (config) #
OmniAccess SafeGuard OS Administration Guide
73
Chapter 2: Accessing and Managing the System
Displaying SNMP Community Information
To display the SafeGuard device SNMP community information, use the show snmpserver community command.
Communities can be added, changed, or deleted. The device does not have to be reset for
changes to take effect.
The SNMP agent of the device complies with SNMP Version 2 (for more information
about the SNMP specification, refer to the SNMP RFCs). The SNMP agent sends traps
through TCP/IP to an external SNMP manager based on the SNMP configuration.
show snmp-server community
The command has no options or parameters.
The following example is representative of the command output:
(SafeGuardOS) #show snmp-server community
SNMP Community Name Client IP Address Client IP Mask Access Mode Status
Ta b le 6 describes the output displayed with the show snmp-server community
command.
Table 6Parameters Displayed with the show snmp-server community
Command
OptionDescription
SNMP
Community
Name
Client IP
Address
Community string to which this entry grants access. A valid entry is a
case-sensitive alphanumeric string of up to 16 characters. Each row
of this table must contain a unique community name.
IP address (or portion thereof) from which this device accepts SNMP
packets with the associated community. The IP address of the
requesting entity is ANDed with the subnet mask before being
compared to the IP address.
Note: that if the subnet mask is set to 0.0.0.0, an IP address of 0.0.0.0
matches all IP addresses. The default value is 0.0.0.0
74
Client IP
Mask
Mask to be ANDed with the IP address of the requesting entity before
comparison with the IP address. If the result matches the IP address,
then the address is an authenticated IP address.
For example, if the IP address is 9.47.128.0 and the corresponding
subnet mask is 255.255.255.0 a range of incoming IP addresses would
match, that is, the incoming IP address could be from 9.47.128.0 to
9.47.128.255. The default value is 0.0.0.0
OmniAccess SafeGuard OS Administration Guide
Chapter 2: Accessing and Managing the System
Table 6Parameters Displayed with the show snmp-server community
Command
OptionDescription
Access
Mode
StatusStatus of this community access entry, either enabled or disabled.
Access level for this community string, valid entries are read only and
read/write.
Displaying SNMP Target Information
To display the SNMP target information, use the show snmp-server target command.
show snmp-server target
The following sample output is representative of the show snmp-server target command:
Ta b le 7 describes the output displayed with the show snmp-server target command.
Table 7Parameters Displayed with the show snmp-server target Command
OptionDescription
SNMP Trap
Community
IP AddressDisplays the IP address assigned to a specified community name.
StatusOne of two modes, either enabled or disabled.
Displays the name of an SNMP trap community.
Displaying SNMP System Information
To display the SNMP information, use the show snmp-server sysinfo command.
show snmp-server sysinfo
The following example is representative of the show snmp-server sysinfo command:
OmniAccess SafeGuard OS Administration Guide
75
Chapter 2: Accessing and Managing the System
(SafeGuardOS) #show snmp-server sysinfo
System Description............................. OAG4048x
System Name.................................... oag4048
System Location................................ ca95134
System Contact................................. it2028
System Object ID............................... Alcatel-Lucent.2.1.3
System Up Time................................. 2 days 22 hrs 39 mins 52 secs
MIBs Supported:
RFC 1907 - SNMPv2-MIB The MIB module for SNMPv2 entities
Alcatel-Lucent-MIB Alcatel-Lucent MIB
SNMP-COMMUNITY-MIB This MIB module defines objects to help
support coexistence between SNMPv1, SNMPv2,
and SNMPv3.
SNMP-FRAMEWORK-MIB The SNMP Management Architecture MIB
SNMP-MPD-MIB The MIB for Message Processing and
Dispatching
SNMP-NOTIFICATION-MIB The Notification MIB Module
SNMP-TARGET-MIB The Target MIB Module
SNMP-USER-BASED-SM-MIB The management information definitions for
the SNMP User-based Security Model.
SNMP-VIEW-BASED-ACM-MIB The management information definitions for
the View-based Access Control Model for SNMP.
USM-TARGET-TAG-MIB SNMP Research, Inc.
RFC 1213 - RFC1213-MIB Management Information Base for Network
Management of TCP/IP-based internets: MIB-II
RFC 1493 - BRIDGE-MIB Definitions of Managed Objects for Bridges
(dot1d)
RFC 2674 - P-BRIDGE-MIB The Bridge MIB Extension module for managing
Priority and Multicast Filtering, defined by
IEEE 802.1D-1998.
RFC 2674 - Q-BRIDGE-MIB The VLAN Bridge MIB module for managing
Virtual Bridged Local Area Networks
RFC 2863 - IF-MIB The Interfaces Group MIB using SMIv2
RFC 3635 - Etherlike-MIB Definitions of Managed Objects for the
Ethernet-like Interface Types
76
Ta b le 7 describes the output displayed with the show snmp-server sysinfo command.
Table 8Parameters Displayed with the show snmp-server sysinfo Command
OptionDescription
System
Description
System
Name
System
Location
System
Contact
Description of the system.
Name of the system.
Location of the system.
Contact for the system.
OmniAccess SafeGuard OS Administration Guide
Chapter 2: Accessing and Managing the System
Table 8Parameters Displayed with the show snmp-server sysinfo Command
OptionDescription
System
Object ID
System Up
Time
MIBs
Supported
System Object ID.
The amount of time the system has been running.
A list of supported MIBs.
Configuring Domain Name Servers
To use some of the posture checking features, domain name servers (DNS) must be
configured. In order to resolve a host name, the system uses the default DNS domain and
the names of the servers in the DNS name server list. See the following sections for more
details:
■Specifying a Default Domain
■Creating a DNS Name Server List
■Displaying DNS Information
Specifying a Default Domain
To create a default DNS domain, use the ip domain command in Privileged Exec mode.
This results of this command stay in persistent memory.
ip domain [lookup] [name name] [retry number] [round-robin] [timeout
seconds]
Syntax DescriptionlookupEnable DNS lookups.
nameDefault domain name.
numberNumber of retries (1-100).
round-robinLoad balance nameservers in round-robin order.
secondsNumber of seconds to wait for a DNS
This example specifies Alcatel-Lucent.com as the default domain name.
(SafeGuardOS) # ip domain name Alcatel-Lucent.com
(SafeGuardOS) #
response.
OmniAccess SafeGuard OS Administration Guide
77
Chapter 2: Accessing and Managing the System
Creating a DNS Name Server List
A DNS name server list with up to three IP addresses in the list can be created. When
more than one address is listed, the system uses the order specified to determine the
order of priority for name resolution. To create a DNS name list, use the ip nameserver
command in Privileged Exec mode.
To remove one or two of the name servers, re-enter the ip nameserver command without
their IP addresses. Specifying the command replaces all the existing nameservers with
the new IP addresses. To remove all of the nameservers, use the no version of the
command:
ip nameserver ipaddr {ipaddr2 ipaddr3}
no ip nameserver
Syntax DescriptionipaddrSpecifies the IP address of a name server.
ipaddr2(Optional) Specifies the IP address of the
secondary name server.
ipaddr3(Optional) Specifies the IP address of the
For example,
(SafeGuardOS) # ip name-server 1.1.1.1
(SafeGuardOS) #
Displaying DNS Information
Use the show dns command in Privileged Exec mode to display the current DNS
configuration:
show dns
For example,
(SafeGuardOS) #show dns
DNS configuration:
ip domain lookup
ip domain name Alcatel-Lucent.com
ip name-server 1.1.1.1
(SafeGuardOS)
final name server.
78
OmniAccess SafeGuard OS Administration Guide
Resetting the Device
To reset the SafeGuard device without powering it off, use the reload command in
Privilege Exec mode. A reset means that all network connections are terminated and the
boot code executes.
The device uses the stored configuration to initialize itself. When prompted to confirm
that the reset should proceed, enter y for Yes. The LEDs on the device indicate a
successful reset.
reload
Configuring Data Traffic Ports
This section describes the commands used for configuring the device port on the device.
See the following sections for more details:
Chapter 2: Accessing and Managing the System
■Entering Interface Configuration Mode
■Enabling and Disabling an Interface
■Displaying Interface Information
■Displaying Ethernet Interface Information
■Understanding Mirroring and Monitoring Ports
■Configuring Port-Based Mirroring
■Changing the Protection Mode of Ports
Entering Interface Configuration Mode
To enter into interface configuration mode, use the interface command in Global
Configuration mode using the following syntax:
interface
Syntax Descriptionslot/portSlot/port format for interface.
[slot/port | vlan id id | vlan name name]
vlan idKeyword for configuration of a VLAN
interface by ID.
vlan nameKeyword for configuration of a VLAN
idID of VLAN interface to configure.
nameName of VLAN interface to configure.
OmniAccess SafeGuard OS Administration Guide
interface by name.
79
Chapter 2: Accessing and Managing the System
The following example enters interface configuration mode for slot 0 port 25:
To disable an interface, use the shutdown command in interface configuration submode.
This command disables all functions on the specified interface and marks it as
unavailable.
shutdown
This command has no options or arguments.
The following command sequence brings down port 9:
By default, all interfaces are initially disabled. To start or restart a disabled interface, use
the no form of this command. The command enables the specified interface. For example,
to restore port 9:
Using the shutdown all command in global configuration mode disables all ports in the
system. The no form of the command enables all ports in the system. The following
example enables all ports in the system:
(SafeGuardOS) # configure terminal
(SafeGuardOS) (config) # no shutdown all
Displaying Interface Information
To display the interface information for the device, use the show interface command.
This command displays a summary of statistics for a specific port or a count of all CPU
traffic based on the argument.
show interface [slot/port | switchport]
80
Syntax Descriptionslot/portDisplays information for a specific interface.
OmniAccess SafeGuard OS Administration Guide
Chapter 2: Accessing and Managing the System
switchportDisplays statistics for the entire switch.
The following example shows the data available for port 20:
The elapsed time, in days, hours, minutes, and seconds since the
statistics for this port were last cleared.
Cleared
Displaying Ethernet Interface Information
To display the Ethernet interface information for the device, use the show interface
ethernet command. This command displays a summary of statistics for a specific port or
a count of all CPU traffic based on the argument.
show interface ethernet [slot/port | switchport]
Syntax Descriptionslot/portDisplays information for a specific interface.
switchportDisplays statistics for the entire switch.
The following example is representative of the show interface ethernet command:
(SafeGuardOS) #show interface ethernet 0/21
Total Bytes Received: 0
Packets Received > 1522 Octets: 0
Packets RX and TX 64 Octets: 0
Packets RX and TX 65-127 Octets: 0
Packets RX and TX 128-255 Octets: 0
Packets RX and TX 256-511 Octets: 0
Packets RX and TX 512-1023 Octets: 0
Packets RX and TX 1024-1518 Octets: 0
Packets Received: 0
Unicast Packets Received: 0
Multicast Packets Received: 0
Broadcast Packets Received: 0
Total Packets Received with MAC Errors: 0
Jabbers Received: 0
Fragments/Undersize Received: 0
FCS Errors: 0
Overruns: 0
Total Received Packets Not Forwarded: 0
Local Traffic Frames: 0
Total Bytes Transmitted: 0
Max Frame Size: 1522
Total Packets Transmitted Successfully: 0
Unicast Packets Transmitted: 0
Multicast Packets Transmitted: 0
Broadcast Packets Transmitted: 0
Total Transmit Errors: 0
FCS Errors: 0
Tx Oversized: 0
Underrun Errors: 0
Total Transmit Packets Discarded: 0
Single Collision Frames: 0
Multiple Collision Frames: 0
Excessive Collision Frames: 0
Port Membership Discards: 0
VLAN Viable Discards: 0
802.3x Pause Frames Transmitted: 0
STP BPDUs Transmitted: 0
STP BPDUs Received: 0
RSTP BPDUs Transmitted: 0
RSTP BPDUs Received: 0
MSTP BPDUs Transmitted: 0
MSTP BPDUs Received: 0
EAPOL Frames Transmitted: 0
EAPOL Start Frames Received: 0
Time Since Counters Last Cleared: 3 day 6 hr 57 min
(SafeGuardOS) #
OmniAccess SafeGuard OS Administration Guide
83
Chapter 2: Accessing and Managing the System
Ta b le 1 0 shows Ethernet interface options and descriptions.
Table 10Ethernet Interface Options
OptionDescription
Packets Received Without
Error
Octets Received – The total number of octets of data (including
those in bad packets) received on the network (excluding
framing bits but including Frame Check Sequence (FCS) octets).
This object can be used as a reasonable estimate of Ethernet
utilization. If greater precision is desired, the etherStatsPkts and
etherStatsOctets objects should be sampled before and afte r a
common interval. The result of this equation is the value
Utilization which is the percent utilization of the ethernet
segment on a scale of 0 to 100 percent.
Packets Received < 64 Octets – The total number of packets
(including bad packets) received that were < 64 octets in
length (excluding framing bits but including FCS octets).
Packets Received 64 Octets – The total number of packets
(including bad packets) received that were 64 octets in length
(excluding framing bits but including FCS octets).
Packets Received 65-127 Octets – The total number of packets
(including bad packets) received that were between 65 and
127 octets in length inclusive (excluding framing bits but
including FCS octets).
Packets Received 128-255 Octets – The total number of packets
(including bad packets) received that were between 128 and
255 octets in length inclusive (excluding framing bits but
including FCS octets).
Packets Received 256-511 Octets – The total number of packets
(including bad packets) received that were between 256 and
511 octets in length inclusive (excluding framing bits but
including FCS octets).
Packets Received 512-1023 Octets – The total number of
packets (including bad packets) received that were between
512 and 1023 octets in length inclusive (excluding framing bits
but including FCS octets).
Packets Received 1024-1518 Octets – The total number of
packets (including bad packets) received that were between
1024 and 1518 octets in length inclusive (excluding framing bits
but including FCS octets).
Packets Received 1519-1522 Octets – The total number of
packets (including bad packets) received that were between
1519 and 1522 octets in length inclusive (excluding framing bits
but including FCS octets).
Packets Received > 1522 Octets – The total number of packets
received that were longer than 1522 octets (excluding framing
bits, but including FCS octets) and were otherwise well formed.
84
OmniAccess SafeGuard OS Administration Guide
Table 10Ethernet Interface Options (continued)
OptionDescription
Chapter 2: Accessing and Managing the System
Packets Received
Successfully
Packets Received with MAC
Errors
Total – The total number of packets received that were without
errors.
Unicast Packets Received – The number of subnetwork-unicast
packets delivered to a higher-layer protocol.
Multicast Packets Received – The total number of good packets
received that were directed to a multicast address. Note that
this number does not include packets directed to the broadcast
address.
Broadcast Packets Received – The total number of good
packets received that were directed to the broadcast address.
Note that this does not include multicast packets.
Total – The total number of inbound packets that contained
errors preventing them from being deliverable to a higher-layer
protocol.
Jabbers Received – The total number of packets received that
were longer than 1518 octets (excluding framing bits, but
including FCS octets), and had either a bad Frame Check
Sequence (FCS) with an integral number of octets (FCS Error) or
a bad FCS with a non-integral number of octets (Alignment
Error). Note that this definition of jabber is different than the
definition in IEEE-802.3 section 8.2.1.5 (10BASE5) and section
10.3.1.4 (10BASE2). These documents define jabber as the
condition where any packet exceeds 20 ms. The allowed range
to detect jabber is between 20 ms and 150 ms.
Fragments/Undersize Received – The total number of packets
received that were less than 64 octets in length (excluding
framing bits but including FCS octets).
Alignment Errors – The total number of packets received that
had a length (excluding framing bits, but including FCS octets)
of between 64 and 1518 octets, inclusive, but had a bad Frame
Check Sequence (FCS) with a non-integral number of octets.
Rx FCS Errors – The total number of packets received that had a
length (excluding framing bits, but including FCS octets) of
between 64 and 1518 octets, inclusive, but had a bad Frame
Check Sequence (FCS) with an integral number of octets
Overruns – The total number of frames discarded as this port
was overloaded with incoming packets, and could not keep up
with the inflow.
OmniAccess SafeGuard OS Administration Guide
85
Chapter 2: Accessing and Managing the System
Table 10Ethernet Interface Options (continued)
OptionDescription
Received Packets not
Forwarded
Total – A count of valid frames received which were discarded
(i.e.,filtered) by the forwarding process.
Local Traffic Frames – The total number of frames dropped in the
forwarding process because the destination address was
located off of this port.
802.3x Pause Frames Received – A count of MAC Control
frames received on this interface with an opcode indicating the
PAUSE operation. This counter does not increment when the
interface is operating in half-duplex mode.
Unacceptable Frame Type – The number of frames discarded
from this port due to being an unacceptable frame type.
VLAN Membership Mismatch – The number of frames discarded
on this port due to ingress filtering.
VLAN Viable Discards – The number of frames discarded on this
port when a lookup on a particular VLAN occurs wh ile that entry
in the VLAN table is being modified, or if the VLAN has not been
configured.
Multicast Tree Viable Discards – The number of frames
discarded when a lookup in the multicast tree for a VLAN occurs
while that tree is being modified.
Reserved Address Discards – The number of frames discarded
that are destined to an IEEE 802.1 reserved address and are not
supported by the system.
Broadcast Storm Recovery – The number of frames discarded
that are destined for FF:FF:FF:FF:FF:FF when Broadcast Storm
Recovery is enabled.
CFI Discards – The number of frames discarded that have CFI bit
set and the addresses in RIF are in non-canonical format.
Upstream Threshold – The number of frames discarded due to
lack of cell descriptors available for that packet's priority level.
86
OmniAccess SafeGuard OS Administration Guide
Chapter 2: Accessing and Managing the System
Table 10Ethernet Interface Options (continued)
OptionDescription
Packets Transmitted OctetsTotal Bytes – The total number of octets of data (including those
in bad packets) received on the network (excluding framing bits
but including FCS octets). This object can be used as a
reasonable estimate of ethernet utilization. If greater precision is
desired, the etherStatsPkts and etherStatsOctets objects should
be sampled before and after a common interval.
Packets Transmitted 64 Octets – The total number of packets
(including bad packets) received that were 64 octets in length
(excluding framing bits but including FCS octets).
Packets Transmitted 65-127 Octets – The total number of
packets (including bad packets) received that were between
65 and 127 octets in length inclusive (excluding framing bits but
including FCS octets).
Packets Transmitted 128-255 Octets – The total number of
packets (including bad packets) received that were between
128 and 255 octets in length inclusive (excluding framing bits but
including FCS octets).
Packets Transmitted 256-511 Octets – The total number of
packets (including bad packets) received that were between
256 and 511 octets in length inclusive (excluding framing bits but
including FCS octets).
Packets Transmitted 512-1023 Octets – The total number of
packets (including bad packets) received that were between
512 and 1023 octets in length inclusive (excluding framing bits
but including FCS octets).
Packets Transmitted 1024-1518 Octets – The total number of
packets (including bad packets) received that were between
1024 and 1518 octets in length inclusive (excluding framing bits
but including FCS octets).
Packets Transmitted 1519-1522 Octets – The total number of
packets (including bad packets) received that were between
1519 and 1522 octets in length inclusive (excluding framing bits
but including FCS octets).
Max Info – The maximum size of the Info (non-MAC) field that this
port will receive or transmit.
OmniAccess SafeGuard OS Administration Guide
87
Chapter 2: Accessing and Managing the System
Table 10Ethernet Interface Options (continued)
OptionDescription
Packets Transmitted
Successfully
Total – The number of frames that have been transmitted by this
port to its segment.
Unicast Packets Transmitted – The total number of packets that
higher-level protocols requested be transmitted to a
subnetwork-unicast address, including those that were
discarded or not sent.
Multicast Packets Transmitted – The total number of packets
that higher-level protocols requested be transmitted to a
Multicast address, including those that were discarded or not
sent.
Broadcast Packets Transmitted – The total number of packets
that higher-level protocols requested be transmitted to the
Broadcast address, including those that were discarded or not
sent.
Transmit ErrorsTotal Errors – The sum of Single, Multiple, and Excessive Collisions.
Tx FCS Errors – The total number of packets transmitted that had
a length (excluding framing bits, but including FCS octets) of
between 64 and 1518 octets, inclusive, but had a bad Frame
Check Sequence (FCS) with an integral number of octets
Oversized – The total number of frames that exceeded the max
permitted frame size. This counter has a max increment rate of
815 counts per sec. at 10 Mb/s.
Underrun Errors – The total number of frames discarded because
the transmit FIFO buffer became empty during frame
transmission.
Transmit DiscardsTotal Discards – The sum of single collision frames discarded,
multiple collision frames discarded, and excessive frames
discarded.
Single Collision Frames – A count of the number of successfully
transmitted frames on a particular interface for which
transmission is inhibited by exactly one collision.
Multiple Collision Frames – A count of the number of successfully
transmitted frames on a particular interface for which
transmission is inhibited by more than one collision.
Excessive Collisions – A count of frames for which transmission
on a particular interface fails due to excessive collisions.
Port Membership – The number of frames discarded on egress
for this port due to egress filtering being enabled.
VLAN Viable Discards – The number of frames discarded on this
port when a lookup on a particular VLAN occurs wh ile that entry
in the VLAN table is being modified, or if the VLAN has not been
configured.
88
OmniAccess SafeGuard OS Administration Guide
Chapter 2: Accessing and Managing the System
Table 10Ethernet Interface Options (continued)
OptionDescription
Protocol StatisticsBPDU received – The count of BPDUs (Bridge Protocol Data Units)
received in the spanning tree layer.
BPDUs Transmitted – The count of BPDUs (Bridge Protocol Data
Units) transmitted from the spanning tree layer.
802.3x Pause Frames Received – A count of MAC Control
frames received on this interface with an opcode indicating the
PAUSE operation. This counter does not increment when the
interface is operating in half-duplex mode.
Time Since Counters Last Cleared............... 3 day 6 hr 48 min 0 sec
(SafeGuardOS) #
Additional Statistics Display Information
Ta b le 11 shows additional Ethernet options.
Table 11 Additional Ethernet Options
OptionDescription
Total Packets Received
Without Error
Total number of packets (including broadcast packets
and multicast packets) that were received by the
processor.
Broadcast Packets
Received
Total number of packets that were received and
directed to the broadcast address. Note that this
number does not include multicast packets.
Packets Transmitted
without Errors
Broadcast Packets
Transmitted
Total number of packets that were transmitted from the
interface.
Total number of packets that higher-level protocols
requested to be transmitted to the broadcast address,
including those that were discarded or not sent.
Address Entries in UseNumber of learned and static entries in the Forwarding
Database Address Table for this device.
Static VLAN EntriesThe number of static VLAN entries configured on the
interface.
Dynamic VLAN EntriesThe number of dynamic VLAN entries configured on the
interface.
VLAN DeletesThe number of frames discarded on this port when a
lookup on a particular VLAN occurs while that entry in
the VLAN table is being modified, or if the VLAN has not
been configured.
90
Time Since Counters Last
Cleared
Elapsed time (in days, hours, minutes, and seconds)
since statistics for this device were last cleared.
OmniAccess SafeGuard OS Administration Guide
CST_039
Mirroring
port
Mirrored-to
port
Mirrored-to
port
Mirrored-to
ports
Mirroring
ports
Mirroring
ports
Chapter 2: Accessing and Managing the System
Understanding Mirroring and Monitoring Ports
The SafeGuard OS supports two types of mirroring:
■port-based mirroring – Monitors all of the traffic on a port and copies, or mirrors,
the data to a destination port.
■policy-based mirroring – Allows mirroring at the rule-level of a policy. Policy-
based mirroring is described in Configuring Policy-Based Mirroring on page 323.
Port-based mirroring is device dependant. The SafeGuard Switch supports multiple
mirroring sessions and the forwarding of mirrored frames to a remote port. Ta bl e 1 2
shows the differences between the devices.
Table 12 Port-Based Mirroring on SafeGuard Devices
DeviceMirror SessionsRemote Mirroring
SafeGuard Switch1-4Yes
SafeGuard Controller1No
As shown in Figure 3, the SafeGuard Switch supports:
■A single mirroring port to a single mirrored-to port.
■Multiple mirroring ports to a single mirrored-to port
■Multiple mirroring ports to multiple mirrored-to ports
However, note that a single mirroring port cannot be connected to multiple mirrored-to
ports.
Figure 3Example of Port-Based Mirroring Configuration for SafeGuard Switch
About Remote Span Support
The system can direct a mirrored frame to a specified remote monitoring device. This
device may not be another Alcatel-Lucent Switch. Frames are identified during VLAN
classification, tagged and directed to the RSPAN VLAN. The mirrored frames are
OmniAccess SafeGuard OS Administration Guide
91
Chapter 2: Accessing and Managing the System
directed to the analyzer that is attached to the other switching device. Tab le 1 3 shows the
impact of frames traversing port ingress and egress with RSPAN enabled and disabled.
NOTE: If RSPAN is enabled, the receiver should be configured to support
jumbo frames, since adding a VLAN tag to the ingress frame may result in a
jumbo frame being sent on the mirror port.
Table 13 RSPAN Ingress and Egress Frame Tagging
RSPAN Disabled
Ingress FrameEgress Frame
UntaggedUntagged
802.1Q tagged802.1Q tagged
Double Tagged (802.1Q in 802.1Q)Double Tagged (802.1Q in 802.1Q)
RSPAN Enabled
Ingress FrameEgress Frame
Untagged802.1Q tagged (RSPAN VLAN)
802.1Q tagged802.1Q in 802.1Q tagged (Outer RSPAN VlanId,
Inner original VlanId)
Double Tagged (802.1Q in 802.1Q)3 tagged 802.1Q in 802.1Q tagged (Outer
RSPAN VID, Inner original VID
Figure 4 illustrates the packet frame data translation from ingress to egress.
92
OmniAccess SafeGuard OS Administration Guide
Figure 4RSPAN Frame Translation
CST_056
Chapter 2: Accessing and Managing the System
Configuring Port-Based Mirroring
Port mirroring, which is also known as port monitoring, selects network traffic that you
can analyze with a network analyzer, such as a SwitchProbe device or other Remote
Monitoring (RMON) probe.
For details on policy-based mirroring, see Configuring Policy-Based Mirroring on page 323.
Setting the Source or Destination Port
To configure a probe port or a monitored port for a monitor session, use the monitor
session
command without optional parameters to remove the monitor session designation from
the source probe port, the destination monitored port and all VLANs.
Once the port is removed from the VLAN, you must manually add the port to any
desired VLANs. In a session on the OAG4048 there can be up to eight source ports. On
the OmniAccess 2400 SafeGuard/1000 there can be up to three source ports.
Session IDId to identify the session.
Admin ModeIndicates whether the Port Mirroring feature is enabled
or disabled for the session. The possible values are
Enabled and Disabled.
Probe PortThe Probe (destination) po rt for the session. If the probe
port is not set the field is blank.
RSPAN VLANIn Switch output only. The VLAN RSPAN.
Mirrored PortThe port configured as the mirrored (source) port for the
session If no source port is configured for this session then
this field is blank.
TypeShown in Switch output only. Direction in which the
source port is configured for port mirroring. Values are tx,
for transmitted packets, or rx for received packets.
Changing the Protection Mode of Ports
The device has three protection modes which have an impact on IP forwarding:
■Pass-thru – No protection policies are employed. This mode is the default.
■Monitor – The system monitors for policy visualization based on user-defined
policy controls, however no enforcement actions are taken.
OmniAccess SafeGuard OS Administration Guide
95
Chapter 2: Accessing and Managing the System
■Protect – The system monitors and enforces policies on user-defined and malware
policy controls.
Table 14 Supported Protection Modes
Protection
Mode
Pass-thru
Mode
Monitor Mode
When UsedSafeGuard ControllerSafeGuard Switch
First time set up
and cabling
Testing and
trials
Acts as a transparent
bridge. All security
functionality is
bypassed.
Authentication, captive portal, visualization,
malware detection and protection and user-
Acts as a standard L2/
L3 switch. All security
functionality is
bypassed.
based policy checking is applied to all data
traffic, but enforcement is ignored.
Protect Mode
Typical
Deployment
Authentication, captive portal, visualization,
malware detection and protection and userbased policy checking is applied to all data
traffic, and actively enforced.
For the SafeGuard Controller
For the SafeGuard Controller, device protection mode is set per port-pair. The global form
of the protection-mode command will set all ports to the specified configuration. Use the
protection-mode command in Global or Interface Configuration submode.
protection-mode mode all
96
Syntax DescriptionmodeThe protection mode of the port-pair. Valid
values are:
■ pass-thru – (Default) No protection
policies are employed.
■ monitor – The system monitors for policy
visualization based on user-defined
policy controls, however no
enforcement actions are taken.
■ protect – The system monitors and
enforces policies on user-defined and
malware policy controls.
allIndicates that the mode parameter applies
to all interfaces.
The all keyword applies only in the Global
Configuration mode. In Interface
Configuration mode, it does not apply.
OmniAccess SafeGuard OS Administration Guide
Chapter 2: Accessing and Managing the System
The following example sets ports 1 and 2 to protect mode, in Global Configuration mode:
For the SafeGuard Switch, device protection mode is set on a global basis. Individual
interfaces cannot be configured with different protection modes. Use the protection-mode command in Global Configuration mode.
OmniAccess SafeGuard OS Administration Guide
97
Chapter 2: Accessing and Managing the System
protection-mode mode all
Syntax DescriptionmodeThe protection mode of the port-pair. Valid
The following example sets the SafeGuard Switch to protect mode:
(SafeGuardOS) #configure terminal
(SafeGuardOS) (config) #protection-mode protect all
Enabled: All SafeGuard security features
(SafeGuardOS) (config) #exit
(SafeGuardOS) #
values are:
■ Pass-thru – (Default) No protection
policies are employed.
■ Monitor – The system monitors for policy
visualization based on user-defined
policy controls, however no
enforcement actions are taken.
■ Protect – The system monitors and
enforces policies on user-defined and
malware policy controls.
Displaying Protection Mode Information
Use the show protection-mode command to verify the protection mode setting. The
following sample output is representative from a SafeGuard Controller:
The fields in the show protection-mode output represent:
DisplayDescription
Interface Displays the interface number in slot/port format.
Protection ModeDisplays the protection mode of the interface. Entries
Port TypeIdentifies whether the port is connected to the hosts
can be pass-thru, monitor, or protect.
or network.
Configuring High Availability Support
This section discusses the high availability options. It contains the following sections:
■Configuring Fail-over Device Support
■Configuring System Recovery
■Configuring Exception Recovery
Configuring Fail-over Device Support
For high-availability, the SafeGuard Controller device must be configured to populate the
authentication state to a fail-over device.
To take configure the SafeGuard Controller device to accommodate high-availability:
1Ensure that the devices in the topology have identical versions and identical
configurations.
2Ensure that cabling to the downstream and upstream devices are the same. For
example, if an edge switch is connected to port 5 on the device, the same edge
switch must also be connected to port 5 on the redundant device.
100
3Ensure that the system is configured to reboot (default) should there be a critical
error. If the devices are set in fail-passthru mode, the redundant system does not
take over traffic when a crucial error occurs. The traffic continues to pass through
OmniAccess SafeGuard OS Administration Guide
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.