ExtremeWare XOS Concepts Guide
Software Version 11.1
Extreme Networks, Inc.
3585 Monroe Street
Santa Clara, California 95051
(888) 257-3000
(408) 579-2800
http://www.extremenetworks.com
Published: December 2004
Part number: 100170-00 Rev 01
Alpine, Altitude, BlackDiamond, EPICenter, Ethernet Everywhere, Extreme Ethernet Everywhere, Extreme
Networks, Extreme Turbodrive, Extreme Velocity, ExtremeWare, ExtremeWorks, GlobalPx Content Director, the Go
Purple Extreme Solution Partners Logo, ServiceWatch, Summit, the Summit7i Logo, and the Color Purple, among
others, are trademarks or registered trademarks of Extreme Networks, Inc. or its subsidiaries in the United States
and other countries. Other names and marks may be the property of their respective owners.
© 2004 Extreme Networks, Inc. All Rights Reserved.
Specifications are subject to change without notice.
The ExtremeWare XOS operating system is based, in part, on the Linux operating system. The machine-readable
copy of the corresponding source code is available for the cost of distribution. Please direct requests to Extreme
Networks for more information at the following address:
Software Licensing Department
3585 Monroe Street
Santa Clara CA 95051
NetWare and Novell are registered trademarks of Novell, Inc. Merit is a registered trademark of Merit Network,
Inc. Solaris and Java are trademarks of Sun Microsystems, Inc. F5, BIG/ip, and 3DNS are registered trademarks of
F5 Networks, Inc. see/IT is a trademark of F5 Networks, Inc.
sFlow® is a registered trademark of InMon Corporation.
All other registered trademarks, trademarks and service marks are property of their respective owners.
1 2 3 4 5 6 7 8 9
Authors: Hugh Bussell, Megan Mahar, Peggy Murphy
Production: Megan Mahar and Peggy Murphy
ExtremeWare XOS 11.1 Concepts Guide
2
Contents
Preface......................................................................................................................................... 17
Introduction .............................................................................................................................17
Terminology........................................................................................................................17
Conventions..............................................................................................................................18
Related Publications .................................................................................................................18
Using ExtremeWare XOS Publications Online .........................................................................19
Part 1: Using ExtremeWare XOS
Chapter 1: ExtremeWare XOS Overview........................................................................................... 23
Platforms and Required Software Versions...................................................................................23
Summary of Features.................................................................................................................23
Feature Highlights of ExtremeWare XOS 11.1 ........................................................................24
Software Licensing ....................................................................................................................27
Upgrading to Core License—Aspen 8810 Switch Only ............................................................27
Advanced Core License—BlackDiamond 10K Switch Only.......................................................28
Security Licensing...............................................................................................................29
Software Factory Defaults ..........................................................................................................29
Chapter 2: Accessing the Switch.................................................................................................... 31
Understanding the Command Syntax...........................................................................................31
Syntax Helper .....................................................................................................................32
Command Shortcuts ............................................................................................................32
Modular Switch Numerical Ranges........................................................................................33
Names ...............................................................................................................................33
Symbols .............................................................................................................................33
Limits ................................................................................................................................34
Line-Editing Keys......................................................................................................................34
Command History......................................................................................................................35
Common Commands..................................................................................................................35
Configuring Management Access ................................................................................................37
User Account......................................................................................................................37
Administrator Account .........................................................................................................38
Default Accounts.................................................................................................................38
Creating a Management Account...........................................................................................39
Failsafe Account .................................................................................................................40
Domain Name Service Client Services .........................................................................................41
Checking Basic Connectivity.......................................................................................................41
Ping...................................................................................................................................41
Traceroute ..........................................................................................................................42
ExtremeWare XOS 11.1 Concepts Guide
3
Contents
Chapter 3: Managing the Switch .................................................................................................... 43
Overview ..................................................................................................................................43
Understanding the ExtremeWare XOS Shell .................................................................................44
Using the Console Interface .......................................................................................................44
Using the 10/100 Ethernet Management Port..............................................................................44
Authenticating Users .................................................................................................................45
RADIUS Client....................................................................................................................45
TACACS+ ...........................................................................................................................45
Configuring RADIUS Client and TACACS+ .............................................................................45
Management Accounts.........................................................................................................46
Using Telnet.............................................................................................................................46
About the Telnet Client........................................................................................................46
About the Telnet Server .......................................................................................................46
Connecting to Another Host Using Telnet...............................................................................47
Configuring Switch IP Parameters .........................................................................................47
Configuring Telnet Access to the Switch ................................................................................49
Disconnecting a Telnet Session ............................................................................................50
Using Secure Shell 2.................................................................................................................50
Using the Trivial File Transfer Protocol........................................................................................50
Connecting to Another Host Using TFTP ................................................................................50
Understanding System Redundancy ............................................................................................51
Node Election .....................................................................................................................51
Replicating Data Between Nodes ..........................................................................................52
Viewing Node Status............................................................................................................54
Understanding Power Supply Management ..................................................................................55
Initial System Boot-Up ........................................................................................................55
Removing a Power Supply ....................................................................................................56
Installing or Providing Power to a Power Supply .....................................................................56
Displaying Power Supply Information ....................................................................................56
Using the Simple Network Management Protocol .........................................................................56
Enabling and Disabling SNMPv1/v2c and SNMPv3 ................................................................57
Accessing Switch Agents......................................................................................................57
Supported MIBs..................................................................................................................58
Configuring SNMPv1/v2c Settings ........................................................................................58
Displaying SNMP Settings....................................................................................................58
SNMPv3.............................................................................................................................59
Message Processing.............................................................................................................60
SNMPv3 Security................................................................................................................60
SNMPv3 MIB Access Control ...............................................................................................63
SNMPv3 Notification...........................................................................................................64
Using the Simple Network Time Protocol.....................................................................................66
Configuring and Using SNTP ................................................................................................67
SNTP Example....................................................................................................................70
ExtremeWare XOS 11.1 Concepts Guide
4
Contents
Chapter 4: Managing the ExtremeWare XOS Software...................................................................... 71
Overview of the ExtremeWare XOS Software .................................................................................71
Understanding the ExtremeWare XOS Software ......................................................................71
Using the ExtremeWare XOS File System.....................................................................................72
Moving or Renaming Files on the Switch ...............................................................................72
Copying Files on the Switch .................................................................................................73
Displaying Files on the Switch ..............................................................................................74
Deleting Files From the Switch .............................................................................................74
Managing the Configuration File .................................................................................................75
Managing ExtremeWare XOS Processes .......................................................................................75
Displaying Process Information.............................................................................................76
Stopping a Process..............................................................................................................76
Starting a Process ...............................................................................................................76
Understanding Memory Protection ..............................................................................................77
Chapter 5: Configuring Slots and Ports on a Switch......................................................................... 79
Configuring a Slot on a Modular Switch.......................................................................................79
I/O Ports on Aspen 8810 MSM Module .................................................................................80
Configuring Ports on a Switch.....................................................................................................80
Enabling and Disabling Switch Ports .....................................................................................81
Configuring Switch Port Speed and Duplex Setting .................................................................81
Jumbo Frames ..........................................................................................................................83
Jumbo Frames on the Aspen 8810 Switch Only .....................................................................84
Enabling Jumbo Frames.......................................................................................................84
Path MTU Discovery ............................................................................................................84
IP Fragmentation with Jumbo Frames....................................................................................85
IP Fragmentation within a VLAN ...........................................................................................86
Load Sharing on the Switch .......................................................................................................86
Load-Sharing Algorithms......................................................................................................87
Configuring Switch Load Sharing ..........................................................................................89
Load-Sharing Examples .......................................................................................................90
Displaying Switch Load Sharing............................................................................................90
Switch Port Mirroring.................................................................................................................91
Switch Port Mirroring on the Aspen 8810 Switch Only............................................................91
Switch Port Mirroring on the BlackDiamond 10K Switch Only..................................................92
Switch Port-Mirroring Rules and Restrictions for All Switches..................................................92
Switch Port-Mirroring Examples............................................................................................93
Verifying the Switch Port-Mirroring Configuration ...................................................................93
Extreme Discovery Protocol ........................................................................................................94
Software-Controlled Redundant Port and Smart Redundancy .........................................................96
Guidelines for Software-Controlled Redundant Ports and Port Groups .......................................97
Configuring Software-Controlled Redundant Ports...................................................................97
Verifying Software-Controlled Redundant Port Configurations...................................................98
Displaying Port Configuration Information....................................................................................99
Chapter 6: Power Over Ethernet.................................................................................................... 103
Summary of PoE Features........................................................................................................103
Power Checking for PoE Module ...............................................................................................103
Power Delivery ........................................................................................................................104
ExtremeWare XOS 11.1 Concepts Guide
5
Contents
Enabling PoE to the Switch................................................................................................104
Power Reserve Budget Per Slot...........................................................................................104
PD Disconnect Precedence ................................................................................................105
Port Disconnect or Fault ....................................................................................................106
Port Power Reset...............................................................................................................107
PoE Usage Threshold.........................................................................................................107
Legacy Devices .................................................................................................................107
PoE Operator Limits ..........................................................................................................108
LEDs......................................................................................................................................108
Configuring PoE ......................................................................................................................108
Enabling Inline Power........................................................................................................109
Reserving Power for a Slot..................................................................................................109
Setting the Disconnect Precedence .....................................................................................110
Configuring the Usage Threshold ........................................................................................111
Configuring the Switch to Detect Legacy PDs .......................................................................112
Configuring the Operator Limit ...........................................................................................112
Configuring PoE Port Labels...............................................................................................113
Power Cycling Connected PDs ............................................................................................113
Displaying PoE Settings and Statistics ......................................................................................113
Clearing Statistics .............................................................................................................113
Displaying System Power Information..................................................................................113
Displaying Slot PoE Information .........................................................................................116
Displaying Port PoE Information .........................................................................................117
Chapter 7: Status Monitoring and Statistics .................................................................................. 121
Status Monitoring....................................................................................................................121
Viewing Port Statistics .............................................................................................................121
Viewing Port Errors..................................................................................................................122
Using the Port Monitoring Display Keys .....................................................................................123
Slot Diagnostics ......................................................................................................................123
Running Diagnostics on I/O and Management Modules .........................................................124
Observing LED Behavior During a Diagnostic Test.................................................................124
Displaying Diagnostic Test Results......................................................................................126
System Health Checking ..........................................................................................................126
Understanding the System Health Checker—BlackDiamond 10K Switch Only .........................126
Understanding the System Health Checker—Aspen 8810
Switch Only ......................................................................................................................127
Enabling and Disabling Backplane Diagnostic Packets on the Switch .....................................128
Configuring Backplane Diagnostic Packets on the Switch ......................................................128
System Health Check Examples..........................................................................................128
Setting the System Recovery Level............................................................................................130
Viewing the System Temperature ..............................................................................................130
Event Management System/Logging ..........................................................................................131
Sending Event Messages to Log Targets...............................................................................132
Filtering Events Sent to Targets ..........................................................................................133
Displaying Real-Time Log Messages ....................................................................................141
Displaying Event Logs........................................................................................................141
Uploading Event Logs ........................................................................................................141
Displaying Counts of Event Occurrences ..............................................................................142
Displaying Debug Information.............................................................................................143
Logging Configuration Changes...........................................................................................143
ExtremeWare XOS 11.1 Concepts Guide
6
Contents
Using sFlow............................................................................................................................143
Configuring sFlow..............................................................................................................144
Displaying sFlow Information..............................................................................................146
RMON....................................................................................................................................147
About RMON ....................................................................................................................147
Supported RMON Groups of the Switch ...............................................................................148
Configuring RMON ............................................................................................................149
Event Actions ...................................................................................................................150
Displaying RMON Information ............................................................................................150
Chapter 8: Virtual LANs ............................................................................................................... 151
Overview of Virtual LANs..........................................................................................................151
Benefits ...........................................................................................................................151
Virtual Routers and VLANs—BlackDiamond 10K Switch Only................................................152
Types of VLANs.......................................................................................................................152
Port-Based VLANs .............................................................................................................152
Tagged VLANs ..................................................................................................................155
Protocol-Based VLANs .......................................................................................................157
Precedence of Tagged Packets Over Protocol Filters .............................................................159
VLAN Names ..........................................................................................................................159
Default VLAN....................................................................................................................160
Renaming a VLAN .............................................................................................................160
Configuring VLANs on the Switch .............................................................................................160
VLAN Configuration Examples ............................................................................................161
Displaying VLAN Settings.........................................................................................................162
Displaying Protocol Information ..........................................................................................163
Tunneling (VMANs) .................................................................................................................163
Guidelines for Configuring VMANs ......................................................................................164
Configuring VMANs ...........................................................................................................165
Displaying VMAN Configurations.........................................................................................167
Chapter 9: Virtual Routers............................................................................................................ 169
Virtual Routers Overview ..........................................................................................................169
Types of Virtual Routers .....................................................................................................169
Virtual Router Configuration Domain—BlackDiamond 10K Switch Only ..................................171
Using Virtual Routers—BlackDiamond 10K Switch Only .............................................................171
Creating Virtual Routers .....................................................................................................172
Adding Ports to a Virtual Router..........................................................................................172
Adding Routing Protocols to a Virtual Router........................................................................172
Displaying Ports and Protocols............................................................................................173
Configuring the Routing Protocols and VLANs ......................................................................173
Virtual Router Configuration Example ........................................................................................174
Chapter 10: Forwarding Database.................................................................................................175
Overview of the FDB ................................................................................................................175
FDB Contents ...................................................................................................................175
How FDB Entries Get Added...............................................................................................175
FDB Entry Types ...............................................................................................................176
Disabling MAC Address Learning ........................................................................................177
ExtremeWare XOS 11.1 Concepts Guide
7
Contents
FDB Configuration Examples ....................................................................................................177
Configuring the FDB Aging Time...............................................................................................177
MAC-Based Security................................................................................................................178
Displaying FDB Entries ............................................................................................................178
Chapter 11: Policies and ACLs ..................................................................................................... 179
Policy Manager .......................................................................................................................179
Creating and Editing Policies....................................................................................................179
Using the Edit Command ...................................................................................................180
Using a Separate Machine .................................................................................................180
Checking Policies..............................................................................................................180
Refreshing Policies............................................................................................................181
Applying Policies ....................................................................................................................181
Applying ACL Policies........................................................................................................181
Applying Routing Policies ..................................................................................................182
ACL Policies ...........................................................................................................................182
ACL Policy File Syntax .......................................................................................................183
ACL Evaluation Precedence................................................................................................187
ACL Metering—Aspen 8810 Only .......................................................................................188
Example ACL Rule Entries .................................................................................................189
Displaying and Clearing ACL Counters .................................................................................190
Routing Policies......................................................................................................................190
Routing Policy File Syntax..................................................................................................191
Policy Examples................................................................................................................195
Chapter 12: Quality of Service ..................................................................................................... 201
Overview of Policy-Based Quality of Service ...............................................................................201
Applications and Types of QoS .................................................................................................202
Voice Applications.............................................................................................................202
Video Applications.............................................................................................................202
Critical Database Applications ............................................................................................203
Web Browsing Applications ................................................................................................203
File Server Applications .....................................................................................................203
Configuring QoS......................................................................................................................204
Configuring QoS on the Aspen 8810 Switch Only .................................................................204
QoS Profiles ...........................................................................................................................205
QoS Profiles on the Aspen 8810 Switch Only.......................................................................205
QoS Profiles on the BlackDiamond 10K Switch....................................................................206
Traffic Groupings ....................................................................................................................207
ACL-Based Traffic Groupings..............................................................................................208
Explicit Class of Service (802.1p and DiffServ) Traffic Groupings ..........................................208
Physical and Logical Groupings ..........................................................................................215
Verifying QoS Configuration and Performance ............................................................................219
Monitoring Performance—BlackDiamond 10K Switch Only ...................................................219
Displaying QoS Profile Information......................................................................................219
Guidelines for Configuring QoS.................................................................................................220
ExtremeWare XOS 11.1 Concepts Guide
8
Contents
Egress Traffic Rate Limiting—Aspen 8810 Switch Only ..............................................................220
Bi-Directional Rate Shaping—BlackDiamond 10K Switch Only....................................................221
Bandwidth Settings ...........................................................................................................222
Configuring Bi-Directional Rate Shaping..............................................................................223
Chapter 13: Security ................................................................................................................... 225
Security Overview....................................................................................................................225
Network Access Security..........................................................................................................225
MAC Address Security .............................................................................................................225
Limiting Dynamic MAC Addresses.......................................................................................226
MAC Address Lock Down ...................................................................................................227
Network Login ........................................................................................................................228
Web-Based, MAC-based, and 802.1x Authentication ............................................................228
Campus and ISP Modes .....................................................................................................230
Interoperability Requirements.............................................................................................231
Multiple Supplicant Support ..............................................................................................232
Exclusions and Limitations.................................................................................................233
Configuring Network Login .................................................................................................233
Web-Based Authentication User Login Using Campus Mode ..................................................235
Displaying Network Login Settings ......................................................................................236
Disabling Network Login ....................................................................................................236
Additional Configuration Details..........................................................................................236
MAC-Based Authentication.................................................................................................237
DHCP Server ..........................................................................................................................238
DHCP Server on the Switch................................................................................................238
Displaying DHCP Information .............................................................................................239
Denial of Service Protection .....................................................................................................239
Configuring Denial of Service Protection..............................................................................240
Management Access Security ...................................................................................................241
Authenticating Users Using RADIUS or TACACS+ ......................................................................241
RADIUS ...........................................................................................................................242
Configuring RADIUS..........................................................................................................243
TACACS+ .........................................................................................................................248
Secure Shell 2........................................................................................................................249
Enabling SSH2 for Inbound Switch Access ..........................................................................249
Using SCP2 from an External SSH2 Client ..........................................................................250
Chapter 14: CLEARFlow ............................................................................................................... 253
Overview ................................................................................................................................253
Configuring CLEARFlow ...........................................................................................................253
Displaying CLEARFlow Configuration and Activity.................................................................254
Adding CLEARFlow Rules to ACLs ............................................................................................254
CLEARFlow Rule Types......................................................................................................255
CLEARFlow Rule Actions ...................................................................................................259
CLEARFlow Rule Examples ......................................................................................................261
Count Rule Type Example ..................................................................................................261
Delta Rule Type Example ...................................................................................................262
Ratio Rule Type Example ...................................................................................................263
Delta-Ratio Rule Type Example...........................................................................................264
ExtremeWare XOS 11.1 Concepts Guide
9
Contents
Part 2: Using Switching and Routing Protocols
Chapter 15: Ethernet Automatic Protection Switching.................................................................... 267
Licensing ...............................................................................................................................267
Overview of the EAPS Protocol .................................................................................................267
Fast Convergence ..............................................................................................................269
Fault Detection and Recovery ...................................................................................................269
Link Down Message Sent by a Transit Node .........................................................................270
Ring Port Down Event Sent by Hardware Layer.....................................................................270
Polling .............................................................................................................................271
Restoration Operations.......................................................................................................271
Multiple EAPS Domains...........................................................................................................272
EAPS Data VLAN Spanning Two Rings Connected by One Switch...........................................272
Multiple EAPS Domains per Ring—Spatial Reuse.................................................................273
Multiple EAPS Rings Sharing a Common Link......................................................................273
Configuring EAPS on a Switch..................................................................................................274
Creating and Deleting an EAPS Domain...............................................................................275
Defining the EAPS Mode of the Switch................................................................................275
Configuring EAPS Polling Timers ........................................................................................276
Configuring the Primary and Secondary Ports.......................................................................277
Configuring the EAPS Control VLAN....................................................................................277
Configuring the EAPS Protected VLANs ...............................................................................278
Enabling and Disabling Fast Convergence............................................................................278
Enabling and Disabling an EAPS Domain.............................................................................278
Enabling and Disabling EAPS on the Switch ........................................................................278
Unconfiguring an EAPS Ring Port .......................................................................................279
Displaying EAPS Status Information....................................................................................279
Configuring EAPS Shared Ports ................................................................................................282
Steady State .....................................................................................................................283
Common Link Failures .......................................................................................................284
Flushing the FDBs.............................................................................................................284
Creating and Deleting a Shared Port....................................................................................285
Defining the Mode of the Shared Port..................................................................................285
Configuring the Link ID of the Shared Port...........................................................................285
Configuring the Shared Port Segment Timer.........................................................................285
Unconfiguring an EAPS Shared Port....................................................................................286
Displaying EAPS Shared-Port Status Information..................................................................286
EAPS Shared Port Configuration Rules ......................................................................................289
EAPS Shared Port Configuration Examples ................................................................................289
Basic Configuration ...........................................................................................................289
Basic Core Configuration....................................................................................................290
Right Angle Configuration ..................................................................................................290
Combined Basic Core and Right Angle Configuration ............................................................291
Large Core and Access Rings Configuration..........................................................................292
Advanced Configuration .....................................................................................................293
Chapter 16: Spanning Tree Protocol............................................................................................. 295
Overview of the Spanning Tree Protocol.....................................................................................295
Spanning Tree Domains...........................................................................................................295
Member VLANs .................................................................................................................296
STPD Modes.....................................................................................................................297
ExtremeWare XOS 11.1 Concepts Guide
10
Contents
Encapsulation Modes.........................................................................................................297
STP States .......................................................................................................................298
Binding Ports....................................................................................................................299
Rapid Root Failover ...........................................................................................................301
STP and Hitless Failover—BlackDiamond 10K Switch Only...................................................301
STP Configurations..................................................................................................................302
Basic STP Configuration ....................................................................................................302
Multiple STPDs on a Port...................................................................................................305
VLAN Spanning Multiple STPDs .........................................................................................305
EMISTP Deployment Constraints ........................................................................................306
Per VLAN Spanning Tree..........................................................................................................308
STPD VLAN Mapping.........................................................................................................308
Native VLAN .....................................................................................................................308
Rapid Spanning Tree Protocol ..................................................................................................308
RSTP Concepts .................................................................................................................309
RSTP Operation ................................................................................................................311
STP Rules and Restrictions ......................................................................................................318
Configuring STP on the Switch .................................................................................................319
STP Configuration Examples ....................................................................................................320
Basic 802.1D Configuration Example..................................................................................320
EMISTP Configuration Example ..........................................................................................321
RSTP 802.1w Configuration Example..................................................................................322
Displaying STP Settings...........................................................................................................323
Chapter 17: Extreme Standby Router Protocol ............................................................................... 325
Overview of ESRP ...................................................................................................................325
ESRP Modes of Operation ..................................................................................................325
ESRP and ELRP................................................................................................................326
Reasons to Use ESRP........................................................................................................326
ESRP Concepts.......................................................................................................................326
ESRP-Aware Switches .......................................................................................................328
Standard and Extended ESRP ............................................................................................329
ESRP Domains .................................................................................................................330
Linking ESRP Switches......................................................................................................331
ESRP and Hitless Failover—BlackDiamond 10K Switch Only ................................................331
Determining the ESRP Master ..................................................................................................332
Master Switch Behavior .....................................................................................................332
Pre-Master Switch Behavior................................................................................................333
Slave Switch Behavior .......................................................................................................333
Neutral Switch Behavior ....................................................................................................333
Electing the Master Switch.................................................................................................333
ESRP Failover Time...........................................................................................................334
ESRP Election Algorithms ..................................................................................................334
Configuring an ESRP Domain on a Switch .................................................................................336
Creating and Deleting an ESRP Domain...............................................................................336
Configuring the ESRP Domain ID........................................................................................337
Adding VLANs to an ESRP Domain .....................................................................................337
Enabling and Disabling an ESRP Domain ............................................................................338
ExtremeWare XOS 11.1 Concepts Guide
11
Contents
Advanced ESRP Features.........................................................................................................339
ESRP Tracking..................................................................................................................339
ESRP Port Restart.............................................................................................................342
ESRP Host Attach .............................................................................................................342
ESRP Port Weight and Don’t Count.....................................................................................343
ESRP Groups....................................................................................................................344
Displaying ESRP Information ...................................................................................................345
Using ELRP with ESRP............................................................................................................345
Using ELRP with ESRP to Recover Loops ............................................................................346
Configuring ELRP..............................................................................................................346
Displaying ELRP Information..............................................................................................347
ESRP Examples ......................................................................................................................348
Single Domain Using Layer 2 and Layer 3 Redundancy.........................................................348
Multiple Domains Using Layer 2 and Layer 3 Redundancy ....................................................351
ESRP Cautions .......................................................................................................................353
Configuring ESRP and IP Multinetting.................................................................................353
ESRP and STP..................................................................................................................353
ESRP and VRRP ...............................................................................................................353
ESRP Groups and Host Attach............................................................................................353
Port Configurations and ESRP ............................................................................................353
Chapter 18: Virtual Router Redundancy Protocol........................................................................... 355
Overview ................................................................................................................................355
Determining the VRRP Master ..................................................................................................355
VRRP Tracking..................................................................................................................356
Electing the Master Router.................................................................................................358
Additional VRRP Highlights......................................................................................................358
VRRP Operation ......................................................................................................................359
Simple VRRP Network Configuration ...................................................................................359
Fully Redundant VRRP Network..........................................................................................360
VRRP Configuration Parameters................................................................................................361
VRRP Examples ......................................................................................................................362
Configuring the Simple VRRP Network ................................................................................362
Configuring the Fully Redundant VRRP Network...................................................................363
VRRP Cautions .......................................................................................................................364
Assigning Multiple Virtual IP Addresses...............................................................................364
VRRP and ESRP ...............................................................................................................364
Chapter 19: IP Unicast Routing .................................................................................................... 365
Overview of IP Unicast Routing.................................................................................................365
Router Interfaces ..............................................................................................................365
Populating the Routing Table .............................................................................................366
Proxy ARP ..............................................................................................................................368
ARP-Incapable Devices......................................................................................................368
Proxy ARP Between Subnets ..............................................................................................369
Relative Route Priorities ..........................................................................................................369
Configuring IP Unicast Routing ................................................................................................370
Verifying the IP Unicast Routing Configuration...........................................................................370
Routing Configuration Example.................................................................................................370
ExtremeWare XOS 11.1 Concepts Guide
12
Contents
IP Multinetting .......................................................................................................................372
Multinetting Topology ........................................................................................................372
How Multinetting Affects Other Features .............................................................................373
Configuring IP Multinetting ................................................................................................377
IP Multinetting Examples...................................................................................................377
Configuring DHCP/BOOTP Relay...............................................................................................378
Configuring the DHCP Relay Agent Option (Option 82) .........................................................378
Verifying the DHCP/BOOTP Relay Configuration ...................................................................379
UDP Echo Server ..............................................................................................................380
Chapter 20: Interior Gateway Protocols ........................................................................................ 381
Overview ................................................................................................................................381
RIP Versus OSPF ..............................................................................................................382
Advantages of RIP and OSPF..............................................................................................382
Overview of RIP ......................................................................................................................382
Routing Table ...................................................................................................................382
Split Horizon ....................................................................................................................383
Poison Reverse .................................................................................................................383
Triggered Updates .............................................................................................................383
Route Advertisement of VLANs ...........................................................................................383
RIP Version 1 Versus RIP Version 2 ....................................................................................383
Overview of OSPF....................................................................................................................384
Licensing .........................................................................................................................384
OSPF Edge Mode ..............................................................................................................384
Link State Database ..........................................................................................................384
Areas ...............................................................................................................................386
Point-to-Point Support .......................................................................................................389
Route Redistribution ...............................................................................................................389
Configuring Route Redistribution ........................................................................................390
OSPF Timers and Authentication ........................................................................................391
RIP Configuration Example ......................................................................................................391
Configuring OSPF....................................................................................................................393
Configuring OSPF Wait Interval...........................................................................................393
OSPF Wait Interval Parameters ...........................................................................................393
OSPF Configuration Example....................................................................................................394
Configuration for ABR1......................................................................................................395
Configuration for IR1.........................................................................................................396
Displaying OSPF Settings.........................................................................................................396
Chapter 21: Exterior Gateway Routing Protocols............................................................................ 397
Licensing ...............................................................................................................................397
Overview ................................................................................................................................398
BGP Attributes........................................................................................................................398
BGP Communities...................................................................................................................398
BGP Features .........................................................................................................................399
Route Reflectors ...............................................................................................................399
Route Confederations ........................................................................................................401
Route Aggregation .............................................................................................................404
Using the Loopback Interface.............................................................................................404
BGP Peer Groups ..............................................................................................................404
ExtremeWare XOS 11.1 Concepts Guide
13
Contents
BGP Route Flap Dampening ...............................................................................................405
BGP Route Selection .........................................................................................................407
Stripping Out Private AS Numbers from Route Updates ........................................................407
Route Redistribution .........................................................................................................408
BGP Static Network...........................................................................................................408
Chapter 22: IP Multicast Routing.................................................................................................. 409
Overview ................................................................................................................................409
PIM Overview....................................................................................................................409
IGMP Overview .................................................................................................................411
Configuring IP Multicasting Routing..........................................................................................412
Configuration Examples ...........................................................................................................413
PIM-DM Configuration Example ..........................................................................................413
PIM-SM Configuration Example ..........................................................................................414
Part 3: Appendixes
Appendix A: Software Upgrade and Boot Options ........................................................................... 419
Downloading a New Image .......................................................................................................419
Installing a Modular Software Package ................................................................................420
Selecting a Primary or a Secondary Image ...........................................................................421
Understanding the Image Version String..............................................................................421
Software Signatures...........................................................................................................422
Rebooting the Switch ........................................................................................................422
Rebooting the Management Module ....................................................................................422
Understanding Hitless Upgrade—BlackDiamond 10K Switch Only ...............................................423
Performing a Hitless Upgrade .............................................................................................423
Hitless Upgrade Examples..................................................................................................425
Saving Configuration Changes ..................................................................................................426
Viewing a Configuration .....................................................................................................427
Returning to Factory Defaults .............................................................................................427
Using TFTP to Upload the Configuration....................................................................................427
Using TFTP to Download the Configuration ................................................................................428
Synchronizing MSMs ...............................................................................................................428
Automatic Synchronization of Configuration Files .................................................................429
Accessing the Bootloader .........................................................................................................429
Upgrading the BootROM—BlackDiamond 10K Switch Only.........................................................430
Upgrading the Firmware—Aspen 8810 Switch Only ...................................................................431
Appendix B: Troubleshooting ....................................................................................................... 433
LEDs......................................................................................................................................433
Using the Command Line Interface...........................................................................................434
Port Configuration .............................................................................................................436
VLANs..............................................................................................................................437
STP .................................................................................................................................438
ESRP...............................................................................................................................439
VRRP...............................................................................................................................439
ExtremeWare XOS 11.1 Concepts Guide
14
Contents
Using Standalone ELRP to Perform Loop Tests ..........................................................................440
About Standalone ELRP.....................................................................................................440
Configuring Standalone ELRP.............................................................................................441
Displaying Standalone ELRP Information.............................................................................442
Using the Rescue Software Image.............................................................................................442
Debug Mode ...........................................................................................................................443
Saving Debug Information to the External Memory Card ..............................................................444
Managing Files on the External Memory Card .......................................................................444
TOP Command........................................................................................................................446
TFTP Server Requirements.......................................................................................................446
System Health Check ..............................................................................................................446
Overview of the System Health Checker...............................................................................446
Enabling and Disabling Backplane Diagnostic Packets on the Switch .....................................447
Configuring Backplane Diagnostic Packets on the Switch ......................................................447
System Odometer....................................................................................................................448
Temperature Operating Range ..................................................................................................448
Corrupted BootROM on the Aspen 8810 Switch.........................................................................449
Inserting Powered Devices in the PoE Module—Aspen 8810 Switch Only.....................................449
Untagged Frames on the 10 Gbps Module—BlackDiamond 10K Switch Only................................449
Running MSM Diagnostics from the Bootloader—BlackDiamond 10K Switch Only ........................449
Contacting Extreme Technical Support......................................................................................450
Appendix C: Supported Protocols, MIBs, and Standards................................................................. 451
Glossary ..................................................................................................................................... 455
Index of Commands ..................................................................................................................... 475
Index .......................................................................................................................................... 481
ExtremeWare XOS 11.1 Concepts Guide
15
Contents
ExtremeWare XOS 11.1 Concepts Guide
16
Preface
This preface provides an overview of this guide, describes guide conventions, and lists other
publications that might be useful.
Introduction
This guide provides the required information to configure ExtremeWare® XOS software version 11.1
running on switches from Extreme Networks.
The guide is intended for use by network administrators who are responsible for installing and setting
up network equipment. It assumes a basic working knowledge of:
●
Local area networks (LANs)
●
Ethernet concepts
●
Ethernet switching and bridging concepts
●
Routing concepts
●
Internet Protocol (IP) concepts
●
Routing Information Protocol (RIP) and Open Shortest Path First (OSPF)
●
Border Gateway Protocol (BGP-4) concepts
●
IP Multicast concepts
●
Protocol Independent Multicast (PIM) concepts
●
Simple Network Management Protocol (SNMP)
NOTE
If the information in the release notes shipped with your switch differs from the information in this guide, follow the
release notes.
Terminology
When features, functionality, or operation is specific to a switch family, the family name is used.
Explanations about features and operations that are the same across all product families simply refer to
the product as the “switch.”
ExtremeWare XOS 11.1 Concepts Guide
17
Preface
Conventions
Tabl e 1 and Tab le 2 list conventions that are used throughout this guide.
Table 1: Notice icons
Icon Notice Type Alerts you to...
Note Important features or instructions.
Caution Risk of personal injury, system damage, or loss of data.
Warning Risk of severe personal injury.
Table 2: Text conventions
Convention Description
Screen displays This typeface indicates command syntax, or represents information as it appears on
the screen.
The words “enter”
and “type”
[Key] names Key names are written with brackets, such as [Return] or [Esc].
Words in italicized type Italics emphasize a point or denote new terms at the place where they are defined in
When you see the word “enter” in this guide, you must type something, and then
press the Return or Enter key. Do not press the Return or Enter key when an
instruction simply says “type.”
If you must press two or more keys simultaneously, the key names are linked with a
plus sign (+). Example:
Press [Ctrl]+[Alt]+[Del].
the text. (Italics are also used when referring to publication titles.)
Related Publications
The publications related to this one are:
●
ExtremeWare XOS release notes
●
ExtremeWare XOS 11.1 Command Reference Guide
●
Extreme Networks Consolidated XOS Hardware Installation Guide
Documentation for Extreme Networks products is available on the World Wide Web at the following
location:
http://www.extremenetworks.com/
ExtremeWare XOS 11.1 Concepts Guide
18
Using ExtremeWare XOS Publications Online
Related Publications
You can access ExtremeWare XOS publications by downloading them from the Extreme Networks
World Wide Web location or from your ExtremeWare product CD. Publications are provided in Adobe
Portable Document Format (PDF). Displaying or printing PDF files requires that your computer be
equipped with Adobe
®
Reader® software, which is available free of charge from Adobe Systems
Incorporated.
The user guide PDF file provides links that connect you directly to relevant command information in
the command reference guide PDF file. This quick-referencing capability enables you to easily find
detailed information in the command reference guide for any command mentioned in the user guide.
To ensure that the quick-referencing feature functions properly, follow these steps:
1 Download both the user guide PDF file and the command reference guide PDF file to the same
destination directory on your computer.
2 You may open one or both PDF files and to enable cross-referenced linking between the user guide
and command reference guide; however, it is recommended that for ease of use, you keep both files
open concurrently on your computer desktop.
NOTE
If you activate a cross-referencing link from the concepts guide PDF file to the command reference PDF file when
the command reference PDF file is closed (that is, not currently open on your computer desktop), the system will
close the user guide PDF file and open the command reference PDF file. To keep both PDF files open when you
activate a cross-reference link, open both PDF files before using the link.
®
ExtremeWare XOS 11.1 Concepts Guide
19
Preface
ExtremeWare XOS 11.1 Concepts Guide
20
1 Using ExtremeWare XOS
1 ExtremeWare XOS Overview
This chapter covers the following topics:
●
Platforms and Required Software Versions on page 23
●
Summary of Features on page 23
●
Software Licensing on page 27
●
Software Factory Defaults on page 29
This chapter provides an overview of the ExtremeWare XOS version 11.1 software.
Platforms and Required Software Versions
ExtremeWare® XOS is the full-featured software operating system that is designed to run on the
Extreme Networks
®
devices.
ExtremeWare XOS supports the following platforms:
●
BlackDiamond® 10800 family of switches—ExtremeWare XOS 10.1 and higher
●
Aspen 8810 switch—ExtremeWare XOS 11.1 and higher
Summary of Features
The features of ExtremeWare XOS include:
●
Virtual local area networks (VLANs) including support for IEEE 802.1Q and IEEE 802.1p
●
Spanning Tree Protocol (STP) (IEEE 802.1D) with multiple STP domains
●
Policy-Based Quality of Service (PB-QoS)
●
Wire-speed Internet Protocol (IP) routing
●
IP multinetting
●
DHCP/BOOTP Relay
●
Extreme Standby Router Protocol (ESRP)
●
Ethernet Automatic Protection Switching (EAPS)
●
Extreme Loop Recovery Protocol (ELRP)
●
Virtual Router Redundancy Protocol (VRRP)
●
Routing Information Protocol (RIP) version 1 and RIP version 2
●
Open Shortest Path First (OSPF) routing protocol
●
Border Gateway Protocol (BGP) version 4
●
Wire-speed IP multicast routing support
●
DiffServ support
ExtremeWare XOS 11.1 Concepts Guide
23
ExtremeWare XOS Overview
●
Access-policy support for routing protocols
●
Access list support for packet filtering
●
IGMP snooping to control IP multicast traffic
●
Protocol Independent Multicast-Dense Mode (PIM-DM)
●
Protocol Independent Multicast-Sparse Mode (PIM-SM)
●
Load sharing on multiple ports, across all blades
●
RADIUS client and per command authentication support
●
TACACS+ support
●
Console command line interface (CLI) connection
●
Telnet CLI connection
●
Secure Shell (SSH2) connection
●
Simple Network Management Protocol (SNMP) support
●
Remote Monitoring (RMON)
●
Traffic mirrorin g
●
Network Login support
●
CLEARFlow
NOTE
For more information on Extreme Networks switch components, see the Extreme Networks Consolidated XOS
Hardware Installation Guide.
Feature Highlights of ExtremeWare XOS 11.1
Virtual Routers
NOTE
Although the Aspen 8810 switch supports the three system virtual routers (VR-Default, VR-Mgmt, VR-Control), the
BlackDiamond 10K switch additionally supports user-created virtual routers.
ExtremeWare XOS supports virtual routers. This capability allows a single physical switch to be split
into multiple virtual routers. This feature separates the traffic forwarded by a virtual router from the
traffic on a different virtual router. Each virtual router maintains a separate logical forwarding table,
which allows the virtual routers to have overlapping address spaces. Because each virtual router
maintains its own separate routing information and switch ports can belong to one and only one virtual
router, packets arriving at a port on one virtual router can never be switched to the ports on another. In
this release of ExtremeWare XOS, the management port belongs to one virtual router and all other ports
belong to other virtual routers.
With multiple virtual routers contained on a single physical switch, some commands in
ExtremeWare XOS now require you to specify to which virtual router the command applies. For
example, when you use the
ping
packets are generated. Many commands that deal with switch management use the management virtual
ExtremeWare XOS 11.1 Concepts Guide
command, you must specify from which virtual router the ping
24
Summary of Features
router by default. See the ExtremeWare XOS Command Reference Guide for information on the defaults for
individual commands.
NOTE
The term “virtual router” is also used with VRRP. VRRP uses the term to refer to a single virtual router that spans
more than one physical router and allows multiple switches to provide redundant routing services to users. For more
information about VRRP, see Chapter 18.
For more information on virtual routers, see Chapter 9
Software Modules
With software version 11.0, ExtremeWare XOS introduces the ability for the user to download a discrete
software module that contains complete functionality for a specified feature. The user no longer must
download the entire image in order to obtain these specific modules. Secure Shell (SSH) is the software
module available with version 11.0.
SSH
To access the switch using the Secure Shell (SSH), you must download, install, and enable the SSH
software module. Once installed, you use the SSH to access the switch. You obtain the SSH software
module through your Extreme Networks support account on the website, once you provide the
required information.
For more information on SSH, see Chapter 13.
EAPS
With software version 11.0, the switch supports Ethernet Automatic Protection Switching (EAPS). This
Extreme Networks proprietary protocol provides fast protection switching to Layer 2 devices connected
in a ring topology, such as large campuses. EAPS provides protection to switching similar to STP, but
the convergence is much faster using EAPS. This fast convergence occurs regardless of the number of
switches in the ring.
ExtremeWare XOS software version 11.1 introduces support for multiple EAPS rings. To use this feature,
you must have Core license. (Refer to “Software Licensing” for more information on the Core license.)
For more information on EAPS, see Chapter 15.
Quality of Service
ExtremeWare XOS has Policy-Based Quality of Service (QoS) features that enable you to specify service
levels for different traffic groups. By default, all traffic is assigned the low QoS policy profile. If needed,
you can customize other QoS policies and apply these policies to different traffic types so that the traffic
types have different guaranteed priority.
With software version 11.0 on the BlackDiamond 10K switch, you can set parameters for ingress traffic,
called bi-directional rate shaping; the Aspen 8810 switch does not support bi-directional rate-shaping.
For more information on Quality of Service, see Chapter 12.
ExtremeWare XOS 11.1 Concepts Guide
25
ExtremeWare XOS Overview
sFlow
sFlow® is a technology for monitoring traffic in data networks containing switches and routers. The
technology relies on statistical sampling of packets from high-speed networks, plus periodic gathering
of the statistics. A UDP datagram format is defined to send the information to an external entity for
analysis. sFlow consists of a Management Information Base (MIB) and a specification of the packet
format for forwarding information to a remote agent. Details of sFlow specifications can be found in
RFC 3176, and specifications and more information can be found at the following website:
http://www.sflow.org
The ExtremeWare XOS implementation is based on sFlow version 5, an improvement from that
specified in RFC3176.
For information on sFlow, see Chapter 7.
ESRP
With software version 11.0, you can use the Extreme Standby Routing Protocol (ESRP). ESRP is an
Extreme Networks proprietary protocol that allows multiple switches to provide redundant routing
services to users. ESRP also provides Layer 2 redundancy; the Layer 3 and Layer 2 redundancy can be
used separately or together.
Using ESRP allows you to simplify your network, and it works very well in meshed networks where
Layer 2 loop protection and Layer 3 redundancy are both required.
For more information on ESRP, see Chapter 17.
IP Multinetting
Software version 11.0 of ExtremeWare XOS introduces IP multinetting, which allows you to overlap
multiple subnets onto the same physical segment. IP multinetting is designed for use in legacy
networks, as a transitional tactic.
For more information on IP multinetting, see Chapter 19.
RMON
With software version 11.1, ExtremeWare XOS introduces Remote Monitoring (RMON), which supports
RFC 1757 and RFC 2021. RMON provides a method of monitoring the network by collecting Ethernet
port statistics and to set systemwide alarm variables.
For more information on RMON, see Chapter 7.
ELRP
ExtremeWare XOS 11.1 introduces support for the Extreme Loop Recovery Protocol (ELRP) ELRP allows
you to prevent, detect, and recover from Layer 2 loops in the network. Once a loop is detected through
ELRP, different recovery actions can be taken such as blocking certain ports to prevent looping or
logging a message to the system log. The action taken is largely dependent on the protocol using ELRP
to detect loops in the network.
ExtremeWare XOS 11.1 Concepts Guide
26
Software Licensing
For more information on using standalone ELRP, see Appendix B . For more information on using ELRP
in conjunction with ESRP, see Chapter 17.
Network Login
Network Login is a method of authenticating users as hosts are added to a network. As a new host is
added to the network, its port connection is in an unauthenticated state, denying any access to the
network. During authentication, the user supplies a password to the switch using the host. If
authenticated, the port connection is authenticated, and traffic flows to and from the host and the
network.
CLEARFlow
CLEARFlow is a broad framework for implementing security, monitoring, and anomaly detection in
ExtremeWare XOS software. Instead of simply looking at the source and destination of traffic,
CLEARFlow allows you to specify certain types of traffic that require more attention. Once certain
criteria for this traffic are met, the switch can either take an immediate, predetermined action; or it can
send a copy of the traffic to another device for analysis.
Software Licensing
Some Extreme Networks products have capabilities that are enabled by using a software key. Keys are
typically unique to the switch and are not transferable. Keys are stored in NVRAM and, once enabled,
persist through reboots, software upgrades, power outages, and reconfigurations.
Two level of software licensing apply to ExtremeWare XOS 11.1: the Core and the Advanced Core
license. Additionally, the U.S. government requires a security licensing to enable certain features.
Upgrading to Core License—Aspen 8810 Switch Only
The Aspen 8810 switch ships with the Advanced Edge license. With ExtremeWare XOS 11.1 on the
Aspen 8810 switch, you can obtain a Core license. The Core license provides additional functionality for
some features.
The license belongs with the switch chassis, not with the particular MSM module.
You can obtain a regular license; you cannot downgrade licenses. The key contains all the necessary
information on the license level.
NOTE
Refer to the specific chapter of the ExtremeWare XOS Concepts Guide to determine if the Core license is required
for some functionality. If not noted, all functionality is available, and license is not required.
If you attempt to execute a command and you do not either have the required license or have reached
the limits defined by the current license level, the system returns one of the following messages:
Error: This command cannot be executed at the current license level.
ExtremeWare XOS 11.1 Concepts Guide
27
ExtremeWare XOS Overview
Error: You have reached the maximum limit for this feature at this license level.
NOTE
The Core license is the only license available on the Aspen 8810 switch; you cannot obtain an Advanced Core
license for this platform.
Obtaining a License Voucher
You can order the desired functionality from the factory, using the appropriate model of the desired
product. If you order licensing from the factory, the license arrives in a separate package from the
switch. After the license key is installed, it should not be necessary to enter the information again.
However, Extreme Networks recommends keeping the certificate for your records.
You can obtain a regular license; you cannot downgrade licenses. The software key contains all the
necessary information on the license level.
You can upgrade the license of an existing product by purchasing a license voucher from Extreme
Networks. Please contact your supplier to purchase a voucher.
The voucher contains information and instructions on obtaining a license key for the switch using the
Extreme Networks Support website at:
http://www.extremenetworks.com/support/techsupport.asp
or by phoning Extreme Networks Technical Support at:
●
(800) 998-2408
●
(408) 579-2826
Enabling and Verifying Licenses
To enable the license, use the following command:
enable license <key>
To verify the current license level, use the following command:
show licenses
Advanced Core License—BlackDiamond 10K Switch Only
The MSM 1 ships with a Core license. The Advanced Core license is hard-coded into the MSM 1XL
module on the BlackDiamond 10K switch. The only way you obtain an Advanced Core license is to
purchase and MSM 1XL; you cannot obtain an Advanced Core license without an MSM 1XL. (Similarly,
you cannot purchase an MSM 1XL without an Advanced Core license; it is hard-coded onto the module
itself.)
You do not need any other licenses to run all features completely on the BlackDiamond 10K switch.
ExtremeWare XOS 11.1 Concepts Guide
28
Software Factory Defaults
Security Licensing
Certain additional ExtremeWare XOS features, such as the use of SSH2 encryption, may be under
United States export restriction control. Extreme Networks ships these security features in a disabled
state. You can obtain information on enabling these features at no charge from Extreme Networks.
Obtaining a Security License
To obtain information on enabling features that require export restriction, access the Extreme Networks
Support website at:
http://www.extremenetworks.com/go/security.htm
Fill out a contact form to indicate compliance or noncompliance with the export restrictions. If you are
in compliance, you will be given information that will allow you to enable security features. You need
the following capabilities to ensure the process works:
●
Email address
●
Ability to use a Web browser to download a file
●
WinZip format to uncompress a .zip file
Security Features Under License Control
ExtremeWare XOS software supports the SSH2 protocol, which allows the encryption of sessions
between an SSH2 client and an Extreme Networks switch, as well as the Secure Copy Protocol (SCP).
The encryption methods used are under export restriction control.
Software Factory Defaults
Tabl e 3 shows factory defaults for global ExtremeWare XOS software version 11.1 features.
Table 3: ExtremeWare XOS version 11.1 global factory defaults
Item Default Setting
Serial or Telnet user account admin with no password and user with no password
Telnet Enabled
Port status Enabled
SSH2 Disabled (You must install a separate software module to run SSH.)
SNMP access Enabled
SNMP read community string public
SNMP write community string private
BOOTP/BOOTP Relay/BOOTP Client Disabled
Jumbo frames Disabled; once enabled, the default size is 9216.
EAPS Disabled
EDP Enabled
Port mirroring Disabled
Load sharing Disabled
ExtremeWare XOS 11.1 Concepts Guide
29
ExtremeWare XOS Overview
Table 3: ExtremeWare XOS version 11.1 global factory defaults (Continued)
Item Default Setting
ESRP Disabled
QoS All traffic is part of the default queue (QP1).
QoS—802.1p replacement Disabled
QoS—DiffServ examination Disabled
Autonegotiation • 10 G modules—autonegotiation OFF, speed 10000 Mbps, full-
duplex
• 1 G modules—autonegotiation ON
802.3x flow control • 10 G modules—ON
• 1 G fiber and copper—ON
Virtual LANs Two VLANs are predefined; the VLAN named default contains all
802.1Q tagging All packets are untagged on the default VLAN (default).
Spanning Tree Protocol Disabled for the switch; enabled for each port in the STPD.
STPD port encapsulation mode • default STPD—802.1D mode
Forwarding database aging period 300 seconds (5 minutes)
IP Routing Disabled
Smart Redundancy Enabled
System health check Enabled
RADIUS authentication port value 1812
RADIUS accounting port value 1813
OSPF link type Auto
VRRP priority 100
IGMP Enabled
IGMP snooping Enabled
PoE power to port Enabled
PoE power per slot 50 W
PoE port priority Low
ELRP Disabled
Net Login Disabled
ports and belongs to the Spanning Tree Protocol Domain (STPD)
named s0. The VLAN mgmt exists only on switches that have an
Ethernet management port and contains only that port. The switch
uses the Ethernet management port for host operation only, not for
switching or routing.
• user-created STPD—Extreme Multiple Instance Spanning Tree
Protocol (EMISTP)
NOTE
For default settings of individual ExtremeWare XOS features, see individual chapters in this guide.
ExtremeWare XOS 11.1 Concepts Guide
30