All rights reserved. August 2000.
The information in this document is subjectto change without notice. The statements, configurations, technical
data, and recommendations in this document are believed to be accurate and reliable, but are presentedwithout
expressor implied warranty. Users must take full responsibility for their applications of any products specified in
this document. The information in this document is proprietary to Nortel Networks NA Inc.
The software described in this document is furnished under a license agreement and m ay be used only in
accordance with the terms of that license. The software licenseagreement is included in this document.
Trademarks
NORTEL NETWORKS is a trademark of Nortel Networks.
Microsoft, MS, MS-DOS, Windows, and WindowsNT are registered trademarksof Microsoft Corporation.
All other trademarks and registered trademarks are the property of their respective owners.
Restricted rights legend
Use, duplication, or disclosure by the UnitedStates Government is subject to restrictions as set forth in
subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013.
Notwithstanding any other license agreement that may pertain to, or accompany the delivery of, this computer
software, the rights of the United States Government regardingits use, reproduction, and disclosure are as set forth
in the Commercial Computer Software-Restricted Rights clause at FAR 52.227-19.
Statement of conditions
In the interest of improving internaldesign,operational f unction, and/or reliability, Nortel Networks NA Inc.
reserves the right to make changes to the products described in this document without notice.
Nortel Networks NA Inc. does not assume any liability that may occur due to the use or application of the
product(s) or circuit layout(s) describedherein.
SUCH PORTIONS OF THE SOFTWARE ARE PROVIDED “AS IS” AND WITHOUT ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, W ITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
In addition, the program and information contained herein are licensed only pursuant to a license agreement that
containsrestrictions on use and disclosure (that may incorporate by reference certain limitations and notices
imposed by third parties).
209321-A
Nortel Networks NA Inc. software license agreement
NOTICE: Please carefully read this license agreement before copying or using the accompanying softwareor
installing the hardware unit with pre-enabled software(each of which is referredto as “Software” in this
Agreement). BY COPYING OR USING THE SOFTWARE, YOU ACCEPT ALL OF THE TERMS AND
CONDITIONS OF THIS LICENSE AGREEMENT. THE TERMS EXPRESSED IN THIS AGREEMENT ARE
THE ONLY TERMS UNDER WHICH NORTEL NETWORKS WILL PERMIT YOU TO USE THE
SOFTWARE. If you do not accept these terms and conditions, return the product, unused and in the original
shippingcontainer, within 30 days of purchase to obtain a credit for the full purchase price.
1. License grant. Nortel Networks NA Inc. (“NortelNetworks”) grants the end user of the Software (“Licensee”) a
personal, nonexclusive,nontransferablelicense: a) to use the Software eitheron a singlecomputeror, if applicable,
on a single authorized device identified by hostID, for which it was originally acquired; b) to copy the Software
solely for backup purposes in support of authorized use of the Software; and c) to use and copy the associated user
manualsolely in supportof authorized use of the Softwareby Licensee. This license applies to the Software only
and does not extend to Nortel Networks Agent software or other Nortel Networks software products. Nortel
NetworksAgent software or other Nortel Networks software products are licensed for use under the terms of the
applicable Nortel Networks NA Inc. Software License Agreement that accompanies such software and upon
paymentby the end user of the applicable license fees for such software.
2. Restrictions on use; reservationof rights.The Software and user manuals are protected under copyright laws.
NortelNetworks and/orits licensors retain all title and ownership in both the Software and user manuals,including
any revisionsmade byNortelNetworks or its licensors. The copyright notice must be reproduced and includedwith
any copy of any portion of the Software or user manuals. Licensee may not modify, translate, decompile,
disassemble, use for any competitiveanalysis,reverseengineer, distribute, or create derivative works from the
Software or user manuals or any copy, in whole or in part. Except as expressly provided in this Agreement,
Licensee maynot copy or transfer the Softwareor user manuals,in whole or in part. The Softwareand usermanuals
embody Nortel Networks’ and its licensors’confidential and proprietary intellectual property. Licensee shall not
sublicense, assign, or otherwisedisclose to any third party the Software, or any information about the operation,
design,performance, or implementation of the Software and user manuals that is confidential to Nortel Networks
and its licensors; however, Licensee may grant permission to its consultants, subcontractors, and agents to use the
Software at Licensee’sfacility, providedthey have agreed to use the Software only in accordance with the terms of
this license.
3. Limited warranty. Nortel Networks warrants each item of Software, as delivered by Nortel Networks and
properly installed and operated on Nortel Networks hardware or other equipment it is originally licensedfor,to
functionsubstantially as described in itsaccompanying user manual during its warranty period,which beginsonthe
date Softwareis first shipped to Licensee. If any item of Software fails to so function during its warranty period,as
the sole remedyNortel Networks will at its discretion provide a suitable fix, patch, or workaround for the problem
that may be included in a future Software release. Nortel Networks further warrants to Licensee that the media on
which the Software is provided will be free from defects in materials and workmanship under normal use for a
periodof 90 days from the date Software is first shipped to Licensee. Nortel Networks will replace defective media
at no charge if it is returnedto NortelNetworksduring the warranty periodalongwithproofof the date of shipment.
This warrantydoes not apply if the media has been damaged as a result of accident,misuse, or abuse. The Licensee
assumesall responsibility for selection of the Software to achieve Licensee’s intended results and for the
installation, use, and results obtained from the Software. Nortel Networks does not warrant a) that the functions
contained in the software will meet the Licensee’s requirements, b) that the Software will operate in the hardware or
software combinations that the Licensee may select, c) that the operation of the Software will be uninterrupted or
error free, or d) that all defects in the operation of the Software will be corrected. Nortel Networks is not obligated
to remedy any Software defect that cannot be reproduced with the latest Software release. These warranties do not
apply to the Softwareif it has been (i) altered, except by NortelNetworksor in accordance with its instructions;(ii)
used in conjunction w ith another vendor’sproduct, resulting in the defect; or (iii) damaged by improper
environment, abuse, misuse, accident, or negligence. THE FOREGOING WARRANTIES AND LIMITATIONS
ARE EXCLUSIVE REMEDIES AND ARE IN LI EU OF ALL OTHER WARRANTIES EXPRESS OR IMPLIED,
3
Getting Started with the Business Policy Switch 2000 Management Software
4
INCLUDING WITHOUT LIMITATION ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A
PARTICULAR PURPOSE. Licensee is responsible for the security of its own data and information and for
maintaining adequate procedures apart from the Software to reconstruct lost or altered files, data, or programs.
4.Limitationof liability. IN NO EVENT WILL NORTEL NETWORKS OR ITS LICENSORS BE LIABLE FOR
ANY COST OF SUBSTITUTE PROCUREMENT; SPECIAL, INDIRECT, I NCIDENTAL, OR
CONSEQUENTIAL DAM AGES; OR ANY DAMAGES RESULTING FROM INACCURATE OR LOST DATA
OR LOSS OF USE OR PROFITS ARISING OUT OF OR IN CONNECTION WITH THE PERFORMANCE OF
THE SOFTWARE, EVEN IF NO RTEL NETWORKS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES. IN NO EVENT SHALL THE LIABILITY OF NORTEL NETWORKS RELATING TO THE
SOFTWARE OR THIS AGREEMENT EXCEED THE PRICE PAID TO NORTEL NETW ORKS FOR THE
SOFTWARE LICENSE.
5. Government licensees. This provision applies to all Software and documentation acquireddirectly or indirectly
by or on behalf of the United States Government. The Software and documentation are commercialproducts,
licensedon the open marketat market prices,and were developed entirelyat private expense and without the use of
any U.S. Government funds. The license to the U.S. Government is granted only with restricted rights, and use,
duplication, or disclosure by the U.S. Government is subject to the restrictions set forth in subparagraph(c)(1) of
the Commercial Computer Software––Restricted Rights clause of FAR 52.227-19 and the limitations set out in this
licensefor civilian agencies, and subparagraph (c)(1)(ii)of the Rights in Technical Data and Computer Software
clause of DFARS 252.227-7013,for agencies of the Department of Defense or their successors,whicheveris
applicable.
6. Use of software i n the European Community. This provision appliesto all Softwareacquiredfor use within the
European Community. If Licensee uses the Software within a country in the European Community, the Software
Directive enacted by the Council of European Communities Directive dated 14 May, 1991, will apply to the
examination of the Software to facilitate interoperability. Licensee agrees to notify Nortel Networks of any such
intended examinationof the Software and may procure support and assistancefrom Nortel Networks.
7. Termand termination. This license is effective until terminated; however, all of the restrictions with respect to
Nortel Networks’copyright in the Software and user manuals will cease being effective at the date of expirationof
the Nortel Networks copyright; those restrictions relatingto use and disclosure of Nortel Networks’ confidential
information shall continue in effect. Licensee may terminate this license at any time. The license will automatically
terminate if Licensee fails to comply with any of the terms and conditions of the license. Upon termination for any
reason,Licensee will immediately destroy or return to Nortel Networks the Software,user manuals, and all copies.
Nortel Networks is not liable to Licensee for damagesin any form solely by reason of the terminationof this
license.
8. Export and re-export.Licensee agrees not to export,directly or indirectly, the Software or related technicaldata
or information without first obtaining any required export licenses or other governmental approvals. Without
limiting the foregoing, Licensee, on behalf of itself and its subsidiaries and affiliates, agrees that it will not, without
firstobtainingall export licenses and approvals required by the U.S. Government: (i) export, re-export, transfer, or
divertany such Softwareor technical data, or any direct product thereof, to any country to which such exports or
re-exports are restrictedor embargoedunder United States exportcontrol lawsand regulations, or to any nationalor
resident of such restricted or embargoed countries; or (ii) provide the Software or relatedtechnical data or
information to any military end user or for any military end use, including the design, development, or production
of any chemical, nuclear, or biological weapons.
209321-A
9. General. If any provision of this Agreement is held to be invalid or unenforceable by a court of competent
jurisdiction,the remainderof the provisionsof this Agreementshallremain in full forceand effect. This Agreement
will be governed by the laws of the state of California.
Should you have any questions concerningthis Agreement,contact Nortel Networks, 4401 Great America
Parkway, P.O. Box 58185, Santa Clara, California 95054-8185.
LICENSEE ACKNOWLEDGES THATLICENSEE HAS READ THIS AGREEMENT, UNDERSTANDS IT,
AND AGREES TO BE BOUND BY ITS TERMS AND CONDITIONS. LICENSEE FURTHER AGREES THAT
THIS AGREEMENT IS THE ENTIRE AND EXCLUSI VE AGREEMENT BETWEEN NORTEL NETWORKS
AND LI CENSEE, WHICH SUPERSEDES ALL PRIOR ORAL AND WRITTEN AGREEMENTS AND
COMMUNICATIONS BETWEEN THE PARTIES PERTAINING TO THE SUBJECT MATTER OF THIS
AGREEMENT. NO DIFFERENT OR ADDITIONAL TERMS WILL BE ENFORCEABLE AGAINST NORTEL
NETWORKS UNLESS NORTEL NETWORKS GIVES ITS EXPRESS WRITTEN CONSENT, INCLUDING AN
EXPRESS WAIVER OF THE TERMS OF THIS AGREEMENT.
5
Getting Started with the Business Policy Switch 2000 Management Software
Getting Started with the Business Policy Switch 2000 Management Software
12 Tables
209321-A
Preface
13
Business Policy Switch 2000 management software provides the m eans to
configure and monitor the operation of your Business Policy Switches.
Management software includes the console interface resident in each Business
Policy Switch; Java-based Device Manager software, which you install on a
management station in the network; and a Web-based management interface
accessible through a Web browser.
This guide provides instructions for installing the Device Manager software and
summarizes procedures for using Device Manager and the Web interface. For
information a bout using the console interface, refer to Using the Business Policy
Switch 2000.
This guide includes the following information:
•A summary of management options for the switch
•Instructions to install Device Manager software
•A summary of navigation procedures for D evice Manager and initial setup
procedures using Device Manager
•An overview of the Web management interface
•Common startup problems and how to troubleshoot them
Before you begin
This guide is intended for network administrators with the following background:
•Basic knowledge of networks, Ethernet bridging, and IP and IPX routing
•Familiarity with networking concepts and terminology
•Basic knowledge of network topologies
•Experience with windowing systems, graphical user interfaces (GU Is), or
Web browsers
Getting Started with the Business Policy Switch 2000 Management Software
14 Preface
Text conventions
This guide uses the following text conventions:
angle brackets (< >)Indicate that you choose the text to enter based on the
description inside the brackets. Do not type the
brackets when entering the command.
Example: If the command syntax is
ping
<ip_address>
ping 192.32.10.12
, you enter
bold Courier text
Indicates command names and options and text that
you need to enter.
Example: Enter
# chmod 755 ./install_dmvm.
italic textIndicates new terms, book titles, and variables in
command syntax descriptions. Where a variable is two
or more words, the words are connected by an
underscore.
Example: If the command syntax is
install_dmvm <
target_directory>,target_directory
<
filename
>
variable and you substitute one value for it.
plain Courier
text
Indicates command syntax and system output, for
example, prompts and system messages.
Example:
% JDM
separator ( > )Shows menu paths.
Example: Edit > File System identifies the File System
option on the Edit menu.
is one
209321-A
Related publications
For more information about using the Business Policy Switch, r efer to the
following publications:
•Using the Business Policy Sw itch 2000 (part number 208700-A)
Describes how to install and use the Business P olicy Switch 2000; includes
instructions to use the console interface to configure the switch.
•Business Policy Switch 2000 Installation Instructions (part number
209319-A)
Provides installation instructions for the switch in English and five other
languages.
•Installing Media De pendent Adapters (MDAs) (part number 302403-D)
Provides installation instructions for media dependent adapters in the
Business Policy Switch; includes descriptions of the available MDAs.
•Reference for the Business Policy Switch 2000 Management SoftwareOperations (part number 209322-A)
Preface 15
Describes how to use Device Manager software to manage the switch.
•Installation and Reference for the 100 Watt DC -DC Converter Module (part
number 209132-A)
Describes how to install and connect the BayStack DC-DC Converter.
•Installing the BayStack 400-ST1 Cascade Module (part number 304433-B)
Describes how to install cascade modules in the switch and connect up to
eight such switches into a stack configuration.
•Using Web-Based Management for the Business Policy Switch 2000 (part
number 209570-A)
Describes how to use the Web-based management interface to configure and
monitor switch operations.
Getting Start ed with the Business Policy Switch 2000 Management Software
16 Preface
You can print selected technical m anuals and release notes free, directly from the
Internet. Go to the support.baynetworks.com/library/tpubs/URL. Find the product
for which you need documentation. Then locate the specific c ategory a nd model
or version for your hardware or software product. Use Adobe Acrobat Reader to
open the manuals and release notes, search for the sections you need, and print
them on most standard printers. Go to Adobe Systems at www.adobe.com to
download a free copy of Acrobat Reader.
You can purchase selected doc umentation sets, CDs, and technical publications
though the Internet at the www1.fatbrain.com/documentation/nortel/ URL.
Howtogethelp
If you purchased a service contract for your Nortel Networks product from a
distributor or authorized reseller, contact the technical support staff for that
distributor or reseller for assistance.
If you purchased a NortelNetworks service program, contact one of the following
Nortel Networks Technical S olutions Centers:
209321-A
Technical Solutions CenterTelephone
EMEA(33) (4) 92-966-968
North America(800) 2LANWAN or (800) 252-6926
Asia Pacific(61) (2) 9927-8800
China(800) 810-5000
An Express Routing Code (ERC) is available for many Nortel Ne tworks products
and services. When you use an ERC, your call is routed to a technical support
person who specializes in supporting that product or service. To locate a n ERC for
your product or service, go to the www12.nortelnetworks.com/ URL and c lick
ERC at the bottom of the page.
Chapter 1
Management basics
This chapter summarizes basic operational procedures in a Business Policy
Switch and provides an overview of switch management options. Topics in this
chapter include the following information:
•Overview of management tools (next)
•Setting IP parameters for management access to the switch ( page 18)
•Access levels and passwords (page 20)
Management tools
You can use three management tools to monitor a nd manage your Business Policy
Switch:
•Device Manager software (next)
•Web m anagement interface (page 18)
•Console port interface (Refer to Using the Business Policy Switch 2000.)
17
Device Manager
The Java-based Device Manager for the Business P olicy Switches is a graphical
user interface (GUI) that allows you to manage a standalone switch or a single
switch stack. Device Manager provides the options found in other m anagement
tools, as well as the ability to manage VLANs and MultiLink Trunks. You can
display or print statistics and other data in one of three graph formats. To use
Device Manager, you must have network connectivity to a management station
running Device Manager on one of the supported platforms. You must also assign
an IP address to the switch, as described in “Setting the switch IP parameters” on
page 18.”
Getting Started with the Business Policy Switch 2000 Management Software
18 Chapter 1 Management bas ics
Web management interface
The Business Policy Switch Web management interface is a Web-based graphical
user interface that you use with a Web browser to manage a standalone switch or
switch stack. You can access devices on your network from various locations
within the network.
To access the Web interface, you need a Web browser and an IP a ddress for the
switch or switch stack. Toassign the IP a ddress to the switch, refer to “Settingthe
switch IP parameters” next.
Setting the switch IP parameters
To allow management access to the switch, you must assign I P parameters for the
switch.
To set the IP parameters:
1Connect a terminal to the Console port on the switch.
209321-A
2Set the terminal protocol as follows:
•9600 baud
•No parity
•8 bits
•1 stop bit
•Flow control set to Xon/Xoff
•Window Terminal Emulator option set to no
•Terminal Preferences: Function, Arrow, and Control keys active
•Buffer size set to 24
3Connect the switch to power.
4After the Nortel Networks logo is displayed, press [Ctrl]-Y to display the
Main Menu (Figure 1).
At first the screen displays the Main Menu for a standalone switch. The n, if
the switch is part of a stack configuration, the screen is refreshed within 20
secondsto show the Main Menu f or a stack configuration. The Main Menu for
a stack configuration includes stack features (bold text in Figure 1).
Chapter 1 Management basics 19
Figure 1 Main menu
Business Policy Switch Main Menu
I
P Configuration/Setup...
P Configuration...
SNM
S
ystem Characteristics...
Sw
itch Configuration...
nsole/Comm Port Configuration...
Co
Identify U
Ren
Display H
Sp
anning Tree Configuration...
T
ELNET Configuration...
Sof
Config
Display E
R
eset
Reset to D
ogout
L
Use arrow keys to highlight option, press <Return> or <Enter> to
select option. Press Ctrl-R to return to previous menu. Press Ctrl-C
to return to Main Menu.
nit Numbers...
umber Stack Units...
ardware Units...
tware Download...
uration File...
vent Log
efault Settings
5Select IP Configuration/Setup (or press i) to display the I P
Configuration/Setup m enu (Figure 2).
Note: The default management VLAN in the B usiness Policy Switch is
VLAN 1. To manage the switch, m ake sure the network management
station is on the managementVLAN or is connected to the management
VLAN through routers.
Figure 2 IP Configuration/Set up menu
IP Configuration/Setup
BootP Request Mode: [ BootP Disabled ]
ConfigurableIn UseLast Boot
In-Band Stack IP Address: [xx.xx.xx.xxx]xx.xx.xx.xxx0.0.0.0
In-Band Switch IP Address: [xx.xx.xx.xxx]0.0.0.0
In-Band Subnet Mask:[255.255.255.0]255.255.255.00.0.0.0
Default Gateway:0.0.0.00.0.0.00.0.0.0
Use space bar to display choices, press <Return> or <Enter> to select
choice. Press Ctrl-R to return to previous menu. Press Ctrl-C to
return to Main Menu.
------------------------------------------------
Getting Start ed with the Business Policy Switch 2000 Management Software
20 Chapter 1 Management bas ics
6Do one of the following,based on your configuration:
•For a standalone switch, e nter the IP address of the switch in the In-Band
Switch IP Address field.
Note: If the In-Band Subnet Mask field does not already contain a value
when you e nter the IP address in the In-Band Switch IP Address field,
the switch software provides an in-use default value for the In-Band
Subnet Mask field, based on the class of the entered IP address.
•For a stack configuration, enter the Stack IP address in the In-Band Stack
IP Address field.
Note: The In-Band Switch IP Address fieldallows this switch to operate
as a standaloneswitch. However, this field is not required for the
operation of the stack. You c annot enter the same IP address in both
fields.
7In the In-Band Subnet Mask field, enter the IP subnet mask address.
8In the Default Gateway field, enter the default gateway address.
Access levels and passwords
Access to m anagement f unctions for Business P olicy Switches is controlled by
passwords and community strings. Different passwords or community strings
allow access to different levels of m anagement functions.
Access to Device Manager requires entering community strings. Access to the
Web interface requires a user identification and a password.
209321-A
Loading...
+ 46 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.