Part No. 209570-B September 2001 4401 Great America Parkway Santa Clara, CA 95054 Using Web-based Management for the Business Policy Switch 2000 Software Version 1.
Copyright © 2001 Nortel Networks All rights reserved. September 2001. The information in this document is subject to change without notice. The statements, configurations, technical data, and recommendations in this document are believed to be accurate and reliable, but are presented without express or implied warranty. Users must take full responsibility for their applications of any products specified in this document. The information in this document is proprietary to Nortel Networks NA Inc.
Nortel Networks NA Inc. software license agreement NOTICE: Please carefully read this license agreement before copying or using the accompanying software or installing the hardware unit with pre-enabled software (each of which is referred to as “Software” in this Agreement). BY COPYING OR USING THE SOFTWARE, YOU ACCEPT ALL OF THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT. THE TERMS EXPRESSED IN THIS AGREEMENT ARE THE ONLY TERMS UNDER WHICH NORTEL NETWORKS WILL PERMIT YOU TO USE THE SOFTWARE.
INCLUDING WITHOUT LIMITATION ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Licensee is responsible for the security of its own data and information and for maintaining adequate procedures apart from the Software to reconstruct lost or altered files, data, or programs. 4. Limitation of liability.
AND LICENSEE, WHICH SUPERSEDES ALL PRIOR ORAL AND WRITTEN AGREEMENTS AND COMMUNICATIONS BETWEEN THE PARTIES PERTAINING TO THE SUBJECT MATTER OF THIS AGREEMENT. NO DIFFERENT OR ADDITIONAL TERMS WILL BE ENFORCEABLE AGAINST NORTEL NETWORKS UNLESS NORTEL NETWORKS GIVES ITS EXPRESS WRITTEN CONSENT, INCLUDING AN EXPRESS WAIVER OF THE TERMS OF THIS AGREEMENT. Using Web-based Management for the Business Policy Switch 2000 Software Version 1.
209570-B
Contents Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Before you begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Text conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Related publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents Chapter 3 Viewing summary information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Viewing stack information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Viewing summary switch information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Viewing switch information in real time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Changing stack numbering . . . . . . .
Contents 9 Creating an SNMPv3 target parameter configuration . . . . . . . . . . . . . . . . . . . 80 Deleting an SNMPv3 target parameter configuration . . . . . . . . . . . . . . . . . . . 82 Configuring SNMP traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Creating an SNMP trap receiver configuration . . . . . . . . . . . . . . . . . . . . . . . . 82 Deleting an SNMP trap receiver configuration . . . . . . . . . . . . . . . . . . . . . . . .
Contents Chapter 6 Viewing system statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 Viewing port statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 Zeroing ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 Viewing port statistics in a pie chart format . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents 11 Deleting a VLAN configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172 Configuring broadcast domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172 Viewing VLAN port information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 Managing spanning tree groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 Creating spanning tree groups . . . . . .
Contents Deleting a layer 2 filter configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232 Creating a layer 2 filter group configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 Modifying a layer 2 filter group configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 Deleting a layer 2 filter group configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 Configuring QoS actions . . . . . . . . . . . . . . . . . . . . .
Figures Figure 1 Web-based management interface home page . . . . . . . . . . . . . . . . . . . . 30 Figure 2 Web page layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Figure 3 Console page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Figure 4 System Information home page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 Figure 5 Console password setting page . . . . . . . . . . .
Figures Figure 30 Remote Access page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Figure 31 Security Configuration page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 Figure 32 Port Lists page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Figure 33 Port List View, Port List page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Figures 15 Figure 65 Transparent Bridging: Chart in a bar graph format . . . . . . . . . . . . . . . . . 144 Figure 66 Port Mirroring page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 Figure 67 Rate Limiting page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 Figure 68 IGMP Configuration page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 Figure 69 IGMP: VLAN Configuration page . . . . . . .
Figures Figure 100 Classification rules page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 Figure 101 Service class assignment page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200 Figure 102 VLAN selection page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202 Figure 103 VLAN service class selection page . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202 Figure 104 Interface Configuration page . . . . . . . . . . .
Tables Table 1 Main headings and options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Table 2 Menu icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Table 3 Page buttons and icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Table 4 System Information page items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Table 5 Console page items . . . . . . . . . . . .
Tables Table 30 Security Table page items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Table 31 Port Configuration page items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 Table 32 MAC Address Table page items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Table 33 Port Management page items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 Table 34 High Speed Flow Control page items . . . . . . . . . . . .
Tables 19 Table 64 Predefined Protocol Identifier (PID) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 Table 65 VLAN Configuration: Protocol Based modification page items . . . . . . . . 167 Table 66 VLAN Configuration: MAC SA Based setting page items . . . . . . . . . . . . 168 Table 67 VLAN Configuration: MAC SA Based modification page items . . . . . . . 170 Table 68 Port Configuration page items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Tables Table 99 Policy Statistics page items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 Table 100 Agent page items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250 Table 101 Status page items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254 Table 102 COPS Configuration Table section items . . . . . . . . . . . . . . . . . . . . . . . .
Preface Welcome to Using Web-based Management for the Business Policy Switch 2000 Software Version 1.2. This document provides instructions on configuring and managing the Business Policy Switch 2000* through the World Wide Web. The Web-based management interface is one of many tools specifically designed to assist the network manager in creating complex standalone or network configurations.
Text conventions This guide uses the following text conventions: italic text Indicates new terms and book titles. separator ( > ) Shows menu paths. Example: Configuration > Port Management identifies the Port Management option on the Configuration menu. Related publications For more information about using the Web-based management user interface and the BPS 2000, refer to the following publications: • Release Notes for the Business Policy Switch 2000 Software Version 1.
Describes how to use the Java Device Manager to configure and manage the BPS 2000. You can print selected technical manuals and release notes free, directly from the Internet. Go to the www.nortelnetworks.com/documentation URL. (The product family for the BPS 2000 is Data and Internet.) Find the product for which you need documentation. Then locate the specific category and model or version for your hardware or software product.
209570-B
Chapter 1 Using the Web-based management interface This chapter describes the requirements for using the Web-based management interface and how to use it as a tool to configure your BPS 2000. This chapter covers: • • • • • • • “New features,” next “Stacking compatibility” on page 26 “Software version 1.
Using the Web-based management interface — Table of port statistics (refer to Chapter 6) Note: To access the software version 1.2 features in a mixed stack, you must access a BPS 2000 unit. Additionally: - only 64 VLANS are available in a mixed stack - multiple STG support is not available in a mixed stack Stacking compatibility You can stack the BPS 2000 up to 8 units high. There are two types of stacks: • • Pure BPS 2000—This stack has only BPS 2000 switches.
Using the Web-based management interface • • 27 Pure BayStack 450 stack—All units must be running the same software version. Hybrid stack: — All BPS 2000 units must be running the same software version. — All BayStack 410 units must be running the same software version. — All BayStack 450 units must be running the same software version. — All software versions must have the identical ISVN. Refer to Appendix B of Using the Business Policy Switch 2000 Software Version 1.
Using the Web-based management interface You can use 256 port-, protocol-, and MAC SA-based VLANs for the stack with a Pure BPS 2000 stack running software version 1.2. (The maximum number of MAC SA-based VLANs available is 48). If you are working with a mixed, or Hybrid, stack, you can use 64 VLANs for the entire stack.
Using the Web-based management interface 29 Port numbering syntax When you enter a port number in a stack configuration, you must specify a unit/port number. A unit/port number consists of the unit number, a slash (/), and the port number. For example, 1/1 is the unit number 1 and port number 1, and 3/11 is unit number 3 and port number 11. In some cases, you can use a list of ports, or a port list. In this case, the same unit/ port number notation applies.
Using the Web-based management interface Figure 1 Web-based management interface home page Network security does not yet exist the first time you access the Web-based management user interface. As the system administrator, you must create access parameters and passwords to protect the integrity of your network configuration(s). For more information on setting access parameters and system passwords, refer to Chapter 4.
Using the Web-based management interface 31 Figure 2 Web page layout Web browser toolbar Administration > System Information Menu Summary Configuration Fault Statistics Application Administration System Info(option) Security Logout Reset Support Business Policy Switch 2000 BayStack 460 HW:AB3 FW:V0.2E sysDescription SW:v1.0.0.
Using the Web-based management interface Table 1 lists the main headings in the Web-based management user interface and their associated options.
Using the Web-based management interface 33 Tools are provided in the menu to assist you in navigating the Web-based management interface. Caution: Web browser capabilities such as page bookmarking, refresh, and page forward and page back, function as they would in any other Web site. However, these capabilities do not enhance the functionality of the Web-based management interface. Nortel Networks recommends that you use only the navigation tools provided in the management interface.
Using the Web-based management interface Management page When you click a menu option, the corresponding management page opens. Figure 3 shows the page displayed for the Administration > Security > Console option. Figure 3 Console page A page is composed of one or more of the following elements: • Tables and input forms The gray cells in a page are display only, and white cells are input fields. • Check boxes You enable or disable a selection by clicking a check box.
Using the Web-based management interface 35 Table 3 describes the icons that may appear on a pages to assist you in navigation. Table 3 Page buttons and icons Icon Name Description Modify Accesses a modification page for the selected row. View Accesses a view only statistics page for the selected row. Delete Deletes a row. Pie Chart Displays statistics information in a pie chart format. Bar Graph Displays statistics information in a bar graph format.
Using the Web-based management interface 209570-B
Chapter 2 Administering the switch The administrative options available to you are: • • • • • • “Viewing system information,” next “Configuring system security” on page 39 “Logging on to the management interface” on page 42 “Resetting the BPS 2000” on page 43 “Resetting the BPS 2000 to system defaults” on page 44 “Logging out of the management interface” on page 45 For more information on the feature discussed in this chapter, refer to Using the Business Policy Switch 2000 Software Version 1.2.
Administering the switch Viewing system information You can view an image of the BPS 2000 switch or an image of your entire stack configuration, information about the host device (or stack) and, if provided, the contact person or manager for the switch. The System Information page is also the Web-based management interface home page. To view system information: ➨ From the main menu, choose Administration > System Information. The System Information page opens (Figure 4).
Administering the switch 39 Table 4 describes the items on the System Information page. Table 4 System Information page items Item Description sysDescription The default description of the Business Policy Switch 2000, including the hardware, firmware, software, and ISVN version numbers. sysUpTime The elapsed time since the last network management portion of the system was last re-initialized. sysName The name created by the network administrator to identify the switch, for example Finance Group.
Administering the switch Figure 5 Console password setting page Note: Console, Telnet, and Web settings share the same switch and stack password type and password. Table 5 describes the items on the Console page. Table 5 Console page items Section Item Console Switch Password Setting Console Switch Password (1) None Setting Type (2) Local Password (3) RADIUS Authentication Displays the switch password types. Read-Only Switch Password 1..
Administering the switch 41 Configuring RADIUS security To configure RADIUS security parameters: 1 From the main menu, choose Administration > Security > RADIUS. The RADIUS page opens. Figure 6 RADIUS page Table 6 describes the items on the RADIUS page. Table 6 RADIUS page items Item Setting Description Primary RADIUS Server XXX.XXX.XXX.XXX Type a Primary RADIUS server IP address in the appropriate format. Secondary RADIUS Server XXX.XXX.XXX.
Administering the switch Logging on to the management interface Once switch and stack passwords and RADIUS authentication settings are integrated into the Web-based management user interface, anyone who attempts to use the application is presented with a log on page (Figure 7). Figure 7 Web-based management interface log on page To log on to the Web-based management interface: 1 In the Username text box, type RO for read-only access or RW for read-write access.
Administering the switch 43 Figure 8 System Information home page With Web access enabled, the switch can support up to four concurrent Web page users. Two predefined user levels are available, and each user level has a corresponding username and password. Table 7 shows an example of the two predefined user levels available and their access level within the Web-based management user interface.
Administering the switch To reset the BPS 2000 without making changes (since your last Submit request): 1 From the main menu, choose Administration > Reset. The Reset page opens (Figure 9). Figure 9 Reset page 2 From the list, choose to reset the switch only, or the entire stack. 3 Click Submit. Note: If you have not configured system password security, a reset returns you to the home page, as shown in Figure 1 on page 30.
Administering the switch 45 To reset the BPS 2000 to system defaults: 1 From the main menu, choose Administration > Reset to Default. The Reset to Default page opens (Figure 10). Figure 10 Reset to Default page 2 From the list, choose to reset the switch only to system defaults, or the entire stack. 3 Click Submit. Note: If you have not configured system password security, a reset returns you to the home page, as shown in Figure 1 on page 30.
Administering the switch 209570-B
Chapter 3 Viewing summary information The summary information options are: • • • • • “Viewing stack information,” next “Viewing summary switch information” on page 49 “Viewing switch information in real time” on page 51 “Changing stack numbering” on page 54 “Identifying unit numbers” on page 56 Note: To access the software version 1.2 features in a mixed stack, you must access a BPS 2000 unit.
Viewing summary information To view stack information: 1 From the main menu, choose Summary > Stack Information. The Stack Information page opens (Figure 11). Figure 11 Stack Information page Table 8 describes the fields on the Stack Information and Stack Inventory sections of the Stack Information page.
Viewing summary information 49 Table 8 Stack Information page fields (continued) Section Fields Description Software Version The current running software version. Operational State The current operational state of the stack. The operational states are: Other, Not Available, Removed, Disabled, Normal, Reset in Progress, Testing, Warning, Non Fatal Errors, Fatal Error, and Not Configured. 2 In the upper-left corner of the Stack Information page, click the number of the device you want to view.
Viewing summary information Table 9 describes the fields on the Switch Information page. Table 9 Switch Information page fields Item Description Unit Select the number of the device on which to view summary information. The page is updated with information about the selected switch. For more information on stack numbering, see page 54. Module Description The factory set description of the policy switch. MDA Description The factory set description of the sub-component/MDA.
Viewing summary information 51 Viewing switch information in real time You can display the port and LED status information of a selected policy switch in real time. To display a physical view of the policy switch: 1 From the main menu, choose Summary > Switch View. The Switch View page opens in a separate Web browser (Figure 13). Figure 13 Switch View page Using Web-based Management for the Business Policy Switch 2000 Software Version 1.
Viewing summary information Note: You may be presented with a security warning to click on before the switch view appears. Table 10 describes the fields on the Switch View page. Table 10 BPS 2000 switch LED descriptions Label Type Color State Meaning Pwr Power status Green On DC power is available to the switch’s internal circuitry. Off No AC power to switch or power supply failed. On Self-test passed successfully and switch is operational.
Viewing summary information 53 Table 10 BPS 2000 switch LED descriptions (continued) Label Type Color State Meaning Base Base mode Green On The switch is configured as the stack base unit. Off The switch is not configured as the stack base unit (or is in standalone mode). Amber On This unit is operating as the stack configuration’s temporary base unit. This condition occurs automatically if the base unit (directly downstream from this unit) fails.
Viewing summary information Changing stack numbering If your system is set to “stack” operational mode, you can view existing stack numbering information and renumber the devices in your stack framework. For information on how to set your system’s operational mode, see “Setting system operational modes” on page 112. Note: The unit number does not affect the base unit designation. To view or renumber devices within the stack framework: 1 From the main menu, choose Summary > Stack Numbering.
Viewing summary information 55 Table 11 Stack Numbering Setting page fields (continued) Item Range Description MAC Address XX.XX.XX.XX.XX.XX MAC address of the corresponding unit listed in the Current Unit Number field. New Unit Number 1..8, None Choose a new number to assign to your selected policy switch. Note: If you leave the field blank, the system automatically selects the next available number. 2 Choose the new number to assign to your switch. 3 Click Submit.
Viewing summary information Identifying unit numbers You can identify the unit numbers of the switches participating in a stack configuration by viewing the LEDs on the front panel of each switch. To identify unit numbers in your configuration: 1 From the main menu, choose Summary > Identify Unit Numbers. The Identify Unit Numbers page opens (Figure 15).
Chapter 4 Configuring the switch The switch configuration options available to you are: • “Configuring BootP, IP, and gateway settings,” (next) • “Modifying system settings” on page 60 • “About SNMP” on page 61 • “Configuring SNMPv1” on page 62 • “Configuring SNMPv3” on page 63 • “Configuring SNMP traps” on page 82 • “Configuring EAPOL-based security” on page 84 • “Managing remote access by IP address” on page 87 • “Configuring MAC address-based security” on page 89 • “Viewing learned
Configuring the switch Configuring BootP, IP, and gateway settings You can configure your BootP mode settings, create and modify your in-band stack and in-band switch IP addresses and in-band subnet mask parameters, and configure the IP address of your default gateway. Note: Settings take effect immediately when you click Submit. To configure BootP, IP, and gateway settings: 1 From the main menu, choose Configuration > IP. The IP page opens (Figure 16).
Configuring the switch 59 Table 12 describes the items on the IP page. Table 12 IP page items Section Item Range Description Boot Mode Setting BootP Request Mode BootP When Needed Choose this mode to inform the switch to send a BootP request when the switch IP address stored in nonvolatile memory is the factory default value. If the stored IP address differs from the factory default value, the switch uses the stored network parameters.
Configuring the switch 2 Type information in the text boxes, or select from a list. 3 Click Submit. Modifying system settings You can create or modify the system name, system location, and network manager contact information. Note: The configurable parameters on the System page are displayed in a read only-format on the Web-based management user interface System Information home page (see Figure 1 on page 30). To configure system settings: 1 From the main menu, choose Configuration > System.
Configuring the switch 61 Table 13 describes the items on the System page. Table 13 System page items Item Range System Description Description The factory set description of the hardware and software versions. System Object ID The character string that the vendor created to uniquely identify this device. System Up Time The elapsed time since the last network management portion of the system was last re-initialized. Note: This field is updated only when the screen is redisplayed. System Name 0..
Configuring the switch Configuring SNMPv1 You can configure SNMPv1 read-write and read-only community strings, enable or disable trap mode settings, and/or enable or disable the Autotopology feature. The Autotopology feature, when enabled, performs a process that recognizes any device on the managed network and defines and maps its relation to other network devices in real time.
Configuring the switch 63 Table 14 describes the items on the SNMPv1 page. Table 14 SNMPv1 page items Section Item Community String Read-Only Setting Community String Range Description 1..32 Type a character string to identify the community string for the SNMPv1 read-only community, for example, public or private. The default value is public. Read-Write Community String 1..
Configuring the switch Figure 19 System Information page Table 15 describes the fields on the System Information section of the SNMPv3 System Information page. Table 15 System Information section fields Item Description SNMP Engine ID The SNMP engine’s identification number. SNMP Engine Boots The number of times that the SNMP engine has re-initialized itself since its initial configuration. SNMP Engine Time The number of seconds since the SNMP engine last incremented the snmpEngineBoots object.
Configuring the switch 65 Table 16 describes the fields on the SNMPv3 Counters section of the SNMPv3 System Information page. Table 16 SNMPv3 Counters section fields Item Description Unavailable Contexts The total number of packets dropped by the SNMP engine because the context contained in the message was unavailable. Unknown Contexts The total number of packets dropped by the SNMP engine because the context contained in the message was unknown.
Configuring the switch Figure 20 User Specification page Table 17 describes the items on the User Specification Table section of the User Specification page. Table 17 User Specification Table section items Item and MIB association Description Deletes the row. User Name (usmUserSecurityName) The name of an existing SNMPv3 user.
Configuring the switch 67 Table 18 describes the items on the User Specification Creation section of the User Specification page. Table 18 User Specification Creation section items Item and MIB association Range Description User Name 1..32 Type a string of characters to create an identity for the user.
Configuring the switch Deleting an SNMPv3 system user configuration To delete an existing SNMPv3 user configuration: 1 From the main menu, choose Configuration > SNMPv3 > User Specification. The User Specification page opens (Figure 20). 2 In the User Specification Table, click the Delete icon for the entry you want to delete. A message opens prompting you to confirm your request. 3 Do one of the following: • • Click Yes to delete the SNMPv3 user configuration.
Configuring the switch 69 Figure 21 Group Membership page Table 19 describes the items on the Group Membership page. Table 19 Group Membership page items Item and MIB association Range Description Deletes the row. Security Name (vacmSecurityToGroupStatus) 1..32 Type a string of character to create a security name for the principal which is mapped by this entry to a group name.
Configuring the switch 2 In the Group Membership Creation section, type information in the text boxes, or select from a list. 3 Click Submit. The new entry appears in the Group Membership Table. Deleting an SNMPv3 group membership configuration To delete an SNMPv3 group membership configuration: 1 From the main menu, choose Configuration > SNMPv3 > Group Membership. The Group Membership page opens (Figure 21).
Configuring the switch 71 Configuring SNMPv3 group access rights You can view a table of existing SNMPv3 group access rights configurations, and you can create or delete a group’s SNMPv3 system-level access rights. Creating an SNMPv3 group access rights configuration To create a group’s SNMPv3 system-level access right configuration: 1 From the main menu, choose Configuration > SNMPv3 > Group Access Rights. The Group Access Rights page opens (Figure 22).
Configuring the switch Table 20 describes the items on the Group Access Rights page. Table 20 Group Access Rights page items Item and MIB association Range Description Deletes the row. Group Name (vacmAccessToGroupStatus) 1..32 Type a character string to specify the group name to which access is granted. Security Model (vacmAccessSecurityModel)l (1) SNMPv1 (2) SNMPv2c (3) USM Choose the security model to which access is granted.
Configuring the switch 2 73 In the Group Access Table, click the Delete icon for the entry you want to delete. A message opens prompting you to confirm your request. 3 Do one of the following: • • Click Yes to delete the group access configuration. Click Cancel to return to the Group Access Rights page without making changes. Note: This Group Access Table section of the Group Access Rights page contains hyperlinks to the Management Information View page.
Configuring the switch Figure 23 Management Information View page Table 21 describes the items on the Management Information View page. Table 21 Management Information View page items Item and MIB association Range Description Deletes the row. View Name (vacmViewTreeFamilyViewName) 1..32 Type a character string to create a name for a family of view subtrees. View Subtree (vacmViewTreeFamilySubtree) X.X.X.X.X...
Configuring the switch 75 2 In the Management Information Creation section, type information in the text boxes, or select from a list. 3 Click Submit. The new entry appears in the Management Information Table (Figure 23). Deleting an SNMPv3 management information view configuration To delete an existing SNMPv3 management information view configuration: 1 From the main menu, choose Configuration > SNMPv3 > Management Info View. The Management Information page opens (Figure 23).
Configuring the switch Creating an SNMPv3 system notification configuration To create an SNMPv3 system notification configuration: 1 From the main menu, choose Configuration > SNMPv3 > Notification. The Notification page opens (Figure 24). Figure 24 Notification page Table 22 describes the items on the Notification page. Table 22 Notification page items Item and MIB association Range Description Deletes the row. Notify Name (snmpNotifyRowStatus) 1..
Configuring the switch 2 In the Notification Creation section, type information in the text boxes, or select from a list. 3 Click Submit. 77 The new entry appears in the Notification Table (Figure 24). Note: This Notification Table section of the Notification page contains hyperlinks to the Target Parameter page. For more information, see “Configuring an SNMPv3 management target parameter” on page 80.
Configuring the switch Configuring an SNMPv3 management target address You can view a table of existing SNMPv3 management target configurations, create SNMPv3 management target address configurations that associate notifications with particular recipients and delete SNMPv3 target address configurations. Creating an SNMPv3 target address configuration To create an SNMPv3 target address configuration: 1 From the main menu, choose Configuration > SNMPv3 > Target Address.
Configuring the switch 79 Table 23 describes the items on the Target Address page. Table 23 Target Address page items Item and MIB association Range Description Deletes the row. Target Name (snmpTargetAddrName) 1..32 Type a character string to create a target name. Target Domain (snmpTargetAddrTDomain) 1..32 The transport type of the address contained in the snmpTargetAddrTAddress object. Target Address (snmpTargetAddrTAddress) XXX.XXX.XXX.
Configuring the switch Deleting an SNMPv3 target address configuration To delete an SNMPv3 target address configuration: 1 From the main menu, choose Configuration > SNMPv3 > Target Address. The Target Address page opens (Figure 25). 2 In the Target Address Table, click the Delete icon for the entry you want to delete. A message opens prompting you to confirm your request. 3 Do one of the following: • • Click Yes to delete the target address configuration.
Configuring the switch 81 Figure 26 Target Parameter page Table 24 describes the items on the Target Parameter page. Table 24 Target Parameter page items Item Range Description Deletes the row. Parameter Tag (snmpTargetParamsRowStatus) 1..32 Type a unique character string to identify the parameter tag. Msg Processing Model (snmpTargetParamsMPModel) (0) SNMPv1 Choose the message processing model to be used when (1) SNMPv2c generating SNMP messages using this entry.
Configuring the switch Deleting an SNMPv3 target parameter configuration To delete an SNMPv3 target parameter configuration: 1 From the main menu, choose Configuration > SNMPv3 > Target Address. The Target Address page opens (Figure 25). 2 In the Target Parameter Table, click the Delete icon for the entry you want to delete. A message opens prompting you to confirm your request. 3 Do one of the following: • • Click Yes to delete the target parameter configuration.
Configuring the switch 83 Figure 27 SNMP Trap Receiver page Table 25 describes the items on the Trap Receiver Table and Trap Receiver Creation sections of the SNMP Trap Receiver page. Table 25 SNMP Trap Receiver page items Items Range Description Deletes the row. Trap Receiver Index 1..4 Choose the number of the trap receiver to create or modify. IP Address XXX.XXX.XXX.XXX Type the network address for the SNMP manager that is to receive the specified trap. Community 0..
Configuring the switch 2 In the Trap Receiver Table, click the Delete icon for the entry you want to delete. A message opens prompting you to confirm your request. 3 Do one of the following: • • Click Yes to delete the SNMP trap receiver configuration. Click Cancel to return to the table without making changes. Configuring EAPOL-based security Beginning with software version 1.1, you can configure security based on the Extensible Authentication Protocol over LAN (EAPOL) protocol.
Configuring the switch 85 Figure 28 EAPOL Security Configuration page (1 of 2) Figure 29 EAPOL Security Configuration page (2 of 2) Using Web-based Management for the Business Policy Switch 2000 Software Version 1.
Configuring the switch Table 26 describes the fields on the EAPOL Security Configuration page. Table 26 EAPOL Security Configuration page fields Section Item Range Description EAPOL Administrative State Setting EAPOL Administrative State (1) Enabled (2) Disabled Enables or disables EAPOL-based security. EAPOL Security Setting Unit 209570-B Displays the unit you are viewing. Port 1 to 28 Displays the port number. Initialize (1) Yes (2) No Activates EAPOL state on this port.
Configuring the switch 2 Complete fields as described in the table. 3 Click Submit. 87 Managing remote access by IP address Beginning with software version 1.2, you can configure the remote access you allow. You can specify up to 10 IP addresses to allow Web access, SNMP access, or Telnet access to the BPS 2000. To configure remote access using the Web-based management system: 1 From the main menu of the Business Policy Switch 2000 Web-based Manager, choose Configuration > Remote Access.
Configuring the switch Figure 30 Remote Access page Table 27 describes the fields on the Remote Access page. Table 27 Remote Access page fields Section Item Range Description Remote Access Settings Telnet/Access (1)Allowed (2) Disallowed Allows Telnet access. Telnet/Use List (1) Yes (2) No Restricts Telnet access to the specified 10 source IP addresses. SNMP/Access (1)Allowed (2) Disallowed Allows SNMP access.
Configuring the switch 89 Table 27 Remote Access page fields (continued) Section Allowed Source IP and Subnet Mask Item Range Description Web/Use List (1) Yes (2) No Restricts Web access to the specified 10 source IP addresses. Allowed Source IP XXX.XXX.XXX. XXX Enter the source IP address you want to allow switch access. Allowed Source Mask XXX.XXX.XXX. XXX Enter the source IP mask you want to allow switch access. 2 Complete fields as described in the table. 3 Click Submit.
Configuring the switch Configuring MAC address-based security To configure MAC address-based security using the Web-based management system: 1 From the main menu, choose Application > MAC Address Security > Security Configuration. The Security Configuration page opens (Figure 31).
Configuring the switch 91 Table 28 describes the items on the Security Configuration page. Table 28 Security Configuration page items Section Item Range Description MAC Address Security Setting MAC Address Security (1) Enabled (2) Disabled Enables the MAC address security features. MAC Address Security SNMP-Locked (1) Enabled (2) Disabled Enables locking SNMP, so that you cannot use SNMP to modify the MAC address security features.
Configuring the switch 3 Click Submit. Configuring ports In this section, you create a list of ports, and you can add ports to or delete ports from each list. To activate an entry or add or delete ports to a list: 1 From the main menu, choose Application > MAC Address Security > Port Lists. The Port Lists page opens (Figure 32).
Configuring the switch 93 Table 29 describes the items on the Ports Lists page. Table 29 Ports Lists page items Item Range Description Entry These are the lists of ports. Action Allows you to add or delete ports to the lists. Port List Displays which ports are associated with each list. 2 To add or delete ports to a list, click the icon in the Action column in the list row you want. The Port List View, Port List page opens (Figure 33).
Configuring the switch Figure 34 Port List View, Learn by Ports page a Click the ports through which you want the switch to learn MAC addresses or click None. b If you want that port to no longer learn MAC addresses, click the checked box to uncheck it. c Click Submit. 5 In the MAC Security Table section, choose Enabled in the Current Learning Mode column of the Learn By Ports row. 6 Click Submit. Note: You cannot include any of the port values you have chosen for the secure ports field.
Configuring the switch 95 Figure 35 Security Table page Note: Using this page, you instruct the switch to allow the specified MAC address access only through the specified port or port list. Table 30 describes the items on the Security Table page. Table 30 Security Table page items Section Item MAC Address Security Table Action Range Allows you to delete a MAC address. Address Allowed Source MAC Address Security Table Entry Creation 2 Description Displays the MAC address.
Configuring the switch Note: If you choose an Entry as the Allowed Source, you must have configured that specific entry on the Port View List, Port List page. 3 On the Security Table page, type information in the text boxes, or select from a list. 4 Click Submit. Note: Be certain to include the MAC address for the default LAN router as an allowed source MAC address. Clearing ports You can clear all information from the specified port(s) for the list of ports that learn MAC addresses.
Configuring the switch 97 Figure 36 Port List View, Clear by Ports page 3 Select the ports you want to clear or click None. 4 Click Submit. Note: When you specify a port (or ports) to be cleared using this field, the specific port (or ports) will be cleared for each of the entries listed in the MAC Address Security Table. If you totally clear the allowed Source Port(s) field (leaving a blank field) for an entry, the associated MAC address for that entry is also cleared.
Configuring the switch Figure 37 Port Configuration page Table 31 describes the items on the Port Configuration page. Table 31 Port Configuration page items Item Range Description Unit 1 to 8 Displays the unit number of the ports shown in the table. Port 1 to 28 Lists each port on the unit. Trunk Blank, 1 to 6 Displays the MultiLink Trunk that the port belongs to. Security (1) Enabled (2) Disabled Enables MAC address-based security on that port.
Configuring the switch • • 99 In the Ports List View, Learn by Ports page (Figure 34), click on the checkmark of a selected port to remove that port from those that learn MAC addresses. In the Port Configuration page (Figure 37), click Disabled to remove that port from the MAC address-based security system; it will disable all MAC address-based security on that port.
Configuring the switch Table 32 describes the items on the MAC Address Table page. Table 32 MAC Address Table page items Section Item Range Description MAC Address Setting Aging Time 10..1000000 Type the timeout period, in seconds, for aging out dynamically learned forwarding information. If the entry is inactive for a period of time that exceeds the specified aging time, the address is removed. Note: Nortel Networks recommends that you use the default value of 300 seconds.
Configuring the switch 101 Figure 39 Find MAC Address Table page Table 32 on page 100 describes the items on the Find MAC Address Table page. 2 In the MAC Address Setting section, type the MAC address you want to search for. 3 Click Submit to enter the request. If the address is located, it is shown in the first row in the MAC Address Table section. If the address is not located, the system response “Not Found” is shown to the right of the Find MAC Address input field.
Configuring the switch Configuring switch port autonegotiation speed You can configure a specific switch port or all switch ports to autonegotiate for the highest available speed of the connected station or you can set the speed for selected switch ports (autonegotiation is not supported on 100 Mbps fiber optic ports). To configure a switch port’s autonegotiation speed: 1 From the main menu, choose Configuration > Port Management. The Port Management page opens (Figure 40).
Configuring the switch 103 Table 33 describes the items on the Port Management page. Table 33 Port Management page items Item Range Description Port The switch port number of the corresponding row. To select the switch row, click the check box to the right.
Configuring the switch 2 In the upper-left hand corner, click on the unit number of the policy switch to manage. The page is updated with the information for the selected switch. 3 In the port row of your choice, select from the lists. 4 Click Submit. Configuring high speed flow control You can set switch port parameters for Gigabit Ethernet media dependent adapters (MDAs) when the switch is participating in a stack configuration.
Configuring the switch 105 Table 34 describes the items on the High Speed Flow Control page. Table 34 High Speed Flow Control page items Item Range Description Autonegotiation (1) Enabled (2) Disabled Choose to enable or disable the autonegotiation feature. When enabled, the port advertises support for flow control autonegotiation. Flow Control (1) Enabled (2) Symmetric (3) Asymmetric Choose your flow control preference to control traffic and avoid congestion on the gigabit MDA port.
Configuring the switch To download a switch image: 1 From the main menu, choose Configuration > Software Download. The Software Download page opens (Figure 42). Figure 42 Software Download page Table 35 describes the items on the Software Download page. Table 35 Software Download page items Item Range Current Running Version Description The version of the current running software. Local Store Version The local version of the software in the flash memory. BPS 2000 Image Filename 1..
Configuring the switch 2 Type information in the text boxes, or select from a list. 3 Click Submit. 107 The software download process automatically completes without user intervention. The process erases the contents of flash memory and replaces it with a new software image. Take care not to interrupt the download process until after it runs to completion (the process can take up to 10 minutes, depending on network conditions).
Configuring the switch Table 36 LED Indications during the software download process (continued) Phase Description LED Indications 3 The switch programs the new software image into the flash memory. 100 Mb/s port status LEDs (ports 1 to 8 only): The LEDs begin to turn on in succession beginning with port 1, which indicates that the new software image is being programmed into the switch’s flash memory.
Configuring the switch 109 Figure 43 Configuration File Download/Upload page Table 37 describes the items on the Configuration File page. Table 37 Configuration File page items Item Range Description Configuration Image Filename 1..32 Type the configuration file name. TFTP Server IP Address XXX.XXX.XXX.XXX Type the IP address of the TFTP load host. Copy Configuration Image to Server (1) Yes (2) No Choose whether or not to copy the configuration image to the server.
Configuring the switch Table 38 describes the requirements for storing or retrieving configuration parameters on a TFTP server. Table 38 Requirements for storing or retrieving configuration parameters on a TFTP server Requirements • The Configuration File feature can only be used to copy standalone switch configuration parameters to other standalone switches or to copy stack configuration parameters to other stack configurations.
Configuring the switch 111 Configuring port communication speed You can view the current console/communication port settings and configure the console port baud rate to match the baud rate of the console terminal. To view current console/communication port settings and configure console port speed: 1 From the main menu, choose Configuration > Console/Comm Port. The Console/Communication Port page opens (Figure 44).
Configuring the switch Setting system operational modes You can set the next stack mode operation of either a stack of BPS 2000es only, or a mixed stack of BPS 2000es and BayStack 450 and 410 switches. To set the next stack mode operation: 1 From the main menu, choose Configuration > Stack Operational Mode. The Stack Operational Mode Setting page opens (Figure 45). Figure 45 Stack Operational Mode page Table 41 describes the items on the Stack Operational Mode Setting page.
Chapter 5 Configuring remote network monitoring (RMON) The RMON management information base (MIB) is an interface between the RMON agent on a BayStack 450 switch or Business Policy Switch 2000 and RMON management applications such as the Web-based management user interface. It defines objects that are suitable for the management of any type of network. Some groups are specifically targeted for Ethernet networks. The RMON agent continuously collects statistics and proactively monitors the switch.
Configuring remote network monitoring (RMON) Configuring RMON fault threshold parameters Alarms are useful when you need to know when the value of some variable goes out of range. RMON alarms can be defined on any MIB variable that resolves to an integer value. String variables (such as system description) cannot be used as alarm variables. Creating an RMON fault threshold You can create the RMON threshold parameters for fault notification (alarms).
Configuring remote network monitoring (RMON) 115 Table 42 describes the items on the RMON Threshold page. Table 42 RMON Threshold page items Item Range Description Deletes the row. Index/Alarm Index 1..10 Type the unique number to identify the alarm entry. Target Integer The unit number and port number. Unit 1..8 Choose the switch on which to configure port alarms. Port 1..28 Choose the port on which to set an alarm.
Configuring remote network monitoring (RMON) Table 42 RMON Threshold page items (continued) Item Range Description Interval Type the time period (in seconds) to sample data and compare the data to the rising and falling thresholds. Sample/Alarm Sample (1) Absolute (2) Delta Choose the sampling method: Absolute: Absolute alarms are defined on the current value of the alarm variable. An example of an alarm defined with absolute value is card operating status.
Configuring remote network monitoring (RMON) 3 117 Do one of the following: • • Click Yes to delete the RMON threshold configuration. Click Cancel to return to the RMON Threshold page without making changes. Viewing the RMON fault event log RMON events and alarms work together to notify you when values in your network go out of a specified range. When values pass the specified ranges, the alarm is triggered and “fires.” The event specifies how the activity is recorded.
Configuring remote network monitoring (RMON) Table 43 describes the fields on the RMON Event Log page. Table 43 RMON Event Log page fields Item Description Time Stamp The time the event occurred. Description An implementation dependent description of the event that activated this log entry. Triggered By A comment describing the source of the event. ID The event that generated this log entry.
Configuring remote network monitoring (RMON) 119 Table 44 describes the fields on the System Log page. Table 44 System Log page fields Section Item Range Description System Log (View By) Display Unit 1..8 Choose the unit on which to display messages or clear messages. Display (1) Non Volatile Messages From (2) Volatile + Non Volatile Choose to display messages from Non Volatile memory (NVRAM) or Volatile (DRAM) and Non Volatile memory. The default settings is Non Volatile.
Configuring remote network monitoring (RMON) Viewing RMON Ethernet statistics You can gather and graph RMON Ethernet statistics in a variety of formats. To gather and graph RMON Ethernet statistics: 1 From the main menu, choose Statistics > RMON Ethernet. The RMON Ethernet page opens (Figure 49). Figure 49 RMON Ethernet page Table 45 describes the items on the RMON Ethernet page. Table 45 RMON Ethernet page items Item Description Displays statistics as a bar graph.
Configuring remote network monitoring (RMON) 121 Table 45 RMON Ethernet page items (continued) Item Description Packets The number of good packets received that were directed to the broadcast address. This does not include multicast packets. Broadcast The number of good packets received that were directed to the broadcast address. This does not include multicast packets. Multicast The number of good packets received that were directed to the multicast address.
Configuring remote network monitoring (RMON) Viewing RMON Ethernet statistics in a bar graph format To view RMON Ethernet statistics in a bar graph format: 1 From the main menu, choose Statistics > RMON Ethernet. The RMON Ethernet page opens (Figure 49). 2 In the port row of your choice, click the bar graph icon. The RMON Ethernet: Chart page appears in a bar graph format (Figure 50).
Configuring remote network monitoring (RMON) 123 Viewing RMON Ethernet statistics in a pie chart format To view RMON Ethernet statistics in a pie chart format: 1 From the main menu, choose Statistics > RMON Ethernet. The RMON Ethernet page opens (Figure 49). 2 In the port row of your choice, click the pie chart icon. The RMON Ethernet: Chart page appears in a pie chart format (Figure 51).
Configuring remote network monitoring (RMON) Viewing RMON history You can view a periodic statistical sampling of data from various types of networks. To view periodic statistical data: 1 From the main menu, choose Statistics > RMON History. The RMON History page opens (Figure 52).
Configuring remote network monitoring (RMON) 125 Table 46 describes the items on the RMON History page. Table 46 RMON History page items Section Item Description RMON History Statistics (View By) Unit Choose the unit number to be monitored. Port Choose the port number to be monitored. Displays statistics as a line graph. RMON History Statistics Table Start The value of the sysUPTime at the start of the interval over which this sample was measured.
Configuring remote network monitoring (RMON) Viewing RMON statistics in a line graph format You can view RMON statistical data in a line graph format. To view statistics in a line graph format: 1 From the main menu, choose Statistics > RMON History. The RMON History page opens (Figure 52). 209570-B 2 In the RMON History Statistics Table, click the line graph icon. 3 Click Back to return to the RMON History page.
Chapter 6 Viewing system statistics The options available to monitor system statistical data are: • “Viewing port statistics,” (next) • “Viewing all port errors” on page 132 • “Viewing interface statistics” on page 134 • “Viewing Ethernet error statistics” on page 137 • “Viewing transparent bridging statistics” on page 141 Note: To access the software version 1.2 features in a mixed stack, you must access a BPS 2000 unit.
Viewing system statistics Figure 53 Port page Table 47 describes the items on the Port page. Table 47 Port page items Section Item Description Port Statistics (View By) Unit Choose the number of the switch to monitor. Port Choose the switch’s port number to monitor. Displays statistics in a bar graph format. Displays statistics in a pie chart format.
Viewing system statistics 129 Table 47 Port page items (continued) Section Item Description Port Statistics Table Packets The number of packets received/transmitted on this port, including bad packets, broadcast packets, and multicast packets. Multicast The number of good multicast packets received/transmitted on this port, excluding broadcast packets. Broadcasts The number of good broadcast packets received/transmitted on this port.
Viewing system statistics Table 47 Port page items (continued) Section Item Description Port Statistics Table, cont. Collisions The number of collisions detected on this port. Single Collisions The number of packets that were transmitted successfully on this port after a single collision. Multiple Collisions The number of packets that were transmitted successfully on this port after more than one collision.
Viewing system statistics 131 Viewing port statistics in a pie chart format You can view port statistics in a pie chart format. To view the displayed statistical information in a pie chart format: 1 In the Port Statistics Table, click the pie chart icon. The Port: Chart page opens in a pie chart format (Figure 54). Figure 54 Port: Chart page in a pie chart format Table 47 describes the items on the Port: Chart page. 2 Click Back to return to the Port page.
Viewing system statistics The Port: Chart page opens in a bar graph format (Figure 55). Figure 55 Port: Chart page in a bar graph format Table 47 describes the items on the Port: Chart page. 2 Click Back to return to the Port page. Viewing all port errors Beginning with software version 1.1, you can view all ports in the entire stack that have an error. If a particular port has no errors, it will not be displayed.
Viewing system statistics 133 Figure 56 Port Error Summary page Table 48 describes the read-only information displayed in the Port Error Summary Table. Table 48 Port Error Summary Table fields Item Description Unit Displays the unit number in the stack. Port Displays the port number of the unit. Status Displays the status of the port (Enabled/Disabled). Link Displays the link status of the port (Up/Down).
Viewing system statistics Viewing interface statistics You can view selected switch interface statistics. To view an interface’s statistical information: 1 From the main menu, choose Statistics > Interface. The Interface page opens (Figure 57).
Viewing system statistics 135 Table 49 describes the items on the Interface page. Table 49 Interface page items Item Description Displays statistics in a bar graph format. Displays statistics in a pie chart format. Port The port number corresponding to the selected switch. In Octets The number of octets received on the interface, including framing characters. Out Octets The number of octets transmitted out of the interface, including framing characters.
Viewing system statistics Viewing interface statistics in a pie chart format You can view interface statistics in a pie chart format. To view interface statistics in a pie chart format: 1 From the main menu, choose Statistics > Interface. The Interface page opens (Figure 57). 2 In the port row of your choice, click the pie chart icon. The Interface: Chart page opens in a pie chart format (Figure 58).
Viewing system statistics 137 The Interface page opens (Figure 57). 2 In the port row of your choice, click the bar graph icon. The Interface: Chart page opens in a bar graph format (Figure 58). Figure 59 Interface: Chart in a bar graph format Table 49 describes the items on the Interface: Chart page. 3 To update the statistical information, click Update, or click Back to return to the Interface page.
Viewing system statistics Figure 60 Ethernet Errors page Table 50 describes the items on the Ethernet Errors page. Table 50 Ethernet Errors page items Item Description Displays statistics in a bar graph format. Displays statistics in a pie chart format. Port The port number corresponding to the selected switch. Alignment Errors The number of frames received on a particular interface that are not an integral number of octets in length and do not pass the FCS check.
Viewing system statistics Table 50 139 Ethernet Errors page items (continued) Item Description SQE Test Errors The number of times that the SQE TEST ERROR message is generated by the PLS sublayer for a particular interface. The SQE TEST ERROR is defined in section 7.2.2.2.4 of ANSI/IEEE 802.3-1985, and its generation is described in section 7.2.4.6 of the same document.
Viewing system statistics Figure 61 Ethernet Error: Chart in a pie chart format Table 51 describes the items on the Ethernet Errors: Chart page. 3 To update the statistical information, click Update, or click Back to return to the Ethernet Errors page. Viewing Ethernet error statistics in a bar graph format You can view Ethernet Errors statistics in a bar graph format. To view Ethernet errors statistics in a bar graph format: 1 From the main menu, choose Statistics > Ethernet Errors.
Viewing system statistics 141 Figure 62 Ethernet Error: Chart in a bar graph format Table 50 describes the items on the Ethernet Errors: Chart page. 3 To update the statistical information, click Update, or click Back to return to the Ethernet Errors page. Viewing transparent bridging statistics You can view the transparent bridging statistics measured for each monitored interface on the device. To view transparent bridging statistics: 1 From the main menu, choose Statistics > Transparent Bridging.
Viewing system statistics Figure 63 Transparent Bridging page Table 51 describes the items on the Transparent Bridging page. Table 51 Transparent Bridging page items Item Description Displays statistics in a bar graph format. Displays statistics in a pie chart format. Port The port number that corresponds to the selected switch. In Frames (dot1dTpPortInFrames) The number of frames that have been received by this port from its segment.
Viewing system statistics 2 143 In the upper-left hand corner, click on the unit number of the device to monitor. The page is updated with statistics about the selected device and its corresponding port number. 3 To refresh the statistical information, click Update. Viewing transparent bridging statistics in a pie chart format You can view measured transparent bridging statistics in a pie chart format.
Viewing system statistics Viewing transparent bridging statistics in a bar graph format You can view measured transparent bridging statistics in a bar graph format. To view transparent bridging statistics in a bar graph format: 1 From the main menu, choose Statistics > Transparent Bridging. The Transparent Bridging page opens (Figure 57). 2 In the port row of your choice, click the bar graph icon. The Transparent Bridging: Chart page opens in a bar graph format (Figure 65).
Chapter 7 Configuring application settings The options available to configure application settings are: • “Configuring port mirroring,” (next) • “Configuring rate limiting” on page 149 • “Configuring IGMP” on page 151 • “Viewing Multicast group membership configurations” on page 153 • “Creating and managing virtual LANs (VLANs)” on page 155 • “Configuring VLANs” on page 157 • “Configuring broadcast domains” on page 172 • “Viewing VLAN port information” on page 174 • “Managing spanning
Configuring application settings Configuring port mirroring The BPS 2000 supports port mirroring to analyze traffic. You can view existing port mirroring activity and you can configure a specific switch port to mirror up to two specified ports or two MAC addresses. When you configure port mirroring, you have the option to specify either port-based monitoring or address-based monitoring. Refer to Using the Business Policy Switch 2000 Software Version 1.2 for configuration guidelines for port-mirroring.
Configuring application settings 147 Table 52 describes the items on the Port Mirroring page.
Configuring application settings Table 53 describes the port-based monitoring modes. Table 53 Port-based monitoring modes Item Description Disabled Choose this option to disable port-based monitoring. The default setting is Disabled. --> Port X Choose this option to monitor all traffic received by port X. Port X --> Choose this option to monitor all traffic transmitted by port X. <-- --> Port X Choose this option to monitor all traffic received and transmitted by port X.
Configuring application settings 149 Configuring rate limiting You can view the current forwarding rate of broadcast and/or multicast packets, and configure the BPS 2000 to limit the forwarding rate of broadcast and multicast packets on each interface. When you configure rate limiting, you are setting the percentage of port bandwidth allowed for a packet type. When the threshold is exceeded, additional packets are discarded.
Configuring application settings Table 55 describes the items on the Rate Limiting page. Table 55 Rate Limiting page items Item Range Description Port 1..28 The selected unit’s port number. The normal port range is 1 to 28. Note: A standard unit with MDA has a normal range of 25, 26, 28. Packet Type (1) Multicast (2) Broadcast (3) Both Choose the packet type to view on the table.
Configuring application settings 151 Configuring IGMP You can configure a VLAN’s switch ports to optimize IP multicast packets in a bridged Ethernet environment, and you can view a table of existing IGMP configurations. For more information about IGMP configuration, see Using the Business Policy Switch 2000 (208700-A). To configure IGMP: 1 From the main menu, choose Application > IGMP > IGMP Configuration. The IGMP Configuration page opens (Figure 68).
Configuring application settings Table 56 IGMP Configuration page items Item Description Robust Value The predetermined value set by the administrator to offset expected packet loss on a subnet. If packet losses on a subnet are unacceptably high, the Robust Value field can be increased to a higher value. Note: This field affects only the VLAN specified in the page’s VLAN field. Query Time 2 The query interval (the interval between general queries sent by the multicast router).
Configuring application settings 153 Table 57 IGMP: VLAN Configuration page items (continued) Item Range Description Proxy (1) Enabled (2) Disabled Choose to enable or disable the proxy feature. This feature allows the switch to consolidate IGMP Host Membership Reports received on its downstream ports and to generate a consolidated proxy report for forwarding to its upstream neighbor. Note: This field affects all VLANs. The default setting is Enabled. Robust Value 1..
Configuring application settings To view multicast group membership configurations for a selected VLAN: 1 From the main menu, choose Application > IGMP > IGMP Multicast Group. The IGMP Multicast Group Membership page opens (Figure 70). Figure 70 IGMP Multicast Group Membership page Table 58 describes the items on the IGMP Multicast Group Membership page.
Configuring application settings 155 Creating and managing virtual LANs (VLANs) A VLAN is a collection of switch ports that make up a single broadcast domain. You can configure a VLAN for a single switch, or for multiple switches. When you create a VLAN, you can control traffic flow and ease the administration of moves, adds, and changes on the network, by eliminating the need to change physical cabling.
Configuring application settings Port-based VLANs A port-based VLAN is a VLAN in which the ports are explicitly configured to be in the VLAN. When you create a port-based VLAN on a switch, you assign a VLAN identification number (VLAN ID) and specify which ports belong to the VLAN. The VLAN ID is used to coordinate VLANs across multiple switches. With software version 1.1 and higher, the automatic PVID feature automatically sets the PVID when you configure a port-based VLAN.
Configuring application settings 157 Configuring VLANs You can create VLANs by assigning switch ports, MAC SA, and protocols as VLAN members and you can designate an existing VLAN to act as the management VLAN. Note: To access the software version 1.2 features in a mixed stack, you must access a BPS 2000 unit.
Configuring application settings Table 59 describes the items on the VLAN Configuration page. Table 59 VLAN Configuration page items Section Item VLAN Table Description Displays a modification page. Deletes the row. VLAN The number assigned to the VLAN when the VLAN was created. VLAN Name The name assigned to the VLAN when the VLAN was created. VLAN Type The base-type assigned when the VLAN was created. The base types are: Port-based, IP Subnet-based, Protocol-based, and MAC SA-based.
Configuring application settings 159 Creating a port-based VLAN To create a port-based VLAN: 1 From the main menu choose Application > VLAN > VLAN Configuration. The VLAN Configuration page opens (Figure 71). 2 In the VLAN Creation section, choose Port. 3 Click Create VLAN. The VLAN Configuration: Port Based setting page opens (Figure 72). Figure 72 VLAN Configuration: Port Based setting page Table 60 describes the items on the VLAN Configuration: Port Based setting page.
Configuring application settings 4 Type information in the text boxes, or select from a list. 5 Do one of the following: • • Click Submit. Click Back to return to the VLAN Configuration page without making changes. The new port-based VLAN configuration appears in the VLAN Table on the VLAN Configuration page (Figure 71). Modifying a port-based VLAN To modify an existing port-based VLAN: 1 From the main menu, choose Application > VLAN > VLAN Configuration.
Configuring application settings 161 Table 61 describes the items on the VLAN Configuration: Port Based modification page. Table 61 VLAN Configuration: Port Based modification page items Item Description VLAN The number assigned to the VLAN when the VLAN was created. VLAN Name (Re)name the VLAN. Learning Constraint The type of learning constraint selected when the VLAN was created. The learning constraint choices are IVL and SVL.
Configuring application settings Creating a protocol-based VLAN To create a protocol-based VLAN: 1 From the main menu, choose Application > VLAN > VLAN Configuration. The VLAN Configuration page opens (Figure 71). 2 In the VLAN Creation section, choose Protocol. 3 Click Create VLAN. The VLAN Configuration: Protocol Based setting page opens (Figure 74). Figure 74 VLAN Configuration: Protocol Based setting page Table 62 describes the items on the VLAN Configuration: Protocol Based setting page.
Configuring application settings 163 Table 62 VLAN Configuration: Protocol Based setting page items Item Range Description VLAN 1..4094 Type a unique number to identify the VLAN. VLAN Name 1..16 Type a unique name to identify the VLAN. Protocol IP, IPX 802.2, 1PX 802.3, Choose the supported protocol for the VLAN. For more information, IPX Snap, IPX Ethernet see Table 63 on page 164. II, Apple Talk, DEC Lat, SNA 802.2, SNA Ethernet II, Net Bios, XNS, Vines, Ipv6, User Defined, and RARP.
Configuring application settings The new protocol-based VLAN configuration appears in the VLAN Table on the VLAN Configuration page (Figure 71). Caution: Gigabit ports and BayStack 410 ports do not have the ability to assign incoming untagged frames to a protocol-based VLAN. To allow gigabit ports and BayStack 410 ports to participate in protocol-based VLANs, set the tagging field value to “Tagged Trunk” (see “Configuring broadcast domains” on page 172).
Configuring application settings 165 Table 63 Standard protocol-based VLANs and PID types (continued) PID Name Encapsulation PID Value (hex) VLAN Type RARP Ethernet type 2 8035 Reverse Address Resolution Protocol (RARP): RARP is a protocol used by some old diskless devices to obtain IP addresses by providing the MAC layer address. When you create a VLAN based on RARP, you can limit the RARP broadcasts to the ports that lead to the RARP server. User-Defined Ethernet type 2, Ethernet 802.
Configuring application settings Table 64 Predefined Protocol Identifier (PID) (continued) Vines Ether2 Ethernet type 2 0BAD Banyan VINES Ipv6 Ether2 Ethernet type 2 86DD IP version 6 User-Defined Ethernet type 2, Ethernet 802.2, or Ethernet Snap User-defined 16 bit value User-defined protocol-based VLAN. For a list of rereserved PIDs that are unavailable for user-defined PIDs, see Table 64 on page 165.
Configuring application settings 167 Table 65 describes the items on the VLAN Configuration: Protocol Based modification page. Table 65 VLAN Configuration: Protocol Based modification page items Item Description VLAN The number assigned to the VLAN when the VLAN was created. VLAN Name (Re)name the VLAN. Learning Constraint The type of learning constraint selected when the VLAN was created. The learning constraint choices are IVL and SVL.
Configuring application settings Figure 76 VLAN Configuration: MAC SA Based setting page Table 66 describes the items on the VLAN Configuration: MAC SA Based setting page. Table 66 VLAN Configuration: MAC SA Based setting page items Item Range Description VLAN 1..4094 Type a unique number to identify the VLAN. VLAN Name 1..16 Type a unique name to identify the VLAN, for example *. Learning Constraint (1) IVL (2) SVL (default) Choose your learning constraint type.
Configuring application settings 4 Type information in the text boxes, or select from a list. 5 Do one of the following: • • 169 Click Submit. Click Back to return to the VLAN Configuration page without making changes. The new MAC SA-based VLAN configuration appears in the VLAN Table on the VLAN Configuration page (Figure 71). Modifying a MAC SA-based VLAN To modify an existing MAC SA-based VLAN: 1 From the main menu, choose Application > VLAN > VLAN Configuration.
Configuring application settings Table 67 describes the items on the VLAN Configuration: MAC SA Based modification page. Table 67 VLAN Configuration: MAC SA Based modification page items Item Description VLAN The number assigned to the VLAN when the VLAN was created. VLAN Name (Re)name the VLAN. Opens the VLAN Configuration: MAC Address page (Figure 78). Learning Constraint The type of learning constraint selected when the VLAN was created. The learning constraint choices are IVL and SVL.
Configuring application settings 5 171 In the MAC Address Creation section, type the MAC address to associate with the VLAN. The MAC address appears in the MAC Address Table (Figure 78). Note: You can delete an existing MAC address by clicking the delete icon in the row of the MAC address you want to delete. 6 Do one of the following: • • 7 Click Submit to save your changes and return to the VLAN Configuration: MAC SA Based setting page.
Configuring application settings Deleting a VLAN configuration To delete a VLAN configuration: 1 From the main menu, choose Application > VLAN > VLAN Configuration. The VLAN Configuration page opens (Figure 71). 2 In the VLAN Table, click the Delete icon for the entry you want to delete. A message opens prompting you to confirm your request. 3 Do one of the following: • • Click Yes to delete the VLAN configuration. Click Cancel to return to the VLAN Configuration page without making changes.
Configuring application settings 173 Figure 79 Port Configuration page Table 68 describes the items on the Port Configuration page. Table 68 Port Configuration page items Item Range Description Port 1..28 The port number. Port Name 1..16 Type character string to create a unique port name, for example, Unit 1, Port 1. Filter Tagged Frames (1) Yes (2) No Choose how to process filter tagged frames. When a flag is set (Yes), the frames are discarded by the forwarding process.
Configuring application settings Table 68 Port Configuration page items (continued) Item Range Description PVID 1..4094 Type the number of the VLAN ID to assign to untagged frames received on this trunk port. For example, a port with a PVID of 3 assigns all untagged frames received on this port to VLAN 3. The default setting is 1. Note: If AutoPVID is enabled and you want another PVID, enter the desired PVID here. Port Priority 0-7 Choose the level of priority for each port.
Configuring application settings 175 Figure 80 Port Information page Table 69 describes the items on the Port Information page. Table 69 Port Information page items Section Item Range Description VLAN Port Information (View By) Unit 1..8 Choose the number of the switch to view. Port 1..28 VLAN Port Information Table Choose the number of the switch’s port to view. PVID The PVID assigned when the VLAN port was created. Port Name The port name assigned when the VLAN port was created.
Configuring application settings Managing spanning tree groups You can configure system parameters for Spanning Tree Protocol, the industry standard for avoiding loops in switched networks. You can configure individual switch ports or all switch ports for participation in the spanning tree algorithm (STA). Note: STP resolves duplicate paths in networks and is not necessary for ports that have workstations directly attached to the switch.
Configuring application settings 177 Creating spanning tree groups To configure spanning tree groups: 1 From the main menu, choose Application > Spanning Tree > Group Creation. The Group Creation page opens (Figure 81). Figure 81 Spanning Tree Group Creation page Table 70 describes the items on the Spanning Tree Group Creation page. Table 70 Spanning Tree Group Creation page items Section Item STP Group Table Description Deletes the group.
Configuring application settings Table 70 Spanning Tree Group Creation page items Section STP Group Creation Item Description Hello Time For the STP Group, indicates the Hello Interval (the amount of time between transmissions of BPDUs) specified by management for this bridge. This parameter takes effect only when this bridge becomes the root bridge.
Configuring application settings 1 179 From the main menu, choose, Application > Spanning Tree > VLAN Membership. The Spanning Tree VLAN Membership page opens (Figure 82). Figure 82 Spanning Tree VLAN Membership page The table displays the spanning tree group and the current VLAN membership. You can add or remove one or more VLANs to an STG. 2 To add a VLAN: a Click the modification icon in the Add VLAN column. The Spanning Tree VLAN Membership Add VLAN page opens (Figure 83).
Configuring application settings 3 To remove a VLAN: a Click the modification icon in the Remove VLAN column. The Spanning Tree VLAN Membership Remove VLAN page opens (Figure 84). Figure 84 Spanning Tree Remove VLAN page b Enter the number of the VLAN(s) you want to remove to the STG. c Click Submit. Note: You cannot delete VLAN 1 from STG 1. Configuring the STG To configure an STG: 1 From the main menu, choose Applications > Spanning Tree > Group Setting.
Configuring application settings 181 Figure 85 Spanning Tree Group Setting page 2 The STP Group number is displayed. 3 Use the Tagged BPDU on Tagged port field to set the frames as tagged (Yes) or untagged on tagged ports (No). 4 The STPG State displays status of the STP group. 5 Click Submit. Configuring ports for spanning tree To configure switch ports for Spanning Tree participation: 1 From the main menu, choose Application > Spanning Tree > Port Configuration.
Configuring application settings Figure 86 Spanning Tree Port Configuration page Table 71 describes the items on the Spanning Tree Port Configuration page. Table 71 Spanning Tree Port Configuration page items Section Item Description STP Group Group Choose the STG Group you want to view. Spanning Tree - Port Port Setting The port number of the currently displayed unit. Trunk The trunk that corresponds to the switch ports specified as MLT members.
Configuring application settings 183 Table 71 Spanning Tree Port Configuration page items Section Item Description Path Cost The bridge spanning tree parameter that determines the lowest path cost to the root. State The current state of the port as defined by application of the Spanning Tree Protocol. This state controls what action a port takes on reception of a frame. Note: If the bridge has detected a port that is malfunctioning, it will place that port into the broken (6) state.
Configuring application settings Figure 87 Spanning Tree Bridge Information page Table 72 describes the items on the Spanning Tree Bridge Information page. Table 72 Spanning Tree Bridge Information page items Section Item STP Group Group Spanning Tree - Bridge Bridge Priority Information Range Description Choose the STP Group you want to work with. 0..65535 Type the priority value of the bridge ID in hexadecimal notation, which is the most significant byte of the bridge ID.
Configuring application settings 185 Table 72 Spanning Tree Bridge Information page items Section Item Range Description Maximum Age Time 6..40 seconds The Maximum Age Time parameter value that the root bridge is currently using. This value specifies the maximum age that a Hello message can attain before it is discarded. Note: The root bridge’s Maximum Age Time parameter value becomes the actual Maximum Age Time parameter value for all bridges participating in the spanning tree network.
Configuring application settings Configuring MultiLink Trunk (MLT) members You can configure groups of links between the BPS 2000 and another switch or a server to provide higher bandwidth with active redundant links. Trunked ports can span multiple units of the stack for fail-safe connectivity to mission-critical servers and the network center. You can configure two to four switch ports together as members of a trunk to a maximum of six trunks.
Configuring application settings 187 Figure 88 Group page Using Web-based Management for the Business Policy Switch 2000 Software Version 1.
Configuring application settings Table 73 describes the items on the Group page. Table 73 Group page items Section Item Range Description MultiLink Trunk Group Setting Trunk 1..6 This column contains fields in each row that can be configured to create the corresponding trunk. The Unit value in the (Unit/Port) field is configurable only when the switch (unit) is part of a stack configuration.
Configuring application settings 189 Monitoring MLT traffic You can monitor the bandwidth usage for the MultiLink Trunk member ports within each trunk in your configuration by selecting the traffic type to monitor. To monitor MultiLink Trunk traffic: 1 From the main menu, choose Application > MultiLink Trunk > Utilization. The Utilization page opens (Figure 89). Figure 89 Utilization page Table 74 describes the items on the Utilization page.
Configuring application settings Table 74 Utilization page items (continued) Section Item Range Description MultiLink Trunk Utilization Table Unit/Port A list of the trunk member switch ports that correspond to the trunk specified in the Trunk column. Last 5 Minutes% The percentage of packets (of the type specified in the Traffic Type field) used by the port in the last five minutes. This field provides a running average of network activity, and is updated every 15 seconds.
Chapter 8 Implementing Quality of Service (QoS) You can configure Quality of Service (QoS) features in your network using the Web-based QoS Wizard or by using the advanced QoS configuration pages available in the Web-based management user interface. Refer to Using the Business Policy Switch 2000 Software Version 1.2. for a sample QoS configuration using the advanced QoS Web pages.
Implementing Quality of Service (QoS) Using QoS Wizard The QoS application delivers a set of tools that, when optimally configured, combats escalating bandwidth costs and optimizes application performance in your network. QoS tools allow you to prioritize your critical applications and sensitive traffic. You can tailor appropriate services to support this traffic over the wide area, thus maintaining the necessary performance levels on an end-to-end basis.
Implementing Quality of Service (QoS) 193 Figure 90 QoS Wizard opening page 2 To continue the configuration process, click Next. A packet prioritization selection page opens (Figure 91). Figure 91 Packet prioritization selection page 3 Select No. Using Web-based Management for the Business Policy Switch 2000 Software Version 1.
Implementing Quality of Service (QoS) 4 Click Next. A Standard prioritization page opens (Figure 92). Note: If you want to prioritize traffic, skip this step and continue the steps outlined in “Prioritizing traffic with the QoS Wizard.” T Figure 92 Standard prioritization page 5 To complete the configuration process, click Next. The session confirmation page appears (Figure 93).
Implementing Quality of Service (QoS) 195 To assign priority levels to different types of network traffic: 1 From the main menu, choose Application > QoS > QoS Wizard. The QoS Wizard opens (Figure 90). 2 To continue the configuration process, click Next. A packet prioritization selection page opens (Figure 91 on page 193). 3 Select Yes. 4 Click Next. A packet prioritization explanation page opens (Figure 94).
Implementing Quality of Service (QoS) Figure 95 Application prioritization selection page 6 To choose an application for traffic prioritization, select the check box in the row of the application(s) you want. 7 From the list in each application row, choose the type of traffic prioritization you want. 8 Click Next. An additional traffic flow prioritization page opens (Figure 96). Figure 96 Additional traffic flow prioritization page 9 To complete the traffic prioritization session, select No.
Implementing Quality of Service (QoS) 197 A VLAN prioritization page opens (Figure 97). Figure 97 VLAN prioritization page 11 Select No. 12 Click Next. A session verification page opens (Figure 98). Figure 98 Session verification page 13 After verifying the information, click Next (or click Back to make changes to the appropriate pages). A session confirmation page opens (Figure 93).
Implementing Quality of Service (QoS) 1 To define additional traffic flows, on the additional traffic flow priority page (Figure 96), select Yes. 2 Click Next. A traffic flow label page opens (Figure 99). Figure 99 Traffic flow label page 3 Type a character string to identify the traffic flow. 4 Click Next. A classification rules page opens (Figure 100).
Implementing Quality of Service (QoS) 199 Figure 100 Classification rules page Table 75 describes the items on the classification rules page. Table 75 Classification rules page items Item Range Description IP Address XXX.XXX.XXX.XXX Select the check box to activate the classification rule, and then type the IP address to match against the packet’s source or destination IP address. Mask Bits Integer Select the check box to activate the classification rule.
Implementing Quality of Service (QoS) Table 75 Classification rules page items (continued) Item Range Description L4 Port Src (min) Integer (0.65535) Select the check box to activate the classification rule, and then type the minimum value that the packet’s layer 4 source port number must have and match this filter. L4 Port Src (max) Integer (0.
Implementing Quality of Service (QoS) 8 201 Click Next. An additional traffic prioritization page opens (Figure 96). 9 To define additional traffic flows, select Yes and repeat steps 1through 7; or select No. 10 Click Next. A VLAN prioritization page opens. 11 Select No. 12 Click Next. A session verification page opens (Figure 98). 13 After verifying the information, click Next (or click Back to make changes to the appropriate pages). A session confirmation page opens (Figure 93).
Implementing Quality of Service (QoS) Figure 102 VLAN selection page 3 From the list, select the VLAN to receive better service. 4 Click Next. A VLAN service class selection page opens (Figure 103). Figure 103 VLAN service class selection page 5 Select the check box of the priority level (service class) to assign to the VLAN. 6 Click Next. A session verification page opens (Figure 98).
Implementing Quality of Service (QoS) 7 203 After verifying the information, click Next (or click Back to make changes to the appropriate pages). A session confirmation page opens (Figure 93). The number of applications you can select and the number of traffic flows you can define are dependent on the Business Policy Switch configuration environment. Refer to Table 76 for a list of filter limitations.
Implementing Quality of Service (QoS) Note: An extended sample of using the QoS Advanced pages to configure QoS parameters is shown in the Using the Business Policy Switch 2000 Software Version 1.2. Configuring an interface group You view existing interface group configurations, or create or modify an interface group if you want a port (or ports) to assign the same QoS policy to all interfaces in the group. Note: One default role combination covers all ports of the device.
Implementing Quality of Service (QoS) 205 Figure 104 Interface Configuration page Table 77 describes the items on the Interface Queue Table section of the Interface Configuration page. Table 77 QoS Interface Queue Table section items Item Description Set ID The number that identifies a specific queue set. Queue ID The number that identifies the queue in the given set. General Discipline The queueing discipline that is associated with the specified queue.
Implementing Quality of Service (QoS) Table 78 describes the items on the Interface Group Table section of the Interface Group page. Table 78 Interface Group Table section items Item Description Opens a modification page. Deletes the row. Role Combination The tag used to identify interfaces with the characteristics specified by the attributes of this class instance (string 1..64).
Implementing Quality of Service (QoS) 207 Table 79 describes the items on the Interface Group Creation section of the Interface Group page. Table 79 Interface Group Creation section page items Item and MIB association Range Description Role Combination (qosInterfaceTypeRoles) 1..64 Type a character string to identify the role combination.
Implementing Quality of Service (QoS) Figure 105 Interface ID page Table 81 describes the items on the Interface ID page. Table 80 Interface ID page items Item Description Interface Displays the unit and port number. Role Combination Displays the role combination associated with the interface. Queue Sets Displays the queue set associated with this interface.
Implementing Quality of Service (QoS) 209 The Interface Group Assignment page opens (Figure 106). Figure 106 Interface Group Assignment page Table 81 describes the items on the Interface Group Assignment page. Table 81 Interface Group Assignment page items Item Description Role Combination The tag used to identify interfaces with the characteristics specified by the attributes of this class instance (string 1..64).
Implementing Quality of Service (QoS) Deleting an interface group configuration To delete an Interface group configuration: 1 From the main menu, choose Application > QoS > QoS Advanced > Devices > Interface Configuration. The Interface Configuration page opens (Figure 104). 2 In the Interface Group Table section, in the interface group configuration row of your choice, click the Modify icon. The Interface Group Assignment page opens (Figure 106).
Implementing Quality of Service (QoS) 211 You can assign 802.1p user priority values to a queue for each interface with a specific queue set. This information is used for assigning egress traffic to outbound queues. To configure 802.1p user priority: 1 From the main menu, choose Application > QoS > QoS Advanced > Devices > Priority Q Assign. The 802.1p Priority Queue Assignment page opens (Figure 107). Figure 107 802.1p Priority Queue Assignment page Table 82 describes the items on the 802.
Implementing Quality of Service (QoS) 2 In the 802.1p Priority Assignment section, select the queue set to view in the 802.1p Priority Assignment Table. 3 Click Submit The table is updated with the queue set you requested. 4 In the 802.1p Priority Assignment Table section, type the information in the text boxes. 5 Click Submit. Note: Clicking Submit in the 802.1p Priority Assignment Table section results in a system reset. Configuring 802.
Implementing Quality of Service (QoS) 213 Figure 108 802.1p Priority Mapping page Table 83 describes the items on the 802.1p Priority Mapping page. Table 83 802.1p Priority Mapping page items Item Description 802.1p Priority The 802.1p user priority to map to a DSCP value at ingress. DSCP Type the DSCP value to associate with the specified 802.1p user priority value at ingress. 2 Type the information in the text boxes. 3 Click Submit.
Implementing Quality of Service (QoS) 1 From the main menu, choose Application > QoS > QoS Advanced > Devices > DSCP Q Assignment. The DSCP Queue Assignment page opens (Figure 109). Figure 109 DSCP Queue Assignment page Table 84 describes the items on the DSCP Queue Assignment page. Table 84 DSCP Queue Assignment page items Section Item Format DSCP Assignment (View By) Queue Set Choose the queue set to display in the DSCP Assignment Table.
Implementing Quality of Service (QoS) 215 Configuring DSCP mapping Note: Nortel Networks recommends using the default DSCP mappings to ensure end-to-end QoS connectivity. To configure DSCP to 802.1p user priority/drop precedence mapping: 1 From the main menu, choose Application > QoS > QoS Advanced > Devices > DSCP Mapping. The DSCP Mapping page opens (Figure 110). Figure 110 DSCP Mapping Table page Using Web-based Management for the Business Policy Switch 2000 Software Version 1.
Implementing Quality of Service (QoS) Table 85 describes the items on the DSCP Mapping Table page. Table 85 DSCP Mapping Table page items Item Format Opens a modification page. DSCP The attribute used internally to determine the appropriate Layer 2 cost of service (CoS) mappings. 802.1p Priority The IEEE802 CoS value used when mapping the DSCP value specified by the qos802DscpMappingDscp attribute to an IEEE 802 CoS.
Implementing Quality of Service (QoS) 217 Table 86 DSCP Mapping Modification page items (continued) Item Range Format Drop Precedence Loss Sensitive Not Loss Sensitive Choose the drop value precedence to use for traffic with the associated 802.1p user priority value with the identified queue. Selecting a Loss Sensitive value specifies a low packet drop precedence; selecting a Not Loss Sensitive value specifies a high packet drop precedence.
Implementing Quality of Service (QoS) Creating an IP filter configuration To create an IP filter configuration: 1 From the main menu, choose Application > QoS > QoS Advanced > Rules > IP Classification. The IP Classification page opens (Figure 112, Figure 113, and Figure 114).
Implementing Quality of Service (QoS) 219 Figure 113 IP Classification page (2 of 3) Figure 114 IP Classification page (3 of 3) Note: When you choose the Ignore value, the filter matches all criteria for that parameter. Using Web-based Management for the Business Policy Switch 2000 Software Version 1.
Implementing Quality of Service (QoS) Table 87 describes the items on the IP Filter Table and IP Filter Creation sections of the IP Classification page. Table 87 IP Filter Table and Filter Creation sections page items Section Item and MIB association IP Filter Table Action Range Description Deletes the row. Note: You cannot delete a filter if it is referenced in a filter group. Instance IP Filter Creation/ Destination Address 209570-B Displays unique identifier.
Implementing Quality of Service (QoS) 221 Table 87 IP Filter Table and Filter Creation sections page items (continued) Item and MIB association Section Host Address) IP Filter Creation/ Source Address Range Description XXX.XXX.XXX. XXX Click if you want the filter to match the packet’s destination host IP address. Enter the IP address to match against the packet’s destination IP address. Ignore Click if you want the filter to ignore the packet’s source IP address. Network Address XXX.XXX.XXX.
Implementing Quality of Service (QoS) 2 In the IP Filter Creation section, type information in the text boxes, or select from a list. 3 Click Submit. The new IP filter configuration appears in the IP Filter Table (Figure 112). Note: An IP filter configuration is not modifiable. The filter must be deleted and then re-created. Deleting an IP filter configuration To delete an IP filter configuration: 1 From the main menu, choose Application > QoS > QoS Advanced > Rules > IP Classification.
Implementing Quality of Service (QoS) 223 The IP Classification page opens (Figure 112). Table 88 describes the items on the IP Filter Group section of the IP Classification page. Table 88 IP Filter Group section page items Item Description Opens a modification page. Deletes the row. Filter Group Name A list of existing filter group configurations. Opens a filter group creation page. 2 Click Create Filter Group. The IP Classification Group page opens (Figure 115).
Implementing Quality of Service (QoS) Table 89 describes the items on the IP Classification Group page. Table 89 IP Classification Group page items Item Range Description Filter Group Name 1..16 Enter a character string to create an identity for the filter group configuration. Group Select (or deselect) the filter from membership in the filter group. Order Integer Type a number to establish the evaluation order of filters in the group.
Implementing Quality of Service (QoS) 2 225 In the IP Filter Group Table section, in the IP filter group configuration of your choice, click the Modify icon. The IP Group Modification page opens (Figure 116). Figure 116 IP Group Modification page Table 90 describes the items on the IP Group Modification page. Table 90 IP Modification Group page items Item Range Description Filter Group Name 1..16 Displays the name of the selected the filter group.
Implementing Quality of Service (QoS) Table 90 IP Modification Group page items Item Range Source L4 Port Description The value that the packet’s layer 4 source port number can have and match the filter entry. Permit (1) True (2) False If the frame matches the filter when this is set to true, the matching process stops. Note: To group multiple filters in a single group, assign Filter Index and Filter Order the same filter group name.
Implementing Quality of Service (QoS) 227 Layer 2 filter and layer 2 filter group configurations You can configure layer 2 filters by defining IEEE 802-based parameters, and selective layer 3 and layer 4 parameters. Layer 2 filter groups are defined by specifying the layer 2 filter to be included in the given filter group. Creating a layer 2 filter configuration To create a layer2 filter configuration: 1 From the main menu, choose Application > QoS > QoS Advanced > Rules > Layer2 Classification.
Implementing Quality of Service (QoS) Figure 118 Layer2 Classification page (2 of 3) Figure 119 Layer2 Classification page (3 of 3) Table 91 describes the items on the Layer2 Filter Table and Layer2 Filter Creation sections of the Layer2 Classification page. Table 91 Layer2 Filter Table and Layer2 Filter Creation section items Section Item Layer 2 Filter Table Action Deletes the row. Instance Displays unique identifier.
Implementing Quality of Service (QoS) 229 Table 91 Layer2 Filter Table and Layer2 Filter Creation section items (continued) Section Item Range Description VLAN Tag (1) Tagged (2) Untagged (3) Ignore Displays whether or not to check VLAN tagging. EtherType Ignore Displays the EtherType to match.
Implementing Quality of Service (QoS) Table 91 Layer2 Filter Table and Layer2 Filter Creation section items (continued) Section Layer2 Filter Creation 209570-B Item Range Description IP Protocol Ignore TCP UDP ICMP IGMP RSVP Displays the IP protocol to match against the packet’s IP protocol field. Destination IP L4 Port Min Ignore, Integer (0.65535) Displays the least value that the packet’s layer 4 destination port number can have and match this filter.
Implementing Quality of Service (QoS) 231 Table 91 Layer2 Filter Table and Layer2 Filter Creation section items (continued) Section Item Range Description EtherType Ignore Choose the EtherType to match. Netmap TCP Netmap XNS XTP LOOP Vines Vines IP Banyan Vines Echo Vines Banyon Echo ARP RARP Note: If you choose User Defined, enter the value.
Implementing Quality of Service (QoS) Table 91 Layer2 Filter Table and Layer2 Filter Creation section items (continued) Section Item Range Description IP Protocol Ignore TCP UDP ICMP IGMP RSVP Select the IP protocol to match against the packet’s IP protocol field. Destination IP L4 Port Range Ignore, Min, Max Choose Ignore or type the minimum value and the maximum value that the packet’s layer 4 destination port number can have and match this filter.
Implementing Quality of Service (QoS) 233 A message opens prompting you to confirm your request. 3 Do one of the following: • • Click Yes to delete the filter configuration. Click Cancel to return to the Layer2 Classification page without making changes. Note: A Layer 2 filter configuration cannot be modified. The configuration must be deleted and then recreated.
Implementing Quality of Service (QoS) 2 Click Create Filter Group. The Layer2 Group page opens (Figure 120). Figure 120 Layer2 Group page Table 93 describes the items on the Layer2 Group page. Table 93 Layer2 Group page items Item Range Description Filter Group Name 1..16 Enter a character string to create an identity for the filter group configuration. Group Order Select (or deselect) the filter from membership in the filter group.
Implementing Quality of Service (QoS) 235 Table 93 Layer2 Group page items Item Range Source L4 Port Max Description The maximum value that the packet’s layer 4 source port number can have and match this filter. Note: To group multiple filters in a single group, assign Filter Index and Filter Order the same filter group name. 3 Type information in the text boxes, or click the check box. 4 Click Submit. The new layer 2 filter group configuration appears in the Layer Filter Group Table (Figure 117).
Implementing Quality of Service (QoS) Table 94 describes the items on the Layer2 Group modification page. Table 94 Layer2 Group modification page items Item Range Description Filter Group Name 1..16 Displays the filter group name. Group Select (or deselect) the filter from membership in the filter group. Order Integer Enter a number to establish the evaluation order of filters in the group. Instance Displays a unique identifier. Filter ID Displays the filter identifier.
Implementing Quality of Service (QoS) 2 237 In the Layer2 Filter Group Table section, in the layer 2 filter group configuration row of your choice, click the Delete icon. A message opens prompting you to confirm your request. 3 Do one of the following: • • Click Yes to delete the filter group configuration. Click Cancel to return to the Layer2 Classification page without making changes. Note: You cannot delete a filter group that is referenced by a policy. You must first delete the policy.
Implementing Quality of Service (QoS) Figure 122 Action page Table 95 describes the items on the Action page. Table 95 Action page items Item and MIB association Range Description Deletes the row. Action Name 1..16 Instance Transmit/Drop Frame (qosActionDrop) Type a character string to uniquely identify the action configuration. Displays the unique identifier. (1) Transmit (2) Drop Choose whether the frame being evaluated should be dropped or transmitted by this attribute.
Implementing Quality of Service (QoS) 239 Table 95 Action page items (continued) Item and MIB association Range Description Set Drop Precedence (ntnQosActionExtSetDropPrec) (1) Ignore (2) Loss Sensitive (3) Not loss Sensitive (4) Use Defaults (5) Use Egress Map Choose a packet drop precedence value.
Implementing Quality of Service (QoS) 1 Create and name an In-Profile Action. 2 Create and name your own Out-Profile Action. 3 Click Submit Deleting an action configuration To delete an action configuration: 1 From the main menu, choose Application > QoS > QoS Advanced > Actions. The Action page opens (Figure 122). 2 In the Action Table section, in the filter action configuration row of your choice, click the Delete icon. A message opens prompting you to confirm your request.
Implementing Quality of Service (QoS) 241 Configuring QoS meters You must create meters when using the QoS Web-based management interface Advanced Pages. You choose either No Meter Data or Metered Data, which sets metering, or policing limits, on the traffic. Note: You must create meters for every action. If you do not want to meter the data, or police the data, choose No Meter Data. You need only create an In-Profile action for this type of data.
Implementing Quality of Service (QoS) 2 In the Meter Creation area, create the meters. Table 96 describes the fields in the Meter Creation area, which you use to set new meters. Table 96 Meter Creation fields Item Range Description Name 1 to 16 alphanumeric characters with no spaces Enter the name for the meter you are creating. Data Specification (1) No Meter Data (2) Metered Data Choose whether you want to meter the data or not.
Implementing Quality of Service (QoS) 243 Viewing meters To view a meter: 1 From the main menu, choose Application > QoS > QoS Advanced > Meters. The Meters page opens (Figure 123). 2 View created meters in the Meter Table. Table 97 describes the fields in the Meter Table area. Table 97 Meter Table fields Item Range Description Action Deletes the meter. Name Displays the name of the meter. Instance Displays the unique identifier.
Implementing Quality of Service (QoS) 3 Do one of the following: • • Click Yes to delete the meter configuration. Click Cancel to return to the Meter page without making changes. Note: You cannot delete a meter that is referenced by a policy. You must delete the policy first. Configuring QoS policies You can configure QoS policies by creating filters in the hardware that apply a set of packet filtering criteria and actions to individual interfaces.
Implementing Quality of Service (QoS) 245 Figure 124 Policies page Note: Policy configurations are not modifiable. They must be deleted and the information re-entered. Using Web-based Management for the Business Policy Switch 2000 Software Version 1.
Implementing Quality of Service (QoS) Table 98 describes the items on the Policy page. Table 98 Policy page items Section Item and MIB association Policy Table Action Range Description Opens a view only statistics table. The table displays current filter statistics in bytes and packets. Deletes the row. Policy Name Policy Creation 1..16 Instance Displays the unique identifier. Filter Group Type The type of filter group that is referenced by this instance of the Target class.
Implementing Quality of Service (QoS) 247 Viewing a hardware policy configuration To view statistics for a selected hardware policy configuration: 1 From the main menu, choose Application > QoS > QoS Advanced > Policies. The Policies page opens (Figure 124). 2 In the Policy Table section, in the filter group configuration of your choice, click the View icon. The Policy Statistics page opens (Figure 125). Figure 125 Policy Statistics page Table 99 describes the items on the Policy Statistics page.
Implementing Quality of Service (QoS) Table 99 Policy Statistics page items (continued) Item and MIB association Description In Profile Octets The total number of in-profile octets associated with packet hits for this policy. Total Overflow In Profile Octets (ntnQosTargetTotalInProf Octets) The total number of times the associated ntnQosTargetTotalOctets counter overflowed. Out Profile Octets The total number of out-of-profile octets associated with packet hits for this policy.
Implementing Quality of Service (QoS) 249 To open the Agent page: 1 From the main menu, choose Application > QoS > QoS Advanced > Agent. The Agent page opens (Figure 126 and Figure 127). Figure 126 Agent page (1 of 2) Figure 127 Agent page (2 of 2) Using Web-based Management for the Business Policy Switch 2000 Software Version 1.
Implementing Quality of Service (QoS) Table 100 describes the items on the Agent page. Table 100 Agent page items Section Item and MIB association Range Description QoS Configuration QoS Policy Server Control Enabled Disabled Choose to enable or disable the QoS Policy server control. Note: Choosing to enable COPS disables local policy control. QoS Policy Agent State (ntnQosConfigQpaState) Running Initialized Disabled The current status of the policy agent.
Implementing Quality of Service (QoS) 251 Table 100 Agent page items (continued) Section Item and MIB association Policy Device Identification Table Range Description Maximum Installed Instances The maximum number of allowed class entries. Description The system description. Maximum Message Size The maximum target message size supported by the device. 2 In the QoS Configuration section, type information in the text boxes, or select from a list. 3 Click Submit.
Implementing Quality of Service (QoS) 209570-B
Chapter 9 Implementing Common Open Policy Services (COPS) Enabling COPS in your networks allows the policy server to: • • • Gather all relevant information. Make a decision based on your (as network administrator) set policies and network resources, Communicate that decision in the form of proper service to the appropriate group or client (bandwidth, ACLs, QoS). A solid COPS strategy is closely tied to Internet Protocol (IP) address management and network management.
Implementing Common Open Policy Services (COPS) Viewing COPS statistics and capabilities You can view a list of the capabilities of the COPS client to connect to a COPS server and view a table displaying the current status of all COPS server connections. To view COPS capabilities and statistics: 1 From the main menu, choose Application > COPS > Status. The Status page opens (Figure 128). Figure 128 Status page Table 101 describes the items on the Status page.
Implementing Common Open Policy Services (COPS) 255 Table 101 Status page items (continued) Section Item Descriptions COPS Current Table, cont. Type The indicator of the source of the COPS server information. Note: COPS servers can be configured by network management into copsClientServerConfigTable and appear in this entry with type copsServerStatic(1).
Implementing Common Open Policy Services (COPS) Table 101 Status page items (continued) Section Item Descriptions COPS Statistics Table, cont. TCP Connection Attempts The number of times that the COPS client attempted to open a TCP connection to the COPS server. Note: This value is valid only for client type 0. Note: This is a cumulative value and is not zeroed on new connections. TCP Connection Failures The number of times that the COPS client failed to open a TCP connection to the COPS server.
Implementing Common Open Policy Services (COPS) 257 Table 101 Status page items (continued) Section Item Descriptions COPS Statistics Table, cont. Bad Sends The total number of COPS packets that the client attempted to send to COPS servers marked for the selected client type that resulted in a transmit error. Note: This is a cumulative value and is not zeroed on new connections.
Implementing Common Open Policy Services (COPS) Figure 129 Configuration page Table 102 describes the items on the COPS Configuration Table section of the Configuration page. Table 102 COPS Configuration Table section items Section Item COPS Configuration Table Range Description Deletes the row. Address Type The type of address in copsClientServerConfigAddress. Address The IPv4, IPv6, or DNS address of the COPS server.
Implementing Common Open Policy Services (COPS) 259 Table 102 COPS Configuration Table section items (continued) Section Item Range Description COPS Configuration Table, cont. Auth Type The authentication mechanism for this COPS client to request when negotiating security at the start of a connection to a COPS server. TCP Port The TCP port number on the COPS server. Priority The level of priority assigned to the client.
Implementing Common Open Policy Services (COPS) Deleting a COPS client configuration To delete a COPS client configuration: 1 From the main menu, choose Application > COPS > Configuration. The Configuration page opens (Figure 129). 2 In the COPS Configuration Table, click the Delete icon for the entry you want to delete. A message opens prompting you to confirm your request. 3 Do one of the following: • • 209570-B Click Yes to delete the configuration.
Chapter 10 Support menu The customer support options available to you are: • • • • Help Release Notes Manuals Upgrade Using the online help option You can read information about management page functions in the online help menu embedded in the Web-based management interface. To open online help: 1 From the main menu, choose Support > Help or click the Help icon located in the upper right corner of any management page. The Online Help menu opens in a separate Web browser (Figure 130).
Support menu Figure 130 Online help window 2 Click on any content item to read information about the topic (if you clicked the Help icon on a management page, information about that page is immediately displayed). 3 Click Return to Top to return to the Content index. 4 Close the Web browser Downloading technical publications You can download current documentation about the Web-based management user interface from Nortel Networks Technical Documentation Web site.
Support menu 263 Figure 131 Nortel Networks Technical Documentation Web site 2 Locate your product, and click the document you want to download. The BPS 2000 documentation is in the Data and Internet Product Family. 3 Click on the PDF icon to start the download process (you need Adobe Acrobat 3.0 or later to view or print documents from this site). 4 Follow the prompts to download the documentation. 5 Close the Web browser.
Support menu Nortel Networks Customer Support opens in a separate Web browser (Figure 132). Figure 132 Nortel Networks Customer Support Web site 209570-B 2 Follow the prompts to download the software release. 3 Close the Web browser.
Index Numbers 450 Image Filename field 106 802.1p Assignment Table 212 security, configuring passwords 39 remote dial-in access 41 system information, viewing 38 802.1p Priority field 211, 213, 216, 229, 234, 236 Administrative Status field 86 802.1p Priority Mapping page 212 Administrative Traffic Control field 86 802.
Index Auth Failures field 257 broadcast domains, configuring 172 Auth Missing ffield 257 Broadcast field 121, 125, 129 Auth Type field 259 broadcast traffic 149 Authentication Password field 67 Authentication Protocol field 66 C Authentication Protocols Supported field 64 Capabilities field 209 Authentication Trap field 63 Carrier Sense Errors field 138 authentication traps, enabling 62 Cascade Ports field 209 Authorization Type field 255 check boxes, about 34 Autonegotiation field 103,
Index 267 Console Switch Password Type field 40 Drop Events field 120, 125 Console/Communication Port page 111 drop precedence 215 conventions, text 22 Drop Precedence field 216, 217 conversation steering 146 DSCP 225 802.
Index Filter Group field 246, 247 high speed flow control, configuring 104 Filter Group Name field 224, 225, 234, 236 Host Address field 221 Filter Group Type 247 Hybrid Stack 112 Filter Group Type field 246 hybrid stack 27 Filter Tagged Frames field 173 Filter Unregistered Frames 173 I Filter Untagged Frames field 173 icons, about 34 Filtererd Packets field 129 Identify Unit Numbers page 56 Find MAC Address page 100 IGMP Multicast Group Membership page 154 Flooded Packets field 129 IGM
Index 269 Interface Group Creation 204 L4 Port Src field 200 Interface Group Table 204 Last BootP field 59 Interface ID page 207 Last Conn Attempt field 255 Interface ID Table 207 Last Error field 255 Interface page 134 Late Collisions field 130, 133, 139 Interface Queue Table 204 Layer2 Classification page 227 interface statistics viewing 134, 135 viewing in a bar graph format 136 viewing in a pie chart format 136 Layer2 Filter Creation 227 Internal MAC Receive Errors field 138 Internal MAC T
Index security table 94 Monitoring 147 MAC Address Security field 91 Monitoring Mode field 147 MAC Address Security SNMP-Locked field 91 monitoring modes 148 MAC Address Table page 99 Msg Processing Model field 81 MAC address-based port mirroring 146, 148 multicast 151 MAC addresses locating a specific address 100 viewing learned addresses 99 Multicast field 121, 125, 129 main menu headings and options 32 icons 33, 35 Multicast Group Address field 154 multicast traffic 149 Maintain Policin
Index 271 O remote dial-in access 41 Telnet 39 Web 39 Octets field 120, 125 online help, accessing 261 Path Cost field 183 Open Attempts field 256 Permit field 220, 224, 226 Open Failures field 256 physical view 51 Operational State field 48, 50 PIDs 164 Operational Status field 86 Policies page 244 Operational Traffic Control field 86 Policy Class Name field 250 Order field 224, 225, 234, 236 Policy Name field 246, 247 Out Discards field 135 Policy Order field 246 Out Errors field 135 P
Index viewing in a pie chart format 131 zeroing ports 130 Port/Port Membership field 161, 167 port-based port mirroring 146, 148 ports enabling 103 trusted, untrusted, and unrestricted 206, 217 power status 49 Power Status field 50 Preconfigured Port # field 221 Preferred Phy field 105 Primary RADIUS Server field 41 Priority field 182, 259 Private Protocol field 66 Private Protocols Supported field 64 product support 23 Protocol field 158, 163, 220, 221, 224, 225, 234, 236 Proxy field 151, 153 publicati
Index 273 loss sensitivity 217, 237 matching 217, 227 metered data 239 metering 25 meters 239 deleting 243 no meter data 239 order 222 out-of-profile action 239 packet reordering 244, 248 policies 204 configuring 241, 244 statistics 247 policing 25 policy server control 248 ports 204 adding or removing 208 type (trusted, untrusted, unrestricted) 206 type (trusted, untrusted, untrestricted) 217 queue sets 210, 211, 213, 250 DSCP associations, creating 213 role combinations adding 208 deleting 210 modifying 2
Index resetting the switch/stack, to system defaults 44 S Retrieve Configuration Image from Server field 109 Sample/Alarm Sample field 116 Retry Algorithm field 259 Retry Count field 259 Retry Interval field 259 Rising Action 115 Rising Level field 115 RMON Ethernet statistics viewing 120 viewing in a bar graph format 122 viewing in a pie chart format 123 history statistics viewing 124 viewing in a line graph format 126 RMON Ethernet Chart page 122 Secondary RADIUS Server field 41 security 25, 84 E
Index 275 SNMP Trap Receiver page 82 Source IP L4 Port Min field 230 SNMP/Access field 88 Source IP L4 Port Range field 232 SNMP/Use List field 88 Source L4 Port field 220, 224, 226 SNMPv1 about 61 configuring 62 Source L4 Port Max field 235, 236 Source L4 Port Min field 234, 236 SNMPv1 page 62 SNMPv3 63 about 61 configuring 63 group access rights 71 deleting 72 group membership 68 deleting 70 management information views 73 deleting 75 system information, viewing 63 system notification entries 75 d
Index statistics 26, 113, 122, 124, 126, 127, 130, 132, 137, 141 system information, viewing 38 Status field 133 system location, naming 60 Status page 254 System Log page 118 STGs 176 system log, viewing 118 STP Learning field 188 System Name field 61 Subnet Mask field 220 system name, configuring 60 summary options changing stack numbering 54 identifying unit numbers 56 viewing stack information 47 switch information 49 switch information in real time 51 System Object ID field 61 Supplic
Index 277 Target Parameter page 80 viewing in a bar graph format 144 viewing in a pie chart format 143 Target Retry Count field 79 Target Tag List field 79 Trap Receiver Index field 83 Target Timeout field 79 traps 82 TCP 199 Triggered By field 118 TCP Connection Attmepts field 256 troubleshooting 26 access 87, 89 configuration file 110 COPS 259 defaults 44 mixed stack 27 QoS 192, 204, 206, 210, 212, 213, 215, 217, 239, 241, 245 spanning tree groups 28, 176, 180 stacking 26, 53, 112 STGs 176 VLANs
Index Unknown Ctype field 256 Unknown Engine IDs field 65 Add VLAN page 179 Remove VLAN page 180 Unknown Opcode field 256 VLAN Membership page 179 Unknown User Name field 65 VLAN Name field 158, 159, 163, 167, 168, 170, 175 unregistererd frames 172 unrestricted ports 206, 209, 217 Unsupported Client Type field 256 Unsupported Security Level field 65 Unsupported Version field 256 Untagged Access 174 untagged access 161 untagged frames 172 untrusted ports 206, 209, 217 Update 802.
Index 279 Web Page/Access field 88 Web Password Setting page 39 Web/Use List field 89 Web-based management interface home page, graphic 30 logging in 29 main menu, icons 33, 35 management page 34 navigating the menu 31 requirements to use 28 Web page layout 30 Web page layout, graphic 31 Write View field 72 Wrong Digest field 65 Wrong Objects field 257 Wrong OpCode field 257 Using Web-based Management for the Business Policy Switch 2000
Index 209570-B