Concept Guide

Application Name Port Number Client Server
443 for secure httpd
8008 HTTP server port for confd application
8888 secure HTTP server port for confd
application
If you congure a source interface is for any EIS management application, EIS might not coexist with that interface and the behavior is
undened in such a case. You can congure the source interface for the following applications: FTP, ICMP (ping and traceroute utilities),
NTP, RADIUS, TACACS, Telnet, TFTP, syslog, and SNMP traps. Out of these applications, EIS can coexist with only syslog and SNMP traps
because these applications do not require a response after a packet is sent.
The switch also processes user-specied port numbers for applications such as RADIUS, TACACS, SSH, and sFlow. The OS maintains a list
of congured management applications and their port numbers. You can congure two default routes, one congured on the management
port and the other on the front-end port.
Two tables, namely, Egress Interface Selection routing table and default routing table, are maintained. In the preceding table, the columns
Client and Server indicate that the applications can act as both a client and a server within the switch. The Management Egress Interface
Selection table contains all management routes (connected, static and default route). The default routing table contains all management
routes (connected, static and default route) and all front-end port routes.
Enabling and Disabling Management Egress Interface Selection
You can enable or disable egress-interface-selection using the management egress-interface-selection command.
NOTE
: Egress Interface Selection (EIS) works only with IPv4 routing.
When the feature is enabled using the management egress-interface-selection command, the following events are performed:
The CLI prompt changes to the EIS mode.
In this mode, you can run the application and no application commands
Applications can be congured or uncongured as management applications using the application or no application
command. All congured applications are considered as management applications and the rest of them as non-management
applications.
All the management routes (connected, static and default) are duplicated and added to the management EIS routing table.
Any new management route added is installed to both the EIS routing table and default routing table.
For management applications, route lookup is preferentially done in the management EIS routing table for all trac. management port is
the preferred egress port. For example, if SSH is a management application, an SSH session to a front-panel port IP on the peer box is
initiated via management port only, if the management port is UP and management route is available.
If SSH request is received on the management port destined to the management port IP address, the response to the request is sent
out of the management port by performing a route lookup in the EIS routing table
If the SSH request is received on the front-end port destined for the front-end IP address, the response trac is sent by doing a route
lookup in the default routing table only.
If the management port is down or route lookup fails in the management EIS routing table, packets are dropped.
For all non-management applications, trac exits out of either front-end data port or management port based on route lookup in
default routing table.
Ping and traceroute are always non-management applications and route lookup for these applications is done in the default routing table
only.
380
Internet Group Management Protocol (IGMP)