Alteon Os 22.0.2 Command Reference
Alteon Os 22.0.2 Command Reference
Command Reference
4655 Great America Parkway Santa Clara, CA 95054 Phone 1-800-4Nortel http://www.nortelnetworks.com
Copyright 2005 Nortel Networks, Inc., 4655 Great America Parkway, Santa Clara, California 95054, USA. All rights reserved. Part Number: 315393-J. This document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this document may be reproduced in any form by any means without prior written authorization of Nortel Networks, Inc. Documentation is provided as is without warranty of any kind, either express or implied, including any kind of implied or express warranty of noninfringement or the implied warranties of merchantability or fitness for a particular purpose. U.S. Government End Users: This document is provided with a commercial item as defined by FAR 2.101 (Oct 1995) and contains commercial technical data and commercial software documentation as those terms are used in FAR 12.211-12.212 (Oct 1995). Government End Users are authorized to use this documentation only in accordance with those rights and restrictions set forth herein, consistent with FAR 12.211- 12.212 (Oct 1995), DFARS 227.7202 (JUN 1995) and DFARS 252.227-7015 (Nov 1995). Nortel Networks, Inc. reserves the right to change any products described herein at any time, and without notice. Nortel Networks, Inc. assumes no responsibility or liability arising from the use of products described herein, except as expressly agreed to in writing by Nortel Networks, Inc. The use and purchase of this product does not convey a license under any patent rights, trademark rights, or any other intellectual property rights of Nortel Networks, Inc.
Alteon OS, Alteon 2424, Alteon 2424-SSL, Alteon 2224, 2216, 2208, 3408, Alteon 180, Alteon 180e,
Alteon 184, Alteon AD3, Alteon AD4, and ACEswitch are trademarks of Nortel Networks, Inc. in the United States and certain other countries. Cisco and EtherChannel are registered trademarks of Cisco Systems, Inc. in the United States and certain other countries. Check Point and FireWall-1 are trademarks or registered trademarks of Check Point Software Technologies Ltd. Any other trademarks appearing in this manual are owned by their respective companies. Originated in the U.S.A.
Contents
Preface 15 Who Should Use This Book 15 How This Book Is Organized 15 Related Documentation 16 Typographic Conventions 17 How to Get Help 18 Chapter 1: The Command Line Interface 19 Connecting to the Switch 20 Establishing a Console Connection 20 Requirements 20 Procedure 20 Establishing a Telnet Connection 21 Using a BOOTP Server 21 Running Telnet 21 Establishing an SSH Connection 22 Running SSH 22 Accessing the Switch 23 CLI Versus Setup 25 Command Line History and Editing 25 Idle Timeout 25 Chapter 2: First-Time Configuration 27 Using the Setup Utility 27 Information Needed For Setup 27 Starting Setup When You Log In 28 Stopping and Restarting Setup Manually 29 Stopping Setup 29 Restarting Setup 29 Setup Part 1: Basic System Configuration 29
3
Setup Part 2: Port Configuration 31 Setup Part 3: VLANs 34 Setup Part 4: IP Configuration 35 IP Interfaces 35 Default Gateways 36 IP Routing 37 Setup Part 5: Final Steps 38 Optional Setup for SNMP Support 39 Optional Setup for Telnet Support 39 Setting Passwords 40 Changing the Default Administrator Password 40 Changing the Default User Password 42 Changing the Default Layer 4 Administrator Password 44 Chapter 3: Menu Basics 47 The Main Menu 47 Menu Summary 48 Global Commands 49 Command Line History and Editing 51 Command Line Interface Shortcuts 52 Command Stacking 52 Command Abbreviation 52 Tab Completion 52 Chapter 4: The Information Menu 53 Information Menu 53 System Information Menu 55 SNMPv3 System Information Menu 57 SNMPv3 USM User Table Information 58 SNMPv3 View Table Information 59 SNMPv3 Access Table Information 60 SNMPv3 Group Table Information 61 SNMPv3 Community Table Information 61 SNMPv3 Target Address Table Information 62 SNMPv3 Target Parameters Table Information 63 SNMPv3 Notify Table Information 64 SNMPv3 Dump Information 65 General System Information 66
4 Contents
Show Last 30 Syslog Messages 67 Saved Syslog Messages 68 Management Port Information 69 SONMP Information 70 System Capacity Information 71 System Information Dump 74 Layer 2 Information Menu 77 Layer 2 FDB Information 78 Show All FDB Information 79 Clearing Entries from the Forwarding Database 80 Link Aggregation Control Protocol Information Menu 80 LACP Aggregator Information 81 LACP Port Information 82 LACP Dump Information 84 Layer 2 Spanning Tree Group Information 85 Trunk Group Information 87 VLAN Information 88 Layer2 Dump Information 89 Layer3 Information Menu 90 IP Routing Information 91 Show All IP Route Information 92 Type Parameters 92 Tag Parameters 93 ARP Information Menu 93 Show ARP Entries on Referenced SP 95 Show All ARP Entry Information 95 ARP Address List Information 96 BGP Information Menu 96 BGP Peer information 97 BGP Summary information 97 Dump BGP Information 98 OSPF Information Menu 98 OSPF General Information 100 OSPF Interface Information 100 OSPF Database Information 101 OSPF Information Route Codes 102 OSPF Dump Information 103 IP Information 104
Contents 5
VRRP Information 105 Layer3 Dump Information 107 Layer 4 Information Menu 110 Session Table Information 112 Samples of Session Dumps for Different Applications 113 Session dump information in Alteon OS 115 Global SLB Information Menu 117 Show All Layer 4 Information 118 Link Status Information 119 Port Information 120 Bandwidth Management Information 121 BWM IP User Information Menu 122 BWM Contract Information 124 Security Information 126 Software Enabled Keys 127 Information Dump 127 Chapter 5: The Statistics Menu 129 Statistics Menu 129 Port Statistics Menu 131 Bridging Statistics 132 Ethernet Statistics 133 Interface Statistics 136 Interface Protocol Statistics 138 Link Statistics 139 RMON Statistics 140 Port Dump Statistics 143 Layer 2 Statistics Menu 144 FDB Statistics 145 LACP Statistics 146 Spanning Tree Group Statistics 147 Layer 3 Statistics Menu 148 OSPF Statistics Menu 150 OSPF Global Statistics 151 IP Statistics 155 Route Statistics 157 ARP statistics 159 VRRP Statistics 159
6 Contents
DNS Statistics 160 ICMP Statistics 161 Interface Statistics 163 TCP Statistics 165 UDP Statistics 167 Server Load Balancing Statistics Menu 167 Server Load Balancing SP statistics Menu 170 SP Real Server Statistics 170 SP Filter Statistics 171 SP Maintenance Statistics 172 Global SLB Statistics Menu 174 Real Server Global SLB Statistics 175 Virtual Server Global SLB Statistics 175 Global SLB Site Statistics 176 Global SLB Maintenance Statistics 177 Real Server SLB Statistics 179 Per Service Octet Counters 179 Real Server Group Statistics 180 Virtual Server SLB Statistics 181 Filter SLB Statistics 181 SLB Layer7 Statistics Menu 182 Layer7 Redirection Statistics 182 Layer 7 SLB String Statistics 183 Layer 7 SLB Maintenance Statistics 184 SLB Secure Socket Layer Statistics 186 File Transfer Protocol SLB and Filter Statistics Menu 187 Active FTP SLB Parsing and Filter Statistics 188 Passive FTP SLB Parsing Statistics 188 FTP SLB Maintenance Statistics 189 FTP SLB Statistics Dump 189 RTSP SLB Statistics 190 DNS SLB Statistics 191 WAP SLB Statistics 192 SLB Maintenance Statistics 194 SIP SLB Statistics 196 Clearing the SLB Statistics 196 BWM Statistics Menu 198 BWM Switch Processor Statistics 199
Contents 7
BWM Switch Processor Contract Statistics Menu 199 BWM Switch Processor Rate Contract Statistics 199 BWM Contract Statistics 200 BWM Contract Rate Statistics 201 BWM History Statistics 203 BWM Maintenance Statistics 204 BWM IP Users Statistics 204 Management Processor Statistics 205 MP Packet Statistics 206 TCP Statistics 208 UCB Statistics 208 MP-Specific SFD Statistics 209 CPU Statistics 209 SP Specific Statistics 210 SP-Specific Maintenance Statistics 211 CPU Statistics 211 Security Statistics 212 DOS Attack Statistics Menu 213 Types of DOS Attacks 214 IP Access Control List Statistics 214 UDP Blast Statistics 215 UDP Blast Dump Statistics 215 UDP Pattern Match Statistics 216 Rate Limiting Statistics 216 Dump Statistics for Security 217 SNMP Statistics 218 NTP Statistics 222 Port Mirroring Statistics Menu 224 Management Port Statistics 224 Dump Statistics 225 Chapter 6: The Configuration Menu 227 Configuration Menu 227 Viewing, Applying, and Saving Changes 228 Viewing Pending Changes 229 Applying Pending Changes 229 Saving the Configuration 229 System Configuration 231
8 Contents
System Host Log Configuration 233 Seven Levels of Severity 234 Management Port Configuration Menu 234 Management Port Link Menu 237 SSH Server Configuration Menu 237 RADIUS Server Configuration 239 TACACS+ Server Configuration Menu 240 NTP Server Configuration 242 SynOptics Network Management Protocol Configuration 243 System SNMP Configuration 244 SNMPv3 Configuration Menu 247 User Security Model Configuration Menu 249 SNMPv3 View Configuration Menu 250 View-based Access Control Model Configuration Menu 251 SNMPv3 Group Configuration Menu 253 SNMPv3 Community Table Configuration Menu 254 SNMPv3 Target Address Table Configuration Menu 255 SNMPv3 Target Parameters Table Configuration Menu 256 SNMPv3 Notify Table Configuration Menu 257 System Health Check Configuration Menu 258 System Access Control Configuration 259 Management Networks Menu 260 User Access Control Menu 261 HTTPS Access Configuration Menu 263 System User ID Configuration Menu 264 Port Configuration 265 Alteon OS 2000 Series 265 Fast Ethernet Ports 265 SFP GBIC Ports 265 Port Link Configuration 267 Alteon OS 3000 Series 269 Port Configuration on Alteon OS 3408 269 Single-Mode ports 270 Single-Mode Copper Port Gigabit Ethernet Link Configuration Menu 271 Single-Mode SFP Gigabit Ethernet Port Link Configuration Menu 273 Dual-Mode Ports 274 Dual-Mode Copper Port Link Configuration 276 Dual-Mode SFP Gigabit Link Configuration Menu 277
Contents 9
Temporarily Disabling a Port 277 Port Mirroring Menu 278 Port-Mirroring Menu 278 Bandwidth Management Configuration 279 Bandwidth Management Contract Configuration 281 BWM Contract Time Policy Configuration Menu 283 Bandwidth Management Policy Configuration 284 Bandwidth Management Group Configuration Menu 285 Bandwidth Management Current Configuration 286 Layer 2 Configuration Menu 287 Spanning Tree Group Configuration 288 Bridge Spanning Tree Configuration 290 Spanning Tree Port Configuration 291 Trunk Configuration 292 Link Aggregation Control Protocol Menu 294 LACP Port Configuration Menu 296 VLAN Configuration 297 Layer 3 Configuration Menu 299 IP Interface Configuration 301 Default IP Gateway Configuration 302 Default Gateway Metrics 303 IP Static Route Configuration 304 ARP Configuration Menu 304 ARP Static Configuration Menu 305 IP Forwarding Configuration Menu 306 Local Network Route Caching Definition 306 Defining IP Address Ranges for the Local Route Cache 307 Network Filter Configuration 308 Route Map Configuration Menu 309 IP Access List Configuration Menu 311 Autonomous System Filter Path 312 Routing Information Protocol Configuration 313 Open Shortest Path First Configuration 315 Area Index Configuration Menu 317 OSPF Summary Range Configuration Menu 318 OSPF Interface Configuration Menu 319 OSPF Virtual Link Configuration Menu 321 OSPF Host Entry Configuration Menu 322
10 Contents
OSPF Route Redistribution Configuration Menu. 323 OSPF MD5 Key Configuration Menu 324 Border Gateway Protocol Configuration 324 BGP Peer Configuration Menu 326 BGP Redistribution Configuration Menu 328 BGP Aggregate Routing Configuration Menu 329 IP Forwarding Port Configuration Menu 330 Domain Name System Configuration Menu 331 Bootstrap Protocol Relay Configuration Menu 332 VRRP Configuration Menu 333 Virtual Router Configuration Menu 334 Virtual Router Priority Tracking Configuration 336 Virtual Router Group Menu 338 Virtual Router Group Priority Tracking Configuration Menu 340 Virtual Router Group Configuration 341 Virtual Router Group Priority Tracking Configuration 343 VRRP Interface Configuration 345 VRRP Tracking Configuration 346 Default Gateway Metrics 347 Security Configuration Menu 348 IP Address Access Control List Configuration Menu 349 Pattern Matching Menu 350 Port Security Configuration Menu 351 UDP Blast Protection Configuration Menu 352 Setup 353 Dump 353 Saving the Active Switch Configuration 354 Restoring the Active Switch Configuration 354 Chapter 7: The SLB Configuration Menu 355 SLB Configuration 356 Filtering and Layer 4 (Server Load Balancing) 358 Real Server SLB Configuration 358 Real Server Layer 7 Configuration 362 Real server IDS Configuration Menu 363 Real Server Group SLB Configuration 364 SLB Health Check Types 367 Server Load Balancing Metrics 370
Contents 11
Virtual Server SLB Configuration 372 Virtual Server Service Configuration 375 Virtual Server RTSP Configuration 380 Cookie-Based Persistence 381 SLB Filter Configuration 383 Defining IP Address Ranges for Filters 387 Advanced Filter Configuration 388 802.1p Advanced Menu 391 Advanced Filter TCP Configuration 392 IP Advanced Menu 393 ICMP Message Types 394 Layer 7 Advanced Filter Configuration Menu 395 SLB Filter Advanced Security Menu 397 Advanced Security Rate Limiting Configuration Menu 398 Port SLB Configuration 399 Global SLB Configuration 401 GSLB Remote Site Configuration 403 GSLB Network Preference Configuration Menu 405 GSLB Rule Configuration Menu 406 Global SLB Rule Metric Menu 408 Layer 7 SLB Resource Definition Menu 408 Web Cache Redirection Configuration 409 Server Load Balance Resource Configuration Menu 411 WAP Configuration 412 Synchronize Peer Switch Configuration 413 Peer Switch Configuration 414 Advanced Layer 4 Configuration 415 SYN Attack Detection Configuration Menu 418 Advanced SMT Real Server Port Configuration Menu 418 Inbound Link Load Balancing configuration Menu 419 Inbound Link Load Balancing Domain Record Menu 420 Inbound Link Load Balancing Mapping Menu 421 Advanced Health Check Configuration Menu 421 Scriptable Health Checks Configuration 423 SNMP Health Check Configuration 425 WAP Health Check Configuration 426 WSP Content Health Check 428 WTP and WSP Content Health Check Menu 429
12 Contents
Proxy IP Address Configuration Menu 430 SLB Peer Proxy IP Address Menu 431 Chapter 8: The Operations Menu 433 Operations Menu 433 Operations-Level Port Options 435 Operations-Level SLB Options 436 Real Server Group Operations 437 Global SLB Operations Menu 438 Operations-Level VRRP Options. 439 Operations-Level Bandwidth Management Options 439 Operations-Level IP Options 440 Operations-Level BGP Options 440 Activating Optional Software 441 Removing Optional Software 442 Chapter 9: The Boot Options Menu 443 Boot Menu 443 Scheduled Reboot of the Switch 444 Scheduled Reboot Menu 444 Updating the Switch Software Image 444 Downloading New Software to Your Switch 444 Selecting a Software Image to Run 446 Uploading a Software Image from Your Switch 446 Selecting a Configuration Block 447 Resetting the Switch 448 Chapter 10: The Maintenance Menu 449 Maintenance Menu 449 System Maintenance Options 451 Forwarding Database Options 451 ARP Cache Options 452 ARP Entries on a Single Port 453 IP Route Manipulation 454 Debugging Options 455 Uuencode Flash Dump 456 TFTP System Dump Put 456 Clearing Dump Information 457 Panic Command 457
315393-J, January 2005
Contents 13
Unscheduled System Dumps 458 Appendix A: Alteon OS Syslog Messages 459 LOG_WARNING 459 LOG_ALERT 460 LOG_CRIT 461 LOG_ERR 461 LOG_NOTICE 467 LOG_INFO 469 Appendix B: Alteon OS SNMP Agent 471 Appendix C: Performing a Serial Download 475 Glossary 477 Index 481
14 Contents
Preface
The Alteon OS 22.0.2 Command Reference describes how to configure and use the Alteon OS software with your Alteon OS. For documentation on installing the switches physically, see the Hardware Installation Guide for your particular switch model.
First-Time Configuration, describes how to use the Setup utility for initial switch configuration and how to change the system passwords. Menu Basics, provides an overview of the menu system, including a menu map, global commands, and menu shortcuts.
The Information Menu, shows how to view switch configuration parameters. The Statistics Menu, shows how to view switch performance statistics. The Configuration Menu, shows how to configure switch system parameters, ports, VLANs, Spanning Tree Protocol, SNMP, Port Mirroring, IP Routing, Port Trunking, and more.
15
The SLB Configuration Menu, shows how to configure Server Load Balancing, Filtering, Global Server Load Balancing, and more.
The Operations Menu, shows how to use commands which affect switch performance immediately, but do not alter permanent switch configurations (such as temporarily disabling ports). The menu describes how to activate or deactivate optional software features.
The Boot Options Menu, describes the use of the primary and alternate switch images, how
to load a new software image, and how to reset the software to factory defaults.
The Maintenance Menu, shows how to generate and access a dump of critical switch state
information, how to clear it, and how to clear part or all of the forwarding database.
Appendix A, Alteon OS Syslog Messages, shows a listing of syslog messages. Appendix B, Alteon OS SNMP Agent, lists the Management Interface Bases (MIBs) sup-
Index includes pointers to the description of the key words used throughout the book.
Related Documentation
Alteon OS 22.0.2 Application Guide (Part No. 315394-H) Provides application explanations and configuration examples for the Switch. Alteon OS Browser-Based Interface (BBI) Quick Guide (315395-C) Provides a description of the Switch BBI and how to configure and access it on the Switch. Alteon Application Switch Hardware Installation Guide (315396-E) Provides a description of the Alteon Application Switch hardware, the physical features, how to install it, and how to troubleshoot it. Alteon OS 22.0.2 Release Notes (315397-H). This document provides a description of new features and caveats and limitations, if any, in the software.
16 Preface
Typographic Conventions
The following table describes the typographic styles used in this book. Table 1 Typographic Conventions
Typeface or Symbol AaBbCc123 Meaning This type is used for names of commands, files, and directories used within the text. Example View the readme.txt file.
It also depicts on-screen computer output and Main# prompts. AaBbCc123 This bold type appears in command examples. It shows text that must be typed in exactly as shown. Main# sys
<AaBbCc123> This italicized type appears in command To establish a Telnet session, enter: examples as a parameter placeholder. Replace host# telnet <IP address> the indicated text with the appropriate real name or value when using the command. Do not type the brackets. This also shows book titles, special terms, or words to be emphasized. [ ] Command items shown inside brackets are optional and can be used or excluded as the situation demands. Do not type the brackets. Read your Users Guide thoroughly. host# ls [-a]
Preface 17
Additional information about the Nortel Networks Technical Solutions Centers is available at the following URL: http://www.nortelnetworks.com/help/contact/global An Express Routing Code (ERC) is available for many Nortel Networks products and services. When you use an ERC, your call is routed to a technical support person who specializes in supporting that product or service. To locate an ERC for your product or service, refer to the following URL: http://www.nortelnetworks.com/help/contact/erc/index.html
18 Preface
CHAPTER 1
The command line interface is the most direct method for collecting switch information and performing switch configuration. Using a basic terminal, you are presented with a hierarchy of menus that enable you to view information and statistics about the switch, and to perform any necessary configuration. This chapter explains how to access the Command Line Interface (CLI) to the switch.
19
A standard serial cable with a male DB9 connector (see your switch hardware installation guide for specifics).
Procedure
1. 2. 3. Connect the terminal to the Console port using the serial cable. Power on the terminal. To establish the connection, press <Enter> a few times on your terminal. You will next be required to enter a password for access to the switch. (For more information, see Setting Passwords on page 40).
NOTE You need to enable Telnet and SSH, using serial connection, before you can use these methods of accessing the switch. Refer to Establishing a Telnet Connection on page 21.
Running Telnet
Once the IP parameters on the Alteon Application Switch are configured, you can access the CLI using a Telnet connection. To establish a Telnet connection with the switch, run the Telnet program on your workstation and issue the Telnet command, followed by the switch IP address:
telnet <IP address>
The following SSH clients have been tested: SSH 1.2.23 and SSH 1.2.27 for Linux (freeware) SecureCRT 3.0.2 and SecureCRT 3.0.3 (Van Dyke Technologies, Inc.) F-Secure SSH 1.1 for Windows (Data Fellows)
NOTE The Alteon OS implementation of SSH is based on SSH version 1.5 and supports SSH-1.5-1.X.XX. SSH clients of other versions (especially Version 2) will not be supported.
Running SSH
Once the IP parameters are configured and the SSH service is turned on the Alteon Application Switch, you can access the command line interface using an SSH connection. To establish an SSH connection with the switch, run the SSH program on your workstation by issuing the SSH command, followed by the switch IP address:
>> # ssh <switch IP address>
You will then be prompted to enter your user name and password.
Access to switch functions is controlled through the use of unique surnames and passwords. Once you are connected to the switch via local console, Telnet, or SSH, you are prompted to enter a password. The default user names/password for each access level are listed in the following table. NOTE It is recommended that you change default switch passwords after initial configuration and as regularly as required under your network security policies. For more information, see Setting Passwords on page 40.
SLB Operator
The SLB Operator manages Web servers and other Internet ser- slboper vices and their loads. In addition to being able to view all switch information and statistics, the SLB Operator can enable/disable servers using the Server Load Balancing operation menu. The Layer 4 Operator manages traffic on the lines leading to the l4oper shared Internet services. This user currently has the same access level as the SLB operator. and the access level is reserved for future use, to provide access to operational commands for operators managing traffic on the line leading to the shared Internet services. The Operator manages all functions of the switch. In addition to oper SLB Operator functions, the Operator can reset ports or the entire switch. The SLB Administrator configures and manages Web servers and other Internet services and their loads. In addition to SLB Operator functions, the SLB Administrator can configure parameters on the Server Load Balancing menus, with the exception of not being able to configure filters or bandwidth management. The Layer 4 Administrator configures and manages traffic on the lines leading to the shared Internet services. In addition to SLB Administrator functions, the Layer 4 Administrator can configure all parameters on the Server Load Balancing menus, including filters and bandwidth management. The superuser Administrator has complete access to all menus, information, and configuration commands on the Alteon Application Switch, including the ability to change both the user and administrator passwords. slbadmin
Layer 4 Operator
Operator
SLB Administrator
Layer 4 Administrator
l4admin
Administrator
admin
NOTE With the exception of the admin user, access to each user level can be disabled by setting the password to an empty value. All user levels below admin will by default be initially disabled (empty password) until they are enabled by the admin user. This prevents inadvertently leaving the switch open to unauthorized users.
Information Menu Statistics Menu Configuration Menu Operations Command Menu Boot Options Menu Maintenance Menu Show pending config changes [global command] Apply pending config changes [global command] Save updated config to FLASH [global command] Revert pending or applied changes [global command] Exit [global command, always available]
NOTE If you are accessing a user account or Layer 4 administrator account, some menu options will not be available.
Idle Timeout
By default, the switch will disconnect your console or Telnet session after five minutes of inactivity. This function is controlled by the idle timeout parameter, which can be set from 1 to 10080 minutes. For information on changing this parameter, see System Configuration on page 231.
CHAPTER 2
First-Time Configuration
To help with the initial process of configuring your switch, the Alteon OS software includes a Setup utility. The Setup utility prompts you step-by-step to enter all the necessary information for basic configuration of the switch. This chapter describes how to use the Setup utility and how to change system passwords. NOTE If you are configuring a 2000-SSL Series Switch, you can use the Switch Setup Utility in the Alteon OS 2000-SSL Series Quick Setup Guide (part number 215102-A) instead for setting up the Switch and the SSL Processor. Then return to this guide for configuration and management information on your Switch.
Date & time Whether to use BOOTP or not Whether to use Spanning Tree Protocol or not Management port configuration
Speed, duplex, flow control, and negotiation mode (as appropriate) Whether to use VLAN tagging or not (as appropriate)
27
IP address, subnet mask, and broadcast address, and VLAN for each IP interface IP addresses for up to four default gateways Destination, subnet mask, and gateway IP address for each IP static route Whether IP forwarding is enabled or not Whether the RIP supply is enabled or not
2.
Enter admin as the default administrator password. If the factory default configuration is detected, the system prompts:
Connected to Alteon Application Switch 2424 18:44:05 Mon April 12, 2004 The switch is booted with factory default configuration. To ease the configuration of the switch, a "Set Up" facility which will prompt you with those configuration items that are essential to the operation of the switch is provided. Would you like to run "Set Up" to configure the switch? [y/n]:
NOTE If the default admin login is unsuccessful, or if the administrator Main Menu appears instead, the system configuration has probably been changed from the factory default settings. If you are certain that you need to return the switch to its factory default settings, see Selecting a Configuration Block on page 447. 3. Enter y to begin the initial configuration of the switch, or n to bypass the Setup facility.
Restarting Setup
You can restart the Setup utility manually at any time by entering the following command at the administrator prompt:
# /cfg/setup
1.
Enter y if you will be configuring VLANs. Otherwise enter n. If you decide not to configure VLANs during this session, you can configure them later using the configuration menus, or by restarting the Setup facility. For more information on configuring VLANs, see the Alteon OS 22.0.2 Application Guide. Next, the Setup utility prompts you to input basic system information.
2.
Enter the last two digits of the year as a number from 00 to 99. 00 is considered 2000. To keep the current year, press <Enter>.
3.
Enter the month as a number from 1 to 12. To keep the current month, press <Enter>. 4. Enter the day of the current date at the prompt:
Enter day [12]:
Enter the date as a number from 1 to 31. To keep the current day, press <Enter>. 5. Enter the hour of the current system time at the prompt:
System Time: Enter hour in 24-hour format [18]:
Enter the hour as a number from 00 to 23. To keep the current hour, press <Enter>. 6. Enter the minute of the current time at the prompt:
Enter minutes [55]:
Enter the minute as a number from 00 to 59. To keep the current minute, press <Enter>. 7. Enter the seconds of the current time at the prompt:
Enter seconds [37]:
Enter the seconds as a number from 00 to 59. To keep the current second, press <Enter>. The system displays the date and time settings:
System clock set to 18:55:36 Mon April 12, 2004.
8.
disabled
If available on your network, a BOOTP server can supply the switch with IP parameters so that you do not have to enter them manually. BOOTP must be disabled however, before the system will prompt for IP parameters. Enter d to disable the use of BOOTP, or enter e to enable the use of BOOTP. To keep the current setting, press <Enter>. 9. Turn Spanning Tree Protocol on or off at the prompt:
Spanning Tree: Current Spanning Tree setting: ON Turn Spanning Tree OFF? [y/n]
Enter y to turn off Spanning Tree, or enter n to leave Spanning Tree on.
If you answer y to configure the management port, you will be prompted for IP address, subnet mask, broadcast address, default gateway, and other management port options. 2. Select the port to configure, or skip port configuration at the prompt:
Port Config: Enter port number: (1-28)
If you wish to change settings for individual ports, enter the number of the port you wish to configure. To skip port configuration, press <Enter> without specifying any port and go to Setup Part 3: VLANs on page 34.
3.
If appropriate, configure Ethernet/Fast Ethernet port speed. If you selected a port that has an Ethernet/Fast Ethernet connector, the system prompts:
Fast Link Configuration: Port Speed: Current Port 1 speed setting: 10/100 Enter new speed ["10"/"100"/"any"]:
Enter the port speed from the options available, or enter any to have the switch auto-sense the port speed. To keep the current setting, press <Enter>. 4. If appropriate, configure Ethernet/Fast Ethernet port duplex mode. If you selected a port that has an Ethernet/Fast Ethernet connector, the system prompts:
Port Mode: Current port 1 mode setting: any Enter new speed ["full"/"half"/"any"]
Enter full for full-duplex, half for half-duplex, or any to have the switch auto-negotiate. To keep the current setting, press <Enter>. 5. If appropriate, configure Ethernet/Fast Ethernet port flow control. If you selected a port that has an Ethernet/Fast Ethernet connector, the system prompts:
Port Flow Control: Current Port 1 flow control setting: both Enter new value ["rx"/"tx"/"both"/"none"]:
Enter rx to enable receive flow control, tx for transmit flow control, both to enable both, or none to turn flow control off for the port. To keep the current setting, press <Enter>. 6. If appropriate, configure Ethernet/Fast Ethernet port autonegotiation mode. If you selected a port that has an Ethernet/Fast Ethernet connector, the system prompts:
Port Auto Negotiation: Current Port 1 autonegotiation: Enter new value ["on"/"off"]:
on
Enter on to enable autonegotiation, off to disable it, or press <Enter> to keep the current setting.
7.
If appropriate, configure Gigabit Ethernet port flow parameters. If you selected a port that has a Gigabit Ethernet connector, the system prompts:
Gig Link Configuration: Port Flow Control: Current Port 1 flow control setting: both Enter new value ["rx"/"tx"/"both"/"none"]:
Enter rx to enable receive flow control, tx for transmit flow control, both to enable both, or none to turn flow control off for the port. To keep the current setting, press <Enter>. 8. If appropriate, configure Gigabit Ethernet port autonegotiation mode. If you selected a port that has a Gigabit Ethernet connector, the system prompts:
Port Auto Negotiation: Current Port 1 autonegotiation: Enter new value ["on"/"off"]:
on
Enter on to enable port autonegotiation, off to disable it, or press <Enter> to keep the current setting. 9. If configuring VLANs, enable or disable VLAN tagging for the port. If you have selected to configure VLANs back in Part 1, the system prompts:
Port VLAN tagging config (tagged port can be a member of multiple VLANs) Current TAG flag: disabled Enter new TAG status [d/e]:
Enter d to disable VLAN tagging for the port or enter e to enable VLAN tagging for the port. To keep the current setting, press <Enter>. 10. The system prompts you to configure the next port:
Enter port number:
When you are through configuring ports, press <Enter> without specifying any port. Otherwise, repeat the steps in this section.
If you wish to change settings for individual VLANs, enter the number of the VLAN you wish to configure. To skip VLAN configuration, press <Enter> without typing a VLAN number and go to Setup Part 4: IP Configuration on page 35. 2. Enter the new VLAN name at the prompt:
VLAN is newly created. Pending new VLAN name: "VLAN 2" Enter new VLAN name, without quotes:
Entering a new VLAN name is optional. To use the pending new VLAN name, press <Enter>. 3. Enter the VLAN port numbers. The system prompts you to define the first port in the VLAN:
Define ports in VLAN: Current VLAN 2: empty Enter port numbers one per line, NULL at end:
Type the first port number to add to the current VLAN and press <Enter>. The right angle prompt appears:
>
For each additional port in the VLAN, type the port number and press <Enter> to move to the next line. Repeat this until all ports for the VLAN being configured are entered. When you are finished adding ports to this VLAN, press <Enter> without specifying any port. 4. The system prompts you to configure the next VLAN:
VLAN Config: Enter VLAN number from 2 to 4090, NULL at end:
Repeat the steps in this section until all VLANs have been configured. When all VLANs have been configured, press <Enter> without specifying any VLAN.
IP Interfaces
IP interfaces are used for defining subnets to which the switch belongs. Up to 256 IP interfaces can be configured on the Alteon Application Switch. The IP address assigned to each IP interface provides the switch with an IP presence on your network. No two IP interfaces can be on the same IP subnet. The interfaces can be used for connecting to the switch for remote configuration, and for routing between subnets and VLANs (if used). 1. Select the IP interface to configure, or skip interface configuration at the prompt:
IP Config: IP interfaces: Enter interface number: (1-256)
NOTE The total number of interfaces on an Alteon Application Switch 2424-SSL is 1-255. If you wish to configure individual IP interfaces, enter the number of the IP interface you wish to configure. To skip IP interface configuration, press <Enter> without typing an interface number and go to Default Gateways on page 36. 2. For the specified IP interface, enter the IP address in dotted decimal notation:
Current IP address: Enter new IP address: 0.0.0.0
To keep the current setting, press <Enter>. 3. At the prompt, enter the IP subnet mask in dotted decimal notation:
Current subnet mask: Enter new subnet mask: 0.0.0.0
To keep the current setting, press <Enter>. 4. At the prompt, enter the broadcast IP address in dotted decimal notation:
Current broadcast address: Enter new broadcast address: 0.0.0.0
To keep the current setting, press <Enter>. 5. If configuring VLANs, specify a VLAN for the interface. This prompt appears if you selected to configure VLANs back in Part 1:
Current VLAN: Enter new VLAN: 1
Enter the number for the VLAN to which the interface belongs, or press <Enter> without specifying a VLAN number to accept the current setting. 6. At the prompt, enter y to enable the IP interface, or n to leave it disabled:
Enable IP interface? [y/n]
7.
Repeat the steps in this section until all IP interfaces have been configured. When all interfaces have been configured, press <Enter> without specifying any interface number.
Default Gateways
1. At the prompt, select a default gateway for configuration, or skip default gateway configuration:
IP default gateways: Enter default gateway number: (1-259)
Enter the number for the default gateway to be configured. To skip default gateway configuration, press <Enter> without typing a gateway number and go to IP Routing on page 37.
2.
At the prompt, enter the IP address for the selected default gateway:
Current IP address: Enter new IP address: 0.0.0.0
Enter the IP address in dotted decimal notation, or press <Enter> without specifying an address to accept the current setting. 3. At the prompt, enter y to enable the default gateway, or n to leave it disabled:
Enable default gateway? [y/n]
4.
Repeat the steps in this section until all default gateways have been configured. When all default gateways have been configured, press <Enter> without specifying any number.
IP Routing
When IP interfaces are configured for the various subnets attached to your switch, IP routing between them can be performed entirely within the switch. This eliminates the need to bounce inter-subnet communication off an external router device. Routing on more complex networks, where subnets may not have a direct presence on the Alteon Application Switch, can be accomplished through configuring static routes or by letting the switch learn routes dynamically. This part of the Setup program prompts you to configure the various routing parameters. 1. At the prompt, enable or disable forwarding for IP Routing:
Enable IP forwarding? [y/n]
Enter y to enable IP forwarding. To disable IP forwarding, enter n and proceed to Step 2.To keep the current setting, press <Enter>. 2. At the prompt, enable or disable the RIP supply:
Enable RIP supply? [y/n]
Enter y to restart the Setup utility from the beginning, or n to continue. 2. When prompted, decide whether you wish to review the configuration changes:
Review the changes made? [y/n]
Enter y to review the changes made during this session of the Setup utility. Enter n to continue without reviewing the changes. We recommend that you review the changes. 3. Next, decide whether to apply the changes at the prompt:
Apply the changes? [y/n]
Enter y to apply the changes, or n to continue without applying. Changes are normally applied. 4. At the prompt, decide whether to make the changes permanent:
Save changes to flash? [y/n]
Enter y to save the changes to flash. Enter n to continue without saving the changes. Changes are normally saved at this point. 5. If you do not apply or save the changes, the system prompts whether to abort them:
Abort all changes? [y/n]
Enter y to discard the changes. Enter n to return to the Apply the changes? prompt. NOTE After initial configuration is complete, it is recommended that you change the default passwords as shown in Setting Passwords on page 40.
NOTE If you need to configure SNMPv3, refer to SNMPv3 Configuration Menu on page 247 of this manual. 1. Enable SNMP and select one of the options.
>> # /cfg/sys/access/snmp (disabled/read-only/read-write) [d/r/w]:
2.
Set SNMP read or write community string. By default, they are public and private respectively.
>> # /cfg/sys/ssnmp/rcomm|wcomm
3.
Apply and save configuration if you are not configuring the switch with Telnet support. Otherwise apply and save after Optional Setup for Telnet Support on page 39.
>> System# apply >> System# save
2.
If your network uses Routing Interface Protocol (RIP), enter y to enable the RIP supply. Otherwise, enter n to disable it. When RIP is enabled, RIP listen is set by default.
Setting Passwords
It is recommended that you change the user and administrator passwords after initial configuration and as regularly as required under your network security policies. To change both the user password and the administrator password, you must login using the administrator password. Passwords cannot be modified from the user command mode. NOTE If you forget your administrator password, call your technical support representative for help using the password fix-up mode.
3.
From the Configuration Menu, use the following command to select the System Menu:
>> Configuration# sys
Syslog Menu Management Port Menu SSH Server Menu RADIUS Authentication Menu TACACS+ Authentication Menu NTP Server Menu SONMP Menu System SNMP Menu System Health Check Menu System Access Menu Set system date Set system time Set timeout for idle CLI sessions Set login notice Set login banner Set SMTP host Enable/disable display hostname (sysName) in CLI prompt Enable/disable use of BOOTP Display current system-wide parameters
4.
From the System menu, use the following path to select the User menu:
System# access/user
5.
6.
NOTE If you forget your administrator password, call your technical support representative for help using the password fix-up mode. 7. Enter the new administrator password at the prompt:
Enter new administrator password:
8.
9.
1. 2.
Connect to the switch and log in using the admin password. From the Main Menu, use the following command to access the Configuration Menu:
Main# cfg
3.
From the Configuration Menu, use the following command to select the System Menu:
>> Configuration# sys
4.
5.
Enter the current administrator password at the prompt. Only the administrator can change the user password. Entering the administrator password confirms your authority.
Changing USER password; validation required... Enter current administrator password:
6.
7.
8.
3.
4.
Enter the current administrator password (not the Layer 4 administrator password) at the prompt:
Changing L4 ADMINISTRATOR password; validation required... Enter current administrator password:
NOTE If you forget your administrator password, call your technical support representative for help using the password fix-up mode. 5. Enter the new Layer 4 administrator password at the prompt:
Enter new L4 administrator password:
6.
7.
CHAPTER 3
Menu Basics
The Alteon Application Switchs Command Line Interface (CLI) is used for viewing switch information and statistics. In addition, the administrator can use the CLI for performing all levels of switch configuration. To make the CLI easy to use, the various commands have been logically grouped into a series of menus and sub-menus. Each menu displays a list of commands and/or sub-menus that are available, along with a summary of what each command will do. Below each menu is a prompt where you can enter any command appropriate to the current menu. This chapter describes the Main Menu commands, and provides a list of commands and shortcuts that are commonly available from all the menus within the CLI.
[Main Menu] info stats cfg oper boot maint diff apply save revert exit
Information Menu Statistics Menu Configuration Menu Operations Command Menu Boot Options Menu Maintenance Menu Show pending config changes [global command] Apply pending config changes [global command] Save updated config to FLASH [global command] Revert pending or applied changes [global command] Exit [global command, always available]
47
Menu Summary
Information Menu Provides sub-menus for displaying information about the current status of the switch: from basic system settings to VLANs, Layer 4 settings, and more. Statistics Menu Provides sub-menus for displaying switch performance statistics. Included are port, IF, IP, ICMP, TCP, UDP, SNMP, routing, ARP, DNS, VRRP, and Layer 4 statistics. Configuration Menu This menu is available only from an administrator login. It includes sub-menus for configuring every aspect of the switch. Changes to configuration are not active until explicitly applied. Changes can be saved to non-volatile memory. Operations Command Menu Operations-level commands are used for making immediate and temporary changes to switch configuration. This menu is used for bringing ports temporarily in and out of service, performing port mirroring, and enabling or disabling Server Load Balancing functions. It is also used for activating or deactivating optional software packages. Boot Options Menu This menu is used for upgrading switch software, selecting configuration blocks, and for resetting the switch when necessary. Maintenance Menu This menu is used for debugging purposes, enabling you to generate a dump of the critical state information in the switch, and to clear entries in the forwarding database and the ARP and routing tables.
Global Commands
Some basic commands are recognized throughout the menu hierarchy. These commands are useful for obtaining online help, navigating through menus, and for applying and saving configuration changes. For help on a specific command, type help. You will see the following screen:
Global Commands: [can be issued from any menu] help up print lines verbose exit diff apply save ping traceroute telnet pushd popd who The following are used to navigate the menu structure: . Print current menu .. Move up one menu level / Top menu if first, or command separator ! Execute command from history
lines
exit or quit
traceroute
pwd verbose n
telnet
who
<Ctrl-n>
<Ctrl-a> <Ctrl-e> <Ctrl-b> <Ctrl-f> <Backspace> <Ctrl-d> <Ctrl-k> <Ctrl-l> <Ctrl-u> Other keys
Command Abbreviation
Most commands can be abbreviated by entering the first characters which distinguish the command from the others in the same menu or sub-menu. For example, the command shown above could also be entered as follows:
Main# c/l2/st/p
Tab Completion
By entering the first letter of a command at any menu prompt and hitting <Tab>, the CLI will display all commands or options in that menu that begin with that letter. Entering additional letters will further refine the list of commands or options displayed. If only one command fits the input text when <Tab> is pressed, that command will be supplied on the command line, waiting to be entered. If the <Tab> key is pressed without any input on the command line, the currently active menu will be displayed.
CHAPTER 4
mation.
The information provided by each menu option is briefly described in Table 4-1 on page 53, with pointers to where detailed information can be found. Table 4-1 Information Menu Options (/info)
Command Syntax and Usage sys Displays system menu information. To view menu options, see page 55. l2 Displays the Layer 2 Information Menu. For details, see page 77. l3 Displays the Layer 3 information menu. For details, see page 90.
53
Port number Port speed (10, 100, 10/100, or 1000) Duplex mode (half, full, or auto) Flow control for transmit and receive (no, yes, or auto) Link status (up or down) For details, see page 119.
Port number Whether the port uses VLAN Tagging or not Port VLAN ID (PVID) Port name VLAN membership For details, see page 120. Displays Bandwidth Management information. For details, see page 121.
bwm
security Displays current UDP blast settings and the security status of the port. To view a sample, see page 126. swkey Displays a list of all the optional software packages which have been activated or installed on your switch. For details see page 127. dump Dumps all switch information available from the Information Menu (10K or more, depending on your configuration). If you want to capture dump data to a file, set your communication software on your workstation to capture session data prior to issuing the dump commands. For details, see page 127.
log Displays last 30 syslog messages. See page 67 for a sample output and detailed information. savedlog Displays syslog messages that are saved in flash. See page 68 for a sample output. mgmt Displays Management port information. See page 69 for detailed information.
/info/sys/snmpv3
SNMPv3 System Information Menu
SNMP version 3 (SNMPv3) is an extensible SNMP Framework that supplements the SNMPv2 Framework by supporting the following: a new SNMP message format security for messages access control remote configuration of SNMP parameters
For more details on the SNMPv3 architecture please refer to RFC2271 to RFC2276.
[SNMPv3 Information Menu] usm - Show usmUser table information view - Show vacmViewTreeFamily table information access - Show vacmAccess table information group - Show vacmSecurityToGroup table information comm - Show community table information taddr - Show targetAddr table information tparam - Show targetParams table information notify - Show notify table information dump - Show all SNMPv3 information
/info/sys/snmpv3/usm
SNMPv3 USM User Table Information
The User-based Security Model (USM) in SNMPv3 provides security services such as authentication and privacy of messages. This security model makes use of a defined set of user identities displayed in the USM user table. The USM user table contains information like: the user name a security name in the form of a string whose format is independent of the Security Model an authentication protocol, which is an indication that the messages sent on behalf of the user can be authenticated the privacy protocol.
Protocol -------------------------------NO AUTH, NO PRIVACY HMAC_MD5, DES PRIVACY HMAC_SHA, DES PRIVACY NO AUTH, NO PRIVACY
/info/sys/snmpv3/view
SNMPv3 View Table Information
The user can control and restrict the access allowed to a group to only a subset of the management information in the management domain that the group can access within each context by specifying the groups rights in terms of a particular MIB view for security reasons.
View Name ----------------org v1v2only v1v2only v1v2only v1v2only Subtree -----------------1.3 1.3 1.3.6.1.6.3.15 1.3.6.1.6.3.16 1.3.6.1.6.3.18 Mask -------------Type -------included included excluded excluded excluded
Mask Type
/info/sys/snmpv3/access
SNMPv3 Access Table Information
The access control sub system provides authorization services. The vacmAccessTable maps a group name, security information, a context, and a message type, which could be the read or write type of operation or notification into a MIB view. The View-based Access Control Model defines a set of services that an application can use for checking access rights of a group. This group's access rights are determined by a read-view, a write-view and a notify-view. The read-view represents the set of object instances authorized for the group while reading the objects. The write-view represents the set of object instances authorized for the group when writing objects. The notify-view represents the set of object instances authorized for the group when sending a notification.
Group Name Prefix Model Level Match ReadV WriteV NotifyV ---------- ------ ------- ----------- ------ ---------admin usm noAuthNoPriv exact org org org v1v2grp snmpv1 noAuthNoPriv exact org org v1v2only admingrp usm authPriv exact org org org
Level
Match
ReadV
WriteV
NotifyV
/info/sys/snmpv3/group
SNMPv3 Group Table Information
A group is a combination of security model and security name that defines the access rights assigned to all the security names belonging to that group. The group is identified by a group name.
Sec Model ---------snmpv1 usm usm usm User Name ------------------------------v1v2only admin adminmd5 adminsha Group Name -------------------v1v2grp admin admingrp admingrp
/info/sys/snmpv3/comm
SNMPv3 Community Table Information
This command displays the community table information stored in the SNMP engine.
Index Name User Name Tag ---------- ---------- -------------------- ---------trap1 public v1v2only v1v2trap
/info/sys/snmpv3/taddr
SNMPv3 Target Address Table Information
This command displays the SNMPv3 target address table information, which is stored in the SNMP engine.
Name Transport Addr Port Taglist Params ---------- --------------- ---- ---------- --------------trap1 47.81.25.66 162 v1v2trap v1v2param
Table 4-9 SNMPv3 Target Address Table Information Parameters (/info/sys/ snmpv3/taddr)
Field Name Transport Addr Port Taglist Params Description Displays the locally arbitrary, but unique identifier associated with this snmpTargetAddrEntry. Displays the transport addresses. Displays the SNMP UDP port number. This column contains a list of tag values which are used to select target addresses for a particular SNMP message. The value of this object identifies an entry in the snmpTargetParamsTable. The identified entry contains SNMP parameters to be used when generating messages to be sent to this transport address.
/info/sys/snmpv3/tparam
SNMPv3 Target Parameters Table Information
Name MP Model --------------- -------v1v2param snmpv2c User Name -------------v1v2only Sec Model --------snmpv1 Sec Level --------noAuthNoPriv
Sec Level
/info/sys/snmpv3/notify
SNMPv3 Notify Table Information
Name Tag -------------------- -------------------v1v2trap v1v2trap
/info/sys/snmpv3/dump
SNMPv3 Dump Information
usmUser Table: User Name -------------------------------admin adminmd5 adminsha v1v2only Protocol -------------------------------NO AUTH, NO PRIVACY HMAC_MD5, DES PRIVACY HMAC_SHA, DES PRIVACY NO AUTH, NO PRIVACY
vacmAccess Table: Group Name Prefix Model Level Match ReadV WriteV NotifyV ---------- ------ ------- ---------- ------ ------- -------- -----admin usm noAuthNoPriv exact org org org v1v2grp snmpv1 noAuthNoPriv exact org org v1v2only admingrp usm authPriv exact org org org vacmViewTreeFamily Table: View Name Subtree -------------------- --------------org 1.3 v1v2only 1.3 v1v2only 1.3.6.1.6.3.15 v1v2only 1.3.6.1.6.3.16 v1v2only 1.3.6.1.6.3.18
Mask ------------
vacmSecurityToGroup Table: Sec Model User Name ---------- ------------------------------snmpv1 v1v2only usm admin usm adminsha
snmpCommunity Table: Index Name User Name Tag ---------- ---------- -------------------- ---------snmpNotify Table: Name Tag -------------------- -------------------snmpTargetAddr Table: Name Transport Addr Port Taglist Params ---------- --------------- ---- ---------- --------------snmpTargetParams Table: Name MP Model User Name Sec Model Sec Level -------------------- -------- ------------------ --------- -------
/info/sys/general
General System Information
On an Alteon Application Switch 2424:
Enter password: System Information at
Alteon Application Switch 2424 Switch is up 1 day, 19 hours, 52 minutes and 55 seconds. Last boot: 13:13:52 Fri Oct 22, 2004 (power cycle) MAC Address: 00:0e:40:2f:5b:00 IP Hardware Order No: EB1412003 Mainboard Hardware: Management Processor Board Hardware: Fast Ethernet Board Hardware: (If 1) Address: 47.80.23.249 Part No: P314090-A Part No: P314080-A Part No: P314091-A Rev: 03 Rev: 02 Rev: 03
NOTE The display of temperature will come up only if the temperature of any of the sensors exceeds 60oC. There will be a warning from the software if any of the sensors exceeds this temperature threshold. The switch will shut down if the power supply overheats and the temperature gets to 100oC. Information about fan failures will also be displayed if one or more fans are not functioning.
/info/sys/log
Show Last 30 Syslog Messages
Date Time Criticality level Message Nov 19 12:16:51 ALERT stp: STG 1, new root bridge Nov 19 13:52:03 ALERT ip: cannot contact default gateway 47.80.22.1 Nov 19 13:52:23 NOTICE ip: default gateway 47.80.22.1 operational Nov 19 13:52:23 NOTICE ip: default gateway 47.80.22.1 enabled Nov 19 14:21:27 ALERT ip: cannot contact default gateway 47.80.22.1 Nov 19 14:21:47 NOTICE ip: default gateway 47.80.22.1 operational Nov 19 14:21:47 NOTICE ip: default gateway 47.80.22.1 enabled Nov 19 14:38:55 NOTICE mgmt: admin login from host 47.81.27.4 Nov 19 14:44:02 NOTICE mgmt: admin idle timeout from Telnet/SSH Nov 19 16:15:06 INFO mgmt: new configuration applied Nov 19 16:15:20 INFO mgmt: new configuration saved Nov 19 16:18:44 INFO mgmt: new configuration applied Nov 19 16:19:37 ERROR mgmt: Error: Apply not done Nov 19 16:19:57 INFO mgmt: new configuration applied Nov 19 16:34:35 NOTICE mgmt: admin login from host 47.81.27.4 Nov 19 16:39:43 NOTICE mgmt: admin idle timeout from Telnet/SSH Nov 19 16:39:59 NOTICE mgmt: admin login from host 47.81.27.4 Nov 19 16:54:13 NOTICE mgmt: admin idle timeout from Telnet/SSH Nov 19 17:20:37 NOTICE mgmt: admin login from host 47.81.27.4 Nov 19 17:26:21 NOTICE mgmt: admin login from host 47.81.25.49 Nov 19 17:31:53 NOTICE mgmt: admin idle timeout from Telnet/SSH
Each syslog message has a criticality level associated with it, included in text form as a prefix to the log message. One of eight different prefixes is used, depending on the condition that the administrator is being notified of, as shown below. EMERG: indicates the system is unusable ALERT: Indicates action should be taken immediately CRIT: Indicates critical conditions ERR: indicates error conditions or error operations
Chapter 4: The Information Menu 67
WARNING: indicates warning conditions NOTICE: indicates a normal but significant condition INFO: indicates an information message DEBUG: indicates a debut-level message
/info/sys/savedlog
Saved Syslog Messages
Aug 20 13:54:21 NOTICE 47.80.22.1 operational Aug 20 13:57:53 ALERT gateway 47.80.22.1 Aug 20 13:57:57 NOTICE 47.80.22.1 operational Aug 20 13:58:23 ALERT gateway 47.80.22.1 Aug 20 13:58:33 NOTICE 47.80.22.1 operational Aug 24 14:43:43 NOTICE Aug 24 14:49:50 NOTICE Aug 24 14:51:38 NOTICE Aug 24 14:57:30 NOTICE Aug 24 15:05:54 NOTICE Aug 24 15:11:40 NOTICE Aug 24 16:00:40 NOTICE Aug 24 16:00:52 NOTICE ip: management port default gateway ip: cannot contact management port default ip: management port default gateway ip: cannot contact management port default ip: management port default gateway mgmt: mgmt: mgmt: mgmt: mgmt: mgmt: mgmt: mgmt: admin login from host 47.81.25.12 admin idle timeout from Telnet/SSH admin login from host 47.81.25.12 admin idle timeout from Telnet/SSH admin login from host 47.81.25.12 admin idle timeout from Telnet/SSH admin login from host 47.81.25.12 switch reset from CLI
/info/sys/mgmt
Management Port Information
Speed ----100 Duplex -----full Link ---up
MAC address: 00:01:81:2e:a4:8d Interface information: 47.80.23.251 255.255.254.0 Gateway information: 47.80.22.1
47.80.23.255
Use this command to display Management port information on an Alteon Application Switch including: Port speed (10/100) Duplex mode (half, full, any, or auto) Link (Up or down) MAC Address of the system IP address of the Interface IP address of the gateway.
/info/sys/sonmp
SONMP Information
This command displays the SynOptics Network Management Protocol (SONMP) topology table. SONMP protocol is enabled on Alteon Application Switches using the /cfg/sys/ sonmp on command, and is necessary so that an Alteon switch can be discovered by the Nortel Networks Optivity Switch Manager.When SONMP is enabled, devices on the network exchange multicast packets namely: flatnet hellos and segment hellos. The IP address of the device is written into the hello packets. As the network devices exchange information, a topology table is built like the one shown below.
Slot Port ----0 /0 1 /11 1 /11 1 /11 1 /11 1 /11 Seg Id --------------- --47.80.23.247 0 47.80.22.1 770 47.80.23.25 259 47.80.23.25 260 47.80.23.241 257 50.10.10.1 263 IP address MAC address ----------------00:01:81:2e:a3:60 00:e0:16:7c:28:24 00:60:cf:81:54:28 00:60:cf:81:54:38 00:60:cf:43:a2:10 00:60:cf:46:d5:60 Local State Seg ------------------ ----- ----Alteon2224 true topChanged Passport1200 true heartbeat Passport8610 true heartbeat Passport8610 true heartbeat AlteonAD4 true topChanged Alteon184 true topChanged Chassis Type
IP Address Seg ID
State
/info/sys/capacity
System Capacity Information
The following sample output from an Alteon OS 2424 displays the maximum and currently enabled switch capacity for various services and applications from Layer 2-7.
Maximum LAYER 2 FDB FDB per SP VLANs Static Trunk Groups LACP Trunk Groups Trunks per Trunk Group Spanning Tree Groups Monitor Ports LAYER 3 IP Interfaces IP Gateways IP Routes Static Routes ARP Entries Static ARP Entries Local Nets DNS Servers BOOTP Servers RIP Interfaces OSPF OSPF OSPF OSPF OSPF LSDB Interfaces Areas Summary Ranges Virtual Links Hosts Limit 16384 8192 255 12 28 8 16 1 Current(Enabled) 54 1(1) 0(0)
16(1)
256 4+255 4096 128 8192 128 5 2 2 256 256 3 16 3 128 12288
BGP Peers BGP Route Aggregators Route Maps Network Filters AS Filters VRRP Routers VRRP Router Groups VRRP Interfaces SLB (LAYER 4-7) Real Servers Server Groups Virtual Servers Virtual Services Real Services Global Global Global Global Global Global Global Global Global Global SLB SLB SLB SLB SLB SLB SLB SLB SLB SLB Domains Services Local Servers Remote Servers Remote Sites Failovers per Remote Site Networks Geographical Regions Rules Metrics Per Rule
0(0) 0(0) 0
1024 1024 1024 1024 8192 1024 8192 1024 1024 64 2 128 7 128 8 2048 32 32 5 1024 2097104 16 64 8
0(0) 0 0(0)
0(0) 0(0) 0(0) 0(0) 0(0) 2(2) 0(0) 7(7) 0(1) 8(8) 0(0) 0 0 0 1 0 0(0)
Filters PIPs Scriptable Health Checks SNMP Health Checks Rules for URL Parsing SLB Sessions Number of Rports to Vport Domain Records Mapping Per Domain Record LAYER 4 - PORTS Port # Client Server
Filter
RTS Continued...
BWM Policies Contracts Groups Contracts per Group Time Policies per Contract GENERAL Syslog hosts RADIUS servers NTP servers SMTP hosts Mnet/Mmask End Users Panic Dumps MP memory SP memory SNMPv3 SNMPv3 SNMPv3 SNMPv3 SNMPv3 Users Views Access Groups Target Address Entries Target Params Entries
512 256 32 8 2
0 1(1) 0
0 0 0 1 0
3 5 2 0 0
/info/sys/dump
System Information Dump
System Information at 10:23:41 Tue Jul Alteon Application Switch 2424 Switch is up 13 days, 19 hours, 7 minutes and 58 seconds. Last boot: 15:15:56 Tue Jun 22, 2008 (power cycle) MAC Address: 00:0e:40:2f:5b:00 IP Hardware Order No: EB1412003 Mainboard Hardware: Management Processor Board Hardware: Fast Ethernet Board Hardware: (If 1) Address: 47.80.23.249 Part No: P314090-A Part No: P314080-A Part No: P314091-A Rev: 03 Rev: 02 Rev: 03 6, 2004
Software Version 22.0.0.0 (FLASH image1), active configuration. Last 30 syslog message information: Jun 22 15:16:00 NOTICE system: link up on port 9 Jun 22 15:16:30 NOTICE system: rebooted (power cycle) Jun 22 15:16:32 NOTICE ip: default gateway 47.80.22.1 operational Jun 22 15:16:32 NOTICE ip: default gateway 47.80.22.1 enabled Jun 22 15:17:05 ALERT stp: STG 1, topology change detected Jun 22 15:28:55 NOTICE mgmt: admin login from host 47.81.25.12 Jun 22 15:32:57 ERROR cli: No apply needed Jun 22 15:35:33 INFO mgmt: new configuration applied Jun 22 15:40:37 NOTICE mgmt: admin idle timeout from Telnet/SSH Jun 23 12:13:04 NOTICE mgmt: admin login from host 47.81.25.12 Jun 23 12:13:39 INFO mgmt: new configuration applied Jun 23 12:13:53 NOTICE mgmt: Failed login attempt via BBI. Jun 23 12:18:36 NOTICE mgmt: admin idle timeout from Telnet/SSH Jun 30 12:32:11 NOTICE mgmt: admin login from host 47.81.27.6 Jun 30 12:37:26 NOTICE mgmt: admin idle timeout from Telnet/SSH Jul 2 9:51:57 NOTICE mgmt: admin login from host 47.81.8.99 Jul 2 9:56:11 NOTICE mgmt: admin logout from Telnet/SSH Jul 6 9:41:55 NOTICE mgmt: admin login from host 47.81.25.12 Jul 6 9:47:06 NOTICE mgmt: admin idle timeout from Telnet/SSH Jul 6 10:22:32 NOTICE mgmt: admin login from host 47.81.27.6 Continued
Interface information: Gateway information: Engine ID = 80:00:07:50:03:00:0E:40:2F:5B:00 usmUser Table: User Name -------------------------------test wyin adminmd5 adminsha v1v2only vacmAccess Table: Group Name Prefix Model ---------- ------ ------testgrp usm v1v2grp snmpv1 v1v2only wyingrp usm admingrp usm test1grp usm test2grp usm
Protocol -------------------------------NO AUTH, NO PRIVACY NO AUTH, NO PRIVACY HMAC_MD5, DES PRIVACY HMAC_SHA, DES PRIVACY NO AUTH, NO PRIVACY
Level Match ReadV WriteV NotifyV ------------ ------ -------- --------noAuthNoPriv exact iso iso iso noAuthNoPriv exact iso iso noAuthNoPriv authPriv noAuthNoPriv noAuthNoPriv exact exact exact exact iso iso iso iso iso iso iso iso iso iso iso iso
vacmViewTreeFamily Table: View Name Subtree -------------------- ------------------------iso 1 included v1v2only included v1v2only excluded v1v2only excluded 1
Mask ------------
Type ----
1.3.6.1.6.3.15
1.3.6.1.6.3.16 Continued
v1v2only excluded
1.3.6.1.6.3.18
vacmSecurityToGroup Table: Sec Model User Name Group Name ---------- ------------------------------- -----------------------snmpv1 v1v2only v1v2grp usm test testgrp usm wyin wyingrp usm test1 test1grp usm adminmd5 admingrp usm adminsha admingrp snmpCommunity Table: Index Name User Name Tag ---------- ---------- -------------------- ---------snmpNotify Table: Name Tag -------------------- -------------------snmpTargetAddr Table: Name Transport Addr Port Taglist Params ---------- --------------- ---- ---------- --------------snmpTargetParams Table: Name MP Model User Name Sec Model Sec Level -------------------- -------- ---------------- --------- ------Slot IP address Seg MAC address Chassis Type Port Id ----- ------------- ---- --------------- ------------Local Seg ----State -----
Priority Hello interval Maximum age value Forwarding delay Aging time You can also see the following port-specific STP information:
For details, see page 83. trunk When trunk groups are configured, you can view the state of each port in the various trunk groups. For details, see page 87.
VLAN Number VLAN Name Status Port membership of the VLAN For details, see page 88.
/info/l2/fdb
Layer 2 FDB Information
The forwarding database (FDB) contains information that maps the media access control (MAC) address of each known device to the switch port where the device address was learned. The FDB also shows which other ports have seen frames destined for a particular MAC address.
[Forwarding Database Menu] find - Show a single FDB entry by MAC address port - Show FDB entries on a single port trunk - Show FDB entries on a single trunk vlan - Show FDB entries on a single VLAN refpt - Show FDB entries referenced by a single SP dump - Show all FDB entries
NOTE The master forwarding database supports up to 16K MAC address entries on the MP per switch. Each SP supports up to 8K entries. Table 4-14 Layer 2 FDB Information Menu Options (/info/l2/fdb)
Command Syntax and Usage find <MAC address> [<VLAN>] Displays a single database entry by its MAC address. You are prompted to enter the MAC address of the device. Enter the MAC address using the format, xx:xx:xx:xx:xx:xx. For example, 08:00:20:12:34:56. You can also enter the MAC address using the format, xxxxxxxxxxxx. For example, 080020123456. 78 Chapter 4: The Information Menu
/info/l2/fdb/dump
Show All FDB Information
MAC address VLAN Port State Referenced SPs Referenced ports ----------------- ---- ---- ----- -------------- ------------00:02:01:00:00:00 300 23 FWD 1 2 1 23 00:02:01:00:00:01 300 23 FWD 1 2 1 23 00:02:01:00:00:02 300 23 FWD 1 2 1 23 00:02:01:00:00:03 300 23 FWD 1 2 1 23 00:02:01:00:00:04 300 23 FWD 1 2 1 23 00:02:01:00:00:05 300 23 FWD 1 2 1 23 00:02:01:00:00:06 300 23 FWD 1 2 1 23 00:02:01:00:00:07 300 23 FWD 1 2 1 23 00:02:01:00:00:08 300 23 FWD 1 2 1 23 00:02:01:00:00:09 300 23 FWD 1 2 1 23 00:02:01:00:00:0a 300 23 FWD 1 2 1 23 00:02:01:00:00:0b 300 23 FWD 1 2 1 23 00:02:01:00:00:0c 300 23 FWD 1 2 1 23
An address that is in the forwarding (FWD) state, means that it has been learned by the switch. When in the trunking (TRK) state, the port field represents the trunk group number. If the state for the port is listed as unknown (UNK), the MAC address has not yet been learned by the switch, but has only been seen as a destination address. When an address is in the unknown state, no outbound port is indicated, although ports which reference the address as a destination will be listed under Reference ports.
If the state for the port is listed as an interface (IF), the MAC address is for a standard VRRP virtual router. If the state is listed as a virtual server (VIP), the MAC address is for a virtual server routera virtual router with the same IP address as a virtual server.
- Show LACP aggregator information for the port - Show LACP port information - Show all LACP ports information
Table 4-15 Link Aggregation Control Protocol Information Menu Options (/info/ lacp)
Command Syntax and Usage aggr <aggregator index 1 to max num ports> Displays information an LACP aggregator. To view a sample output, see port <port index 1 to max num ports> Displays information of an LACP port. To view a sample output, see dump Displays LACP information of all the ports. Use this command to verify the state of ports in an LACP trunk group. To view a sample output, see page 83.
/info/lacp/aggr
LACP Aggregator Information
Aggregator Id 1 ---------------------------------------------MAC address - 00:01:81:2e:a1:d1 Actor System Priority - 32768 Actor System ID - 00:01:81:2e:a1:b0 Individual - FALSE Actor Admin Key - 300 Actor Oper Key - 300 Partner System Priority - 32768 Partner System ID - 00:0d:29:e3:4a:00 Partner Oper Key - 1 ready - TRUE Number of Ports in aggr - 10 index 0 port 1 index 1 port 2 index 2 port 3 index 3 port 4 index 4 port 5 index 5 port 6 index 6 port 7 index 7 port 8 index 8 port 9 index 9 port 10
/info/lacp/port
LACP Port Information
port 1
---------------------------------------------lacp_enabled - TRUE lacp_admin_enabled - TRUE Actor Actor Actor Actor Actor Actor System ID System Priority Admin Key Oper Key Port Number Port Priority Admin System Priority Oper System Priority Admin System ID Oper System ID Admin Key Oper Key Admin Port Number Admin Port Priority Oper Port Number Oper Port Priority 00:01:81:2e:a1:b0 32768 300 300 1 32768 0 32768 00:00:00:00:00:00 00:0d:29:e3:4a:00 0 1 0 0 4 32768
Partner Partner Partner Partner Partner Partner Partner Partner Partner Partner
Actor Admin Port state Activity: Active Timeout: Synchronization:FALSE Collecting: Defaulted: FALSE Expired: Actor Oper Port state Activity: Active Timeout: Synchronization:TRUE Collecting: Defaulted: FALSE Expired: Partner Admin Port state - 0x0 Partner Oper Port state Activity: Active Timeout:
Aggregation: Distributing:
TRUE FALSE
TRUE TRUE
Long
Aggregation:
TRUE Continued
Collecting: Expired:
TRUE
/info/lacp/dump
LACP Dump Information
port attached trunk aggr ------------------------------------------------------------------1 active 300 300 y 32768 1 13 2 active 300 300 y 32768 1 13 3 active 300 300 y 32768 1 13 4 active 300 300 y 32768 1 13 5 active 300 300 y 32768 1 13 6 active 300 300 y 32768 1 13 7 active 300 300 y 32768 1 13 8 active 300 300 y 32768 1 13 9 active 300 300 n 32768 --10 active 300 300 n 32768 --11 active 300 300 n 32768 --12 active 300 300 n 32768 --13 active 300 300 n 32768 --14 off 14 14 n 32768 --15 off 15 15 n 32768 --16 off 16 16 n 32768 --17 off 17 17 n 32768 --18 off 18 18 n 32768 --19 off 19 19 n 32768 --20 off 20 20 n 32768 --21 off 21 21 n 32768 --22 off 22 22 n 32768 --23 off 23 23 n 32768 --24 off 24 24 n 32768 --25 off 25 25 n 32768 --26 off 26 26 n 32768 --27 off 27 27 n 32768 --28 off 28 28 n 32768 --lacp adminkey operkey selected prio
/info/l2/stg
Layer 2 Spanning Tree Group Information
When multiple paths exist on a network, Spanning Tree Protocol (STP) configures the network so that a switch uses only the most efficient path. NOTE Alteon OS 22.0.2 supports up to 16 multiple Spanning Tress or Spanning Tree Groups.
Spanning Tree Group 1: On Current Root: 8000 00:01:81:2e:a1:80 Parameters: Priority 32768 Cost ---0 0 0 0 5 0 0 0 0 0 0 Path-Cost 0 Port Hello MaxAge FwdDel Aging 0 2 20 15 300 FwdDel 15 Aging 300
Hello 2
MaxAge 20
Port ----1 2 3 4 5 6 7 8 9 10 11
Priority -------128 128 128 128 128 128 128 128 128 128 128
State ---------DISABLED DISABLED DISABLED DISABLED FORWARDING DISABLED DISABLED DISABLED DISABLED DISABLED DISABLED
8000-00:01:81:2e:a1:80
32773
The switch software uses the IEEE 802.1d Spanning Tree Protocol (STP). In addition to seeing if STP is enabled or disabled, you can view the following STP bridge information: Priority Hello interval Maximum age value Forwarding delay Aging time
You can also see the following port-specific STP information: Port number and priority Cost State Designated Bridge Designated Port
The following table describes the STP parameters. Table 4-16 Spanning Tree Parameter Descriptions
Parameter Priority (bridge) Hello Description The bridge priority parameter controls which bridge on the network will become the STP root bridge. The hello time parameter specifies, in seconds, how often the root bridge transmits a configuration bridge protocol data unit (BPDU). Any bridge that is not the root bridge uses the root bridge hello value. The maximum age parameter specifies, in seconds, the maximum time the bridge waits without receiving a configuration bridge protocol data unit before it reconfigure the STP network. The forward delay parameter specifies, in seconds, the amount of time that a bridge port has to wait before it changes from learning state to forwarding state. The aging time parameter specifies, in seconds, the amount of time the bridge waits without receiving a packet from a station before removing the station from the Forwarding Database. The port priority parameter helps determine which bridge port becomes the designated port. In a network topology that has multiple bridge ports connected to a single segment, the port with the lowest port priority becomes the designated port for the segment. The port path cost parameter is used to help determine the designated port for a segment. Generally speaking, the faster the port, the lower the path cost. A setting of 0 indicates that the cost will be set to the appropriate default after the link speed has been auto negotiated. The state field shows the current state of the port. The state field can be either BLOCKING, LISTENING, LEARNING, FORWARDING, or DISABLED.
MaxAge
FwdDel
Aging
priority (port)
Cost
State
Designated port
/info/l2/trunk
Trunk Group Information
Trunk groups can provide super-bandwidth, multi-link connections between Alteon Application Switches or other trunk-capable devices. A trunk group is a group of ports that act together, combining their bandwidth to create a single, larger virtual link. When trunk groups are configured, you can view the state of each port in the various trunk groups.
Trunk group 1, bw contract 256, port state: 1: STG 1 forwarding 2: STG 1 forwarding
NOTE If Spanning Tree Protocol on any port in the trunk group is set to forwarding, the remaining ports in the trunk group will also be set to forwarding.
/info/l2/vlan
VLAN Information
VLAN ---1 Name Status Jumbo BWC Learn Ports -------------------------------- ------ ----- ---- ----- ----Default VLAN ena n 256 ena 1-28
This information display includes all configured VLANs and all member ports that have an active link state. Port membership is represented in slot/port format. VLAN information includes: VLAN Number VLAN Name Status Jumbo Frames Bandwidth Contract if BWM is enabled Source MAC Address Learning Port membership of the VLAN
/info/l2/dump
Layer2 Dump Information
Spanning Tree Group 1: On Current Root: 8000 00:01:81:2e:a1:80 Parameters: Priority 32768 Cost ---0 0 0 0 5 0 0 0 0 0 0 0 Path-Cost 0 Hello 2 Port Hello MaxAge FwdDel Aging 0 2 20 15 300 FwdDel 15 Aging 300
MaxAge 20
Port -----1 2 3 4 5 6 7 8 9 10 11 12
Priority -------128 128 128 128 128 128 128 128 128 128 128 128
State ---------DISABLED DISABLED DISABLED DISABLED FORWARDING DISABLED DISABLED DISABLED DISABLED DISABLED DISABLED DISABLED
8000-00:01:81:2e:a1:80
32773
arp Displays the Address Resolution Protocol (ARP) Information Menu. For details, see page 93. bgp Displays BGP Information Menu. To view menu options, see page 96. ospf Displays OSPF routing information menu. For details, see page 98. ip Displays IP Information. For details, see page 104. IP information, includes:
IP interface information: Interface number, IP address, subnet mask, broadcast address, VLAN
/info/l3/route
IP Routing Information
[IP Routing Menu] find - Show gw - Show type - Show tag - Show if - Show dump - Show a single route by destination IP address routes to a single gateway routes of a single type routes of a single tag routes on a single interface all routes
Using the commands listed below, you can display all or a portion of the IP routes currently held in the switch. Table 4-18 Route Information Menu Options (/info/route)
Command Syntax and Usage find <IP address (such as, 192.4.17.101)> Displays a single route by destination IP address. gw <default gateway address (such as, 192.4.17.44)> Displays routes to a single gateway. type indirect|direct|local|broadcast|martian|multicast Displays routes of a single type. For a description of IP routing types, see Table 4-19 on page 92. tag fixed|static|addr|rip|ospf|bgp|broadcast|martian|vip Displays routes of a single tag. For a description of IP routing types, see Table 4-20 on page 93. if <interface number (1-256)> Displays routes on a single interface.
NOTE The total number of interfaces on an Alteon Application Switch 2424-SSL is 1-255.
/info/l3/route/dump
Show All IP Route Information
Status code: * - best Destination Mask Gateway Type Tag Metr If --------------- --------------- ------------- --------- ----- -* 0.0.0.0 0.0.0.0 47.80.22.1 indirect static 1 * 47.80.22.0 255.255.254.0 47.80.23.249 direct fixed 1 * 47.80.23.249 255.255.255.255 47.80.23.249 local addr 1 * 47.80.23.255 255.255.255.255 47.80.23.255 broadcast broadcast 1 * 127.0.0.0 255.0.0.0 0.0.0.0 martian martian * 224.0.0.0 224.0.0.0 0.0.0.0 martian martian * 224.0.0.5 255.255.255.255 0.0.0.0 multicast addr * 224.0.0.6 255.255.255.255 0.0.0.0 multicast addr * 255.255.255.255 255.255.255.255 255.255.255.255 broadcast broadcast
Type Parameters
The following table describes the Type parameters. Table 4-19 IP Routing Type Parameters (/info/l3/route/dump/type)
Parameter indirect Description The next hop to the host or subnet destination will be forwarded through a router at the Gateway address. Packets will be delivered to a destination host or subnet attached to the switch. Indicates a route to one of the switchs IP interfaces. Indicates a broadcast route. The destination belongs to a host or subnet which is filtered out. Packets to this destination are discarded. Indicates a multicast route.
direct
multicast
Tag Parameters
The following table describes the Tag parameters. Table 4-20 IP Routing Tag Parameters (info/l3/route/tag)
Parameter fixed static Description The address belongs to a host or subnet attached to the switch. The address is a static route which has been configured on the Alteon Application Switch. The address belongs to one of the switchs IP interfaces. The address was learned by the Routing Information Protocol (RIP). The address was learned by Open Shortest Path First (OSPF). The address was learned via Border Gateway Protocol (BGP) Indicates a broadcast address. The address belongs to a filtered group. Indicates a route destination that is a virtual server IP address. VIP routes are needed to advertise virtual server IP addresses via BGP.
/info/l3/Arp
ARP Information Menu
Address Resolution Protocol (ARP) is the TCP/IP protocol that resides within the Internet layer. ARP resolves a physical address from an IP address. ARP queries machines on the local network for their physical addresses. ARP also maintains IP to physical address pairs in its cache memory. In any IP communication, the ARP cache is consulted to see if the IP address of the router is present in the ARP cache. Then the corresponding physical address is used to send a packet.
[Address Resolution Protocol Menu] find - Show a single ARP entry by IP address port - Show ARP entries on a single port vlan - Show ARP entries on a single VLAN refpt - Show ARP entries referenced by a single SP dump - Show all ARP entries help - Show help on the fields of ARP entries addr - Show ARP address list
The ARP information includes IP address and MAC address of each entry, address status flags (see Table 4-22 on page 95), VLAN and port for the address, and port referencing information. Table 4-21 ARP Information Menu Options (/info/l3/arp)
Command Syntax and Usage find <IP address (such as, 192.4.17.101> Displays a single ARP entry by IP address. port <port number> Displays the ARP entries on a single port. vlan <VLAN number (1-4090)> Displays the ARP entries on a single VLAN. refpt <SP number (1-4)> Displays the ARP entries referenced by a single SP. For details, see page 95. dump Displays all ARP entries. including:
IP address and MAC address of each entry Address status flag (see below) The VLAN and port to which the address belongs The ports which have referenced the address (empty if no port has routed traffic to the IP address shown) For more information, see page 95.
help Displays help on the ARP field entries. For example: IP address: Flags: IP address of ARP entry J - ARP entry belongs to a Jumbo capable VLAN P - Permanent ARP entry (not obtained via ARP request), e.g. IP interface, VIP, etc. R - Indirect ARP (cache) entry for IP address reachable via indirect routes (static/dynamic) 4 - Layer 4 IP address (VIP) u - Unresolved ARP entry. The MAC address has not been learned. MAC address: VLAN: Port: Referenced SPs: MAC address of ARP entry VLAN of this ARP entry Physical port where this IP address owner is connected SPs on which this ARP entry is present
addr Displays the ARP address list: IP address, IP mask, MAC address, and VLAN flags.
/info/l3/arp/refpt
Show ARP Entries on Referenced SP
IP address Flags ------------- ----47.80.23.249 P MAC address VLAN Port ----------------- ---- ----00:0e:40:2f:5b:00 1 Referenced SPs -----------1-4
/info/l3/arp/dump
Show All ARP Entry Information
IP address Flags MAC address VLAN Port --------------- ----- ----------------- ---- ---1.1.11.1 P 4 00:09:97:16:5f:01 10.10.10.10 P 4 00:09:97:16:5f:01 47.80.22.1 00:e0:16:7c:28:86 1 23 47.80.23.81 P 00:09:97:16:5f:00 1 172.31.3.1 P 00:09:97:16:5f:00 1 172.31.3.10 00:b0:d0:98:d8:1b 1 3 172.31.3.11 00:b0:d0:98:d8:1b 1 3 Referenced SPs ------------1-4 1-4 empty 1-4 1-4 empty empty
Referenced ports are the ports that request the ARP entry. So the traffic coming into the referenced ports has the destination IP address. From the ARP entry (the referenced ports), this traffic needs to be forwarded to the egress port (port 6 in the above example). NOTE If you have VMA turned on, the referenced port will be the designated port. If you have VMA turned off, the designated port will be the normal ingress port. The Flag field is interpreted as follows: Table 4-22 ARP Dump Flag Parameters
Flag P P 4 Description Permanent entry created for switch IP interface. Permanent entry created for Layer 4 proxy IP address or virtual server IP address. Indirect route entry. Unresolved ARP entry. The MAC address has not been learned. ARP entry belongs to a Jumbo capable VLAN
R U J
/info/l3/arp/addr
ARP Address List Information
IP address --------------10.10.10.10 1.1.11.1 172.31.4.200 172.31.3.1 172.31.4.1 47.80.23.81 IP mask --------------255.255.255.255 255.255.255.255 255.255.255.255 255.255.255.255 255.255.255.255 255.255.255.255 MAC address ----------------00:09:97:16:5f:01 00:09:97:16:5f:01 00:09:97:16:5f:0e 00:09:97:16:5f:00 00:09:97:16:5f:00 00:09:97:16:5f:00 VLAN ---Flags -----
D 1 1 1
/info/l3/bgp
BGP Information Menu
Border Gateway Protocol (BGP) is an Internet protocol that enables routers on a network to share routing information with each other and advertise information about the segments of the IP address space they can access within their network with routers on external networks. For more information, refer to BGP section in chapter: The Configuration Menu on page 227 and the Application Guide.
[BGP Menu] peer - Show all BGP peers summary - Show all BGP peers in summary dump - Show BGP routing table
/info/l3/bgp/peer
BGP Peer information
Following is an example of the information that /info/l3/bgp/peer provides.
BGP Peer Information: 3: 2.1.1.1 , version 0, TTL 1 Remote AS: 0, Local AS: 0, Link type: IBGP Remote router ID: 0.0.0.0, Local router ID: 1.1.201.5 BGP status: idle, Old status: idle Total received packets: 0, Total sent packets: 0 Received updates: 0, Sent updates: 0 Keepalive: 0, Holdtime: 0, MinAdvTime: 60 LastErrorCode: unknown(0), LastErrorSubcode: unspecified(0) Established state transitions: 0 4: 2.1.1.4 , version 0, TTL 1 Remote AS: 0, Local AS: 0, Link type: IBGP Remote router ID: 0.0.0.0, Local router ID: 1.1.201.5 BGP status: idle, Old status: idle Total received packets: 0, Total sent packets: 0 Received updates: 0, Sent updates: 0 Keepalive: 0, Holdtime: 0, MinAdvTime: 60 LastErrorCode: unknown(0), LastErrorSubcode: unspecified(0) Established state transitions: 0
/info/l3/bgp/summary
BGP Summary information
Following is an example of the information that /info/l3/bgp/summary provides.
BGP Peer Summary Information: Peer V AS MsgRcvd MsgSent Up/Down State --------------- - -------- -------- -------- -------- ---------1: 205.178.23.142 4 142 113 121 00:00:28 established 2: 205.178.15.148 0 148 0 0 never connect
/info/l3/bgp/dump
Dump BGP Information
Following is an example of the information that /info/l3/bgp/dump provides.
>> BGP# dump Status codes: * valid, > best, i - internal Origin codes: i - IGP, e - EGP, ? - incomplete Network Next Hop Metr LcPrf Wght --------------- --------------- ----- ---- ----*> 10.0.0.0 205.178.21.147 1 256 *>i205.178.15.0 0.0.0.0 * 205.178.21.147 1 128 *> 205.178.17.0 205.178.21.147 1 128 13.0.0.0 205.178.21.147 1 256
/info/l3/ospf
OSPF Information Menu
Alteon OS supports the Open Shortest Path First (OSPF) routing protocol. The Alteon OS implementation conforms to the OSPF version 2 specifications detailed in Internet RFC 1583. OSPF is designed for routing traffic within a single IP domain called an Autonomous System (AS). The AS can be divided into smaller logical units known as areas. In any AS with multiple areas, one area must be designated as area 0, known as the backbone. The backbone acts as the central OSPF area. All other areas in the AS must be connected to the backbone. Areas inject summary routing information into the backbone, which then distributes it to other areas as needed. For more information on how to configure OSPF on the switch, refer to the OSPF section in chapter The Configuration Menu on page 227 and your Alteon OS Application Guide.
[OSPF Information Menu] general - Show general information aindex - Show area(s) information if - Show interface(s) information virtual - Show details of virtual links nbr - Show neighbor(s) information dbase - Database Menu sumaddr - Show summary address list nsumadd - Show NSSA summary address list routes - Show OSPF routes dump - Show OSPF information
/info/l3/ospf/general
OSPF General Information
OSPF Version 2 Router ID: 47.80.23.247 Started at 95 and the process uptime is 352315 Area Border Router: yes, AS Boundary Router: no LS types supported are 6 External LSA count 0 External LSA checksum sum 0x0 Number of interfaces in this router is 2 Number of virtual links in this router is 1 16 new lsa received and 34 lsa originated from this router Total number of entries in the LSDB 10 Database checksum sum 0x0 Total neighbors are 1, of which 2 are >=INIT state, 2 are >=EXCH state, 2 are =FULL state Number of areas is 2, of which 3-transit 0-nssa Area Id : 0.0.0.0 Authentication : none Import ASExtern : yes Number of times SPF ran : 8 Area Border Router count : 2 AS Boundary Router count : 0 LSA count : 5 LSA Checksum sum : 0x2237B Summary : noSummary
/info/l3/ospf/if
OSPF Interface Information
Ip Address 10.10.12.1, Area 0.0.0.1, Admin Status UP Router ID 10.10.10.1, State DR, Priority 1 Designated Router (ID) 10.10.10.1, Ip Address 10.10.12.1 Backup Designated Router (ID) 10.10.14.1, Ip Address 10.10.12.2 Timer intervals, Hello 10, Dead 40, Wait 1663, Retransmit 5, Poll interval 0, Transit delay 1 Neighbor count is 1 If Events 4, Authentication type none
/info/l3/ospf/dbase
OSPF Database Information
[OSPF Database Menu] advrtr - LS Database info for an Advertising Router asbrsum - ASBR Summary LS Database info dbsumm - LS Database summary ext - External LS Database info nw - Network LS Database info nssa - NSSA External LS Database info rtr - Router LS Database info self - Self Originated LS Database info summ - Network-Summary LS Database info all - All
/info/l3/ospf/routes
OSPF Information Route Codes
Codes: IA - OSPF inter area, N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 IA 10.10.0.0/16 via 200.1.1.2 IA 40.1.1.0/28 via 20.1.1.2 IA 80.1.1.0/24 via 200.1.1.2 IA 100.1.1.0/24 via 20.1.1.2 IA 140.1.1.0/27 via 20.1.1.2 IA 150.1.1.0/28 via 200.1.1.2 E2 172.18.1.1/32 via 30.1.1.2 E2 172.18.1.2/32 via 30.1.1.2 E2 172.18.1.3/32 via 30.1.1.2 E2 172.18.1.4/32 via 30.1.1.2 E2 172.18.1.5/32 via 30.1.1.2 E2 172.18.1.6/32 via 30.1.1.2 E2 172.18.1.7/32 via 30.1.1.2 E2 172.18.1.8/32 via 30.1.1.2
/info/ospf/dump
OSPF Dump Information
OSPF Version 2 Router ID: 1.1.1.1 Started at 42 and the process uptime is 1197051 Area Border Router: no, AS Boundary Router: no External LSA count 0 Number of interfaces in this router is 0 Number of virtual links in this router is 0 0 new lsa received and 0 lsa originated from this router Total number of entries in the LSDB 0 Total neighbors are 0, of which 0 are >=INIT state, 0 are >=EXCH state, 0 are =FULL state Number of areas is 0, of which 0-transit 0-nssa OSPF Neighbors: Intf NeighborID ---- ----------
Prio ----
State -----
Address -------
OSPF LS Database: OSPF LSDB breakdown for router with ID (1.1.1.1) No areas enabled.
/info/l3/ip
IP Information
Interface information: 1: 47.80.23.81 255.255.254.0 2: 172.31.4.1 255.255.255.0 3: 172.31.3.1 255.255.255.0 47.80.23.255, 172.31.4.255, 172.31.3.255, vlan 1, up vlan 1, up vlan 1, up
Default gateway information: metric strict 2: 47.80.22.1, vlan any, up Current IP forwarding settings: ON, dirbr disabled Current local networks: Current IP port settings: All other ports have forwarding ON Current network filter settings: none Current route map settings: Current OSPF settings: ON Default route none Router ID: 1.1.1.1 lsdb limit 0
/info/l3/vrrp
VRRP Information
Virtual Router Redundancy Protocol (VRRP) support on Alteon Application Switch provides redundancy between routers in a LAN. This is accomplished by configuring the same virtual router IP address and ID number on each participating VRRP-capable routing device. One of the virtual routers is then elected as the master, based on a number of priority criteria, and assumes control of the shared virtual router IP address. If the master fails, one of the backup virtual routers will assume routing authority and take control of the virtual router IP address. Refer to your Alteon OS Application Guide for more information on VRRP.
VRRP information: 10: vrid 10, 10.1.2.200, 11: vrid 11, 11.1.2.200, 12: vrid 12, 12.1.2.200, 13: vrid 13, 13.1.2.200, 14: vrid 14, 14.1.2.200, 20: vrid 20, 20.1.2.200, 27: vrid 27, 27.1.2.200, 28: vrid 28, 28.1.2.200, 100: vrid 100, 172.21.8.100, server 172: vrid 172, 172.21.8.200, 254: vrid 254, 27.1.2.100, server 255: vrid 255, 28.1.2.100, server VRRP information: 1: vrid 2, 205.178.18.210, if 2: vrid 1, 205.178.18.202, if 3: vrid 3, 205.178.18.204, if
if if if if if if if if if
10, renter, prio 110, master 11, renter, prio 118, master 12, renter, prio 102, backup 13, renter, prio 118, master 14, renter, prio 102, backup 20, renter, prio 110, master 27, renter, prio 118, master 28, renter, prio 102, backup 172, renter, prio 110, master,
if 172, renter, prio 110, master if 27, renter, prio 102, backup, if 28, renter, prio 118, master,
1, renter, prio 100, master, server 1, renter, prio 100, backup 1, renter, prio 100, master, proxy
When virtual routers are configured, you can view the status of each virtual router using this command. VRRP information includes: Virtual router number Virtual router ID and IP address Interface number Ownership status
owner identifies the preferred master virtual router. A virtual router is the owner when the IP address of the virtual router and its IP interface are the same. renter identifies virtual routers which are not owned by this device.
Priority value. During the election process, the virtual router with the highest priority becomes master. Activity status
master identifies the elected master virtual router. backup identifies that the virtual router is in backup mode.
Server status. The server state identifies virtual routers that support Layer 4 services. These are known as virtual server routers: any virtual router whose IP address is the same as any configured virtual server IP address. Proxy status. The proxy state identifies virtual proxy routers, where the virtual router shares the same IP address as a proxy IP address. The use of virtual proxy routers enables redundant switches to share the same IP address, minimizing the number of unique IP addresses that must be configured.
/info/l3/dump
Layer3 Dump Information
This command dumps all the information about Layer 3 parameters. This dump is a collection of all the individual commands described in the sections above.
IP information: IP information: Router ID: 45.1.1.201,
AS number 100
Default gateway information: metric strict Current IP forwarding settings: ON, dirbr disabled Current local networks: Current IP port settings: All other ports have forwarding ON Current network filter settings: none Current route map settings: Current BGP settings: ON, pref 100, AS number 100 Current BGP peer settings: 1: 45.1.1.203, ras 300, hold 180, alive 60, adv 60 retry 120, orig 15, ttl 1, enabled metric none, default none, rip disabled, ospf disabled fixed disabled, static disabled, vip disabled in-rmap: empty out-rmap: empty Current BGP aggr settings:
Continued
Virtual Router Redundancy is globally turned OFF. ARP cache information: IP address Flags MAC address VLAN Port Referenced SPs --------------- ----- ----------------- ---- ----- ---------------45.1.1.75 00:0f:06:ec:8a:00 1 24 empty 45.1.1.201 P 00:01:81:2e:a2:20 1 1-4 45.1.1.202 00:09:97:5e:69:00 1 24 empty 172.21.1.254 P 00:01:81:2e:a2:20 1 1-4 205.1.1.1 00:09:6b:b5:0b:d6 1 24 empty 205.1.1.2 00:09:6b:b5:08:48 1 24 empty 205.1.1.3 00:09:6b:00:6f:b7 1 24 empty 205.1.1.4 00:09:6b:00:76:1b 1 24 empty 205.1.1.5 00:09:6b:00:74:97 1 24 empty 205.1.1.6 00:09:6b:00:71:bb 1 24 empty 205.1.1.100 P 4 00:01:81:2e:a2:2e 1-4 205.1.1.201 P 00:01:81:2e:a2:20 1 1-4 ARP address information: IP address IP mask --------------- --------------205.1.1.100 255.255.255.255 172.21.1.254 255.255.255.255 205.1.1.201 255.255.255.255 45.1.1.201 255.255.255.255
MAC address VLAN Flags ----------------- ---- ----00:01:81:2e:a2:2e D 00:01:81:2e:a2:20 1 00:01:81:2e:a2:20 1 00:01:81:2e:a2:20 1
Route table information: Status code: * - best Destination Mask Gateway Type Tag Metr If --------------- ------------- ------------ ------------- -* 45.0.0.0 255.0.0.0 45.1.1.201 direct fixed 2 * 45.1.1.201 255.255.255.255 45.1.1.201 local addr 2 * 45.255.255.255 255.255.255.255 45.255.255.255broadcast broadcast 2 * 127.0.0.0 255.0.0.0 0.0.0.0 martian martian * 172.21.1.0 255.255.255.0 172.21.1.254 direct fixed 4 * 172.21.1.254 255.255.255.255 172.21.1.254 local addr 4 * 172.21.1.255 255.255.255.255 172.21.1.255 broadcast broadcast 4 Continued
* 205.1.1.0 255.255.255.0 205.1.1.201 direct fixed 3 * 205.1.1.100 255.255.255.255 205.1.1.100 direct vip * 205.1.1.201 255.255.255.255 205.1.1.201 local addr 3 * 205.1.1.255 255.255.255.255 205.1.1.255 broadcast broadcast 3 * 224.0.0.0 224.0.0.0 0.0.0.0 martian martian * 255.255.255.255 255.255.255.255 255.255.255.255 broadcast broadcast OSPF is disabled. Status codes: * valid, > best, i - internal Origin codes: i - IGP, e - EGP, ? - incomplete Network Next Hop Metr LcPrf Wght Path --------------- --------------- ----- ----- ----- --------------*> 45.0.0.0 0.0.0.0 0 ? *> 172.21.1.0 0.0.0.0 0 ? *> 205.1.1.0 0.0.0.0 0 ?
/info/slb/sess
Session Table Information
[Session Table Information Menu] cip - Show all session entries with source IP address cport - Show all session entries with source port dip - Show all session entries with destination IP address dport - Show all session entries with destination port pip - Show all session entries with proxy IP address pport - Show all session entries with proxy port filter - Show all session entries with matching filter flag - Show all session entries with matching flag port - Show all session entries with ingress port real - Show all session entries with real IP address sp - Show all session entries on sp dump - Show all session entries help - Session entry description
entry dump:
3, 01: 1.1.1.1 4586, 2.2.2.1 http -> 1.1.1.2 3567 3.3.3.1 http age 6 f:10 EUSPT c (1) (2) (3) (4) (5) (6) (7a) (7) (8) (9) (10) (11) (12)
(13)
Note: The fields, 1 to 13 associated with a session as identified in the above example, are described in Session dump information in Alteon OS on page 115. help Displays the description of the session entry.
3,01: 172.21.12.19 4586, 39.2.2.1 rtsp -> 47.81.144.13 urlwcr age 10 f:100 EU 3,01: 172.21.12.19 6970, 39.2.2.1 21220 -> 47.81.144.13 21220 age 10 P Filtering LinkLB 2,07: 10.0.1.26 1706, 205.178.14.84 http -> 192.168.4.10 linklb age 8 f:10 E FTP 1,00: 172.31.4.215 80, 172.31.4.200 0 172.31.3.11 age 8 EP c:1 1,09: 172.31.4.215 4098, 172.31.4.200 ftp ->172.31.3.20 ftp age 10 EU 1,09: 172.31.4.215 4102, 172.31.4.200 ftp-data ->172.31.3.20 ftp-data age 10 E NAT 2,05: 172.21.8.16 2559, 10.0.1.26 http NAT age 2 f:24 E Persistent session 3,00: 237.162.52.123 160.10.20.30 age 4 EPS C:3 The destination port, real server IP and server port are not shown for persistent session.
This field indicates the Switch Processor number that created the session. This field shows the physical port through which the client traffic enters the switch. This field contains the source IP address from the clients IP packet. This field identifies the source port from the clients TCP/UDP packet. This field identifies the destination IP address from the clients TCP/UDP packet. This field identifies the destination port from clients TCP/UDP packet. This field contains the Proxy IP address substituted by the switch. This field contains the real server IP address of the corresponding server that the switch selects to forward the client packet to, for load balancing. If the switch does not find a live server, this field contains the same information as the destination IP address mentioned in field (5). This field also shows the real server IP address for filtering. No address is shown if the filter action is Allow, Deny or NAT. It will show ALLOW, DENY or NAT instead.
This field identifies the TCP/UDP source port substituted by the switch.
For load balancing, this field contains the IP address of the real server that the switch selects to forward client packet to. If the switch does not find live server, this field is the same as destination IP address (as in row 5). For example: 3,01: 1.1.1.1 1040, 2.2.2.1 http -> 3.3.3.1 http age 10 3,01: 1.1.1.1 6970, 2.2.2.1 rtsp -> 2.2.2.1 21220 age 10 P For filtering, this field also shows the real server IP address. No address is shown if the filter action is Allow, Deny or NAT. It will show ALLOW, DENY or NAT instead. For example: 3,01: 1.1.1.1 1040, 2.2.2.1 http -> 3.3.3.1 http age 10 f:11 2,07: 1.1.1.1 1706, 2.2.2.1 http-> 192.168.4.10 linklb age 8 f:10 E
Description
This field is the same as the destination port (field 6) for load balancing except for the RTSP UDP session. For RTSP UDP session, this server port is obtained from the client-server negotiation. This field is the filtering application port for filtering. It is for internal use only. This field can be urlwcr, wcr, idslb, linkslb or nonat.
(10) Age
This is the session timeout value. If no packet is received within the value specified, the session is freed. For example, if: age 10 - The session is aged out in 10 minutes.
age < 160 - The session is aged out in 160 minutes. This indicates that slowage is used. The user can configure slowage by using the command: /cfg/slb/adv/slowage.
This field indicates the session created by filtering code as a result of the IP header keys matching the filtering criteria. E: Indicates the session is established and will be aged out if no traffic is received within session timeout value. L: Indicates the session is a link load balance session. N: Indicates no NAT, which means the session only translates the destination MAC when forwarding client traffic to the real server.
P: Indicates the session is a persistent session and is not to be aged out. Fields (6), (7) and (8) cannot have persistent session. S: Indicates the session is a persistent session and the application is SSL session ID, or Cookie Pbind. Rt: Indicates the session is TCP rate limiting for every client entry. Ru: Indicates UDP rate limiting for every client entry. Ri: Indicates the session is ICMP rate limiting per-client entry. Vr: Indicates the session is a SIP REGISTER session. Vs: Indicates the session is a SIP SUBSCRIBE session. Vi: Indicates the session is a SIP INVITE session. Vm: Indicates the session is a SIP MESSAGE session. U: Indicates the session is Layer 7 delayed binding and the switch is trying to open TCP connection to the real server. W: Indicates the session only translates the destination MAC when forwarding Layer 7 WCR traffic to the real server.
This counter indicates the number of client sessions created to associate with this persistent session.
/info/slb/gslb
Global SLB Information Menu
An Alteon OS running Global SLB selects the most appropriate site to direct the client traffic for a given domain during the initial client connection. The menu for this feature displays the following information:
[Global SLB Information Menu] virt - Show Global SLB site - Show Global SLB rule - Show Global SLB geo - Show Global SLB dump - Show all Global
virtual server information remote site information rule information geographical preference information SLB information
/info/slb/dump
Show All Layer 4 Information
Real 1: 2: 26: 27: server state: 210.1.2.200, 00:01:02:c1:4b:48, vlan 1, port 1, health 3, up 210.1.2.1, 00:01:02:70:4d:4a, vlan 1, port 8, health 3, up 20.20.20.102, 00:03:47:07:a4:9e, vlan 1, port 6, health 3, up 20.20.20.101, 00:01:02:71:9c:a6, vlan 1, port 7, health 3, up
Virtual server state: 1: 20.20.20.200, 00:60:cf:47:5c:1e virtual ports: http: rport http, group 88, backup none, dbind HTTP Application: urlslb real servers: 26: 20.20.20.102, backup none, 2 ms, up exclusionary string matching: disabled 1: any 2: urlone 27: 20.20.20.101, backup none, 1 ms, up exclusionary string matching: disabled 3: urltwo 4: urlthree Redirect filter state: Action redir dport http, rport 3128, vlan any 200: group 1, health 3, backup none proxy enabled, radius snoop disabled real servers: 1: 210.1.2.200, backup none, 3 ms, up 2: 210.1.2.1, backup none, 2 ms, up Port 1: 2: 3: 4: state: filt disabled, filters: 80 idslb filt enabled, filters: 200 idslb filt enabled, filters: 200 filt disabled, filters: 50 200
Use this command to display link status information about each port on an Alteon Application
Switch slot, including:
Port number Port speed (10, 100, 10/100, or 1000) Duplex mode (half, full, any, or auto) Flow control for transmit and receive (no, yes, or auto) Link status (up or down)
Port information includes: Port number Whether the port uses VLAN tagging or not (y or n) Whether Remote Monitor is enabled or disabled Port VLAN ID (PVID) Port name VLAN membership Whether RMON is enabled or disabled on the port
/info/bwm/ipuser
BWM IP User Information Menu
[BWM IP User Entries Information Menu] ip - Show all IP user entries with IP address cont - Show all IP user entries for a contract sp - Show all IP user entries on sp dump - Show all IP user entries
/info/bwm/cont
BWM Contract Information
Current Bandwidth Management setting: ON Policy Enforcement:enabled BWM history will be mailed in a minute to 'abcd' at host '100.81.138.26' BWM IP user table entries 64k
Contract Policy Per User Traffic Num Name Prec Hard Soft Resv Limit Key State Shaping 1 123456789012345 2 1 50M 1M 500K E D 2 vlan 4 1 60M 2M 500K E D 3 filter 7 20 2M 1M 500K E D 4 5 1 2M 1M 500K D D 5 512 1 2M 1M 500K E D 10 10 1 1M 0K 0K 500K sip E D 11 11 1 100M 80M 500K 2M sip E D 12 12 1 2M 1M 500K E D 13 13 1 3M 1M 500K E D 14 14 1 4M 400K 100K E D 15 15 1 2M 1M 500K E D
This command displays information about any configured contracts and the BWM policies applied to the contracts. Table 4-31 BWM Contract Information
Field Contract Policy Description
Displays the BWM contract number. Displays specific information about a policy applied to a contract. Includes the following:
The policy number applied to the contract Prec: the precedence applied to the policy Hard: the hard limit applied to the policy Soft: the soft limit applied to the policy Resv: the reserve limit applied to the policy
Displays whether Traffic Shaping is enabled (E) or disabled (D) for this contract.
the current IP addresses in the Access Control List (ACL) the current UDP blast protection settings the current port security settings
Current security settings: seclog 128 fragment allow pdepth none Current IP address ACL settings: Number Address Mask -------- ---------------- ---------------Current UDP blast protection settings: UDP Port ----------1-5000 Packet Rate (per second) -----------------------20
Software key information includes a list of all the optional software packages which have been activated or installed on your switch. For information on ordering optional software license keys, see How to Get Help on page 18.
CHAPTER 5
129
63242584 63277826 0 0 NA NA 0
dot1PortOutFrames
dot1PortInDiscards
dot1TpLearnedEntry Discards
0 0 0 0 NA 0 0 0 NA 0 0 0 NA
dot3StatsSingleCollisionFrames
dot3StatsMultipleCollisionFrames
dot3StatsSQETestErrors
dot3StatsLateCollisions
dot3StatsExcessive Collisions
dot3StatsInternalMacTransmitErrors
dot3StatsCarrierSenseErrors
dot3StatsInternalMacReceiveErrors
dot3CollFrequencies
ifHCInUcastPkts
ifHCInBroadcastPkts ifHCInMulticastPkts
ifHCInDiscards
ifHCInErrors
ifHCOutOctets
ifHCOutUcastPkts
ifHCOutBroadcastPkts
ifHCOutMulticastPkts
ifHCOutDiscards
0 0 0 0 0 0
ipForwDatagrams: ipInDiscards:
0 0
ipInAddrErrors
ipForwDatagrams
ipInUnknownProtos
ipInDelivers
ipTtlExceeds
ipLANDattacks
etherStatsOctets
etherStatsBroadcastPkts etherStatsMulticastPkts
etherStatsCRCAlign Errors
etherStatsUndersizePkts
etherStatsOversizePkts
etherStatsFragments
etherStatsJabbers
etherStatsPkts64Octets
etherStatsPkts65to127Octets
etherStatsPkts128to255Octets
etherStatsPkts256to511Octets
etherStatsPkts512to1023Octets
etherStatsPkts1024to1518Octets
RMON statistics for port 1: etherStatsDropEvents: etherStatsOctets: etherStatsPkts: etherStatsBroadcastPkts: etherStatsMulticastPkts: etherStatsCRCAlignErrors: etherStatsUndersizePkts: etherStatsOversizePkts: etherStatsFragments: etherStatsJabbers: etherStatsCollisions: etherStatsPkts64Octets: etherStatsPkts65to127Octets: etherStatsPkts128to255Octets: etherStatsPkts256to511Octets: etherStatsPkts512to1023Octets: etherStatsPkts1024to1518Octets:
/stats/l2/fdb
FDB Statistics
FDB statistics: creates: current: lookups: finds: find_or_c's: max: 9611 58 850254 5832 11874 16384 deletes: hiwat: lookup fails: find fails: overflows: 9553 65 151373 0 0
This menu option enables you to display statistics regarding the use of the forwarding database, including the number of new entries, finds, and unsuccessful searches. FDB statistics are described in the following table: Table 5-10 Forwarding Database Statistics (/stats/l2/fdb)
Statistic creates current lookups finds find_or_cs deletes hiwat Description Number of entries created in the Forwarding Database. Current number of entries in the Forwarding Database. Number of entry lookups in the Forwarding Database. Number of successful searches in the Forwarding Database. Number of entries found or created in the Forwarding Database. Number of entries deleted from the Forwarding Database. Highest number of entries recorded at any given time in the Forwarding Database. Number of unsuccessful searches made in the Forwarding Database. Number of search failures in the Forwarding Database. Number of entries overflowing the Forwarding Database. Number of maximum Forwarding Database entries supported by the switch.
/stats/l2/lacp
LACP Statistics
>> Layer 2 Statistics# lacp 1 port 1 Valid LACPDUs received Valid Marker PDUs received Valid Marker Rsp PDUs received Unknown version/TLV type Illegal subtype received LACPDUs transmitted Marker PDUs transmitted Marker Rsp PDUs transmitted
9394 0 0 0 0 8516 0 0
Valid LACPDUs received The number of LACPDUs that the switch received on this port. Valid Marker PDUs received Valid Marker Rsp PDUs received Unknown version/TLV type Illegal subtype received LACPDUs transmitted Marker PDUs transmitted The number of valid Marker PDUs that the switch received on this port. The number of valid Marker Responses that the switch received on this port. The number of unknown version or TLV type that the switch received on this port. The number of illegal LACP subtype received on this port. The number of LACPDUs transmitted out of this port. The number of Marker PDUs transmitted out of this port.
Marker Rsp PDUs trans- The number of Marker Responses transmitted out of this port. mitted
/stats/l2/stg
Spanning Tree Group Statistics
Spanning Tree Group 1: Port Rcv Cfg Rcv TCN ----- ------------------1 0 0 2 0 0 3 0 0 4 0 0 5 0 0 6 0 0 7 0 0 8 0 0 9 139046 176 10 0 0 11 0 0 12 0 0 13 0 0 14 0 0 15 0 0 16 0 0 17 0 0 18 0 0 19 0 0 20 0 0 21 0 0 22 0 0 23 0 0 24 0 0 25 0 0 26 0 0 27 0 0 28 0 0 Xmt Cfg ---------0 0 0 0 0 0 0 0 27 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Xmt TCN ---------0 0 0 0 0 0 0 0 15 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
Xmt Cfg
See page 159 for sample output. dns Displays Domain Name Server/System (DNS) statistics. See page 160 for sample output. icmp Displays ICMP statistics. See page 161 for sample output. if <interface number (1-256)> Displays IP interface statistics for the management processors. See page 163 for sample output. tcp Displays TCP statistics. See page 165 for sample output. udp Displays UDP statistics. See page 167 for sample output. ifclear Clears IP interface statistics. Use this command with caution as it will delete all the IP interface statistics. ipclear Clears IP statistics. Use this command with caution as it will delete all the IP statistics. dump Dumps all Layer 3 switch statistics. Use this command to gather data for tuning and debugging Layer 3 switch performance. If you want to capture dump data to a file, set your communication software on your workstation to capture session data prior to issuing the dump command.
/stats/l3/ospf
OSPF Statistics Menu
[OSPF stats Menu] general - Show global stats aindex - Show area(s) stats if - Show interface(s) stats
/stats/l3/ospf/general
OSPF Global Statistics
The OSPF General Statistics contain the sum total of all OSPF packets received on all OSPF areas and interfaces.
OSPF stats ---------Rx/Tx Stats: Pkts hello database ls requests ls acks ls updates Nbr change stats: hello start n2way adjoint ok negotiation done exchange done bad requests bad sequence loading done n1way rst_ad down Timers kickoff hello retransmit lsa lock lsa ack dbage summary ase export
Rx -------0 23 4 3 7 9
Tx -------0 518 12 1 7 7 Intf change Stats: hello down loop unloop wait timer backup nbr change
2 0 2 2 2 2 0 0 2 0 0 1
4 2 0 0 2 0 5
514 1028 0 0 0 0 0
Tx Pkts
Rx Hello
Tx Hello
Rx Database
Tx Database
Rx ls Requests
Tx ls Requests
Rx ls Acks
Tx ls Acks
Rx ls Updates
Tx ls Updates
Start
n2way
adjoint ok
negotiation done
exchange done
bad requests
bad sequence
loading done
n1way
rst_ad
down
unloop
wait timer
backup
nbr change
Timers Kickoff: hello The sum total number of times the Hello timer has been fired (which triggers the send of a Hello packet) across all OPSF areas and interfaces. The sum total number of times the Retransmit timer has been fired across all OPSF areas and interfaces. The sum total number of times the Link State Advertisement (LSA) lock timer has been fired across all OSPF areas and interfaces. The sum total number of times the LSA Ack timer has been fired across all OSPF areas and interfaces. The total number of times the data base age (Dbage) has been fired. The total number of times the Summary timer has been fired. The total number of times the Autonomous System Export (ASE) timer has been fired.
retransmit
lsa lock
lsa ack
/stats/l3/ip
IP Statistics
IP statistics: ipInReceives: ipInAddrErrors: ipInUnknownProtos: ipInDelivers: ipOutDiscards: ipReasmReqds: ipReasmFails: ipFragFails: ipRoutingDiscards: ipReasmTimeout: 3115873 35447 500504 2334166 4 0 0 0 0 5 ipInHdrErrors: ipForwDatagrams: ipInDiscards: ipOutRequests: ipOutNoRoutes: ipReasmOKs: ipFragOKs: ipFragCreates: ipDefaultTTL: 1 0 0 1010542 4 0 0 0 255
ipInHdrErrors
ipInAddrErrors
ipForwDatagrams
ipInUnknownProtos
ipInDelivers
ipOutRequests
ipOutDiscards
ipOutNoRoutes
ipReasmReqds
ipReasmOKs ipReasmFails
ipFragOKs
ipFragFails
ipFragCreates
ipDefaultTTL
ipReasmTimeout
/stats/l3/route
Route Statistics
Route statistics: ipRoutesCur: 3 ipRoutesHighWater: 3 ipRoutesMax: 4096 -----------------------------------------------------------------SP Route statistics: SP ipRoutesCur ipRoutesHighWater ipRoutesMax --- ------------- ------------------- ------------1 3 3 4096 2 3 3 4096 3 3 3 4096 4 3 3 4096 -----------------------------------------------------------------RIP statistics: ripInPkts: ripDiscardPkts: BGP statistics: bgpInPkts: bgpBadPkts: bgpRoutesAdded: bgpRoutesCur: bgpRoutesIgnored:
ripOutPkts: 0 ripRoutesAgedOut:
0 0
0 0 0 0 0
0 0 0 0 0
ripRoutesAgedOut BGP statistics: bgpInPkts bgpOutPkts bgpBadPkts bgpSessFailures bgpRoutesAdded bgpRoutesRemoved bgpRoutesCur bgpRoutesFailed bgpRoutesIgnored
The total number of BGP packets received. The total number of BGP packets sent. The total number of BGP packets dropped. The total number of failed sessions. The total number of routes that were added to the routing table. The total number of routes that were removed from the routing table. The total number of current BGP routes. The total number of BGP routes that failed to add in the routing table. The total number of routes ignored because the peer was not connected locally or multihop was not configured. The total number of routes dropped by the filter.
bgpRoutesFiltered
/stats/l3/arp
ARP statistics
This menu option enables you to display Address Resolution Protocol statistics.
MP ARP statistics: arpEntriesCur: 2 arpEntriesHighWater: 2 arpEntriesMax: 8192 -----------------------------------------------------------------SP ARP statistics: SP arpEntriesCur arpEntriesHighWater arpEntriesMax --- --------------- --------------------- --------------1 1 1 8192 2 1 1 8192 3 1 1 8192 4 1 1 8192
/stats/l3/vrrp
VRRP Statistics
Virtual Router Redundancy Protocol (VRRP) support on the Alteon Application Switch provides redundancy between routers in a LAN. This is accomplished by configuring the same virtual router IP address and ID number on each participating VRRP-capable routing device. One of the virtual routers is then elected as the master, based on a number of priority criteria, and assumes control of the shared virtual router IP address. If the master fails, one of the backup virtual routers will assume routing authority and take control of the virtual router IP address. When virtual routers are configured, you can display the following protocol statistics for VRRP: Advertisements received (vrrpInAdvers) Advertisements transmitted (vrrpOutAdvers) Advertisements received, but ignored (vrrpBadAdvers)
0 0 0 0 0
0 0 0 0
/stats/l3/dns
DNS Statistics
This menu option enables you to display Domain Name System statistics.
DNS statistics: dnsInRequests: dnsBadRequests: 0 0 dnsOutRequests: 0
/stats/l3/icmp
ICMP Statistics
ICMP statistics: icmpInMsgs: icmpInDestUnreachs: icmpInParmProbs: icmpInRedirects: icmpInEchoReps: icmpInTimestampReps: icmpInAddrMaskReps: icmpOutErrors: icmpOutTimeExcds: icmpOutSrcQuenchs: icmpOutEchos: icmpOutTimestamps: icmpOutAddrMasks: 245802 41 0 0 244350 0 0 0 0 0 253777 0 0 icmpInErrors: icmpInTimeExcds: icmpInSrcQuenchs: icmpInEchos: icmpInTimestamps: icmpInAddrMasks: icmpOutMsgs: icmpOutDestUnreachs: icmpOutParmProbs: icmpOutRedirects: icmpOutEchoReps: icmpOutTimestampReps: icmpOutAddrMaskReps: 1393 0 0 18 0 0 253810 15 0 0 18 0 0
icmpInErrors
icmpOutErrors
icmpOutRedirects
ifInUcastPkts
ifInNUCastPkts
ifInDiscards
ifInErrors
ifInUnknownProtos
ifOutUcastPkts
ifOutNUcastPkts
ifOutDiscards
ifOutErrors
ifStateChanges
/stats/l3/tcp
TCP Statistics
TCP statistics: tcpRtoAlgorithm: tcpRtoMax: tcpActiveOpens: tcpAttemptFails: tcpInSegs: tcpRetransSegs: tcpCurBuff: tcpCurInConn: tcpCurLstnConn: tcpAllocTCBFails: 4 240000 0 0 0 0 0 0 3 0 tcpRtoMin: tcpMaxConn: tcpPassiveOpens: tcpEstabResets: tcpOutSegs: tcpInErrs: tcpCurConn: tcpCurOutConn: tcpOutRsts: 0 1600 0 0 0 0 6 0 0
tcpRtoMin
tcpRtoMax
tcpMaxConn
tcpActiveOpens
tcpPassiveOpens
tcpEstabResets
tcpInSegs
tcpOutSegs
tcpRetransSegs
tcpInErrs
tcpCurBuff
/stats/l3/udp
UDP Statistics
UDP statistics: udpInDatagrams: udpInErrors: 54 0 udpOutDatagrams: udpNoPorts: 43 1578077
udpNoPorts
Number of times the real server has failed its health checks Number of sessions currently open on the real server Total sessions the real server was assigned Highest number of simultaneous sessions recorded for each real server Real server transmit/receive octets See page 179 for sample output.
group <real server group number (1-256)> Displays the following real server group statistics:
Current and total sessions for each real server in the real server group. Current and total sessions for all real servers associated with the real server group. Highest number of simultaneous sessions recorded for each real server. Real server transmit/receive octets. For per-service octet counters, see page 179. See page 180 for sample output.
virt <virtual server number (1-1024)> Displays the following virtual server statistics:
Current and total sessions for each real server associated with the virtual server. Current and total sessions for all real servers associated with the virtual server. Highest number of simultaneous sessions recorded for each real server. Real server transmit/receive octets. For per-service octet counters, see page 179. See page 181 for sample output.
filt <filter ID (1-2048)> Displays the total number of times any filter has been used. See page 181 for sample output. layer7 Displays Layer 7 statistics. See page 182 for sample output. ssl Displays SSL server load balancing statistics. See page 186 for sample output. ftp Displays FTP SLB parsing and NAT statistics. See page 187 for sample output. rtsp Displays RTSP SLB statistics. See page 190 for sample output.
To view the statistics reset by this command, refer to Table 5-48 on page 196. aux Displays auxiliary session table statistics. dump Dumps all switch SLB statistics. Use this command to gather data for tuning and debugging switch performance. To save dump data to a file, set your communication software on your workstation to capture session data prior to issuing the dump command.
/stats/slb/sp
Server Load Balancing SP statistics Menu
[Server Load Balancing SP Statistics Menu] real - Show real server stats group - Show real server group stats virt - Show virtual server stats filt - Show filter stats maint - Show maintenance stats aux - Show auxiliary session table stats clear - Clear SP stats
Terminated Sessions
Allocation Failures
UDP Datagrams
Incorrect VIPs
No Available Real Server Backup Server Activations Overflow Server Activations Filtered (Denied) Frames
LAND attacks
Invalid reset packet drops Total IP fragment ses- This represents the total number of fragment sessions the switch has sions processed so far. Current IP fragment sessions IP fragment discards This represents the current number of fragment sessions. The number of fragmented packets that are discarded due to lack of resources.
IP fragment table full This counter indicates how many times session table is full. Free service pool entries
/stats/slb/gslb
Global SLB Statistics Menu
[Global SLB Statistics Menu] real - Show Global SLB remote real server stats virt - Show Global SLB virtual server stats site - Show Global SLB remote site stats network - Show Global SLB network preference stats rule - Show Global SLB rule stats geo - Show Global SLB geographical preference stats maint - Show Global SLB maintenance stats clear - Clear all Global SLB stats dump - Show all Global SLB stats
For any remote real server configured for Global Server Load Balancing, the following statistics can be viewed: Number of DNS responses directed to the remote real server Number of HTTP redirects to the remote real server
/stats/slb/gslb/site
Global SLB Site Statistics
Global SLB remote site 1 stats: Bad remote site packets received: DSSPv1 remote site updates sent: DSSPv1 remote site updates received: DSSPv2 remote site updates sent: DSSPv2 remote site updates received:
/stats/slb/gslb/maint
Global SLB Maintenance Statistics
Global SLB maintenance stats: Bad remote site packets received: DSSPv1 remote site updates sent: DSSPv1 remote site updates received: DSSPv2 remote site updates sent: DSSPv2 remote site updates received: DNS queries received: Bad DNS queries received: DNS responses sent: HTTP requests received: Bad HTTP requests received: HTTP responses sent: Hostname domain hits: Network domain hits: Basic domain hits: No server selected for hostname domain: No server selected for network domain: No server selected for basic domain: No matching domain: Last no result domain: Last source IP: 0 0 0 127746 85164 0 0 0 0 0 0 0 0 0 0 0 0 0 0.0.0.0
The number of bad packets received from the remote site. Bad updates or dropped packets usually indicate that there is a configuration problem at local or remote GSLB switches. If bad updates or dropped packets occur, check your syslog for configuration error messages. The number of Distributed Site State Protocol (DSSP) version one updates/packets sent to the remote sites. The number of Distributed Site State Protocol (DSSP) version one updates/packets received from the remote sites. The number of Distributed Site State Protocol (DSSP) version two updates/packets sent to the remote sites. The number of Distributed Site State Protocol (DSSP) version two updates/packets received from the remote sites.
DSSPv1 remote site updates sent DSSPv1 remote site updates received DSSPv2 remote site updates sent DSSPv2 remote site updates received
The number of DNS queries received. The number of bad DNS queries received. The number of DNS responses sent by the switch that includes DNS directs and DNS error responses.
HTTP requests received The number of HTTP requests received. Bad HTTP requests received
The number of bad/dropped client HTTP requests. Client HTTP GET request packets that do not contain the entire URL are considered bad and are dropped. The number of HTTP responses sent by the switch that includes HTTP redirects. The number of times the DNS queries received matched for the hostname configured. The number of times the DNS queries received matched for the network domain name configured. The number of times the DNS queries received matched for the basic domain name configured. The number of times no server was selected after matching the host name domain. The number of times no server was selected after matching the network domain name. The number of times no server was selected after matching the basic domain name. The number of times the DNS queries received did not match the host name, domain name, or the network domain configured. The domain in the last DNS query received that did not match the host name, domain name, or the network domain configured. The source IP address of the last DNS query or HTTP request received.
No server selected for hostname domain No server selected for network domain No server selected for basic domain No matching domain
Last source IP
NOTE Octets are provided per server, not per service, unless configured as described in Per Service Octet Counters on page 179. Table 5-32 Real Server SLB Statistics (/stats/slb/real)
Statistics Current sessions Description The total number of outstanding sessions that are established to the particular real server. The total number of sessions that have been established to the particular real server. The highest number of sessions ever recorded for the particular real server. The total number of octets sent by the particular real server.
Total sessions
Highest sessions
Octets
2.
On the Alteon Application Switch, configure a real server with a real IP address for each service above. Continuing the example above, two real servers would be configured for the physical server (representing each real service). If there were five physical servers providing the two services (HTTP and FTP), 10 real servers would have to be configured: five for the HTTP services on each physical server, and five for the FTP services on each physical server.
3.
On the Alteon Application Switch, configure one real server group for each type of service, and group each appropriate real server IP address into the group that handles the specific service. Thus, in keeping with our example, two groups would be configured: one for handling HTTP and one for handling FTP.
4.
Configure a virtual server and add the appropriate services to that virtual server.
Real server group statistics include the following: Current and total sessions for each real server in the real server group. Current and total sessions for all real servers associated with the real server group. Highest number of simultaneous sessions recorded for each real server. Real server transmit/receive octets. For per-service octet counters, see the procedure on Per Service Octet Counters on page 179.
NOTE The virtual server IP address is shown on the last line, below the real server IP addresses. Virtual server statistics include the following: Current and total sessions for each real server associated with the virtual server. Current and total sessions for all real servers associated with the virtual server. Highest number of simultaneous sessions recorded for each real server. Real server transmit/receive octets. For per-service octet counters, see Per Service Octet Counters on page 179.
You can obtain the total number of times any filter has been matched.
/stats/slb/layer7
SLB Layer7 Statistics Menu
[Layer 7 Statistics Menu] redir - Show URL Redirection stats str - Show SLB String stats maint - Show Layer 7 Maintenance stats
/stats/slb/layer7/redir
Layer7 Redirection Statistics
Total Total Total Total Total Total Total Total Total Total URL based web cache redirection stats: cache server hits: origin server hits: straight to origin server hits: none-GETs hits: 'Cookie: ' hits: no-cache hits: RTSP cache server hits: RTSP origin server hits: HTTP redirection hits: 0 0 0 0 0 0 0 0 0
Total cache server hits The total number of HTTP requests redirected to the cache server. Total origin server hits The total number of HTTP requests forwarded to the origin server. Total straight to ori- The total number of HTTP requests forwarded from straight to the gin server hits origin server. Total none-GETs hits The total number of none GET requests forwarded to the origin server.
/stats/slb/layer7/str
Layer 7 SLB String Statistics
SLB String stats: ID SLB String 1 any 2 www.[abcdefghijklm]*.com 3 www.[nopqrstuvwxyz]*.com 4 www.junk.com 5 www.abc.com 6 www.[abcdefjhijklm]*.org 7 www.[nopqrstuvwxyz]*.org Hits 1527115 0 0 0 0 0 0
/stats/slb/layer7/maint
Layer 7 SLB Maintenance Statistics
Layer 7 maintenance stats: Clients reset by switch on client side: 0 Clients reset by switch on server side: 0 Connection Splicing to support HTTP/1.1: 0 Invalid HTTP methods: 0 Aged delayed binding sessions: 0 Half open connections: 0 Switch retries: 0 Random early drops: 0 Requests exceeded 9000 bytes: 0 Invalid 3-way handshakes: 0 Exceeded max frame size: 0 Out of order packet drops: 0 Current SP[1] memory units: 1260 Lowest: Current SP[2] memory units: 1260 Lowest: Current SP[3] memory units: 1260 Lowest: Current SP[4] memory units: 1260 Lowest: Current SP memory units: 5040 Current SEQ buffer entries: 0 Highest: Current Data buffer use: 0 Highest: Current SP buffer entries: 0 Highest: Total Nonzero SEQ Alloc: 0 Total SEQ Buffer Allocs: 0 Total SEQ Frees: Total Data Buffer Allocs: 0 Total Data Frees: Alloc Fails - Seq buffers: 0 Alloc Fails - Ubufs: Max sessions per bucket: 0 Max frames per session: Max bytes buffered (sess): 0
Switch retries Random early drops Requests exceeded 4500 bytes Invalid 3-way handshakes Exceeded max frame size Out of order packet drops: Current SP memory units Current SEQ buffer entries Highest SEQ buffer entries Current Data buffer use Highest Data buffer use Total Nonzero SEQ Alloc Total SEQ Buffer Allocs Total SEQ Frees
Max frames per session The maximum number of frames to be buffered per session. Max bytes buffered (sess) The maximum number of bytes to be buffered per session.
/stats/slb/ssl
SLB Secure Socket Layer Statistics
SSL SLB maintenance stats: SessionId allocation fails: Total number of SSL ID reassignments: 0 0
Current Total Highest Sessions Sessions Sessions ------------------------- -------- ---------- -------Unique SessionIds 0 0 0 SSL connections 0 0 0 Persistent Port Sessions 0 0 0
The table shows the Current Sessions, the total sessions seen on the switch since last reset and the high water mark of current sessions for the following: Unique SessionIds Many SSL sessions can use the same SessionId, these should all bind to the same server. This number shows the number of unique SSL sessions seen on the switch. The number of different TCP connections using SSL service. The number of SessionIds maintained to allow for persistence across different client ports.
/stats/slb/ftp
File Transfer Protocol SLB and Filter Statistics Menu
[FTP SLB parsing and active - Show parsing - Show maint - Show dump - Dump Filter Statistics Menu] active FTP NAT filter stats FTP SLB parsing server stats FTP maintenance stats all FTP SLB/NAT stats
Table 5-38 FTP SLB Parsing and Filter Statistics Menu Options (/stats/slb/ftp)
Command Syntax and Usage active Shows active FTP SLB parsing and filter statistics. See page 188 for sample output. parsing Shows parsing statistics. See page 188 for sample output. maint Shows maintenance statistics. See page 189 for sample output. dump Shows all FTP SLB/NAT statistics. See page 189.
/stats/slb/ftp/active
Active FTP SLB Parsing and Filter Statistics
Total Active FTP NAT stats(PORT): Total FTP: Total New Active FTP Index: Active FTP NAT ACK/SEQ diff: 0 0 0
Table 5-39 Active FTP Slb Parsing and Filter statistics (/stats/slb/ftp/active)
Statistics Total Active FTP NAT stats (PORT) Total FTP Total New Active FTP Index Active FTP NAT ACK/SEQ diff Description The number of times the switch receives the port command from the client. The number of times the switch receives both active and passive FTP connections. The number of times the switch creates a new index due to port command from the client. The difference in the numbers of ACK and SEQ that the Switch needs for packet adjustment.
/stats/slb/ftp/parsing
Passive FTP SLB Parsing Statistics
Total FTP SLB Parsing Stats(PASV): Total FTP: Total New FTP SLB parsing Index: FTP SLB parsing ACK/SEQ diff: 0 0 0
Total New FTP SLB parsing Index FTP SLB parsing ACK/ SEQ diff
/stats/slb/ftp/maint
FTP SLB Maintenance Statistics
FTP mode switch error: 0
/stats/slb/ftp/dump
FTP SLB Statistics Dump
Total FTP : Total FTP NAT Filtered: Total new active FTP NAT Index: Total new FTP SLB parsing Index: FTP Active FTP NAT ACK/SEQ diff: FTP SLB parsing ACK/SEQ diff: FTP mode switch error: 0 0 0 0 0 0 0
Total FTP NAT Filtered The total number of FTP NAT filter sessions that occurred. Total new active FTP NAT Index Total new FTP SLB parsing Index FTP Active FTP NAT ACK/SEQ diff FTP SLB parsing ACK/ SEQ diff FTP mode switch error The total number of new data sessions created for FTP NAT filter in active mode. The number of times the switch creates a new index in response to the pasv command from the client. The total number of times the adjustment between ACK and SEQ occurred on the filter. The difference in the numbers of ACK and SEQ that the switch needs for FTP SLB parsing. The number of times the switch could not switch mode from active to passive and vice versa.
/stats/slb/rtsp
RTSP SLB Statistics
Control UDP Connection Buffer Alloc SP Connection Streams Redirect Denied Allocs Failures -- ---------- ---------- ---------- ---------- ---------- ---------1 0 0 0 0 0 0 2 0 0 0 0 0 0 3 0 0 0 0 0 0 4 0 0 0 0 0 0 -- ---------- ---------- ---------- ---------- ---------- -------0 0 0 0 0 0
Redirect ConnectionDenied
BufferAllocs AllocFailures
/stats/slb/dns
DNS SLB Statistics
Total Total Total Total Total Total Total number number number number number number number of of of of of of of TCP DNS queries: UDP DNS queries: invalid DNS queries: multiple DNS queries: domain name parse errors: failed real server name matches: DNS parsing internal errors: 0 0 0 0 0 0 0
Total number of domain name parse errors Total number of failed real server name matches Total number of DNS parsing internal errors
/stats/slb/wap
WAP SLB Statistics
This command displays all the Radius and WAP related counters.
WAP Maintenance stats: current sessions: 0 allocation failures: 0 incorrect VIPs: 0 incorrect Vports: 0 no available real server: 0 requests to wrong SP: 0 -----------------------------------------------------------------TPCP External Notification stats: add session reqs: 0 del session reqs: 0 req fails- SP dead: 0 req fails- SP dead: 0 -----------------------------------------------------------------RADIUS Snooping stats: acct reqs: 0 acct wrap reqs: 0 acct start reqs: 0 acct update reqs: 0 acct stop reqs: 0 acct bad reqs: 0 acct reqs(FIP): 0 acct reqs(no FIP): 0 add session reqs: 0 del session reqs: 0 req fails- SP dead: 0 req fails- DMA: 0
WAP Maintenance stats: current sessions allocation failures The number of session bindings currently in use. Indicates instances where the switch ran out of available bindings for a port. Indicates the number of times the switch received a Layer 4 request for a virtual server which was not configured. This dropped frames counter indicates that the virtual server has received frames for TCP/UDP services that have not been configured. Normally this indicates a mis-configuration on the virtual server or the client. This dropped frames counter indicates that all real servers are either out of service or at their maxcon limit.
incorrect VIPs
incorrect Vports
requests to wrong SP The number of session add/delete requests sent to the wrong SP.
TPCP External Notification stats: add session reqs req fails- SP dead The number of WAP session add requests via TPCP. The number of add-request failures due to dead target SP.
RADIUS Snooping stats: acct reqs acct wrap reqs The number of RADIUS Accounting frames received. The number of wrapped RADIUS Accounting frames received. The number of RADIUS Accounting Start frames received. The number of RADIUS Accounting Update frames. The number of RADIUS Accounting Stop frames received. The number of bad RADIUS Accounting frames received. The number of WAP session add requests via RADIUS snooping. The number of WAP session delete requests via RADIUS snooping. The number of add/delete request failures due to dead target SP. The number of add/delete requests failed due to DMA write failure.
acct start reqs acct update reqs acct stop reqs acct bad reqs add session reqs del session reqs req fails- SP dead req fails- DMA
/stats/slb/maint
SLB Maintenance Statistics
SLB Maintenance stats: Maximum sessions: Current sessions: 4 second average: 64 second average: Terminated sessions: Allocation failures: UDP datagrams: Non TCP/IP frames: Incorrect VIPs: Incorrect Vports: No available real server: Backup server activations: Overflow server activations: Filtered (denied) frames: LAND attacks: No TCP control bits: Invalid reset packet drops: Total IP fragment sessions: Current IP fragment sessions IP fragment discards: IP fragment table full: Free Service pool entries: 2097104 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 8192
SLB Maintenance statistics are described in the following table. Table 5-46 Server Load Balancing Maintenance Statistics (/stats/slb/maint)
Statistic Maximum sessions Current Sessions Description The maximum number of simultaneous sessions supported. Number of session bindings currently in use (the last 4 and 64 seconds).
Terminated Sessions Number of sessions removed from the session table because the server assigned to them failed and graceful server failure was not enabled. Allocation Failures Indicates instances where the Switch ran out of available sessions for a port. UDP Datagrams Non TCP/IP Frames Incorrect VIPs Indicates that the virtual server IP address and MAC are receiving UDP frames when UDP balancing is not turned on. Indicates the number of non-IP based frames received by the virtual server. Indicates the number of times the switch received a Layer 4 request for a virtual server which was not configured.
No Available Real Server Backup Server Activations Overflow Server Activations Filtered (Denied) Frames LAND attacks
No TCP Control Bits The number of packets that were dropped because the packet had no control bits set in the TCP header. Invalid reset packet drops Total IP fragment sessions Current IP fragment sessions IP fragment discards IP fragment table full Free service pool entries This represents the total number of fragment sessions the switch has processed so far. This represents the current number of fragment sessions. The number of fragmented packets that are discarded due to lack of resources. This counter indicates how many times session table is full.
/stats/slb/sip
SIP SLB Statistics
SIP Stats: Total number Total number Total number Total number of of of of SIP SIP SIP SIP Client Parse Errors Server Parse Errors Unknown Method packets Incomplete Messages : : : : 0 0 0 0
Total number of SIP Total number of packets received with methods not known to the Unknown Method packets SIP parser on the switch. Total number of SIP Incomplete Messages Total number of packets received which do not have the complete SIP message in a single packet.
/stats/slb/clear
Clearing the SLB Statistics
The following statistics are reset to zero when the clear command is given and confirmed: Table 5-48 SLB Statistics Reset (/stats/slb/clear)
Statistics Real server stats: Description Health check failures Total sessions Highest sessions Octets Total sessions Highest sessions Octets Total sessions Highest sessions Octets
BW Contract statistics Contract Name Rate(Kbps) Octets Discards BufUsed BufMax -------- --------------- ---------- ---------- ---------- ------- ----1 cont1 0 40465360 262049256 0 16320 2 cont2 0 0 0 0 16320 20 cont20 5230 682947936 1822133376 16384 16320 26 cont26 0 0 0 0 16320 256 Default 0 773974 0 0 16320 1 cont1 0 40465360 262049256 0 16320 2 cont2 0 0 0 0 16320 20 cont20 5238 684289056 1825753104 16384 16320 26 cont26 0 0 0 0 16320 256 Default 0 774114 0 0 16320
The following description of statistics applies on a specific switch port for all enabled contracts. NOTE This command displays enabled contracts only. Table 5-51 Bandwidth Management Contract Statistics (/stats/bwm/cont)
Statistics Contract Name Octets Description The contract number. The contract name. The number of octets that are being transmitted through a particular contract since the switch is booted. The number of octets that are being discarded because of seeing more traffic than the bandwidth contract limit permits.
Discards
BufMax
/stats/bwm/rcont
BWM Contract Rate Statistics
Use this command to show the rate statistics of all the enabled contracts. NOTE This command displays enabled contracts only. This command repeats its output when the printed lines are less than the configured CLI lines per screen. If the CLI lines are configured at zero per screen, the command will continue to repeat its output until you type a key on the console or telnet session. You can configure the number of CLI lines per screen using the global (hidden) command: lines <number of lines>. For example:
>> AAS_2424 - Bandwidth Management Statistics# lines Current lines-per-screen: 24 >> AAS_2424 - Bandwidth Management Statistics# lines ? lines sets lines-per-screen 0-300, zero for infinite
BW Contract statistics Contract Name Rate(Kbps) Octets Discards BufUsed BufMax -------- --------------- ---------- ---------- ---------- ------- ----1 cont1 5222 285408288 735607152 16384 456960 2 cont2 0 0 0 0 456960 20 cont20 5238 285720864 735308784 16384 456960 26 cont26 0 0 0 0 456960 256 Default 4 517182 0 0 456960 1 cont1 5230 286747296 739228896 16384 456960 2 cont2 0 0 0 0 456960 20 cont20 5230 287059872 738930528 16384 456960 26 cont26 0 0 0 0 456960 256 Default 8 519400 0 0 456960 1 cont1 5222 288084192 742853160 16384 456960 2 cont2 0 0 0 0 456960 20 cont20 5238 288400992 742550760 16384 456960 26 cont26 0 0 0 0 456960 256 Default 8 521578 0 0 456960
Octets
Discards
BufUsed
BufMax
/stats/bwm/hist
BWM History Statistics
Discards TimeStamp YyyyMmDd:Hr:Mi/TmZone --------------- ---- ---------------- ---------- ---------- ---------47.80.23.124 1 filter_number01 0 0 20030910:15:11/ -8:00 47.80.23.124 2 filter_number02 0 0 20030910:15:11/ -8:00 47.80.23.124 3 filter_number03 0 0 20030910:15:11/ -8:00 47.80.23.124 4 filter_number04 0 0 20030910:15:11/ -8:00 47.80.23.124 5 filter_number05 0 0 20030910:15:11/ -8:00 47.80.23.124 6 filter_number06 0 0 20030910:15:11/ -8:00 47.80.23.124 7 filter_number07 0 0 20030910:15:11/ -8:00 47.80.23.124 8 filter_number08 0 0 20030910:15:11/ -8:00 47.80.23.124 9 filter_number09 0 0 20030910:15:11/ -8:00 47.80.23.124 10 filter_number10 0 0 20030910:15:11/ -8:00 47.80.23.124 256 Default 608 0 20030910:15:11/ -8:00 Switch IP Cont Name Octets
You can dump the stats kept in the SMTP history buffer that get dumped periodically when an E-mail is sent. This command is used to keep long term history only for the contracts that are enabled and have history command turned on. Use this command to show the history of all the contracts for which history command is enabled. The sampling is done at one-minute intervals. Table 5-53 Bandwidth Management History Statistics (/stats/bwm/hist)
Statistics Contract Octets Discards Description The contract number for which history is enabled. The number of octets sent out on a particular contract. The number of octets discarded because of seeing more traffic than the bandwidth contract limit permits. Indicates the time the packets were received or discarded.
TimeStamp
/stats/bwm/maint
BWM Maintenance Statistics
BWM Maint statistics -----------------------------------------------------------------Maint Stats for rate limiting contracts Discard pkts 0 Discard octets 0 Out pkts 0 Out octets 0 Transmit failed 0 User Limit entry allocation failures 0 -----------------------------------------------------------------Maint Stats for traffic shaping contracts QFull Discard pkts 0 QFull Discard octets 0 Out of buffers pkts 0 Out of buffers pkts 0 Transmit failed 0 TDT set when qfull 0 TDT set between soft and hard 0 TDT set at soft 0
/stats/bwm/ipusers
BWM IP Users Statistics
This command displays the number of BWM IP user entries for each BWM contract for each SP.
BWM IP users statistics Contract SP1 SP2 SP3 SP4 Total -------- ---------- ---------- ---------- ---------- ---------10 0 10 0 0 10 11 0 10 0 0 10 ---------- ---------- ---------- ---------- ---------0 20 0 0 20
/stats/mp/pkt
MP Packet Statistics
Packet counts: allocs: mediums: jumbos: smalls: alloc fails: TCP counts: allocs: current: alloc fails: 89262 0 0 0 0 4866 46 0 frees: mediums hi-watermark: jumbos hi-watermark: smalls hi-watermark: packet discards: frees: current hi-watermark: alloc discards: 89262 4 0 4 0 4827 146 0
frees
mediums
jumbos
smalls
alloc fails
frees
mediums hi-watermark
jumbos hi-watermark The highest number of packet allocation with size between 1536 bytes to 9K bytes from the packet buffer pool by the TCP/IP protocol stack. smalls hi-watermark The highest number of packet allocation with size less than 128 bytes from the packet buffer pool by the TCP/IP protocol stack.
TCP counts: allocs Total number of TCP packet allocations from MP memory by the TCP/IP protocol stack. Total number of TCP packet allocations from MP memory by the TCP/IP protocol stack. Total number of TCP packet allocation failures from MP memory by the TCP/IP protocol stack. Total number of times the TCP packet buffers are freed (released) to MP memory by the TCP/IP protocol stack. The highest number of TCP packet allocation from MP memory by the TCP/IP protocol stack. The number of TCP packets that are discarded by the MP. The packets are discarded because MP memory resources are not available.
current
alloc fails
frees
/stats/mp/tcb
TCP Statistics
All TCP allocated control blocks: 117f6d00: 0.0.0.0 0 <=> 0.0.0.0 117f81a8: 47.81.27.6 1331 <=> 47.80.16.59 80 23 listen established
/stats/mp/ucb
UCB Statistics
All UDP allocated control blocks: 161: listen 1985: listen 3122: listen
/stats/mp/sfd
MP-Specific SFD Statistics
All Socket FD allocated: 0 -1 16 1180b128: 0.0.0.0 server 1 -1 17 108c5bd8: 0.0.0.0 server 2 -1 18 108d5cfc: 0.0.0.0 server 3 -1 19 1180a258: 0.0.0.0 server 0 <=> 47.133.88.31 0 <=> 47.133.88.31 0 <=> 47.133.88.31 0 <=> 47.133.88.31 81 23 22 443 listen listen listen listen TCP TCP TCP TCP
/stats/mp/cpu
CPU Statistics
This menu option enables you to display the CPU utilization statistics on MP.
CPU utilization: cpuUtil1Second: cpuUtil4Seconds: cpuUtil64Seconds:
cpuUtil4Seconds
cpuUtil64Seconds
clear cpu
0 0 0 0
/stats/sp/cpu
CPU Statistics
This menu option enables you to display the CPU utilization statistics on the Switch Processor (SP).
CPU utilization for SP 1: cpuUtil1Second: cpuUtil4Seconds: cpuUtil64Seconds:
6% 6% 6%
cpuUtil64Seconds
/stats/security/dos
DOS Attack Statistics Menu
[DoS Attack Statistics Menu] port - Port DoS attack statistics dump - Dump all DoS attack statistics clear - Clear all DoS attack statistics help - DoS attack statistics description
/stats/security/ipacl
IP Access Control List Statistics
The following IP Access Control List statistics can be viewed with this command:
[IP ACL Statistics Menu] dump - IP address access control Stats clear - Clear all access control Stats
/stats/security/udpblast
UDP Blast Statistics
[UDP Blast Statistics Menu] dump - UDP Blast Stats clear - Clear all UDP Blast Stats
/stats/security/udpblast/dump
UDP Blast Dump Statistics
UDP blast protection stats: UDP Port Blocked Packets ------------------------Current Packet Rate/Second --------------------------
/stats/security/pgroup
UDP Pattern Match Statistics
Pattern Match Group stats: ID Name 1 Hits 0
This menu displays how many times each configured pattern group has been matched and a subsequent filtering action performed. Pattern groups are configured in the Pattern Matching Menu on page 350.
/stats/security/ratelim
Rate Limiting Statistics
Rate limiting stats: TCP: Total hold downs triggered: Current per-client state entries: UDP: Total hold downs triggered: Current per-client state entries: ICMP: Total hold downs triggered: Current per-client state entries:
0 0
0 0
0 0
/stats/security/dump
Dump Statistics for Security
IP ACL stats: Address Blocked Packets ---------------------------------------------------------------------------------------------UDP blast protection stats: UDP Port Blocked Packets Current Packet Rate/Second ------------------------------------------------------------------------------------------------------------------Pattern Match Group stats: ID Name Hits 1 0 100 0 101 0 -----------------------------------------------------------------Rate limiting stats: TCP: Total hold downs triggered: Current per-client state entries: UDP: Total hold downs triggered: Current per-client state entries: ICMP: Total hold downs triggered: Current per-client state entries:
0 0
0 0
0 0
snmpInBadVersions: snmpInBadC'tyUses: snmpEnableAuthTraps: snmpInBadTypes: snmpInNoSuchNames: snmpInReadOnlys: snmpInTotalReqVars: snmpInGetRequests: snmpInSetRequests: snmpInTraps: snmpOutNoSuchNames: snmpOutReadOnlys: snmpOutGetRequests: snmpOutSetRequests: snmpOutTraps: snmpProxyDrops:
SNMPv3 Statistics: snmpUnknownSecurityModels: snmpInvalidMsgs: snmpUnknownPDUHandlers: snmpUnknownContexts: snmpUnavailableContexts: usmStatsUnsupportedSecLevels: usmStatsNotInTimeWindows: usmStatsUnknownUserNames: usmStatsUnknownEngineIDs: usmStatsWrongDigests: usmStatsDecryptionErrors:
0 0 0 0 0 0 0 2 2 0 0
snmpInBadC'tyNames
snmpInBadC'tyUses
snmpInASNParseErrs
snmpInBadTypes snmpInTooBigs
snmpInNoSuchNames
snmpInBadValues
snmpInReadOnlys
snmpInTotalReqVars
snmpInTotalSetVars
snmpInGetRequests
snmpInGetNexts
snmpInSetRequests
snmpInGetResponses
snmpInTraps
snmpOutTooBigs
snmpOutNoSuchNames
snmpOutBadValues
snmpOutReadOnlys snmpOutGenErrs
snmpOutGetRequests
snmpOutSetRequests
snmpSilentDrops
snmpProxyDrops
SNMPv3 Statistics: snmpUnknownSecurityModels The total number of packets received by the SNMP engine which were dropped because they referenced a securityModel that was not known to or supported by the SNMP engine. The total number of packets received by the SNMP engine which were dropped because there were invalid or inconsistent components in the SNMP message. The total number of packets received by the SNMP engine which were dropped because the PDU contained in the packet could not be passed to an application responsible for handling the pduType, for example, no SNMP application had registered for the proper combination of the contextEngineID and the pduType. The total number of packets received by the SNMP engine which were dropped because the context contained in the message was unavailable. The total number of packets received by the SNMP engine which were dropped because the context contained in the message was unknown.
snmpInvalidMsgs
snmpUnknownPDUHandlers
snmpUnknownContexts snmpUnavailableContexts
usmStatsNotInTimeWindows
usmStatsUnknownUserNames
usmStatsUnknownEngineIDs
/stats/ntp
NTP Statistics
Alteon OS uses NTP (Network Timing Protocol) version 3 to synchronize the switchs internal clock with an atomic time calibrated NTP server. With NTP enabled, the switch can accurately update its internal clock to be consistent with other devices on the network and generates accurate syslogs.
NTP statistics: Primary Server: Requests Sent: 17 Responses Received: 17 Updates: 1 Secondary Server: Requests Sent: 0 Responses Received: 0 Updates: 0 Last update based on response from primary server. Last update time: 18:04:16 Tue Jul 13, 2004 Current system time: 18:55:49 Tue Jul 13, 2004
RX packets
RX errors
RX overruns
TX packets
CHAPTER 6
NOTE The apply command is a global command. Therefore, you can enter apply at any prompt in the administrative interface.
NOTE All configuration changes take effect immediately when applied, except for starting Spanning Tree Protocol. To turn STP on or off, you must apply the changes, save them (see below), and then reset the switch (see Resetting the Switch on page 448).
When you save configuration changes, the changes are saved to the active configuration block. The configuration being replaced by the save is first copied to the backup configuration block. If you do not want the previous configuration block copied to the backup configuration block, enter the following instead:
# save n
You can decide which configuration you want to run the next time you reset the switch. Your options include: The active configuration block The backup configuration block Factory default configuration
You can view all pending configuration changes that have been applied but not saved to flash memory using the diff flash command. It is a global command that can be executed from any menu. For instructions on selecting the configuration to run at the next system reset, see Selecting a Configuration Block on page 447.
This menu provides configuration of switch management parameters such as user and administrator privilege mode passwords, Web-based management settings, and management access list. Table 6-2 System Configuration Menu Options (/cfg/sys)
Command Syntax and Usage syslog Displays the Syslog Menu. To view menu options, see page 233. mmgmt Displays Management Port Menu. To view menu options, see page 234. sshd Displays the SSH Server Menu. To view menu options, see page 237. radius Displays the RADIUS Authentication Menu. To view menu options, see page 239. tacacs Displays TACACS+ authentication Menu. To view menu options, see page 240.
/cfg/sys/syslog
System Host Log Configuration
[Syslog Menu] host host2 sever sever2 facil facil2 console log cur Set IP address of first syslog host Set IP address of second syslog host Set the severity of first syslog host Set the severity of second syslog host Set facility of first syslog host Set facility of second syslog host Enable/disable console output of syslog messages Enable/disable syslogging of features Display current syslog settings
/cfg/sys/mmgmt
Management Port Configuration Menu
The Management port is a Fast Ethernet port that is used exclusively to manage the switch. While the switch can be managed from any network port, the Management port saves consuming a port that could otherwise be used for processing data and traffic. This port manages the switch using either telnet CLI, SNMP, or HTTP. This port is isolated from and does not participate in the networking protocols that run on the network ports. The Management port must be configured with a static IP address, subnet mask, broadcast address, and default gateway, and must be enabled before it can be used. If this port is disabled, the network ports have to perform all switch management (other than the switch management using the console). If this port is enabled, the factory default settings for some of the management features remain with the network ports. You can change the defaults by configuring these features to permanently use the management port, or in some cases, by using the operational commands to set these options on a one-time basis.
[Management Port Menu] port - Management Port Phy Menu addr - Set IP address mask - Set subnet mask gw - Set default gateway address intr - Set interval between gateway ping attempts retry - Set number of failed attempts to declare gateway DOWN dns - Set default port for DNS ntp - Set default port for NTP radius - Set default port for RADIUS tacacs - Set default port for TACACS+ smtp - Set default port for SMTP snmp - Set default port for SNMP traps syslog - Set default port for SYSLOG sonmp - Set default IP for SONMP hello packets tftp - Set default port for TFTP ena - Enable management port dis - Disable management port cur - Display current configuration
/cfg/sys/mmgmt/port
Management Port Link Menu
[Management Port Link Menu] speed - Set link speed mode - Set full or half duplex mode auto - Set autonegotiation cur - Display current link configuration
/cfg/sys/sshd
SSH Server Configuration Menu
Secure Shell (SSH), sometimes known as Secure Socket Shell, is a UNIX-based command interface and protocol for securely getting access to a remote computer. It is widely used by network administrators to control Web and other kinds of servers remotely. SSH is actually a suite of three utilities - slogin, ssh, and scp - that are secure versions of the earlier UNIX utilities, rlogin, rsh, and rcp. SSH commands are encrypted and secure in several ways. Both ends of the client/server connection are authenticated using a digital certificate, and passwords are protected by being encrypted. SSH uses RSA public key cryptography for both connection and authentication.
[SSHD Menu] intrval scpadm hkeygen skeygen sshport ena dis on off cur
Set Interval for generating the RSA server key Set SCP-only admin password Generate the RSA host key Generate the RSA server key Set SSH server port number Enable the SCP apply and save Disable the SCP apply and save Turn SSH server ON Turn SSH server OFF Display current SSH server configuration
NOTE For the Alteon Application Switch, this menu enables Secure Shell access from any SSH client. SSH scripts can be viewed by using the /cfg/dump command (see page 353). Table 6-6 System Configuration Menu Options (/cfg/sys/sshd)
Command Syntax and Usage intrval <interval (0-24)> Sets the interval for generating the RSA server key. scpadm Sets the Secure Copy (SCP)-only admin password. hkeygen Generates the RSA host key. When you enter this command, RSA host key generation starts immediately. skeygen Generates the RSA server key. When you enter this command, RSA server key generation starts immediately. sshport <TCP port number> Sets the SSH server port number. ena Enables SCP. dis Disables SCP. on Enables the SSH server. cur Displays the current SSH server configuration.
NOTE The top four commands are only accessible at the serial port
/cfg/sys/radius
RADIUS Server Configuration
[RADIUS Server Menu] prisrv - Set primary RADIUS server address secsrv - Set secondary RADIUS server address secret - Set primary RADIUS server secret secret2 - Set secondary RADIUS server secret port - Set RADIUS port retries - Set RADIUS server retries timeout - Set RADIUS server timeout telnet - Enable/disable RADIUS backdoor for telnet on - Turn RADIUS authentication ON off - Turn RADIUS authentication OFF cur - Display current RADIUS configuration
/cfg/sys/tacacs
TACACS+ Server Configuration Menu
TACACS (Terminal Access Controller Access Control System) is an authentication protocol that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can be allowed to a given system. TACACS is an encryption protocol and therefore less secure than TACACS+ and Remote Authentication Dial-In User Service (RADIUS) protocols. (Both TACACS and TACACS+ are described in Request for Comments 1492.) TACACS+ protocol is seen as more reliable than RADIUS as TACACS+ uses the Transmission Control Protocol (TCP) whereas RADIUS uses the User Datagram Protocol (UDP). Also, RADIUS combines authentication and authorization in a user profile, whereas TACACS+ separates the two operations. TACACS+ protocol has been implemented on Alteon OS to support the customers that have Ciscos TACACS+ protocol as their network security feature. Apart from that, TACACS+ offers the following advantages over RADIUS as the authentication device: TACACS+ is TCP-based so it facilitates connection-oriented traffic. It supports full-packet encryption as against password-only in authentication requests. Supports decoupled authentication, authorization, and accounting.
[TACACS+ Server prisrv secsrv secret secret2 port retries timeout telnet on off cur -
Menu] Set primary TACACS+ server address Set secondary TACACS+ server address Set primary TACACS+ server secret Set secondary TACACS+ server secret Set TACACS+ TCP port Set TACACS+ server retries Set TACACS+ server timeout (seconds) Enable/disable TACACS+ backdoor for telnet Turn TACACS+ authentication ON Turn TACACS+ authentication OFF Display current TACACS+ configuration
/cfg/sys/ntp
NTP Server Configuration
This menu enables you to synchronize the switch clock to a Network Time Protocol (NTP) server. By default, this option is disabled.
[NTP Server Menu] prisrv - Set primary NTP server address secsrv - Set secondary NTP server address intrval - Set NTP server resync interval tzone - Set NTP timezone offset from GMT dlight - Enable/Disable daylight savings time on - Turn NTP service ON off - Turn NTP service OFF cur - Display current NTP configuration
/cfg/sys/sonmp
SynOptics Network Management Protocol Configuration
[SONMP Menu] srcif on off cur Set source interface to be used in hello packets Turn Ethernet Autotopology ON Turn Ethernet Autotopology OFF Display current SONMP configuration
SynOptics Network Management Protocol (SONMP) is a proprietary network management protocol that is used by Nortel Networks Optivitiy Switch Manager (OSM) to discover Alteon Application Switches on the network. The following commands add support for the Ethernet Autotopology algorithm and the Bay Topology MIB. The topology algorithm is executed by each Alteon switch on which SONMP is enabled. Table 6-10 System Configuration Menu Options (/cfg/sys/sonmp)
Command Syntax and Usage srcif <interface number (1-256)> This command specifies the IP address to be used in the hello packets. If the interface specified by this command is not up, then the first interface which is up and running is used in the hello packets. on This command enables the SONMP protocol, and turns Ethernet Autotopology on.
/cfg/sys/ssnmp
System SNMP Configuration
Alteon OS supports SNMP-based network management. In SNMP model of network management, a management station (client/manager) accesses a set of variables known as MIBs (Management Information Base) provided by the managed device (agent). If you are running an SNMP network management station on your network, you can manage the switch using the following standard SNMP MIBs: MIB II (RFC 1213) Ethernet MIB (RFC 1643) Bridge MIB (RFC 1493)
An SNMP agent is a software process on the managed device that listens on UDP port 161 for SNMP messages. Each SNMP message sent to the agent contains a list of management objects to retrieve or to modify. SNMP parameters that can be modified include: System name System location System contact Use of the SNMP system authentication trap function Read community string Write community string Trap community strings
[System SNMP Menu] snmpv3 - SNMPv3 Menu name - Set SNMP "sysName" locn - Set SNMP "sysLocation" cont - Set SNMP "sysContact" rcomm - Set SNMP read community string wcomm - Set SNMP write community string trsrc - Set SNMP trap source interface timeout - Set timeout for the SNMP state machine auth - Enable/disable SNMP "sysAuthenTrap" linkt - Enable/disable SNMP link up/down trap cur - Display current system SNMP configuration
NOTE This command is applicable only to SNMPv1 and SNMPv2 traps because only the SNMPv1 and SNMPv2 trap packets contain the source IP address that can be set with this command. The SNMPv3 packets do not contain this field.
/cfg/sys/ssnmp/snmpv3
SNMPv3 Configuration Menu
SNMP version 3 (SNMPv3) is an extensible SNMP Framework that supplements the SNMPv2 Framework by supporting the following: a new SNMP message format security for messages access control remote configuration of SNMP parameters
For more details on the SNMPv3 architecture please refer to RFC2271 to RFC2276.
[SNMPv3 Menu] usm view access group comm taddr tparam notify v1v2 cur
usmUser Table menu vacmViewTreeFamily Table menu vacmAccess Table menu vacmSecurityToGroup Table menu community Table menu targetAddr Table menu targetParams Table menu notify Table menu Enable/disable V1/V2 access Display current SNMPv3 configuration
defines a set of services that an application can use for checking access rights of the user. You need access control when you have to process retrieval or modification request from an SNMP entity. To view menu options, see page 251.
A group maps the user name to the access group names and their access rights needed to access SNMP management objects. A group defines the access rights assigned to all names that belong to a particular group. To view menu options, see page 253.
comm <snmpCommunity number [1-16]> The community table contains objects for mapping community strings and version-independent SNMP message parameters. To view menu options, see page 254. taddr <snmpTargetAddr number [1-16]> This command allows you to configure destination information, consisting of a transport domain and a transport address. This is also termed as transport endpoint. The SNMP MIB provides a mechanism for performing source address validation on incoming requests, and for selecting community strings based on target addresses for outgoing notifications. To view menu options, see page 255. tparam <target params index [1-16]> This command allows you to configure SNMP parameters, consisting of message processing model, security model, security level, and security name information. There may be multiple transport endpoints associated with a particular set of SNMP parameters, or a particular transport endpoint may be associated with several sets of SNMP parameters. To view menu options, see page 256. notify <notify index [1-16]> A notification application typically monitors a system for particular events or conditions, and generates Notification-Class messages based on these events or conditions. To view menu options, see page 257. v1v2 disable|enable This command allows you to enable or disable the access to SNMP version 1 and version 2. This command is enabled by default. cur Displays the current SNMPv3 configuration.
/cfg/sys/ssnmp/snmpv3/usm
User Security Model Configuration Menu
You can make use of a defined set of user identities using this Security Model. An SNMP engine must have the knowledge of applicable attributes of a user. This menu helps you create a user security model entry for an authorized user. You need to provide a security name to create the USM entry.
[SNMPv3 usmUser name auth authpw priv privpw del cur 1 Menu] Set USM user name Set authentication protocol Set authentication password Set privacy protocol Set privacy password Delete usmUser entry Display current usmUser configuration
Table 6-13 User Security Model Configuration Menu Options (/cfg/sys/ssnmp/ snmpv3/usm)
Command Syntax and Usage name <32 character name> This command allows you to configure a string up to 32 characters long that represents the name of the user. This is the login name that you need in order to access the switch. auth md5|sha|none This command allows you to configure the authentication protocol between HMAC-MD5-96 or HMAC-SHA-96. The default algorithm is none. authpw If you selected an authentication algorithm using the above command, you need to provide a password, otherwise you will get an error message during validation. This command allows you to create or change your password for authentication. priv des|none This command allows you to configure the type of privacy protocol on your switch. The privacy protocol protects messages from disclosure. The options are des (CBC-DES Symmetric Encryption Protocol) or none. If you specify des as the privacy protocol, then make sure that you have selected one of the authentication protocols (MD5 or HMAC-SHA-96). If you select none as the authentication protocol, you will get an error message. privpw This command allows you to create or change the privacy password.
Table 6-13 User Security Model Configuration Menu Options (/cfg/sys/ssnmp/ snmpv3/usm)
Command Syntax and Usage del Deletes the USM user entries. cur Displays the USM user entries.
cfg/sys/ssnmp/snmpv3/view
SNMPv3 View Configuration Menu
[SNMPv3 vacmViewTreeFamily 1 Menu] name - Set view name tree - Set MIB subtree(OID) which defines a family of view subtrees mask - Set view mask type - Set view type del - Delete vacmViewTreeFamily entry cur - Display current vacmViewTreeFamily configuration
/cfg/sys/ssnmp/snmpv3/access
View-based Access Control Model Configuration Menu
The view-based Access Control Model defines a set of services that an application can use for checking access rights of the user. Access control is needed when the user has to process SNMP retrieval or modification request from an SNMP entity.
[SNMPv3 vacmAccess 1 Menu] name - Set group name prefix - Set content prefix model - Set security model level - Set minimum level of security match - Set prefix only or exact match rview - Set read view index wview - Set write view index nview - Set notify view index del - Delete vacmAccess entry cur - Display current vacmAccess configuration
Table 6-15 View-based Access Control Model Menu Options (/cfg/sys/ssnmp/ snmpv3/access)
Command Syntax and Usage name <32 character name> Defines the name of the group. prefix <32 character name> Defines the name of the context. An SNMP context is a collection of management information that an SNMP entity can access. An SNMP entity has access to many contexts. For more information on naming the management information, see RFC2571, the SNMP Architecture document. The view-based Access Control Model defines a table that lists the locally available contexts by contextName. model usm|snmpv1|snmpv2 Allows you to select the security model to be used. level noAuthNoPriv|authNoPriv|authPriv Defines the minimum level of security required to gain access rights. The level noAuthNoPriv means that the SNMP message will be sent without authentication and without using a privacy protocol. The level authNoPriv means that the SNMP message will be sent with authentication but without using a privacy protocol. The authPriv means that the SNMP message will be sent both with authentication and using a privacy protocol.
Table 6-15 View-based Access Control Model Menu Options (/cfg/sys/ssnmp/ snmpv3/access)
Command Syntax and Usage match exact|prefix If the value is set to exact, then all the rows whose contextName exactly matches the prefix are selected. If the value is set to prefix then the all the rows where the starting octets of the contextName exactly match the prefix are selected. rview <32 character view name> This is a 32 character long read view name that allows you read access to a particular MIB view. If the value is empty or if there is no active MIB view having this value then no access is granted. wview <32 character view name> This is a 32 character long write view name that allows you write access to the MIB view. If the value is empty or if there is no active MIB view having this value then no access is granted. nview <32 character view name> This is a 32 character long notify view name that allows you notify access to the MIB view. del Deletes the View-based Access Control entry. cur Displays the View-based Access Control configuration.
/cfg/sys/ssnmp/snmpv3/group
SNMPv3 Group Configuration Menu
[SNMPv3 vacmSecurityToGroup 1 Menu] model - Set security model uname - Set USM user name gname - Set group gname del - Delete vacmSecurityToGroup entry cur - Display current vacmSecurityToGroup configuration
/cfg/sys/ssnmp/snmpv3/comm
SNMPv3 Community Table Configuration Menu
This command is used for configuring the community table entry. The configured entry is stored in the community table list in the SNMP engine. This table is used to configure community strings in the Local Configuration Datastore (LCD) of SNMP engine.
[SNMPv3 snmpCommunityTable 1 Menu] index - Set community index name - Set community string uname - Set USM user name tag - Set community tag del - Delete communityTable entry cur - Display current communityTable configuration
Table 6-17 SNMPv3 Community Table Configuration Menu Options (/cfg/sys/ ssnmp/snmpv3/comm)
Command Syntax and Usage index <32 character name> Allows you to configure the unique index value of a row in this table consisting of 32 characters maximum. name <32 character name> Defines the user name as defined in /cfg/sys/ssnmp/snmpv3/usm/name on page 249. uname <32 character name> Defines a readable 32 character long string that represents the corresponding value of an SNMP community name in a security model. tag <list of tag string, max 255 characters> Allows you to configure a tag of up to 255 characters maximum. This tag specifies a set of transport endpoints to which a command responder application sends an SNMP trap. del Deletes the community table entry. cur Displays the community table configuration.
/cfg/sys/ssnmp/snmpv3/taddr
SNMPv3 Target Address Table Configuration Menu
This command is used to configure the target transport entry. The configured entry is stored in the target address table list in the SNMP engine. This table of transport addresses is used in the generation of SNMP messages.
[SNMPv3 snmpTargetAddrTable 1 Menu] name - Set target address name addr - Set target transport address IP port - Set target transport address port taglist - Set tag list pname - Set targetParams name del - Delete targetAddrTable entry cur - Display current targetAddrTable configuration
/cfg/sys/ssnmp/snmpv3/tparam
SNMPv3 Target Parameters Table Configuration Menu
You can configure the target parameters entry and store it in the target parameters table in the SNMP engine. This table contains parameters that are used to generate a message. The parameters include the message processing model (for example: SNMPv3, SNMPv2c, SNMPv1), the security model (for example: USM), the security name, and the security level (noAuthnoPriv, authNoPriv, or authPriv).
[SNMPv3 snmpTargetParamsTable 1 Menu] name - Set target params name mpmodel - Set message processing model model - Set security model uname - Set USM user name level - Set minimum level of security del - Delete targetParamsTable entry cur - Display current targetParamsTable configuration
Table 6-19 Target Parameters Table Configuration Menu Options (/cfg/sys/ ssnmp/snmpv3/tparam)
Command Syntax and Usage name <32 character name> Allows you to configure the locally arbitrary, but unique identifier that is associated with this entry. mpmodel snmpv1|snmpv2c|snmpv3 Allows you to configure the message processing model that is used to generate SNMP messages. model usm|snmpv1|snmpv2 Allows you to select the security model to be used when generating the SNMP messages. uname <32 character name> Defines the name that identifies the user in the USM table (page 249) on whose behalf the SNMP messages are generated using this entry. level noAuthNoPriv|authNoPriv|authPriv Allows you to select the level of security to be used when generating the SNMP messages using this entry. The level noAuthNoPriv means that the SNMP message will be sent without authentication and without using a privacy protocol. The level authNoPriv means that the SNMP message will be sent with authentication but without using a privacy protocol. The authPriv means that the SNMP message will be sent both with authentication and using a privacy protocol.
Table 6-19 Target Parameters Table Configuration Menu Options (/cfg/sys/ ssnmp/snmpv3/tparam)
Command Syntax and Usage del Deletes the targetParamsTable entry. cur Displays the current targetParamsTable configuration.
/cfg/sys/ssnmp/snmpv3/notify
SNMPv3 Notify Table Configuration Menu
SNMPv3 uses Notification Originator to send out traps. A notification typically monitors a system for particular events or conditions, and generates Notification-Class messages based on these events or conditions. [SNMPv3 snmpNotifyTable 1 Menu] name - Set notify name tag - Set notify tag del - Delete notifyTable entry cur - Display current notifyTable configuration
/cfg/sys/health
System Health Check Configuration Menu
[System TCP Health Menu] add - Add TCP services to listen for health check rem - Remove TCP services from listening on - Turn system TCP health services ON off - Turn system TCP health services OFF cur - Display current TCP health services configuration
/cfg/sys/access
System Access Control Configuration
[System Access Menu] mgmt - Management Network Definition Menu user - User Access Control Menu (passwords) https - HTTPS (Web) Server Access Menu http - Enable/disable HTTP (Web) access wport - Set HTTP (Web) server port number snmp - Set SNMP access control tnet - Enable/disable Telnet access tnport - Set Telnet server port number rlimit - Set max rate of ARP, ICMP, TCP, or UDP packets to MP cur - Display current system access configuration
/cfg/sys/access/mgmt
Management Networks Menu
This menu is used to define IP address ranges which are allowed to access the switch for management purposes. NOTE The add and rem commands below replace the /cfg/sys/mnet and /cfg/ sys/mmask commands found in earlier releases of Alteon OS.
[Management Networks Menu] add - Add mgmt network definition rem - Remove mgmt network definition cur - Display current mgmt network definitions
NOTE If you configure the management network without including the switch interfaces, it will cause the Firewall Load Balancing health checks to fail and will create a Network Down state on the network.
/cfg/sys/access/user
User Access Control Menu
uid usrpw sopw l4opw opw sapw l4apw admpw cur User ID Menu Set user password (user) Set SLB operator password (slboper) Set L4 operator password (l4oper) Set operator password (oper) Set Slb administrator password (slbadmin) Set L4 administrator password (l4admin) Set administrator password (admin) Display current user status
NOTE Passwords can be a maximum of 15 characters. Table 6-24 User Access Control Menu Options (/cfg/sys/access/user)
Command Syntax and Usage uid <User ID, 1-10> Displays the User ID Menu. To view menu options, see page 264. usrpw Sets the user (user) password. The user has no direct responsibility for switch management. He or she can view switch status information and statistics, but cannot make any configuration changes. sopw Sets the SLB operator (slboper)password. The SLB operator manages Web servers and other Internet services and their loads. He or she can view all switch information and statistics and can enable/disable servers using the Server Load Balancing configuration menus. Access includes user functions.
/cfg/sys/access/https
HTTPS Access Configuration Menu
[https Menu] https port generate certSave cur Enable/Disable HTTPS Web access HTTPS WebServer port number Generate self-signed HTTPS server certificate save HTTPS certificate Display current SSL Web Access configuration
Country Name (2 letter code) [ ]: CA State or Province Name (full name) []: Ontario Locality Name (for example, city) []: Ottawa Organization Name (for example, company) []: Nortel Networks Organizational Unit Name (for example, section) []: Alteon Common Name (for example, users name) []: Mr Smith Email (for example, email address) []: [email protected] You will be asked to confirm if you want to generate the certificate. It will take approximately 30 seconds to generate the certificate. Then the switch will restart SSL agent.
certSave Allows the client, or the Web browser, to accept the certificate and save the certificate to Flash to be used when the switch is rebooted. cur Displays the current SSL Web Access configuration.
/cfg/sys/access/user/uid
System User ID Configuration Menu
This feature allows the users to operate the real servers assigned to them. Using this command you can list the current status of the real server including the real server number, the real server name, the operational state of the real server, and the number of current sessions. You can enable or disable the real servers and change the password for accessing these real servers.
[User ID 1 cos name pswd add rem ena dis del cur Menu] - Set class of service - Set user name - Set user password - Add real server - Remove real server - Enable user ID - Disable user ID - Delete user ID - Display current user configuration
For more information on connectors, please refer to the Hardware Installation Guide for Alteon OS. The commands on Alteon OS 2000 series and their description are as follows:
[Port 1 Menu] fast - Fast Phy Menu gig - Gig Phy Menu pvid - Set default port VLAN id name - Set port name cont - Set default port BW Contract nonip - Set BW Contract for non-IP traffic egbw - Set port egress bandwidth Limit rmon - Enable/Disable RMON for port tag - Enable/disable VLAN tagging for port iponly - Enable/disable allowing only IP related frames at ingress ena - Enable port dis - Disable port cur - Display current port configuration
Use these menu options to set port parameters for the port link.
NOTE Since the speed and mode parameters cannot be set for Gigabit Ethernet ports, these options do not appear on the Gigabit Link Menu. Link menu options are described in Table 6-36 and appear on the fast and gig port configuration menus for the Alteon Application Switch. Using these configuration menus, you can set port parameters such as speed, flow control, and negotiation mode for the port link. Table 6-29 Port Link Configuration Menu Options (/cfg/port/fast|gig)
Command Syntax and Usage speed 10|100|any Sets the link speed. Not all options are valid on all ports. The choices include:
Any for automatic detection (default) 10 Mbps 100 Mbps
This menu appears only if a Fast Ethernet port is selected. mode full|half|any Sets the operating mode. This command is available only in the Fast Link Menu.The choices include:
Any for auto negotiation (default) Full-duplex Half-duplex
This menu appears only if a Fast Ethernet port is selected. fctl rx|tx|both|none Sets the flow control. This command is available only in the Fast Link Menu.The choices include:
Receive flow control Transmit flow control Both receive and transmit flow control (default) No flow control
auto on|off Enables or disables auto negotiation for the port. cur Displays the current port parameters.
NOTE For more information on connectors, refer to the Alteon OS Hardware Installation Guide Part Number 315393-E.
Single-Mode ports
10/100/1000Base-T Copper Ports
When you select a single-mode copper port (1, 2, 7, or 8), you see the menu below:
[Port 1 Menu] gig pvid name cont rmon tag iponly ena dis cur
Copper Gig Phy Menu Set default port VLAN id Set port name Set default port BW Contract Enable/Disable RMON for port Enable/disable VLAN tagging for port Enable/disable allowing only IP related frames Enable port Disable port Display current port configuration
Table 6-31 Single-Mode Copper Port Configuration Menu Options (/cfg/port <1, 2, 7, or 8>)
Command Syntax and Usage gig If a port is configured to support Gigabit Ethernet, this option displays the Copper Gigabit Ethernet Physical Link Menu. To view menu options, see page 271. pvid <VLAN number (1-4090)> Sets the default VLAN number which will be used to forward frames which are not VLAN tagged. The default number is 1. name <64 character string>|none Sets a name for the port. The assigned port name appears next to the port number on some information and statistics screens. The default is set to None. cont <BWM Contract (1-256)> Sets the default Bandwidth Management Contract for this port. rmon disable|enable Disables or enables RMON for this port. It is disabled by default. tag disable|enable Disables or enables VLAN tagging for this port. It is disabled by default. iponly disable|enable Disables or enables allowing only IP-related frames. It is disabled by default. ena Enables the port. dis Disables the port. (To temporarily disable a port without changing its configuration attributes, refer to Temporarily Disabling a Port on page 277.)
Table 6-31 Single-Mode Copper Port Configuration Menu Options (/cfg/port <1, 2, 7, or 8>)
Command Syntax and Usage cur Displays the current port parameters.
Use these menu options to set port parameters for the port link. Link menu options are described in Table 6-36 and appear on the gig port configuration menus for the Alteon Application Switch. Using these configuration menus, you can set port parameters such as speed, flow control, and negotiation mode for the port link. Table 6-32 Single-Mode Copper Port Gigabit Ethernet Link Configuration Menu Options (/cfg/port <1, 2, 7, or 8>/gig)
Command Syntax and Usage speed 10|100|1000|any Sets the link speed. Not all options are valid on all ports. The choices include:
Any for automatic detection (default) 10 Mbps 100 Mbps 1000 Mbps
fctl rx|tx|both|none Sets the flow control. This command is available only in the Fast Link Menu.The choices include:
Receive flow control Transmit flow control Both receive and transmit flow control (default) No flow control Chapter 6: The Configuration Menu 271
Table 6-32 Single-Mode Copper Port Gigabit Ethernet Link Configuration Menu Options (/cfg/port <1, 2, 7, or 8>/gig)
Command Syntax and Usage auto on|off Enables or disables autonegotiation for the port. cur Displays the current Gigabit Ethernet copper link port parameters.
SFP Gig Phy Menu Set default port VLAN id Set port name Set default port BW Contract Set port egress bandwidth Limit Enable/Disable RMON for port Enable/disable VLAN tagging for port Enable/disable allowing only IP related frames Enable port Disable port Display current port configuration
Table 6-33 Single-Mode SFP Gigabit Ethernet Port Configuration Menu Options (/cfg/port <912>)
Command Syntax and Usage gig If a port is configured to support Gigabit Ethernet, this option displays the SFP Gigabit Ethernet Physical Link Menu. To view menu options, see page 273. pvid <VLAN number (1-4090)> Sets the default VLAN number which will be used to forward frames which are not VLAN tagged. The default number is 1. name <64 character string>|none Sets a name for the port. The assigned port name appears next to the port number on some information and statistics screens. The default is set to None. cont <BWM Contract (1-256)> Sets the default Bandwidth Management Contract for this port.
Table 6-33 Single-Mode SFP Gigabit Ethernet Port Configuration Menu Options (/cfg/port <912>)
Command Syntax and Usage rmon disable|enable Disables or enables RMON for this port. It is disabled by default. tag disable|enable Disables or enables VLAN tagging for this port. It is disabled by default. iponly disable|enable Disables or enables allowing only IP-related frames. It is disabled by default. ena Enables the port. dis Disables the port. (To temporarily disable a port without changing its configuration attributes, refer to Temporarily Disabling a Port on page 277.) cur Displays the current port parameters.
Use these menu options to set port parameters for the port link. Link menu options are described in Table 6-36 and appear on the gig port configuration menus for the Alteon Application Switch. Using these configuration menus, you can set port parameters such as flow control, and negotiation mode for the port link.
Table 6-34 Single-Mode SFP Gigabit Ethernet Port Link Configuration Menu Options (/cfg/port <9-12>/gig)
Command Syntax and Usage fctl rx|tx|both|none Sets the flow control. The choices include:
Receive flow control Transmit flow control Both receive and transmit flow control (default) No flow control
auto on|off Enables or disables autonegotiation for the port. cur Displays the current SFP Gigabit Ethernet link port parameters.
Dual-Mode Ports
When you select any one of the dual-mode ports (36), you see the menu below:
[Port 3 Menu] cop sfp pref back pvid name cont rmon tag iponly ena dis cur
Copper Gig Phy Menu SFP Gig Phy Menu Set preferred link Set backup link Set default port VLAN id Set port name Set default port BW Contract Enable/Disable RMON for port Enable/disable VLAN tagging for port Enable/disable allowing only IP related frames Enable port Disable port Display current port configuration
Use these menu options to set port parameters for the port link. Link menu options are described in Table 6-36 and appear on the cop port configuration menus for the Alteon Application Switch. Using these configuration menus, you can set port parameters such as speed, flow control, and negotiation mode for the port link. Table 6-36 Dual-Mode Copper Port Link Configuration Menu Options (/cfg/port <36>/cop)
Command Syntax and Usage speed 10|100|1000|any Sets the link speed. Not all options are valid on all ports. The choices include:
Any for automatic detection (default) 10 Mbps 100 Mbps 1000 Mbps
Receive flow control Transmit flow control Both receive and transmit flow control (default) No flow control
auto on|off Enables or disables auto negotiation for the port. cur Displays the current Gigabit Ethernet copper link port parameters.
Table 6-37 Dual-Mode SFP Gigabit Link Configuration Menu Options (/cfg/port <3-6>/sfp)
Command Syntax and Usage fctl rx|tx|both|none Sets the flow control. The choices include:
Receive flow control Transmit flow control Both receive and transmit flow control (default) No flow control
Because this configuration sets a temporary state for the port, you do not need to use apply or save. The port state will revert to its original configuration when the Alteon Application Switch is reset. See the Operations Menu on page 433 for other operations-level commands.
Port mirroring is disabled by default. The Port Mirroring Menu is used to configure, enable, and disable the monitored port. When enabled, network packets being sent and/or received on a target port are duplicated and sent to a monitor port. By attaching a network analyzer to the monitor port, you can collect detailed information about your network performance and usage. Table 6-38 Port Mirroring menu options (/cfg/pmirr)
Command Syntax and Usage mirror disable|enable Enables or disables port mirroring monport <monitoring port (port to mirror to)> Displays port-mirroring menu options that help configure the port. To view menu options, see page 278. cur Displays the current settings of the mirrored and monitoring ports.
/cfg/pmirr/monport
Port-Mirroring Menu
[Port 1 Menu] add - Add "Mirrored" port and VLANs rem - Rem "Mirrored" port and VLANs cur - Display current Port-based Port Mirroring configuration
[Bandwidth Management Menu] cont - Contract menu policy - Policy menu group - Group menu user - Set SMTP server user name entries - Set number of entries in the BWM IP user table frequen - Set the frequency of BWM email in minutes force - Enable/disable enforce policies on - Globally turn Bandwidth Management processing ON off - Globally turn Bandwidth Management processing OFF cur - Display current Bandwidth Management configuration
NOTE Up to 256 bandwidth management contracts can be configured on Alteon OS. Table 6-40 Bandwidth Management Menu Options (/cfg/bwm)
Command Syntax and Usage cont <BW contract number (1-256)> Displays the Bandwidth Management Contract Menu. To manage bandwidth on an Alteon
Application Switch, you must create one or more bandwidth management contracts. The switch uses these contracts to limit individual traffic flows. For further details, see the Alteon OS 22.0.2 Application Guide.
By default, this option is disabled. To view menu options, see page 281. policy <BW policy number (1-512)> Displays the Bandwidth Management Policy Menu. Bandwidth policies are bandwidth limita-
tions defined for any set of frames, specifying the guaranteed bandwidth rates. A bandwidth policy is often based on a rate structure whereby a Web host could charge a customer for bandwidth utilization. For further details, see the Alteon OS 22.0.2 Application Guide.
To view menu options, see page 284.
group <BW Group number (1-32)> Displays the Bandwidth Management Group Menu. To view menu options, see page 285. user <user name> Sets the SMTP user name to whom the history statistics will be mailed. The default is set to None. entries <64k|128k|256k|512k|1024k> Sets the number of entries in the Bandwidth Management IP user table. frequen <1-1440 minutes, 0 for default behavior> Sets the frequency of Bandwidth Management email in minutes. The default is set to 0.
Table 6-42 BWM Contract Time Policy Configuration Menu Options (/cfg/bwm/ timepol)
Command Syntax and Usage day <mon|tue|wed|thu|fri|sat|sun|weekday|weekend|everyday> Defines the day(s) of the week, weekdays (Monday to Friday), weekend (Saturday and Sunday) or everyday. The default is everyday. from <1-12am/pm> Defines the time from where you need to start the time in hours. If am or pm is not specified, the switch will default to am for numbers lower than 12 and will default to pm for numbers 13 or higher. to <1-12am/pm> Sets the end limit of time in hours. If am or pm is not specified, the switch will default to am for numbers lower than 12 and will default to pm for numbers 13 or higher. policy <BW Policy number, 1-512> Defines the policy number for the contract. enable Enables the Time Policy command on the switch. disable Disables the Time Policy command on the switch.
Table 6-42 BWM Contract Time Policy Configuration Menu Options (/cfg/bwm/ timepol)
Command Syntax and Usage delete Deletes Time Policy. cur Displays the current Time Policy configuration on the switch.
/cfg/bwm/group
Bandwidth Management Group Configuration Menu
[BW Group 1 Menu] add - Add Contract to this group rem - Remove Contract from this group del - Delete BW Group cur - Display current BW Group configuration
/cfg/bwm/cur
Bandwidth Management Current Configuration
Current Bandwidth Management setting: ON Policy Enforcement: enabled SMTP server user name: Contract Name Policy Prec Hist TOS State Shaping 1 cont_1 1 1 E E E E 2 cont_2 2 1 E D D D 256 Default -0 E D E D *Default contract gets all the BW that is available on a port after the active contracts reserved BW is taken. Policy 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Hard 25M 10M 2M 2M 2M 2M 2M 2M 2M 2M 2M 2M 2M 2M 2M 2M 2M 2M 2M 2M 2M 2M 2M 2M 2M 2M 2M 2M 2M 2M Soft 20M 8M 1M 1M 1M 1M 1M 1M 1M 1M 1M 1M 1M 1M 1M 1M 1M 1M 1M 1M 1M 1M 1M 1M 1M 1M 1M 1M 1M 1M Resv oTOS uTOS Buffer 500K 150 100 16320 500K 0 0 16320 500K 0 0 16320 500K 0 0 16320 500K 0 0 16320 500K 0 0 16320 500K 0 0 16320 500K 0 0 16320 500K 0 0 16320 500K 0 0 16320 500K 0 0 16320 500K 0 0 16320 500K 0 0 16320 500K 0 0 16320 500K 0 0 16320 500K 0 0 16320 500K 0 0 16320 500K 0 0 16320 500K 0 0 16320 500K 0 0 16320 500K 0 0 16320 500K 0 0 16320 500K 0 0 16320 500K 0 0 16320 500K 0 0 16320 500K 0 0 16320 500K 0 0 16320 500K 0 0 16320 500K 0 0 16320 500K 0 0 16320
NOTE When VRRP is used for active/active redundancy, STP must be enabled. Table 6-46 Spanning Tree Configuration Menu (/cfg/l2/stp)
Command Syntax and Usage brg Displays the Bridge Spanning Tree Menu. To view menu options, see page 290. port <port number> Displays the Spanning Tree Port Menu. To view menu options, see page 291. add <VLAN numbers (1-4090)> Associates a VLAN with a spanning tree and requires an external VLAN ID as a parameter. remove <VLAN numbers (1-4090)> Breaks the association between a VLAN and a spanning tree and requires an external VLAN ID as a parameter. clear Removes all VLANs from a spanning tree. on Globally enables Spanning Tree Protocol. off Globally disables Spanning Tree Protocol. default Resets STG and Group member parameters to factory default. cur Displays the current Spanning Tree Protocol parameters.
/cfg/l2/stg/brg
Bridge Spanning Tree Configuration
[Bridge Spanning Tree Menu] prior - Set bridge Priority [0-65535] hello - Set bridge Hello Time [1-10 secs] mxage - Set bridge Max Age (6-40 secs) fwd - Set bridge Forward Delay (4-30 secs) aging - Set bridge Aging Time (1-65535 secs, 0 to disable) cur - Display current bridge parameters
Spanning Tree bridge parameters affect the global STP operation of the switch. STP bridge parameters include: Bridge priority Bridge hello time Bridge maximum age Forwarding delay Bridge aging time Table 6-47 Bridge Spanning Tree Menu Options (/cfg/l2/stp/brg)
Command Syntax and Usage prior <new bridge priority (0-65535)> Configures the bridge priority. The bridge priority parameter controls which bridge on the network is the STP root bridge. To make this switch the root bridge, configure the bridge priority lower than all other switches and bridges on your network. The lower the value, the higher the bridge priority. The range is 0 to 65535, and the default is 32768. hello <new bridge hello time (1-10 secs)> Configures the bridge hello time.The hello time specifies how often the root bridge transmits a configuration bridge protocol data unit (BPDU). Any bridge that is not the root bridge uses the root bridge hello value. The range is 1 to 10 seconds, and the default is 2 seconds. mxage <new bridge max age (6-40 secs)> Configures the bridge maximum age. The maximum age parameter specifies the maximum time the bridge waits without receiving a configuration bridge protocol data unit before it re configures the STP network. The range is 6 to 40 seconds, and the default is 20 seconds. fwd <new bridge Forward Delay (4-30 secs)> Configures the bridge forward delay parameter. The forward delay parameter specifies the amount of time that a bridge port has to wait before it changes from the listening state to the learning state and from the learning state to the forwarding state. The range is 4 to 30 seconds, and the default is 15 seconds.
When configuring STP bridge parameters, the following formulas must be used: 2*(fwd-1) > mxage 2*(hello+1) < mxage
Spanning Tree port parameters are used to modify STP operation on an individual port basis. STP port parameters include: Port priority Port path cost
Each LACP active or passive port needs an admin, an operational key, and an aggregator for LACP to start negotiation on these ports. You need to assign the same admin key to a group of ports to make them aggregatable. The link can generate Link Aggregation ID (LAG ID) based on the operational key. All the aggregatable ports must have the same LAG ID. You can form an active LACP trunk group with all the ports that have the same LAG ID. Please refer to your Alteon OS Application Guide for a detailed information on this protocol. NOTE All ports are in LACP off mode by default. Use the following commands to configure LACP on the Alteon OS.
[LACP Menu] sysprio - Set LACP system priority timeout - Set LACP system timeout scale for timing out partner info port - LACP port Menu cur - Display current LACP configuration
Use the following commands to configure Link Aggregation Control Protocol (LACP) on a selected port. Table 6-51 Link Aggregation Control Protocol Port Configuration Menu Options (/cfg/l2/lacp/port #)
Command Syntax and Usage mode <off for no LACP or active or passive> off: Using this option, you can turn LACP off for this port. You can use this port to manually configure a static trunk. All ports are in off mode by default. active: Using this option, you can turn LACP on and set this port to active. Only active ports initiate negotiation with the partner system port by sending the LACPDU packets. passive: Using this option, you can turn LACP on and set this port to passive mode. Passive ports do not initiate negotiation, but only respond to the negotiation requests from active ports. prio <1-65535> Sets the priority value for the selected port. Lower numbers provide higher priority. The default value is 128. adminkey <1-255> Sets the admin key for this port. Only ports with the same admin key and oper key (operational state generated internally) can form an LACP trunk group. cur Displays the current LACP configuration for this port.
Set VLAN name Assign VLAN to a Spanning Tree Group Set BW contract Add port to VLAN Remove port from VLAN Define VLAN as list of ports Enable/disable Jumbo Frame support Enable/disable smac learning Enable VLAN Disable VLAN Delete VLAN Display current VLAN configuration
NOTE All ports must belong to at least one VLAN. Any port which is removed from a VLAN and which is not a member of any other VLAN is automatically added to default VLAN #1. You cannot remove a port from VLAN #1 if the port has no membership in any other VLAN. Also, you cannot add a port to more than one VLAN unless the port has VLAN tagging turned on (see the tag command on page 270).
The Alteon Application Switch can be configured with up to 256 IP interfaces. Each IP interface represents the Alteon Application Switch on an IP subnet on your network. The Interface option is disabled by default. Table 6-54 IP Interface Menu Options (/cfg/l3/if)
Command Syntax and Usage addr <IP address (such as 192.4.17.101)> Configures the IP address of the switch interface using dotted decimal notation. mask <IP subnet mask (such as 255.255.255.0)> Configures the IP subnet address mask for the interface using dotted decimal notation. vlan <VLAN number (1-4090)> Configures the VLAN number for this interface. Each interface can belong to one VLAN, though any VLAN can have multiple IP interfaces in it. relay disable|enable Enables or disables the BOOTP relay on this interface. It is enabled by default. ena Enables this IP interface. dis Disables this IP interface. del Removes this IP interface. cur Displays the current interface settings.
NOTE The switch can be configured with up to 255 gateways. Gateways one to four are reserved for default gateway load balancing. Gateways five to 259 are used for load-balancing of VLAN-based gateways. This option is disabled by default. Table 6-55 Default Gateway Options (/cfg/l3/gw)
Command Syntax and Usage addr <default gateway address (such as, 192.4.17.44)> Configures the IP address of the default IP gateway using dotted decimal notation. intr <0-60 seconds> The switch pings the default gateway to verify that its up. The intr option sets the time between health checks. The range is from 1 to 120 seconds. The default is 2 seconds. retry <number of attempts (1-120)> Sets the number of failed health check attempts required before declaring this default gateway inoperative. The range is from 1 to 120 attempts. The default is 8 attempts. vlan <VLAN number (1-4090)> Sets the VLAN to be assigned to this default IP gateway.
NOTE By default learned default route has higher priority than the configured default gateway route.
arp disable|enable Enables or disables Address Resolution Protocol (ARP) health checks. This command is disabled by default. ena Enables the gateway for use. dis Disables the gateway. del Deletes the gateway from the configuration. cur Displays the current gateway settings.
/cfg/l3/route
IP Static Route Configuration
[IP Static Route Menu] add - Add static route rem - Remove static route cur - Display current static routes
Up to 128 static routes can be configured. Table 6-56 IP Static Route Configuration Menu Options (cfg/l3/route)
Command Syntax and Usage add <destination> <mask> <gateway> <interface number> Adds a static route. You will be prompted to enter a destination IP address, destination subnet mask, and gateway address. Enter all addresses using dotted decimal notation. If a gateway address is 0.0.0.0., the route becomes a black hole route, where any packet routed to this destination will be dropped. rem <destination> <mask> Removes a static route. The destination address of the route to remove must be specified using dotted decimal notation. cur Displays the current IP static routes.
/cfg/l3/arp
ARP Configuration Menu
Address Resolution Protocol (ARP) is the TCP/IP protocol that resides within the Internet layer. ARP resolves a physical address from an IP address. ARP queries machines on the local network for their physical addresses. ARP also maintains IP to physical address pairs in its cache memory. In any IP communication, the ARP cache is consulted to see if the IP address of the computer or the router is present in the ARP cache. Then the corresponding physical address is used to send a packet.
[ARP Menu] static rearp cur
- Static ARP Menu - Set re-ARP period in minutes - Display current ARP configuration
/cfg/l3/arp/static
ARP Static Configuration Menu
Static ARP entries are permanent in the ARP cache and do not age out like the ARP entries that are learnt dynamically. Static ARP entries enable the switch to reach the hosts without sending an ARP broadcast request to the network. Static ARPs are also useful to communicate with devices that do not respond to ARP requests. Static ARPs can also be configured on some gateways as a protection against malicious ARP Cache corruption and possible DOS attacks. NOTE Alteon OS 21.0 and above allows the static ARP configuration to be retained over reboots. Alteon OS 20.x and below allow the user to configure the ARP information but that information cannot be retained over a switch reboot.
[Static ARP Menu] add - Add a permanent ARP entry del - Delete an ARP entry cur - Display current static ARP configuration
/cfg/l3/frwd
IP Forwarding Configuration Menu
[IP Forwarding Menu] local - Local network definition for route caching menu dirbr - Enable or disable forwarding directed broadcasts on - Globally turn IP Forwarding ON off - Globally turn IP Forwarding OFF cur - Display current IP Forwarding configuration
/cfg/l3/frwd/local
Local Network Route Caching Definition
This menu is used for adding local networks by setting the local network address and netmask for the route cache, and to remove local networks.
[IP Local Networks Menu] add - Add local network definition rem - Remove local network definition cur - Display current local network definitions
NOTE All addresses that fall outside the defined range are forwarded to the default gateway. The default gateways must be within range.
/cfg/l3/nwf
Network Filter Configuration
[IP Network Filter 1 Menu] addr - IP Address mask - IP Subnet mask enable - Enable Network Filter disable - Disable Network Filter delete - Delete Network Filter cur - Display current Network Filter configuration
[IP Route Map alist aspath ap lp metric type prec weight enable disable delete cur
1 -
Menu] Access List number AS Filter Menu Set as-path prepend of the matched route Set local-preference of the matched route Set metric of the matched route Set OSPF metric-type of the matched route Set the precedence of this route map Set weight of the matched route Enable route map Disable route map Delete route map Display current route map configuration
prec <value (1-255)> Sets the precedence of the route map. The smaller the value, the higher the precedence. Default value is 10. weight <value (0-65534)>|none Sets the weight of the route map. enable Enables the route map. disable Disables the route map. delete Deletes the route map. cur Displays the current route configuration.
[IP Access List nwf metric action enable disable delete cur -
1 Menu] Network Filter number Metric Set Network Filter action Enable Access List Disable Access List Delete Access List Display current Access List configuration
[AS Filter 1 Menu] as - AS number action - Set AS Filter action enable - Enable AS Filter disable - Disable AS Filter delete - Delete AS Filter cur - Display current AS Filter configuration
/cfg/l3/rip1
Routing Information Protocol Configuration
The Routing Information Protocol (RIP) is an interior gateway protocol (IGP). RIP is one of a class of algorithms known as distance vector algorithms. The distance or hop count is used as the metric to determine the best path to a remote network or host where the hop count does not exceed 15 hops assuming a cost of one for each network. RIP uses broadcast User Datagram protocol (UDP) data packets to exchange routing information. RIP sends routing information updates every 30 seconds. This update contains known networks and the distances (hop count) associated with each one. For RIP1, no mask information is exchanged; the natural mask is always applied by the router receiving the update. For RIP2, mask information is sent. If information about a network is not received for 90 seconds, the metric associated with the network is raised to infinity (U) the metric is set for 16, which means the network has become unreachable. If information about a network is not received for 180 seconds (six update intervals), it is removed from the routing table. The RIP1 Menu is used for configuring Routing Information Protocol, version 1 (RIP1) parameters. This option is turned off by default.
[Routing Information Protocol Menu] updat - Set update period in seconds spply - Enable/disable supplying route updates lsten - Enable/disable listening to route updates deflt - Enable/disable listening to default routes statc - Enable/disable supplying static routes poisn - Enable/disable poisoned reverse vip - Enable/disable vip advertisement on - Globally turn RIP ON off - Globally turn RIP OFF cur - Display current RIP configuration
NOTE Do not configure RIP1 parameters if your routing equipment uses RIP version 2.
/cfg/l3/ospf
Open Shortest Path First Configuration
Alteon OS supports the Open Shortest Path First (OSPF) routing protocol. The Alteon OS implementation conforms to the OSPF version 2 specifications detailed in Internet RFC 1583. OSPF is designed for routing traffic within a single IP domain called an Autonomous System (AS). The AS can be divided into smaller logical units known as areas. In any AS with multiple areas, one area must be designated as area 0, known as the backbone. The backbone acts as the central OSPF area. All other areas in the AS must be connected to the backbone. Areas inject summary routing information into the backbone, which then distributes it to other areas as needed. For more information on how to configure OSPF on the switch, refer to your Alteon OS Application Guide.
[Open Shortest Path First Menu] aindex - OSPF Area (index) Menu range - OSPF Summary Range Menu if - OSPF Interface Menu virt - OSPF Virtual Links Menu md5key - OSPF MD5 Key Menu host - OSPF Host Entry Menu redist - OSPF Route Redistribute Menu lsdb - Set the LSDB limit for external LSA default - Export default route information on - Globally turn OSPF ON off - Globally turn OSPF OFF cur - Display current OSPF configuration
/cfg/l3/ospf/aindex
Area Index Configuration Menu
[OSPF Area (index) 1 Menu] areaid - Set area ID type - Set area type metric - Set stub area metric auth - Set authentication type spf - Set time interval between two SPF calculations enable - Enable area disable - Disable area delete - Delete area cur - Display current OSPF area configuration
/cfg/l3/ospf/range
OSPF Summary Range Configuration Menu
[OSPF Summary addr mask aindex hide enable disable delete cur Range 1 Menu] - Set IP address - Set IP mask - Set area index - Enable/disable hide range - Enable range - Disable range - Delete range - Display current OSPF summary range configuration
/cfg/l3/ospf/if
OSPF Interface Configuration Menu
[OSPF Interface aindex prio cost hello dead trans retra key mdkey enable disable delete cur 1 Menu] Set area index Set interface router priority Set interface cost Set hello interval in seconds Set dead interval in seconds Set transit delay in seconds Set retransmit interval in seconds Set authentication key Set MD5 key ID Enable interface Disable interface Delete interface Display current OSPF interface configuration
/cfg/l3/ospf/virt
OSPF Virtual Link Configuration Menu
[OSPF Virtual aindex hello dead trans retra nbr key mdkey enable disable delete cur Link 1 Menu] - Set area index - Set hello interval in seconds - Set dead interval in seconds - Set transit delay in seconds - Set retransmit interval in seconds - Set router ID of virtual neighbor - Set authentication key - Set MD5 key ID - Enable interface - Disable interface - Delete interface - Display current OSPF interface configuration
/cfg/l3/ospf/host
OSPF Host Entry Configuration Menu
[OSPF Host Entry 1 Menu] addr - Set host entry IP address aindex - Set area index cost - Set cost of this host entry enable - Enable host entry disable - Disable host entry delete - Delete host entry cur - Display current OSPF host entry configuration
/cfg/l3/ospf/redist <fixed|static|rip|ebgp|ibgp>
OSPF Route Redistribution Configuration Menu.
[OSPF Redistribute Fixed Menu] add - Add rmap into route redistribution list rem - Remove rmap from route redistribution list export - Export all routes of this protocol cur - Display current route-maps added
/cfg/l3/ospf/md5key
OSPF MD5 Key Configuration Menu
[OSPF MD5 Key key delete cur 1 Menu] Set authentication key Delete key Display current MD5 key configuration
/cfg/l3/bgp
Border Gateway Protocol Configuration
Border Gateway Protocol (BGP) is an Internet protocol that enables routers on a network to share routing information with each other and advertise information about the segments of the IP address space they can access within their network with routers on external networks. BGP allows you to decide what is the best route for a packet to take from your network to a destination on another network, rather than simply setting a default route from your border router(s) to your upstream provider(s). You can configure BGP either within an autonomous system or between different autonomous systems. When run within an autonomous system, it is called internal BGP (iBGP). When run between different autonomous systems, it is called external BGP (eBGP). BGP is defined in RFC 1771. The BGP Menu enables you to configure the switch to receive routes and to advertise static routes, fixed routes and virtual server IP addresses with other internal and external routers. BGP is turned off by default.
Protocol Menu] Peer menu Aggregation menu Set Autonomous System (AS) number Set Local Preference Globally turn BGP ON Globally turn BGP OFF Display current BGP configuration
NOTE Fixed routes are subnet routes. There is one fixed route per IP interface. Table 6-74 Border Gateway Protocol Menu (/cfg/l3/bgp)
Command Syntax and Usage peer <peer number (1-16)> Displays the menu used to configure each BGP peer. Each border router, within an autonomous system, exchanges routing information with routers on other external networks. To view menu options, see page 326. aggr <aggregate number (1-16)> Displays the Aggregation Menu. To view menu options, see page 329. as <autonomous system number (1-65535)> Sets Autonomous System Number for this autonomous system. An autonomous system (AS) is the unit of router policy, either a single network or a group of networks that is controlled by a common network administrator on behalf of an administrative entity (such as a university, a business enterprise, or a business division). An autonomous system is assigned a globally unique number called an Autonomous System Number (ASN). An autonomous system shares routing information with other autonomous systems using the Border Gateway Protocol (BGP). pref <preference (0-4294967294)> Sets the local preference. The path with the higher value is preferred.
When multiple peers advertise the same route, use the route with the shortest AS path as the preferred route if you are using eBGP, or use the local preference if you are using iBGP.
on Globally turns BGP on.
This menu is used to configure BGP peers, which are border routers that exchange routing information with routers on internal and external networks. The peer option is disabled by default. Table 6-75 BGP Peer Configuration Options (/cfg/l3/bgp/peer)
Command Syntax and Usage redist Displays BGP Redistribution Menu. To view the menu options, see page 328. addr <IP address (such as, 192.4.17.101)> Defines the IP address for the specified peer (border router), using dotted decimal notation. The default address is 0.0.0.0.
/cfg/l3/bgp/peer/redist
BGP Redistribution Configuration Menu
[Redistribution metric default rip ospf fixed static vip cur Menu] Set default-metric of advertised routes Set default route action Enable/disable advertising RIP routes Enable/disable advertising OSPF routes Enable/disable advertising fixed routes Enable/disable advertising static routes Enable/disable advertising VIP routes Display current redistribution configuration
[BGP Aggr 1 Menu] addr - Set aggregation IP address mask - Set aggregation network mask enable - Enable aggregation disable - Disable aggregation delete - Delete aggregation current - Display current aggregation configuration
This menu allows you to configure aggregate routing to condense the number of routes between internal and external peer routers. Table 6-77 BGP Aggregate Menu Options (/cfg/l3/ip/bgp/aggr)
Command Syntax and Usage addr <IP address, such as 192.4.17.101> Adds the IP address to the selected aggregate.
The Layer 3 Port Menu allows you to turn IP forwarding on or off on a port-by-port basis. By default, the port forwarding option is turned on. Table 6-78 IP Forwarding Port Configuration Menu Options (/cfg/l3/port)
Command Syntax and Usage on Enables IP forwarding for the current port. off Disables IP forwarding for the current port. cur Displays the current IP forwarding settings.
/cfg/l3/dns
Domain Name System Configuration Menu
[Domain Name System Menu] prima - Set IP address of primary DNS server secon - Set IP address of secondary DNS server dname - Set default domain name cur - Display current DNS configuration
The Domain Name System (DNS) Menu is used for defining the primary and secondary DNS servers on your local network, and for setting the default domain name served by the switch services. DNS parameters must be configured prior to using hostname parameters with the ping, traceroute, and tftp commands. Table 6-79 Domain Name System Menu Options (/cfg/l3/dns)
Command Syntax and Usage prima <IP address (such as, 192.4.17.101)> You will be prompted to set the IP address for your primary DNS server. Use dotted decimal notation. secon <IP address (such as, 192.4.17.101)> You will be prompted to set the IP address for your secondary DNS server. If the primary DNS server fails, the configured secondary will be used instead. Enter the IP address using dotted decimal notation. dname <dotted DNS notation>|none Sets the default domain name used by the switch. For example: mycompany.com cur Displays the current Domain Name System settings.
/cfg/l3/bootp
Bootstrap Protocol Relay Configuration Menu
[Bootstrap Protocol Relay Menu] addr - Set IP address of BOOTP server addr2 - Set IP address of second BOOTP server on - Globally turn BOOTP relay ON off - Globally turn BOOTP relay OFF cur - Display current BOOTP relay configuration
The Bootstrap Protocol (BOOTP) Relay Menu is used to allow hosts to obtain their configurations from a Dynamic Host Configuration Protocol (DHCP) server. The BOOTP configuration enables the switch to forward a client request for an IP address to two DHCP/BOOTP servers with IP addresses that have been configured on the Alteon Application Switch. BOOTP relay menu is turned off by default. Table 6-80 Bootstrap Protocol Relay Configuration Menu Options (/cfg/l3/bootp)
Command Syntax and Usage addr <IP address (such as, 192.4.17.101)> Sets the IP address of the BOOTP server. addr2 <IP address (such as, 192.4.17.101)> Sets the IP address of the second BOOTP server. on Globally turns on BOOTP relay. off Globally turns off BOOTP relay. cur Displays the current BOOTP relay configuration.
/cfg/l3/vrrp
VRRP Configuration Menu
[Virtual Router vr vrgroup group if track hotstan on off holdoff cur Redundancy Protocol Menu] VRRP Virtual Router Menu VRRP Virtual Router Vrgroup Menu VRRP Virtual Router Group Menu VRRP Interface Menu VRRP Priority Tracking Menu Enable/disable hot-standby processing Globally turn VRRP ON Globally turn VRRP OFF Globally VRRP hold off time Display current VRRP configuration
Virtual Router Redundancy Protocol (VRRP) support on Alteon Application Switch provides redundancy between routers in a LAN. This is accomplished by configuring the same virtual router IP address and ID number on each participating VRRP-capable routing device. One of the virtual routers is then elected as the master, based on a number of priority criteria, and assumes control of the shared virtual router IP address. If the master fails, one of the backup virtual routers will assume routing authority and take control of the virtual router IP address. By default, VRRP is disabled. Alteon OS has extended VRRP to include virtual servers as well, allowing for full active/active redundancy between its Layer 4 switches. For more information on VRRP, see the High Availability chapter in your Alteon OS 22.0.2 Application Guide. Table 6-81 Virtual Router Redundancy Protocol Options (/cfg/l3/vrrp)
Command Syntax and Usage vr <virtual router number (1-1024)> Displays the VRRP Virtual Router Menu. This menu is used for configuring up to 1024 virtual routers on this switch. To view menu options, see page 334. vrgroup <virtual router vrgroup number (1-16)> Displays VR Group Menu. To view menu options, see page 338. group Displays the VRRP virtual router group menu, used to combine all virtual routers together as one logical entity. Group options must be configured when using two or more Alteon switches in a hotstandby failover configuration where only one switch is active at any given time. To view menu options, see page 341. if <interface number (1-256)> Displays the VRRP Virtual Router Interface Menu. To view menu options, see page 345.
This menu is used for configuring up to 256 virtual routers for this switch. A virtual router is defined by its virtual router ID and an IP address. On each VRRP-capable routing device participating in redundancy for this virtual router, a virtual router will be configured to share the same virtual router ID and IP address.
Virtual routers are disabled by default. Table 6-82 VRRP Virtual Router Options (/cfg/l3/vrrp/vr)
Command Syntax and Usage track Displays the VRRP Priority Tracking Menu for this virtual router. Tracking is Alteons proprietary extension to VRRP, used for modifying the standard priority system used for electing the master router. Tracking is not needed if sharing (share) is enabled. To view menu options, see page 336. vrid <virtual router ID (1-1024)> Defines the virtual router ID. This is used in conjunction with addr (below) to define a virtual router on this switch. To create a pool of VRRP-enabled routing devices which can provide redundancy to each other, each participating VRRP device must be configured with the same virtual router: one that shares the same vrid and addr combination. The vrid for standard virtual routers (where the virtual router IP address is not the same as any virtual server) can be any integer between 1 and 255. The default value is 1. The vrid of virtual server routers where the virtual router IP address is the same as the virtual server can be between 1 and 1024. All vrid values must be unique within the VLAN to which the virtual routers IP interface belongs. addr <IP address (such as, 192.4.17.101)> Defines the IP address for this virtual router using dotted decimal notation. This is used in conjunction with the vrid (above) to configure the same virtual router on each participating VRRP device. The default address is 0.0.0.0. if <interface number (1-256)> Selects a switch IP interface (between 1 and 256). If the IP interface has the same IP address as the addr option above, this switch is considered the owner of the defined virtual router. An owner has a special priority of 255 (highest) and will always assume the role of master router, even if it must preempt another virtual router which has assumed master routing authority. This preemption occurs even if the preem option below is disabled. The default value is 1. prio <priority (1-254)> Defines the election priority bias for this virtual server. This can be any integer between 1 and 254. The default value is 100. During the master router election process, the routing device with the highest virtual router priority number wins. If there is a tie, the device with the highest IP interface address wins. If this virtual routers IP address (addr) is the same as the one used by the IP interface, the priority for this virtual router will automatically be set to 255 (highest). When priority tracking is used (/cfg/l3/vrrp/track or /cfg/l3/vrrp/vr #/track), this base priority value can be modified according to a number of performance and operational criteria. adver <seconds (1-255)> Defines the time interval between VRRP master advertisements. This can be any integer between 1 and 255 seconds. The default value is 1.
This menu is used for modifying the priority system used when electing the master router from a pool of virtual routers. Various tracking criteria can be used to bias the election results. Each time one of the tracking criteria is met, the priority level for the virtual router is increased by an amount defined through the VRRP Tracking Menu (see page 346).
Criteria are tracked dynamically, continuously updating virtual router priority levels when enabled. If the virtual router preemption option (see preem in Table 6-82 on page 335) is enabled, this virtual router can assume master routing authority when its priority level rises above that of the current master. Some tracking criteria (vrs, ifs, and ports below) apply to standard virtual routers, otherwise called virtual interface routers. Other tracking criteria (l4pts, reals, and hsrp) apply to virtual server routers, which perform Layer 4 Server Load Balancing functions. A virtual server router is defined as any virtual router whose IP address (addr) is the same as any configured virtual server IP address.
/cfg/l3/vrrp/vrgroup
Virtual Router Group Menu
This feature allows the failover of individual groups of VIRs and VSRs. When Web hosting is shared between two or more customers on a single VRRP switch, you can group VIRs and VSRs to serve the high availability of a specific customer. If failover occurs on a customer link, the group of VIRs and VSRs associated with that customer alone will fail over to the backup switch. The VIRs and VSRs configured for the other customers on the master switch are not affected. Up to 16 virtual router groups can be configured on the switch.
[VRRP Virtual Router Vrgroup 1 Menu] track - Priority Tracking Menu name - Set virtual router group name add - Add virtual router to group rem - Remove virtual router from group prio - Set priority for virtual router group ena - Enable virtual router group dis - Disable virtual router group del - Delete virtual router group cur - Display current VRRP virtual router group configuration
Table 6-85 Virtual Router Group Priority Tracking Menu Options (/cfg/l3/vrrp/vrgroup/track)
Command Syntax and Usage ifs disable|enable When enabled, the priority will be increased for each IP interface active on this virtual router group. An IP interface is considered active when there is at least one active port on the same VLAN. This helps elect the virtual routers with the most available routes as the master. This command is disabled by default. ports disable|enable When enabled, the priority will be increased for each active port on the VLAN on this virtual router group. A port is considered active if it has a link and is forwarding traffic. This helps elect the virtual routers with the most available ports as the master. This command is disabled by default. l4pts disable|enable When enabled for virtual server routers, the priority will be increased for each physical switch port which has active Layer 4 processing on this virtual router group. This helps elect the main Layer 4 switch as the master. This command is disabled by default. reals disable|enable When enabled for virtual server routers, the priority will be increased for each healthy real server behind the virtual server IP address of the same IP address as the virtual router on this virtual router group. This helps elect the switch with the largest server pool as the master, increasing Layer 4 efficiency. This command is disabled by default.
Table 6-85 Virtual Router Group Priority Tracking Menu Options (/cfg/l3/vrrp/vrgroup/track)
Command Syntax and Usage hsrp disable|enable Hot Standby Router Protocol (HSRP) is used with some types of routers for establishing router failover. In networks where HSRP is used, enable this switch option to increase the priority of this virtual router group for each Layer 4 client-only port that receives HSRP advertisements. Enabling HSRP helps elect the switch closest to the master HSRP router as the master, optimizing routing efficiency. This command is disabled by default. hsrv disable|enable Hot Standby Router on VLAN (HSRV) is used to work in VLAN-tagged environments. Enable this switch option to increment only that vrrp instance on the virtual router group that is on the same VLAN as the tagged hsrp master flagged packet. This command is disabled by default. cur Displays the current configuration for priority tracking for this virtual router group.
/cfg/l3/vrrp/group
Virtual Router Group Configuration
[VRRP Virtual track vrid if prio adver preem share ena dis del cur Router Group Menu] - Priority Tracking Menu - Set virtual router ID - Set interface number - Set renter priority - Set advertisement interval - Enable or disable preemption - Enable or disable sharing - Enable virtual router - Disable virtual router - Delete virtual router - Display current VRRP virtual router configuration
The Virtual Router Group menu is used for associating all virtual routers into a single logical virtual router, which forces all virtual routers on the Alteon Application Switch to either be master or backup as a group. A virtual router is defined by its virtual router ID and an IP address. On each VRRP-capable routing device participating in redundancy for this virtual router, a virtual router will be configured to share the same virtual router ID and IP address.
NOTE This option is required to be configured only when using at least two Alteon Application Switches in a hot-standby failover configuration, where only one switch is active at any time. Table 6-86 VRRP Virtual Router Group Options (/cfg/l3/vrrp/group)
Command Syntax and Usage track Displays the VRRP Priority Tracking Menu for the virtual router group. Tracking is Alteons proprietary extension to VRRP, used for modifying the standard priority system used for electing the master router. Tracking is not needed if sharing (share) is enabled. To view menu options, see page 346. vrid <virtual router ID (1-255)> Defines the virtual router ID for this group. if <interface number (1-256)> Selects a switch IP interface (between 1 and 256). The default switch IP interface number is 1. prio <priority (1-254)> Defines the election priority bias for this virtual router group. This can be any integer between 1 and 254. The default value is 100. During the master router election process, the routing device with the highest virtual router priority number wins. If there is a tie, the device with the highest IP interface address wins. If this virtual routers IP address (addr) is the same as the one used by the IP interface, the priority for this virtual router will automatically be set to 255 (highest). When priority tracking is used (/cfg/l3/vrrp/track or /cfg/l3/vrrp/vr #/track), this base priority value can be modified according to a number of performance and operational criteria. adver <seconds (1-255)> Defines the time interval between VRRP master advertisements. This can be any integer between 1 and 255 seconds. The default is 1. preem disable|enable Enables or disables master preemption. When enabled, if the virtual router group is in backup mode but has a higher priority than the current master, this virtual router will preempt the lower priority master and assume control. Note that even when preem is disabled, this virtual router will always preempt any other master if this switch is the owner (the IP interface address and virtual router addr are the same). By default, this option is enabled. share disable|enable Enables or disables virtual router sharing, Alteons proprietary extension to VRRP. When enabled, this switch will process any traffic addressed to this virtual router, even when in backup mode. By default, this option is enabled.
/cfg/l3/vrrp/group/track
Virtual Router Group Priority Tracking Configuration
[Virtual Router vrs ifs ports l4pts reals hsrp hsrv cur Group Priority Tracking Menu] Enable/disable tracking master virtual routers Enable/disable tracking other interfaces Enable/disable tracking VLAN switch ports Enable/disable tracking L4 switch ports Enable/disable tracking L4 real servers Enable/disable tracking HSRP Enable/disable tracking HSRP by VLAN Display current VRRP Group Tracking configuration
NOTE If Virtual Router Group Tracking is enabled, then the tracking option will be available only under group option. The tracking setting for the other individual virtual routers will be ignored.
1 Menu] Set authentication types Set plain-text password Delete interface Display current VRRP interface configuration
This menu is used for configuring VRRP authentication parameters for the IP interfaces used with the virtual routers. Table 6-88 VRRP Interface Menu Options (/cfg/l3/vrrp/if)
Command Syntax and Usage auth none|password Defines the type of authentication that will be used: none (no authentication), or password (password authentication). passw <password> Defines a plain text password up to eight characters long. This password will be added to each VRRP packet transmitted by this interface when password authentication is chosen (see auth above). del Clears the authentication configuration parameters for this IP interface. The IP interface itself is not deleted. cur Displays the current configuration for this IP interfaces authentication parameters.
/cfg/l3/vrrp/track
VRRP Tracking Configuration
[VRRP Tracking Menu] vrs - Set priority increment for virtual router tracking ifs - Set priority increment for IP interface tracking ports - Set priority increment for VLAN switch port tracking l4pts - Set priority increment for L4 switch port tracking reals - Set priority increment for L4 real server tracking hsrp - Set priority increment for HSRP tracking hsrv - Set priority increment for HSRP by VLAN tracking cur - Display current VRRP Priority Tracking configuration
This menu is used for setting weights for the various criteria used to modify priority levels during the master router election process. Each time one of the tracking criteria is met (see VRRP Virtual Router Priority Tracking Menu on page 336), the priority level for the virtual router is increased by an amount defined through this menu. Table 6-89 VRRP Tracking Options (/cfg/l3/vrrp/track)
Command Syntax and Usage vrs <0-254> Defines the priority increment value (1 through 254) for virtual routers in master mode detected on this switch. The default value is 2. ifs <0-254> Defines the priority increment value (1 through 254) for active IP interfaces detected on this switch. The default value is 2. ports <0-254> Defines the priority increment value (1 through 254) for active ports on the virtual routers VLAN. The default value is 2. l4pts <0-254> Defines the priority increment value (1 through 254) for physical switch ports with active Layer 4 processing. The default value is 2. reals <0-254> Defines the priority increment value (1 through 254) for healthy real servers behind the virtual server router. The default value is 2. hsrp <0-254> Defines the priority increment value (1 through 254) for switch ports with Layer 4 client-only processing that receive HSRP broadcasts. The default value is 10.
These priority tracking options only define increment values. These options do not affect the VRRP master router election process until options under the VRRP Virtual Router Priority Tracking Menu (see page 336) are enabled.
roundrobin
/cfg/security/ipacl
IP Address Access Control List Configuration Menu
Alteon OS can be configured with IP access control lists (ACLs) composed of ranges of client IP addresses that are to be denied access to the switch. When traffic ingresses the switch, the client source IP address is checked against this pool of addresses. If a match is found, then the client traffic is blocked.
[IP ACL Menu] add - Add IP Address/Mask for access control rem - Remove IP Address/Mask for access control cur - Display All IP address/mask for access control
Enable/disable DOS attack detection Enable/disable IP ACL processing Enable/disable UDP Blast processing Display current port configuration
ipacl disable|enable Enables or disables IP access control List denial on this port. udpblast disable|enable Enables or disables UDP blast protection on this port. cur Displays the current security configuration on this port.
/cfg/security/udpblast
UDP Blast Protection Configuration Menu
Malicious attacks over UDP protocol ports are becoming a common way to bring down real servers. Alteon OS can be configured to restrict the amount of traffic allowed on any UDP port, thus ensuring that backend servers are not flooded with data and disabled. You can specify a series of UDP port ranges and the allowed packet limit for that range. When the maximum number of packets/second is reached, UDP traffic is shut down on those ports. Alteon OS supports up to 5000 UDP port numbers, using any integer from 1 to 65535. The maximum port range is 5000. If the first port number is 300, the last number that can be used is 5300. While you can configure multiple port ranges, the sum of ranges cannot exceed the maximum of 5000 ports.
[UDP Blast Protection Menu] add - Add UDP port/range for UDP blast protection rem - Remove UDP port/range for UDP blast protection default - Default packet rate for UDP blast protection cur - Display all UDP blast protection Ports
/cfg/setup Setup
The setup program steps you through configuring the system date and time, BOOTP, IP, Spanning Tree, port speed/mode, VLAN parameters, and IP interfaces. For a complete description of how to use setup, see Chapter 2, First-Time Configuration. To start the setup program, at the Configuration# prompt, enter:
Configuration# setup
/cfg/dump Dump
The dump program writes the current switch configuration to the terminal screen. To start the dump program, at the Configuration# prompt, enter:
Configuration# dump
The configuration is displayed with parameters that have been changed from the default values. The screen display can be captured, edited, and placed in a script file, which can be used to configure other switches through a Telnet connection. When using Telnet to configure a new switch, paste the configuration commands from the script file at the command line prompt of the switch. The active configuration can also be saved or loaded via TFTP, as described on page 354.
where server is the TFTP server IP address or hostname, and filename is the name of the target script configuration file. NOTE The output file is formatted with line-breaks but no carriage returnsthe file cannot be viewed with editors that require carriage returns (such as Microsoft Notepad).
NOTE If the TFTP server is running SunOS or the Solaris operating system, the specified ptcfg file must exist prior to executing the ptcfg command and must be writable (set with proper permission, and not locked by any application). The contents of the specified file will be replaced with the current configuration data.
where server is the TFTP server IP address or hostname, and filename is the name of the target script configuration file.
CHAPTER 7
355
This menu is used for configuring information about real servers that participate in a server pool for Server Load Balancing or Application Redirection. The required parameters are: Real server IP address Real server enabled (disabled by default) Table 7-2 Real Server Configuration Menu Options (/cfg/slb/real)
Command Syntax and Usage layer7 Displays the Layer 7 Menu. To view menu options, see page 362. ids Displays Intrusion Detection Server/system menu. To view menu options, see page 363. rip <real server IP address> Sets the IP address of the real server in dotted decimal format. When this command is used, the address entered is PINGed to determine if the server is up, and the administrator will be warned if the server does not respond. name <string, maximum 31 characters>|none Defines a 15-character alias for each real server. This will enable the network administrator to quickly identify the server by a natural language keyword value. weight <real server weight (1-48)> Sets the weighting value (1 to 48) that this real server will be given in the load balancing algorithms. Higher weighting values force the server to receive more connections than the other servers configured in the same real server group. By default, each real server is given a weight setting of 1. A setting of 10 would assign the server roughly 10 times the number of connections as a server with a weight of 1. Weights are not applied when using the hash or minmisses metrics (see Server Load Balancing Metrics on page 370). avail <server weight (1-48)> Displays the currently available real server for Global server load balancing and allows the user to change to another real server for Global server load balancing. maxcon <maximum connections (0-200000)> Sets the maximum number of connections that this server should simultaneously support. By default, the number of maximum connections is set at 20,000. This option sets a threshold as an artificial barrier, such that new connections will not be issued to this server if the maxcon limit is reached. New connections will be issued again to this server once the number of current connections has decreased below the maxcon setting. If all servers in a real server group for a virtual server reach their maxcon limit at the same time, client requests will be sent to the backup/overflow server or backup/overflow server group. If no backup servers/server group are configured, client requests will be dropped by the virtual server.
This menu is used for entering commands and strings for Layer 7 processing. Table 7-3 Layer 7 Commands Menu Options (/cfg/slb/real/layer7)
Command Syntax and Usage addlb <URL path ID [1-1024]> Adds the predefined URL loadbalance string ID to the real server. remlb <URL path ID [1-1024]> Removes the predefined URL loadbalance string ID from the real server. cookser disable|enable Enables or disables the real server to handle client requests that dont contain a cookie. This option is used if you want to designate a specific server to assign cookies only. This server gets the client request, assigns the cookie, and embeds the IP address of the real server that will handle the subsequent requests from the client. By default, this option is disabled. exclude disable|enable Enables or disables exclusionary string matching. By default, this option is disabled. ldapwr disable|enable Enables or disables LDAP write server. LDAP servers are of two types: read servers and write servers. You need to use read servers when you only want to browse the directory. You need to use the write servers when you want to modify the directory on the server. The write server can conduct both read and write operations.
/cfg/slb/group <real server group number> Real Server Group SLB Configuration
[Real server group 1 Menu] metric - Set metric used to select next server in group rmetric - Set metric used to select next rport in server content - Set health check content health - Set health check type backup - Set backup real server or group name - Set real server group name realthr - Set real server failure threshold idsrprt - Set Intrusion Detection Port advhlth - Set an advance group health check formula mhash - Set minmisses hash parameter viphlth - Enable/disable VIP health checking in DSR mode ids - Enable/disable Intrusion Detection idsfld - Enable/disable Intrusion Detection Group Flood oper - Enable/disable the access to this group for operator ena - Enable real server in this group dis - Disable real server in this group add - Add real server rem - Remove real server del - Delete real server group cur - Display current group configuration
This menu is used for combining real servers into real server groups. Each real server group should consist of all the real servers which provide a specific service for load balancing. Each group must consist of at least one real server. Each real server can belong to more than one group. Real server groups are used both for Server Load Balancing and Application Redirection. Table 7-5 Real Server Group Configuration Menu Options (/cfg/slb/group)
Command Syntax and Usage metric leastconns|roundrobin|minmisses|hash|response|bandwidth|phash Sets the load balancing metric used for determining which real server in the group will be the target of the next client request. The default setting is leastconns. See Server Load Balancing Metrics on page 370 for more information. rmetric Sets the load balancing metric used for determining which port in the real server will be the target of the next client request.
NOTE Under the leastconns, roundrobin, hash, and phash metrics, when real servers are configured with weights (see the weight option on page 359), a higher proportion of connections are given to servers with higher weights. This can improve load balancing among servers of different performance levels. Weights are not applied when using the minmisses metrics.
This menu is used for configuring the virtual servers which will be the target for client requests for Server Load Balancing. Configuring a virtual server requires the following parameters: Creating a virtual server IP address Adding TCP/UDP port and real server group Enabling the virtual server (disabled by default) Table 7-8 Virtual Server Configuration Menu Options (/cfg/slb/virt)
Command Syntax and Usage service <virtual port or name> Displays the Virtual Services Menu. The virtual port name can be a well-known port name, such as http, ftp, the service number, and so on. The allowable port range is from 13 to 65534. To get more information about well-known ports, see the sport command on page 385. To view services menu options, see page 375. vip <virtual server IP address> Sets the IP address of the virtual server using dotted-decimal notation. The virtual server created within the switch will respond to ARPs and PINGs from network ports as if it was a normal server. Client requests directed to the virtual servers IP address will be balanced among the real servers available to it through real server group assignments.
[Virtual Server 1 http Service Menu] group - Set real server group number rport - Set real port hname - Set hostname httpslb - Set HTTP SLB processing cont - Set BW contract for this virtual service urlcont - Set BW cont of an SLB string specific to this service pbind - Set persistent binding type rcount - Set multi response count thash - Set hash parameter dbind - Enable/disable delayed binding udp - Enable/disable UDP balancing frag - Enable/disable remapping UDP server fragments nonat - Enable/disable only substituting MAC addresses dnsslb - Enable/disable DNS query load balancing http - Enable/disable HTTP redirects for Global SLB direct - Enable/disable direct access mode sip - Enable/disable SIP load balancing xforward - Enable/disable X-Forwarded-For for proxy mode epip - Enable/disable pip selection based on egress port/vlan del - Delete virtual service cur - Display current virtual service configuration
urlslb: Enable or disable URL SLB host: Enable or disable for virtual hosting cookie: Enable or disable cookie-based SLB for cookie-based preferential load balanc-
ing. You will be prompted for the following: Cookie name, starting point of the cookie value, number of bytes to be extracted, enable/disable checking for cookie in URI browser: Enable or disable SLB, based on browser type urlhash: Enable or disable URL hashing based on URI headerhash: Hashes on any HTTP header value. others: Requires inputs for a particular header field You may choose to combine or select applications to load balance using the commands and and/or or. For example:
httpslb <application> httpslb <application> and|or <application>
cont <BWM Contract (0-256), 0 for VIP default> Sets a Bandwidth Management contract for this virtual service. The default number of contracts is set at 256 for Alteon OS. Note: If you enter 0 for the service contract, it will carry the value entered for the Virtual Server IP (vip) contract.
nections from the same client with the same real server until the client becomes inactive and the connection is aged out of the binding table. The connection timeout value (set in the Real Server Menu) is used to control how long these inactive but persistent connections remain associated with their real servers. When the client resumes activity after their connection has been aged out, they will be connected to the most appropriate real server based on the load balancing metric. An alternative approach may be to use the real server group metrics minmisses or hash (see Server Load Balancing Metrics). In Alteon OS 22.0.2, with clientip command enabled, HTTP and HTTPs traffic from the same client will map to the same server irrespective of the load balancing metric used, since the services are related. Whereas, different services from the same client may not map to the same server. The cookie option uses a cookie defined in the HTTP header or placed in the URI for hashing. For more information on cookie option, see Cookie-Based Persistence on page 381. For detailed information on Cookie-Based Persistence, see the Persistence chapter in the Alteon OS 20.2 Application Guide. The sslid option is for Secure Sockets Layer (SSL), which is a set of protocols built on top of TCP/IP that allow an application server and user to communicate over an encrypted HTTP session. SSL provides authentication, non-repudiation, and security. The session ID is a value comprising 32 random bytes chosen by the SSL server that gets stored in a session hash table. By enabling the sslid option, all subsequent SSL sessions which present the same session ID will be directed to the same real server. The disable option allows you to disable presistent binding, if it has previously been enabled for a particular application. rcount <response count number (116)> Sets the maximum response counter for cookie-based persistence. The Alteon Application Switch will examine each server response until the cookie is found, or until the maximum count is reached. The default number is 1.
Table 7-10 Virtual Server Service Configuration Menu Options (/cfg/slb/virt 1/service 554)
Command Syntax and Usage group <real server group number (1-1024)> Sets real server group number. hname <hostname>|none Sets the hostname for a service added. This is used in conjunction with dname (above) to create a full host/domain name for individual services. The format for this command is: # hname <hostname> For example, to add a hostname for Web services, you could specify www as the hostname. If a dname of foocorp.com was defined (above), www.foocorp.com would be the full host/ domain name for the service. To clear the hostname for a service, use the command: # hname none rtspslb hash|patternMatch|dis This Layer 7 load balancing option sets the type of rtspslb, either hash or patternMatch, thereby enabling the service. The default is hash. hash: If you use hash, RTSP will parse the URL and will hash the URL to select a server to load balance. patternMatch: If you select this option, the switch will match the string or pattern
within the URL to select a server based on the string configured on the real server.
dis: If set at disable, RTSP will use Layer 4 metrics to select a server to load balance. thash sip|sip+sport Defines hash parameter. Tunable hash feature allows the user to select different parameters for computing the hash value used by the hash, phash, and minmisses SLB metrics. For example, the source IP address, the destination IP address, or both source IP address and source port. If the user does not select any, the switch will use default hash parameter, which is sip.
Table 7-10 Virtual Server Service Configuration Menu Options (/cfg/slb/virt 1/service 554)
Command Syntax and Usage del Deletes this virtual service. cur Displays the current virtual service configuration.
Cookie-Based Persistence
The cookie option is used to establish cookie-based persistence, and has the following command syntax and usage: pbind cookie <mode> <name> <offset> <length> <URI> Each parameter is explained in the following table.
Table 7-11 Command Syntax and Usage for pbind cookie Options (/cfg/slb/virt/service/pbind cookie)
Option <mode> Description Specify the mode for cookie-based persistence. The following three modes are available:
p: Passive mode. In this mode, the network administrator configures the Web
server to embed a cookie in the server response that the switch looks for in subsequent requests from the same client. r: Rewrite mode. In active cookie mode (or cookie rewrite mode), the switch, and not the network administrator, generates the cookie value on behalf of the server. The switch intercepts this persistence cookie and rewrites the value to include server-specific information before sending it to the client. i: Insert mode. When a client sends a request without a cookie, the server responds with the data, and the switch inserts an Alteon persistence cookie into the data packet. The switch uses this cookie to bind to the appropriate server. Insert cookie mode expiration parameters are as follows: Enter insert-cookie expiration as either:
... a date <MM/dd/yy[@hh:mm]> (e.g. 12/31/01@23:59) ... a duration <days[:hours[:minutes]]> (e.g. 45:30:90) ... or none <return>
Enter the name of the cookie. Enter the starting point of the cookie value (1-64) Enter number of bytes to extract (1-64). For cookie rewrite, the extracting length must be 8 or 16. Look for cookie in the URI. If you want to look for cookie name or value in the URI, enter e to enable this option. To look for cookie in the HTTP header, enter d to disable this option.
For more information on Cookie-Based Persistence, see the Alteon OS 22.0.2 Application Guide.
The switch supports up to 2048 traffic filters. Each filter can be configured to allow, deny, redirect or perform Network Address Translation on traffic according to a variety of address and protocol specifications, and each physical switch port can be configured to use any combination of filters. This command is disabled by default. There are several options available in the Filter Advanced Menu (/cfg/slb/filt/adv, page 388) that can be used to provide more information through syslog. The types of information include: IP protocol TCP/UDP ports TCP flags ICMP message type
The following parameters are required for filtering: Set the address, masks, and/or protocol that will be affected by the filter Set the filter action (allow, deny, redirect, nat) Enable the filter Add the filter to a switch port Enable filtering on the Alteon Application Switch port Table 7-12 Filter Configuration Menu Options (/cfg/slb/filt)
Command Syntax and Usage adv Displays the Filter Advanced Menu. To view menu options, see page 388. name <31 character name>|none Allows the user to assign a name to a filter. smac any|<MAC address (such as, 00:60:cf:40:56:00)> Sets the source MAC address. The default is any. dmac any|<MAC address (such as, 00:60:cf:40:56:00)> Sets the destination MAC address. The default is any. sip any|<IP address> If defined, traffic with this source IP address will be affected by this filter. Specify an IP address in dotted decimal notation, or any. A range of IP addresses is produced when used with the smask below. The default is any if the source MAC address is any. smask <IP subnet mask (such as, 255.255.255.0> This IP address mask is used with the sip to select traffic which this filter will affect. See details below for more information on producing address ranges. For more information, see Defining IP Address Ranges for Filters on page 387. dip any|<IP address> If defined, traffic with this destination IP address will be affected by this filter. Specify an IP address in dotted decimal notation, or any. A range of IP addresses is produced when used with the dmask below. The default is any if the destination MAC address is any. For more information, see Defining IP Address Ranges for Filters on page 387. dmask <IP subnet mask (such as, 255.255.255.0)> This IP address mask is used with the dip to select traffic which this filter will affect.
sport any|<name>|<port>|<port>-<port> If defined, traffic with the specified TCP or UDP source port will be affected by this filter. Specify the port number, range, name, or any. The default is any. Listed below are some of the well-known ports: Number 20 21 22 23 25 37 42 43 53 69 70 79 80 109 110 Name ftp-data ftp ssh telnet smtp time name whois domain tftp gopher finger http pop2 pop3
dport any|<name>|<port>|<port>-<port> If defined, traffic with the specified real server TCP or UDP destination port will be affected by this filter. Specify the port number, range, name, or any, just as with sport above. The default is set at any.
nat
goto
As another example, you could configure the switch with two filters so that each would handle traffic filtering for one half of the Internet. To do this, you could define the following parameters: Table 7-13 Filtering IP Address Ranges
Filter #1 #2 Internet Address Range dip dmask 128.0.0.0
128.0.0.0 128.0.0.0
work traffic at the Layer 2 level in your switch. Using this command you can preserve 802.1p bits in all the frames that pass through the switch.
To view menu options, see page 391. tcp Displays the TCP Flags advanced menu. To view menu options, see page 392. ip Sets IP advanced menu. To view menu options, see page 393. layer7 Displays Layer7 advanced menu. To view menu options, see page 395. security Displays the filter Security Menu. To view menu options, see page 397 icmp any|<number>|<type; "icmp list" for list> Sets the ICMP message type. The default is set at any. For a list of ICMP message types, see Table 7-18 on page 394. For a detailed description of filtering and ICMP, see the Alteon OS 22.0.2 Application Guide. cont <BWM Contract (1-256)> Sets the Bandwidth Management Contract. By default, the contract number is set at 256. revcont <BW Contract, 1-256> Sets the Bandwidth Management contract for the reverse traffic session. This command helps you assign a different Bandwidth management contract from the one configured on the ingress filter. tmout <even number of minutes (4-32768)> Sets the session timeout in an even number of minutes. The default is set at 4 minutes. idsgrp <real server group number, 1-1024>|none Sets the IDS server group for intrusion detection server load balancing. When filtering is used for IDSLB, each filter added to an IDSLB-enabled port can be assigned a unique IDS real server group. idshash sip|dip|both Sets the hash metric parameter for Intrusion Detection System Server Load Balancing: source IP (sip), destination IP (dip), or both.
These commands can be used to configure packet filtering for specific TCP flags. Table 7-16 Advanced Filter TCP Menu (/cfg/slb/filt/adv/tcp)
Command Syntax and Usage urg disable|enable Enables or disables TCP URG (urgent) flag matching. By default, this option is disabled. ack disable|enable Enables or disables TCP ACK (acknowledgement) flag matching. By default, this option is disabled. psh disable|enable Enables or disables TCP PSH (push) flag matching. By default, this option is disabled. rst disable|enable Enables or disables TCP RST (reset) flag matching. By default, this option is disabled. syn disable|enable Enables or disables TCP SYN (synchronize) flag matching. By default, this option is disabled.
Radius snooping allows the Alteon OS to examine RADIUS accounting packets for client information. This information is needed to add to or delete static session entries in the switchs session table so that it can perform the required persistency for load balancing. For more details, please refer to your Application Guide.
Enables or disables matching of all configured patterns before the filter can perform the deny action.
parseall disable|enable Enables or disables pattern string lookup (parsing) of all packets in a session where pattern matching is being performed. This command is enabled by default, and normally all data packets in a session are examined by the filter. However, some sessions may contain only one packet containing the layer 7 content. Once this packet is found, subsequent packets can be ignored. When parseall is disabled, pattern matching is turned off for the remaining packets in the session. cur Displays the current configuration.
Alteon OS switch software allows you to enable or disable processing independently for each type of Layer 4 traffic (client and server) on a per port basis, expanding your topology options. NOTE When changing the filters on a given port, it may take some time before the port session information is updated so that the filter changes take effect. To make port filter changes take effect immediately, clear the session binding table for the port (see the clear command in Table 8-3 on page 436). Table 7-22 Port Configuration Menu Options (/cfg/slb/port)
Command Syntax and Usage client disable|enable For Server Load Balancing, the port can be enabled or disabled to process client Layer 4 traffic. Ports configured to process client request traffic bind servers to clients and provide address translation from the virtual server IP address to the real server IP address, re-mapping virtual server IP addresses and port values to real server IP addresses and ports. Traffic not associated with virtual servers is switched normally. Maximizing the number of these ports on the Layer 4 switch will improve the switchs potential for effective Server Load Balancing. This option is disabled by default. server disable|enable Ports configured to provide real server responses to client requests require real servers to be connected to the Layer 4 switch, directly or through a hub, router, or another switch. When server processing is enabled, the switch port re-maps real server IP addresses and Layer 4 port values to virtual server IP addresses and Layer 4 ports. Traffic not associated with virtual servers is switched normally. This option is disabled by default.
port <TCP port number> Sets the TCP port number for remote site updates for Global server load balancing. The default TCP port is 80. sinter <remote site updates interval in seconds, 10-7200> Sets the time interval in seconds for remote site updates. The range is between 10 and 7200 seconds. sesscap <Session utilization capacity threshold (1-100)> Sets the threshold for session utilization capacity. The default configuration is 90%. cpucap <CPU utilization capacity threshold (1-100)> Sets the threshold for the CPU utilization capacity. The default configuration is 90%. mincon <available sessions threshold, 0-65535> Defines the capacity threshold for the sessions available on the real server for GSLB. dns disable|enable Enables or disables DNS direct-based GSLB. This option is enabled by default. hostlk disable|enable Enables or disables lookups based on host or domain name in a GSLB configuration. When enabled, the hostname specified in the Virtual Service configuration, in addition to the domain name, will be used to resolve the IP address for the domain. When disabled, only the domain name will be used to match. http disable|enable Enables or disables HTTP redirects to peer sites by this switch. When enabled (default), this switch will redirect client requests to peer sites if its own real servers fail or have reached their maximum connection limits. If disabled, the switch will not perform HTTP Redirects, but will instead drop requests for new connections and cause the clients browser to eventually issue a new DNS request. usern disable|enable Enables or disables an HTTP redirect to a real server name. When a site redirects a client to another site using an HTTP redirect, the client is redirected to the new site's IP address. This option is disabled by default. If usern is enabled, the client will be redirected to the domain name specified by the remote real server name plus virtual server domain name: <remote real server name> <virtual server domain name>
At a local site for a domain, there is a local virtual server but no remote virtual server. The local virtual server has a number of local virtual services Each local virtual service has a group of local or remote real servers. The remote real servers are the virtual servers at the remote sites.
[Remote site 1 Menu] prima - Set primary switch IP address of remote site secon - Set secondary switch IP address of remote site name - Set remote site name update - Enable/disable remote site updates ena - Enable remote site dis - Disable remote site del - Delete remote site cur - Display current remote site configuration
Up to 64 remote sites can be configured. Table 7-24 GSLB Remote Site Menu Options (/cfg/slb/gslb/site)
Command Syntax and Usage prima <server IP address> Defines the IP interface IP address of the primary switch at the remote site used for Global Server Load Balancing. Use dotted decimal notation. secon <server IP address> If the remote site is configured with a redundant switch, enter the IP address of the IP interface for the remote secondary switch here. If the remote site primary switch fails, the local switch will address the remote site secondary switch instead. name <31 character name>|none Sets the name of the remote site. The default is set at none. update disable|enable Enables or disables remote site updates. If enabled (default), this switch will send regular Distributed Site State Protocol (DSSP) updates to its remote peers using HTTP port 80. If disabled, the switch will not send state updates. If your local firewall does not permit this traffic, disable the updates. Note: When update is enabled, Global Server Load Balancing uses service port 80 on the IP interface for DSSP updates. By default, the Alteon OS Web-based interface also uses port 80. Both services cannot use the same port. If both are enabled, configure the Alteon OS Browser-Based Interface (BBI) to use a different service port (see the /cfg/sys/access/wport option on page 259). ena Enables this remote site for use with Global Server Load Balancing.
/cfg/slb/gslb/rule
GSLB Rule Configuration Menu
Rules allow the GSLB selection to use different metric preferences based on time-of-day. You can configure one or more rules on each domain. Each rule has a metric preference list. The GSLB selection selects the first rule that matches the domain and starts with the first metric in the metric preference list of the rule.
[Rule 1 Menu] metric start end ttl rr dname ena dis del cur
Metric Menu Set start time for rule Set end time for rule Set Time To Live in seconds of DNS resource records Set DNS resource records in DNS response Set network preference domain name for rule Enable rule Disable rule Delete rule Display current rule configuration
/cfg/slb/gslb/rule/metric
Global SLB Rule Metric Menu
[Rule 1 Metric 1 Menu] gmetric - Set metric to use to select next server addnet - Add network to gmetric=network remnet - Remove network from gmetric=network cur - Display current metric configuration
/cfg/slb/layer7
Layer 7 SLB Resource Definition Menu
[Layer 7 Resource Definition Menu] redir - Web Cache Redirection Menu slb - Server Load Balancing Menu dbindtm - Set timeout for incomplete delayed binding connections cur - Display current Layer 7 configuration
/cfg/slb/layer7/redir
Web Cache Redirection Configuration
[Web Cache Redirection Menu] urlal - Enable/disable auto-ALLOW for non-GETs to origin servers cookie - Enable/disable auto-ALLOW for Cookie to origin servers nocache - Enable/disable no-cache control header to origin servers hash - Enable/disable URL hashing based on URI header - Enable/disable server loadbalance based on HTTP header cur - Display current WCR configuration
determine whether all non-GET requests should be redirected to a cache server or origin server. This option is enabled by default. cookie disable|enable Enables or disables auto-ALLOW for cookie to origin servers.
If this command is enabled, the switch will redirect all requests that contain Cookie: in the
determine whether it should redirect all requests that contain Cookie: in the HTTP header to a cache server or origin server. This option is disabled by default.
cache in HTTP/1.1 header, or Pragma: no-cache in HTTP/1.0 header to the origin server.
If this command is disabled, the switch will compare the URI against the expression table to
determine whether it should redirect requests that contain Cache-Control: no-cache in HTTP/ 1.1 header, or Pragma: no-cache in HTTP/1.0 header to a cache server or origin server. This option is enabled by default. hash disable|enable <number (1-255)> Enables or disables URL hashing based on the URI.
If hashing is enabled, you can set the length of URI that will be used to hash into the cache
This option is disabled by default. header disable|enable host|useragent|others Enables or disables server load balancing based on HTTP header. This option is disabled by default. cur Displays the current URL expression table.
/cfg/slb/layer7/slb
Server Load Balance Resource Configuration Menu
[Server Loadbalance Resource Menu] message - Set HTTP error message addstr - Add SLB string for load balance remstr - Remove SLB string for load balance rename - Rename SLB string for load balance addmeth - Add HTTP method type remmeth - Remove HTTP method type case - Enable/disable case sensitive for string matching cont - Set BW contract for the SLB string cur - Display current configuration
To synchronize the configuration between two switches, a peer must be configured and enabled on each switch. Switches being synchronized must use the same administrator password. Peers are sent SLB, FILT, and VRRP configuration updates using /oper/slb/ synch. Table 7-32 Synchronization Menu Options (/cfg/slb/sync)
Command Syntax and Usage peer <peer switch number (1-2)> Displays the Sync Peer Switch Menu. This option is enabled by default. To view menu options, see page 414. filt disable|enable Enables or disables synchronizing filter configuration. This option is disabled by default. ports disable|enable Enables or disables synchronizing Layer 4 port configuration. This option is enabled by default. prios disable|enable Enables or disables syncing VRRP priorities. This option is enabled by default. pips disable|enable Enables or disables synchronizing proxy IP addresses. This option is disabled by default. peerpips disable|enable Enables or disables synchronizing the peer proxy IP addresses. Peer proxy IP addresses are used in VRRP Active/Active configuration. This option is disabled by default.
To synchronize the configuration between two switches, a peer must be configured and enabled on each switch. Switches being synchronized must use the same administrator password. Table 7-33 Peer Switch Configuration Menu Options (/cfg/slb/sync/peer)
Command Syntax and Usage addr <IP address> Sets the peer switch IP address. The default is 0.0.0.0 ena Enables the peer for this switch. By default, this option is disabled. dis Disables the peer for this switch.
/cfg/slb/adv/synatk
SYN Attack Detection Configuration Menu
[SYN Attack Detection Menu] intrval - Set SYN attack detection interval thrshld - Set SYN attack alarm threshold cur - Display current SYN attack detection configuration
/cfg/slb/adv/smtport
Advanced SMT Real Server Port Configuration Menu
[SMT Real Port Menu] add - Add real port remove - Remove real port cur - Display real port configuration
Table 7-36 Advanced SMT Real Server Port Menu Options (/cfg/slb/adv/smtport)
Command Syntax and Usage add <real server port (2-65534)> This command allows you to add a service port to the real server that is configured to process client traffic by-passing the server processor. remove <real server port (2-65534)> This command allows you to remove a service port from the real server that is configured to process client traffic by-passing the server processor. cur Displays real port configuration.
/cfg/slb/linklb
Inbound Link Load Balancing configuration Menu
[Inbound Linklb group ttl drecord ena dis cur Menu] Set real server group Set Time to Live of DNS resource records Domain Record Menu Enable Inbound Linklb Disable Inbound Linklb Display current Inbound Linklb configuration
Table 7-37 Inbound Link Load Balancing Configuration Menu Options (/cfg/slb/ linklb)
Command Syntax and Usage group <real server group number (1-256)> Sets the real server ISP group number. ttl <time to live in seconds (0-65535)> Sets the time-to-live for DNS resource records. drecord <domain record number (1-64)> Displays domain record menu. To view menu options, see page 420. ena Enables inbound link load balancing. dis Disables inbound link load balancing. cur Displays current inbound link load configuration.
/cfg/slb/linklb/drecord
Inbound Link Load Balancing Domain Record Menu
[Domain Record Menu] domain - Set Domain Name entry - Virt Real Mapping Menu ena - Enable Domain Record dis - Disable Domain Record del - Delete Domain Record cur - Display current Domain Record configuration
Table 7-38 Inbound Link Load Balancing Domain Record Menu Options (/cfg/slb/ linklb/drecord)
Command Syntax and Usage domain <34 character domain name>|none Allows you to configure the domain name. Default is none. entry <linklb entry number (1-8)> Displays the link load balancers mapping menu for the virtual and real servers. See page 390 to view menu options. ena Enables the domain records. dis Disables the domain records. del Deletes the domain records. cur Displays the current domain records.
/cfg/slb/linklb/drecord/entry
Inbound Link Load Balancing Mapping Menu
[Virt Real Mapping 1 Menu] virt - Set Virtual Server Number real - Set Real Server Number ena - Enable Entry dis - Disable Entry del - Delete Entry cur - Display current Entry configuration
Table 7-39
Command Syntax & Usage virt <virtual server number, 1-1024> Defines the virtual server number for mapping. real Defines the real server number for mapping. ena Enables the entry for drecords. dis Disables the entry for drecords. del Deletes the entry for drecords. cur Displays the current real and virtual server mappings for drecords entries.
/cfg/slb/advhc
Advanced Health Check Configuration Menu
[Layer 4 Advanced Health Check Menu] script - Scriptable Health Check Menu snmphc - SNMP Health Check Menu waphc - WAP Health Check Menu aphttp - Enable/disable Allow HTTP Health Check on any port ldapver - LDAP version secret - Set RADIUS secret minter - Set interval of response and bandwidth metric updates cur - Display current Layer 4 advanced health check configuration
/cfg/slb/advhc/snmphc
SNMP Health Check Configuration
[SNMP Health Check 1 Menu] oid - OID to be sent in the SNMP request packet comm - Community string used in the SNMP request packet rcvcnt - Expected value in the SNMP response packet invert - Enable/disable inversion of expected value weight - Enable/disable readjusting of weights based on response del - Delete SNMP health check cur - Display current SNMP health check configuration
/cfg/slb/advhc/waphc
WAP Health Check Configuration
Wireless Session Protocol (WSP) is used within the Wireless Application Protocol (WAP) suite to manage sessions between wireless devices and WAP content servers or WAP gateways. Alteon OS provides a content-based health check mechanism where customized WSP packets are sent to the WAP gateways, and the switch verifies the expected response, in a manner similar to scriptable health checks. WSP content health checks can be configured in two modes: connectionless and connectionoriented. Connectionless WSP runs on UDP/IP protocol, ports 9200 and 9202 and connectionoriented (WTP) traffic runs on ports 9201 and 9203. Application switches can be used to load balance the gateways in both modes of operation. Alteon OS allows you to configure three WAP gateway health check types for all four WAP services (WSP, WTP+WSP, WTLS+WSP, WTLS+WTP+WSP), deployed on WAP gateways/ servers. For further details, refer to the Application Guide.
[WAP Health Check Menu] wspcnt - WSP Health Check Content Menu wtpcnt - WTP+WSP Health Check Content Menu wspport - WSP port number to health check wtpport - WTP port number to health check wtlswsp - WTLS+WSP port number to health check wtlsprt - WTLS port number to health check couple - Enable/disable coupling with RADIUS Accounting Service cur - Display current WAP health check configuration
/cfg/slb/advhc/waphc/wspcnt
WSP Content Health Check
[WSP Health Check Content Menu] offset - Offset in received WSP packet sndcnt - Content to be sent to the WAP gateway rcvcnt - Content to be received from the WAP gateway cur - Display current WSP health check content configuration
/cfg/slb/advhc/waphc/wtpcnt
WTP and WSP Content Health Check Menu
This menu is used for configuring the health check for connection-oriented unencrypted WAP traffic.
[WTP+WSP Health Check Content Menu] offset - Offset in received WSP PDU connect - CONNECT PDU to be sent to the sndcnt - GET PDU to be sent to the WAP rcvcnt - REPLY PDU to be received from cur - Display current WTP+WSP health
Table 7-45 WTP and WSP Content Health Check Menu Options (/cfg/slb/advhc/ waphc/wtpcnt)
Command Syntax and Usage offset <offset in the received WSP PDU> Enter the offset value content of the received WSP packets. The offset value is the number of bytes from the beginning of the WSP PDU, at which the comparison begins to match with the expected receive content. An offset value of 0 (default) sets the switch to start comparisons from the beginning of WSP PDU of the received packet. connect <connect content as hexstring> Enter the content for the first switch-generated WSP session packet. This command allows you to customize the headers in the connect message. sndcnt <send content as hexadecimal string> Enter a hexadecimal string that represents a WSP request to a WSP gateway. This string will be delivered to the WSP gateway. rcvcnt <receive content as a hexadecimal string> Enter a hexadecimal string that represents the content that the switch expects to receive from the WSP gateway. cur Displays current WTP+WSP health check content configuration.
/cfg/slb/pip
Proxy IP Address Configuration Menu
You need to enable proxy IP address processing on the port to use this command. You can configure multiple proxy IP addresses based on either port or VLAN. You can configure up to 32 proxy IP addresses on per port or per VLAN basis.
[Proxy IP Address Menu] type - Set base type of Proxy IP address add - Add port or VLAN to Proxy IP address rem - Remove port or VLAN from Proxy IP address cur - Display current Proxy IP address configuration
/cfg/slb/peerpip
SLB Peer Proxy IP Address Menu
When this command is enabled, the switch is able to forward traffic from the other switch, using Layer 2, without performing server processing on the packets of the other switch. This happens because the peer switches are aware of each others proxy IP addresses. This prevents the dropping of a packet or being sent to the backup switch in the absence of the proxy IP address of the peer switch. [Peer Proxy IP Address Menu] add - Add peer Proxy IP address rem - Rem peer Proxy IP address cur - Display current peer Proxy IP address configuration
CHAPTER 8
The commands of the Operations Menu enable you to alter switch operational characteristics without affecting switch configuration. Port Mirroring menu options are accessible only to the Alteon AD4 and Alteon 184 WebSwitches.
433
Operations-level port options are used for temporarily disabling or enabling a port, and for changing Remote Monitoring (RMON) status on a port. Table 8-2 Operations-Level Port Menu Options (/oper/port)
Command Syntax and Usage rmon disable|enable Temporarily enables/disables Remote Monitoring on the port. The port will be returned to its configured operation mode when the switch is reset. ena Temporarily enables the port. The port will be returned to its configured operation mode when the switch is reset. dis Temporarily disables the port. The port will be returned to its configured operation mode when the switch is reset. cur Displays the current settings for the port.
When the optional Layer 4 software is enabled, the operations-level Server Load Balancing options are used for temporarily disabling or enabling real servers and synchronizing the configuration between the active/active switches. Table 8-3 Server Load Balancing Operations Menu Options (/oper/slb)
Command Syntax and Usage group <real server group number (1-1024)> Displays the Real Server Group Menu. To view menu options, see page 437. gslb Displays Global SLB Operations Menu. To view menu options, see page 438. sync Synchronizes the SLB, filter, VRRP, port, Bandwidth Management configuration, and VR priorities on a peer switch (a switch that owns the IP address). To take effect, peers must be configured on the Alteon Application Switch and the administrator password on the switch must be identical. ena <real server number (1-1023)> Temporarily enables a real server. The real server will be returned to its configured operation mode when the switch is reset.
specified real server (except for persistent http 1.0 sessions) by removing the real server from operation within its real server group and virtual server Using the n (none) optionimmediately suspends assignment of connections to the specified real server by removing the real server from operation within its real server group and virtual server The real server will be returned to its configured state after a switch reset.
NOTE This command provides for orderly server shutdown to allow maintenance on a server. For more information, see Disabling and Enabling Real Servers in the Alteon OS 22.0.2 Application Guide.
clear Clears all session tables and allows port filter changes to take effect immediately.
NOTE This command disrupts current SLB and Application Redirection sessions.
cur Displays the current SLB operational state.
/oper/slb/group
Real Server Group Operations
[Real server group 1 Menu] ena - Enable real server in this group dis - Disable real server in this group cur - Current server group operational state
/oper/slb/gslb
Global SLB Operations Menu
[Global SLB Operations Menu] query - Query Global SLB selection
the same)
This switchs virtual router has a higher priority and preemption is enabled. There are no other virtual routers available to take master control.
/oper/bwm
Operations-Level Bandwidth Management Options
[Bandwidth Management Operations Menu] sndhist - Send BW History to SMTP server
/oper/ip/bgp
Operations-Level BGP Options
[Border Gateway start stop cur Protocol Operations Menu] Start peer session Stop peer session Current BGP operational state
To obtain a software key, you must register each License Certificate with Nortel Networks and provide the MAC address of the Alteon OS switch that will run the optional software. Nortel Networks will then provide a License Password. NOTE Each License Password will work only on the specific switch which has the MAC address you provided when registering your Licence Certificate. Once you have your License Password, perform the following actions: 1. 2. Connect to the switchs command line interface and log in as the administrator (see Chapter 1, The Command Line Interface). At the Main# prompt, enter:
Main# oper
3.
4.
When prompted, enter your 16-digit software key code. For example:
Enter Software Key: <16 hexadecimal-digit key to enable software feature (such as, 123456789ABCDEF)>
If the correct code is entered, you will see the following message:
Valid software key entered. Software feature enabled.
When prompted, enter the code for software to be removed. For example:
Enter Software Feature to be removed:[GSLB]||BWM|Security: GSLB
CHAPTER 9
443
/boot/sched
Scheduled Reboot Menu
[Boot Schedule Menu] set - Set switch reset time cancel - Cancel pending switch reset cur - Display current switch reset schedule
To download a new software to your switch, you will need the following: The image or boot software loaded on a TFTP server on your network The hostname or IP address of the TFTP server The name of the new software image or boot file Setup the TFTP option (/cfg/sys/mgmt/tftp) for the TFTP connection. This sets the default option for the gtimg and ptimg commands. However, note that you can override this setting with the option provided to these operational commands.
NOTE The DNS parameters must be configured if specifying hostnames. See Domain Name System Configuration Menu on page 331). When the above requirements are met, use the following procedure to download the new software to your switch. 1. At the Boot Options# prompt, enter:
Boot Options# gtimg
2.
3.
4.
The exact form of the name will vary by TFTP server. However, the file location is normally relative to the TFTP directory (usually /tftpboot). 5. The system prompts you to confirm your request. You should next select a software image to run, as described below.
2.
Enter the name of the image you want the switch to use upon the next boot. The system informs you of which image is currently set to be loaded at the next reset, and prompts you to enter a new choice:
Currently set to use switch software "image1" on next reset. Specify new image to use on next reset ["image1"/"image2"]:
2.
The system prompts you for information. Enter the desired image:
Enter name of switch software image to be uploaded ["image1"|"image2"|"boot"]: <image> <hostname or server-IP-addr> <server-file-
4.
Enter the name of the file into which the image will be uploaded on the TFTP server:
Enter name of file on TFTP server: <filename>
5.
The system then requests confirmation of what you have entered. To have the file uploaded, enter Y.
image2 currently contains Software Version 20.2.0.7 Upload will transfer image2 (1889411 bytes) to file "test" on TFTP server 192.1.1.1. Confirm upload operation [y/n]: y
2.
Enter the name of the configuration block you want the switch to use: The system informs you of which configuration block is currently set to be loaded at the next reset, and prompts you to enter a new choice:
Currently set to use active configuration block on next reset. Specify new block to use ["active"/"backup"/"factory"]:
CHAPTER 10
Dump information contains internal switch state data that is written to flash memory on the Alteon Application Switch after any one of the following occurs: The switch administrator forces a switch panic. The panic option, found in the Maintenance Menu, causes the switch to dump state information to flash memory, and then causes the switch to reboot. The switch administrator enters the switch reset key combination on a device that is attached to the console port. The switch reset key combination is <Shift><Ctrl><->.
449
The watchdog timer forces a switch reset. The purpose of the watchdog timer is to reboot the switch if the switch software freezes. The switch detects a hardware or software problem that requires a reboot. Table 10-1 Maintenance Menu Options (/maint)
Command Syntax and Usage sys Displays the System Maintenance Menu. To view menu options, see page 451. fdb Displays the Forwarding Database Manipulation Menu. To view menu options, see page 451. arp Displays the ARP Cache Manipulation Menu. To view menu options, see page 452. route Displays the IP Route Manipulation Menu. To view menu options, see page 454. debug Displays the Debugging Menu. To view menu options, see page 455. uudmp Displays dump information in uuencoded format. For details, see page 456. ptdmp hostname filename [-mgmt| -data] Saves the system dump information via TFTP. For details, see page 456. cldmp Clears dump information from flash memory. For details, see page 457. lsdmp Displays list flash dump. panic Dumps MP information to FLASH and reboots. For details, see page 457. tsdmp Dumps all Alteon Application Switch information, statistics, and configuration.You can log the tsdump output into a file, and send it to Nortel Networks Tech Support for debugging purposes.
The Forwarding Database Manipulation Menu can be used to view information and to delete a MAC address from the forwarding database or clear the entire forwarding database. This is helpful in identifying problems associated with MAC address learning and packet forwarding decisions.
NOTE To display all ARP entries currently held in the switch, or a portion according to one of the options listed on the menu above (find, port, vlan, refpt, dump), you can also refer to ARP Information on page 93.
NOTE To display all routes, you can also refer to IP Routing Information on page 92.
The Miscellaneous Debug Menu displays trace buffer information about events that can be helpful in understanding switch operation. You can view the following information using the debug menu: Events traced by the Management Processor (MP) Events traced by the Switch Processor (SP) Events traced to a buffer area when a reset occurs
If the switch resets for any reason, the MP trace buffer and SP trace buffers are saved into the snap trace buffer area. The output from these commands can be interpreted by the Nortel Networks Customer Support division. Table 10-6 Miscellaneous Debug Menu Options (/maint/debug)
Command Syntax and Usage tbuf Displays the Management Processor trace buffer. Header information similar to the following is shown: MP trace buffer at 13:28:15 Fri May 25, 2001; mask: 0x2ffdf748 The buffer information is displayed after the header. sptb <port number (1-4)> Displays the Switch Processor trace buffer. Header information similar to the following is shown: SP 1 trace buffer at 10:56:35 Tue Jul 30, 2002; mask: 0x00800008 The buffer information is displayed after the header. spall Displays the Switch Processor trace buffer. Header information similar to the following is shown: SP 1 trace buffer at 10:56:35 Tue Jul 30, 2002; mask: 0x00800008. The buffer information is displayed after the header. Displays all SP trace buffers. clrcfg Deletes all flash configuration blocks. vmasp <IP address> Displays the assigned SP (Switch Processor) for this IP address.
The dump information is displayed on your screen and, if you have configured your communication software to do so, captured to a file. If the dump region is empty, the following appears:
No FLASH dump available.
Where server is the TFTP server IP address or hostname, and filename is the target dump file.
456 Chapter 10: The Maintenance Menu
The switch clears the dump region of flash memory and displays the following message:
FLASH dump region cleared.
If the flash dump region is already clear, the switch displays the following message:
FLASH dump region is already clear.
APPENDIX A
Following is a list of potential syslog messages. To keep this list as short as possible, only <Thread ID> and <Message> are shown. The messages are sorted by <Log Label>. Where the <Thread ID> is listed as mgmt, one of the following may be shown: console, telnet, web server, or ssh.
LOG_WARNING
FILTER filter <filter number> fired on port <port number>, <source IP address> -> <destination IP address>, [<ICMP type>], [<IP protocol>], [<layer-4 ports>], [<TCP f1ags>]
ntp: ntp cannot contact primary NTP server <ip_address> cannot contact secondary NTP server <ip_address>
459
LOG_ALERT
stp: IP vrrp: vrrp: vrrp: vrrp: slb: slb: gslb: gslb: gslb: gslb: slb: slb: slb: slb: bgp: bgp: vrrp: vrrp: dps: dps: syn_atk tcplim own BPDU received from port <port_id> cannot contact default gateway <ip_address> received errored advertisement from <ip_address> received incorrect password from <ip_address> received incorrect addresses from <ip_address> received incorrect advertisement interval <seconds> from <ip_address> cannot contact real server <ip_address> real server <ip_address> has reached maximum connections received update from <ip_address> for unknown remote server <ip_address> received update from <ip_address> for unknown virtual service received update for unknown remote server <ip_address> from <ip_address> received update for unknown service <ip_address:service> cannot contact real service <ip_address:real_port> real server failure threshold (<threshold>) has been reach for group <group_id> real server <ip_address> disabled through configuration Virtual Service Pool full. gSvcPool=MAX_SERVICES notification (<reason>) received from <BGP peer ip_address> session with <BGP peer ip_address> failed (<reason>) Synchronization from non-configured peer <ip_address> Synchronization from non-configured peer <ip_address> was blocked hold down triggered: <ip_address> for <min> minutes manual hold down: <ip_address> SYN attack detected: <count> new half-open sessions per second hold down triggered: <ip_address> for <min> minutes
LOG_CRIT
SYSTEM: temperature at sensor <sensor_id> exceeded threshold SYSTEM: internal power supply failed SYSTEM: redundant power supply failed SYSTEM: fan failure detected SSH can't allocate memory in load_MP_INT
LOG_ERR
mgmt: mgmt: mgmt: ntp: isd: stp: stp: mgmt: mgmt: mgmt: cli: cli: cli: cli: cli: cli: cli: cli: cli: PANIC at <file>:<line> in thread <thread id> VERIFY at <file>:<line> in thread <thread id> ASSERT at <file>:<line> in thread <thread id> unable to listen to NTP port unable to listen to BOOTP_SERVER_PORT port Error: Error writing STG config to FLASH Error: Error writing config to FLASH Apply not done Save not done <apply|save> is issued by another user. Try later Error: Error writing %s config to FLASH New Path Cost for Port <port_id> is invalid PVID <vlan_id> for port <port_id> is not created RADIUS secret must be 1-32 characters long Please configure primary RADIUS server address STP changes can't be applied since STP is OFF Switch reset is required to turn STP on/off Trunk group <trunk_id> contains ports with different PVIDs Trunk group <trunk_id> has more than <max_trunk_ports> ports
LOG_ERR (Continued)
cli: cli: cli: Trunk group <trunk_id> contains no ports but is enabled Not all ports in trunk group <trunk_id> are in VLAN <vlan_id> Trunk groups <trunk_id> and <trunk_id> can not share the same port
port_mirr: Port Mirroring changes are not applied cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: Broadcast address for IP interface <interface_id> is invalid IP Interfaces <interface_id> and <interface_id> are on the same subnet Multiple static routes have same destination Virtual router <vr_id> must have sharing disabled when hotstandby is enabled Virtual router group must be enabled when hotstandby is enabled At least one virtual router must be enabled when group is enabled Virtual router group must have sharing disabled when hotstandby is enabled Virtual router group must have preemption enabled when hotstandby is enabled Virtual router <vr_id> must have an IP address Virtual router <vr_id> cannot have same VRID and VLAN as <vlan_id> Virtual router <vr_id> cannot have same IP address as <ip_address> Virtual router <vr_id> corresponding virtual server <server_id> is not enabled Hot-standby must be enabled when a virtual router has a PIP address Virtual router <vr_id> IP interface should be <interface_id> Enabled real server <server_id> has no IP address Real server <server_id> has same IP address as IP interface <interface_id> Real server <server_id> has same IP address as switch Real server <server_id> (Backup for <server_id>) is not enabled Real server <server_id> has same IP address as virtual server <server_id> Real server <server_id> has same IP address as real server <server_id> Real server group <group_id> cannot backup itself Real server <server_id> cannot be added to same group Enabled virtual server <server_id> has no IP address
LOG_ERR (Continued)
cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: Virtual server <server_id> has same IP address as IP interface <interface_id> Virtual server <server_id> has same IP address as switch Virtual servers <server_id> and <server_id> with same IP address must support same layr3 configuration Real server <server_id> cannot be backup server for both real server <server_id> and group <group_id> Virtual server <server_id> has same IP address and vport as virtual server <server_id> RS <server_id> can't exist for VS <server_id> vport <virtual_port> Switch port <port_id> has same proxy IP address as port <port_id> Switch port <port_id> has same IP address as IP interface <interface_id> A hot-standby port cannot also be an inter-switch port There must be at least one inter-switch port if any hot-standby port exist With VMA, ports 1-8 must all have a PIP if any one does Client bindings are not supported with proxy IP addresses DAM must be turned on or a PIP must be enabled for port <port_id> in order for virtual server to support FTP parsing Real server <server_id> and group %u cannot both have backups configured Virtual server <server_id> : port mapping but layer3 bindings Extracting length has to set to 8 or 16 for cookie rewrite mode DAM must be turned on or a PIP must be enabled for port <port_id> in order for virtural server <server_id> to support URL parsing Port filtering must be disabled on port <port_id> in order to support cookie based persistence for virtual server <server_id> Virtual server <server_id>: port mapping but Direct Access Mode Virtual server %lu: support nonat IP but not layer 3 bindings Virtual servers: all that support IP must use same group Virtual servers <server_id> and <server_id> that include the same real server <server_id> cannot map the same real port or balance UDP Virtual server <server_id>: UDP service <virtual_port> with out-of-range port number
LOG_ERR (Continued)
cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: Switch cannot support more than <MAX_VIRT_SERVICES> virtual services Switch cannot support more than <MAX_SMT> real services Trunk group (<trunk_id>) ports must have same L4 config Trunk group (<trunk_id>) ports must all have a PIP DAM must be turned on or a PIP must be enabled for ports <port_id> in order to do URL based redirection Two services have same hostname, <host_name>.<domain_name> Direct access mode is not supported with default gateway load balancing SLB Radius secret must be 16 characters long Dynamic NAT filter <filter_id> must be cached NAT filter <filter_id> must have same smask and dmask NAT filter <filter_id> cannot have port ranges NAT filter <filter_id> must be cached NAT filter <filter_id> dest range includes VIP <server_id> NAT filter <filter_id> dest range includes RIP <server_id> Redirection filter <filter_id> must be cached Filter with L4 ports configured <port_id> must have IP protocol configured For Global SLB, Web server must be moved from TCP port 80 Remote site <site_id> does not have a primary IP address Primary and secondary remote site <site_id> switches must differ Remote sites <site_id> and <site_id> must use different addresses Remote site <site_id> and real server <server_id> must use different addresses Remote site <site_id> and virtual server <server_id> must use different addresses Only <MAX_SLB_SITES> remote servers are allowed per group Only <MAX_SLB_SERVICES> remote services are supported Enabled external lookup IP address has no IP address domain name must be configured
LOG_ERR (Continued)
cli: cli: cli: cli: cli: cli: cli: cli: cli: cli: mgmt: mgmt: mgmt: vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: Network <static_network_id> has no VIP address duplicate default entry BGP peer <bgp_peer_id> must have an IP address BGP peers <bgp_peer_id> and <bgp_peer_id> have same address BGP peer <bgp_peer_id> have same address as IP interface <ip_interface_id> BGP peer <bgp_peer_id> IP interface <ip_interface_id> is not enabled Filter with ICMP types configured (<icmp_type>) must have IP protocol configure to ICMP Two services have same hostname, <host_name>.<domain_name> Loadbalance string must be added to real server <server_id> in order to enable exclusionary string matching intrval input value must be in the range [0-24] unapplied changes reverted unsaved changes reverted Attempting to redirect a previously redirected output Attempting to redirect a previously redirected output cfg_sync_tx_putsn: ABORTED Synchronization TX Error Synchronization TX connection RESET Synchronization TX connection TIMEOUT Synchronization TX connection UNREACEABLE Synchronization TX connection UNKNOWN CLOSE Synchronization RX connection RESET Synchronization RX connection TIMEOUT Synchronization RX connection UNREACEABLE Synchronization RX connection UNKNOWN CLOSE Synchronization connection RCLOSE by peer Synchronization connection RCLOSE before RX
LOG_ERR (Continued)
vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: Synchronization connection early RCLOSE in RX Synchronization connection Wait-For-Close Timeout Synchronization connection Transmit Timeout Synchronization Receive Timeout Synchronization Receive UNKNOWN Timeout Sync transmit in progress cannot start Sync Sync receive in progress cannot start Sync Sync already in progress cannot start Sync Config Sync route find error Config Sync tcp_open error Config Synchronization Timeout - Resuming Console thread <""apply""|""save""> is issued by another user. Try later new configuration did not validate (rc = ) new configuration did not apply (rc = ) new configuration did not save (rc = ) Sync config apply error Restoring Current Config Sync rx tcp open error Sync Version/Password Failed-No Version/Password Line Sync Version Failed - peer:%s config:%s Sync Password Failed-Bad Password Sync receive already in progress cannot start Sync receive Sync transmit in progress cannot start Sync receive
LOG_NOTICE
system: system: system: system: system: system: mgmt: mgmt: mgmt: mgmt: mgmt: mgmt: mgmt: mgmt: mgmt: mgmt: mgmt: mgmt: mgmt: mgmt: mgmt: ssh: ssh: mgmt: mgmt: mgmt: mgmt: internal power supply ok redundant power supply present and ok temperature ok fan ok rebooted <last_reset_information> rebooted <last_reset_information> administrator logged in boot config block changed boot image changed switch reset from CLI syslog host changed to <ip_address> syslog host changed to this host second syslog host changed to <ip_address> second syslog host changed to this host Next boot will use active config block user password changed SLB operator password changed L4 operator password changed operator password changed SLB administrator password changed L4 administrator password changed administrator password changed scp <login_level> login scp <login_level> <""connection closed""|""idle timeout""|""logout""> RADIUS server timeouts Failed login attempt via TELNET from host %s PASSWORD FIX-UP MODE IN USE <login_level> login on Console
LOG_NOTICE (Continued)
mgmt: mgmt: <login_level> <""idle timeout""|""logout""> from Console PANIC command from CLI
port_mirr: port mirroring is <""enabled""|""disabled""> vlan: mgmt: mgmt: IP IP vrrp: vrrp: slb: slb: slb: slb: slb: slb: slb: slb: slb: slb: bgp: Default VLAN can not be deleted <login_level> login from host <ip_address> <login_level> <""connection closed""|""idle timeout""|""logout""> from default gateway <ip_address> <""enabled""|""disabled""> default gateway <ip_address> operational virtual router <ip_address> is now master virtual router <ip_address> is now backup backup server <ip_address> <""enabled""|""diabled""> for real server <server_id> backup server <ip_address> <""enabled""|""disabled""> for real server group <group_id> backup group server <ip_address> <""enabled""|""disabled""> for real server group group_id> overflow server <ip_address> <""enabled""|""disabled""> for real server <server_id> overflow server <ip_address> <""enabled""|""disabled""> for real server group <group_id> overflow group server <ip_address> <""enabled""|""disabled""> for real server group <group_id> real server <ip_address> operational real service <ip_address:real_port> operational No services are available for Virtual Server <virtual_server> Services are available for Virtual Server <virtual_server> session established with <BGP_peer_ip_address>
LOG_INFO
SYSTEM: mgmt: mgmt: mgmt: mgmt: mgmt: mgmt: ssh: ssh: mgmt: mgmt: mgmt: mgmt: ssh: ssh: ssh: vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: vrrp: bootp response from <ip_address> new configuration applied new configuration saved unsaved changes reverted Could not revert unsaved changes "<image1|image2> downloaded from host <ip_address>, file <file_name> <software_version>" serial EEPROM downloaded from host <ip_address> file <file_name> scp <login_level> login "scp <login_level> <""connection closed""|""idle timeout""|""logout"">" <login_level> login on Console "<login_level> <""idle timeout""|""logout""> from Console" <login_level> login from host <ip_address> "<login_level> <""connection closed""|""idle timeout""|""logout""> from Telnet/SSH." server key autogen starts server key autogen completes server key autogen timer timeouts new synch configuration applied new synch configuration saved Synchronizing from <host_name> Synchronizing to <host_name> Config Synchronization Transmit Successful Config Synchronization Receive Successful new configuration VALIDATED
APPENDIX B
In addition, the following SynOptics MIBS are also supported: synro193.mib -- SynOptics Root MIB s5roo117.mib -- SynOptics Registration MIB s5tcs112.mib -- Textual Convention MIB s5emt104.mib -- Ethernet Multi segment Autotopology MIB
SNMPv1|v2|v3 traps can be sent to the hosts configured in targetAddr table. Up to 16 IP addresses can be configured in targetAddr table. Alteon OS SNMP agent supports the following standard MIBs: RFC 1213 - MIB II (System, Interface, Address Translation, IP, ICMP, TCP, UDP, SNMP Groups) RFC 1573 - MIB II Extension (IFX table) RFC 1643 - EtherLike MIB RFC 1493 - Bridge MIB RFC 1757 - RMON MIB (Statistics, History, Alarm, Event Groups) RFC 1850 for OSPF
471
The following SNMPv3 MIBs are supported: RFC 2571 - SNMP Frame work RFC 2572 - MPD MIB RFC 2573 - Target MIB RFC 2574 - USM MIB RFC 2575 - VACM MIB RFC 2576 - Community MIB
Alteon OS SNMP agent supports the following generic traps as defined in RFC 1215: ColdStart WarmStart LinkDown LinkUp AuthenticationFailure
The SNMP agent also supports two Spanning Tree traps as defined in RFC 1493: NewRoot TopologyChange
The following are the enterprise SNMP traps supported in Alteon OS: Table 10-7 Alteon OS-Supported Enterprise SNMP Traps
Trap Name Description
Signifies that the default gateway is alive. Signifies that the default gateway is down. Signifies that the default gateway is up and in service Signifies that the default gateway is alive but not in service Signifies that the real server is up and operational Signifies that the real server is down and out of service Signifies that the real server has reached maximum connections
Signifies that the backup real server is activated due to availablity of the primary real server Signifies that the backup real server is deactivated due to the primary real server is available Signifies that the backup real server is deactivated due to the primary real server is overflowed Signifies that the backup real server is deactivated due to the primary real server is out from overflow situation Signifies that the packet received on a switch port matches the filter rule Signifies that the service port of the real server is up and operational Signifies that the service port of the real server is down and out of service
The newMaster trap indicates that the sending agent has transitioned to 'Master' state. The newBackup trap indicates that the sending agent has transitioned to 'Backup' state. A vrrpAuthFailure trap signifies that a packet has been received from a router whose authentication key or authentication type conflicts with this router's authentication key or authentication type. Implementation of this trap is optional. An altSwLoginFailure trap signifies that someone failed to enter a valid username/password combination.
altSwVrrpAuthFailure
altSwTempExceedThreshold
altSwSlbSessAttack altSwFanFailure
APPENDIX C
Use the following procedure to perform a serial upgrade. 1. 2. Using the serial cable, connect the Console port of an Alteon Application Switch to the serial port of your PC that supports XModem/1K XModem. Start hyper terminal (part of Microsoft Windows) and set the following parameters:
Parameter Baud Rate Data Bits Parity Stop Bits Flow Control Value 9600 8 None 1 None
3. 4.
Power on the switch. Hold the <Shift> key down and hit D repeatedly until the following message appears:
Alteon Application Switch - PPCBoot 2.2. To download a serial image use 1K Xmodem at 115200
475
5.
Reconfigure your terminal emulation software with the following parameters (only after you see the message displayed in step 4):
Parameter Baud Rate Data Bits Parity Stop Bits Flow Control Value 115200 8 None 1 None
NOTE You can perform serial downloads at 57600 baud rate by pressing Shift f or at 115200 baud rate by pressing Shift d.
6.
Press <Enter> on the key board of the PC that is connected to the console port of the switch. When the Console Port is successfully communicating with the PC, you will see: CCCC... Make sure that the new binary firmware file is available on the computer. This file can be downloaded from the CD that is shipped with the switch. Select <Transfer-Send File> and choose the following:
file: For example, "21.0.0.0_Serial.img" (Or the file previously downloaded to the computer)
7.
protocol: 1K XMODEM It will take about 15 minutes for the transfer to complete. NOTE Although slower, XMODEM will work too if you choose not to use 1K MODEM. 8. Power off the switch, wait for a few seconds and power the switch on. CAUTIONDo not power off the switch until you see the message: Change your baud rate to 9600 bps and power cycle switch, otherwise, the switch will be inoperable. 9. The switch will boot with the new software load. You should see the following sample log on your screen:
Alteon Application Switch - PPCBoot 2.2. To download a serial image use 1K Xmodem at 115200 CCCCCCCCCCCCCCCCCCCCCCCCCCCCC Total bytes transferred: 0x4ff400 Extracting images... Do *NOT* power cycle the switch Updating flash... ################################################################# Change your baudrate to 9600 bps and power cycle the switch
Glossary
DIP (Destination IP Address) Dport (Destination Port) NAT (Network Address Translation) The destination IP address of a frame.
Any time an IP address is changed from one source IP or destination IP address to another address, network address translation can be said to have taken place. In general, half NAT is when the destination IP or source IP address is changed from one address to another. Full NAT is when both addresses are changed from one address to another. No NAT is when neither source nor destination IP addresses are translated. Virtual server-based load balancing uses half NAT by design, because it translates the destination IP address from the Virtual Server IP address, to that of one of the real servers. In VRRP, preemption will cause a Virtual Router that has a lower priority to go into backup should a peer Virtual Router start advertising with a higher priority. In VRRP, the value given to a Virtual Router to determine its ranking with its peer(s). Minimum value is 1 and maximum value is 254. Default is 100. A higher number will win out for master designation. The protocol of a frame. Can be any value represented by a 8-bit value in the IP header adherent to the IP specification (for example, TCP, UDP, OSPF, ICMP, and so on.) A group of real servers that are associated with a Virtual Server IP address, or a filter.
Preemption
Priority
Proto (Protocol)
477
A type of load balancing that operates differently from virtual server-based load balancing. With this type of load balancing, requests are transparently intercepted and redirected to a server group. Transparently means that requests are not specifically destined for a Virtual Server IP address that the switch owns. Instead, a filter is configured in the switch. This filter intercepts traffic based on certain IP header criteria and load balances it. Filters can be configured to filter on the SIP/Range (via netmask), DIP/Range (via netmask), Protocol, SPort/Range or DPort/Range. The action on a filter can be Allow, Deny, Redirect to a Server Group, or NAT (translation of either the source IP or destination IP address). In redirection-based load balancing, the destination IP address is not translated to that of one of the real servers. Therefore, redirection-based load balancing is designed to load balance devices that normally operate transparently in your networksuch as a firewall, spam filter, or transparent Web cache. Real Server IP Address. An IP addresses that the switch load balances to when requests are made to a Virtual Server IP address (VIP). The source IP address of a frame.
The source port (application socket: for example, HTTP-80/HTTPS-443/DNS-53). In VRRP, a method to increase the priority of a virtual router and thus master designation (with preemption enabled). Tracking can be very valuable in an active/active configuration. You can track the following: Vrs: Virtual Routers in Master Mode (increments priority by 2 for each) Ifs: Active IP interfaces on the Alteon Application Switch (increments priority by 2 for each) Ports: Active ports on the same VLAN (increments priority by 2 for each) l4pts: Active Layer 4 Ports, client or server designation (increments priority by 2 for each reals: healthy real servers (increments by 2 for each healthy real server) hsrp: HSRP announcements heard on a client designated port (increments by 10 for each) An IP address that the switch owns and uses to load balance particular service requests (like HTTP) to other servers. A VRRP address that is an IP interface address shared between two or more virtual routers.
478 Glossary
Virtual Router
A shared address between two devices utilizing VRRP, as defined in RFC 2338. One virtual router is associated with an IP interface. This is one of the IP interfaces that the switch is assigned. All IP interfaces on the Alteon Application Switch must be in a VLAN. If there is more than one VLAN defined on the Alteon Application Switch, then the VRRP broadcasts will only be sent out on the VLAN of which the associated IP interface is a member. Classic load balancing. Requests destined for a Virtual Server IP address (VIP), which is owned by the switch, are load balanced to a real server contained in the group associated with the VIP. Network address translation is done back and forth, by the switch, as requests come and go. Frames come to the switch destined for the VIP. The switch then replaces the VIP and with one of the real server IP addresses (RIP's), updates the relevant checksums, and forwards the frame to the server for which it is now destined. This process of replacing the destination IP (VIP) with one of the real server addresses is called half NAT. If the frames were not half NAT'ed to the address of one of the RIPs, a server would receive the frame that was destined for it's MAC address, forcing the packet up to Layer 3. The server would then drop the frame, since the packet would have the DIP of the VIP and not that of the server (RIP). In VRRP, a value between 1 and 255 that is used by each virtual router to create its MAC address and identify its peer for which it is sharing this VRRP address. The VRRP MAC address as defined in the RFC is 00-00-5E-00-01-{VRID}. If you have a VRRP address that two switches are sharing, then the VRID number needs to be identical on both switches so each virtual router on each switch knows whom to share with. A protocol that acts very similarly to Cisco's proprietary HSRP address sharing protocol. The reason for both of these protocols is so devices have a next hop or default gateway that is always available. Two or more devices sharing an IP interface are either advertising or listening for advertisements. These advertisements are sent via a broadcast message to an address such as 224.0.0.18. With VRRP, one switch is considered the master and the other the backup. The master is always advertising via the broadcasts. The backup switch is always listening for the broadcasts. Should the master stop advertising, the backup will take over ownership of the VRRP IP and MAC addresses as defined by the specification. The switch announces this change in ownership to the devices around it by way of a Gratuitous ARP, and advertisements. If the backup switch didn't do the Gratuitous ARP the Layer 2 devices attached to the switch would not know that the MAC address had moved in the network. For a more detailed description, refer to RFC 2338. A VRRP address that is a shared Virtual Server IP address. VSR is Alteon WebSystems proprietary extension to the VRRP specification. The switches must be able to share Virtual Server IP addresses, as well as IP interfaces. If they didnt, the two switches would fight for ownership of the Virtual Server IP address, and the ARP tables in the devices around them would have two ARP entries with the same IP address but different MAC addresses.
Glossary 479
480 Glossary
Index
Symbols
(MD5) .............................................................. 422 (SLB real server group option) content ...................................................... 365 / command .......................................................... 49 [ ]....................................................................... 17 admpw (system option) ...................................... 262 advertisement of virtual IP addresses ................... 314 aging STP bridge option ....................................... 291 STP information ........................................... 86 application redirection ................................ 359, 386 filter states.................................................. 111 filters ......................................................... 358 within real server groups .............................. 364 apply (global command) ..................................... 229 applying configuration changes ........................... 229 ASCII terminal .................................................... 20 autoconfiguration duplex mode ................................................. 32 link........................................................ 32, 33 port speed..................................................... 32 auto-negotiation ................................................... 32 enable/disable on port .......... 268, 272, 274, 276 setup...................................................... 32, 33 autonomous system filter action .......................... 312 autonomous system filter path action ........................................................ 312 as .............................................................. 312 aspath ........................................................ 312
Numerics
1K XModem ..................................................... 475 3000 series........................................................ 269
A
abbreviating commands (CLI) .............................. 52 access control system ....................................................... 259 action (SLB filtering option) ............................... 386 activating optional software ................................ 441 active configuration block .......................... 230, 447 active FTP SLB parsing statistics ........................ 188 active IP interface .............................................. 344 active Layer 4 processing ................................... 344 active port VLAN ....................................................... 344 active switch configuration gtcfg ......................................................... 354 ptcfg ......................................................... 354 restoring .................................................... 354 active switch, saving and loading configuration .... 354 add SLB port option .......................................... 400 addr ARP entries................................................ 453 IP route tag .................................................. 93 Address Resolution Protocol (ARP) address list ................................................. 453 administrator account ..................................... 24, 27
B
backup SLB real server group option ........................ 365 backup configuration block ......................... 230, 447 backup server activations (SLB statistics) .... 173, 195 bandwidth management configuration .............................................. 279 contracts .................................................... 280 bandwidth management contract precedence value ......................................... 282 bandwidth management contract configuration .... 234,
281
481
Alteon OS 22.0.2 Command Reference Bandwidth Management options operations-level options ................................439 bandwidth management policy configuration ........284 buffer limit .................................................285 hard bandwidth limit ....................................284 over the limit TOS .......................................285 reserve limit ................................................284 soft bandwidth limit .....................................284 underlimit TOS ...........................................285 bandwidth management statistics .........................198 banner (system option)........................................232 baud rate console connection ........................................20 serial download ...................................475, 476 BBI .....................................................................19 BGP configuration...............................................324 eBGP .........................................................324 iBGP..........................................................324 in route .......................................................327 IP address, border router ...............................326 IP route tag ...................................................93 keep-alive time ............................................327 peer ...........................................................325 peer configuration ........................................326 redistribution configuration ...........................328 remote autonomous system ...........................327 router hops..................................................327 binary ...............................................................475 binary firmware image ........................................476 binding failure ...........................................172, 194 binding table ......................................................377 BLOCKING (port state)........................................86 boot options menu ..............................................443 BOOTP ...............................................................21 setup (enable/disable) .....................................30 system option ..............................................232 bootstrap protocol ..............................................332 Border Gateway Protocol ......................................93 configuration...............................................324 Border Gateway Protocol (BGP) operations-level options ................................440 BPDU. See Bridge Protocol Data Unit. bridge parameter menu, for STP ..........................289 bridge priority ......................................................86 Bridge Protocol Data Unit (BPDU) ........................86 STP transmission frequency ..........................290 Bridge Spanning-Tree parameters ........................290 broadcast IP route tag .................................................. 93 IP route type ................................................. 92 broadcast domains ............................................. 297 broadcast IP address ............................................ 36 Browser-Based Interface ...................................... 19 BWM contract rate statistics................................... 201 contract statistics......................................... 200 history statistics .......................................... 203 port ........................................................... 199 switch processor contract statistics ................ 199 switch processor rate contract statistics .......... 199
C
capture dump information to a file....................... 456 Cisco Ether Channel .......................................... 292 clear ARP entries ................................................ 453 dump information ....................................... 457 FDB entry .................................................. 452 routing table ............................................... 454 clearing SLB statistics ........................................ 196 client traffic processing ...................................... 399 command (help) .................................................. 49 Command-Line Interface (CLI) ....... 19 to 25, 27, 47 commands abbreviations ................................................ 52 conventions used in this manual ...................... 17 global commands .......................................... 49 shortcuts ...................................................... 52 stacking ....................................................... 52 tab completion .............................................. 52
482 Index
Alteon OS 22.0.2 Command Reference configuration administrator password ................................ 262 apply changes ............................................. 229 default gateway interval, for health checks ..... 302 default gateway IP address ........................... 302 dump command .......................................... 353 effect on Spanning-Tree Protocol .................. 229 Fast Ethernet .............................................. 266 flow control ....................... 268, 271, 274, 276 Gigabit Ethernet ......................... 266, 270, 272 IP static route ............................................. 304 Layer 4 administrator password .................... 262 operating mode ........................... 268, 271, 276 port link speed ............................ 268, 271, 276 port mirroring ............................................. 278 port trunking .............................................. 292 route cache................................................. 306 save changes .............................................. 229 setup ......................................................... 353 setup command .......................................... 353 switch IP address ........................................ 301 TACACS+ ................................................. 240 user password ............................................. 261 view changes.............................................. 229 VLAN default (PVID) ......... 266, 270, 272, 275 VLAN IP interface ...................................... 301 VLAN tagging ................... 267, 270, 273, 275 VRRP ....................................................... 333 configuration block active ........................................................ 447 backup....................................................... 447 factory ....................................................... 447 selection .................................................... 447 configuration menu ............................................ 227 configuring routing information protocol ............. 313 connecting via console ................................................... 20 via Telnet..................................................... 21 connection timeout (Real Server Menu option) ..... 377 console port communication settings ................................. 20 connecting ................................................... 20 serial download settings ....................... 475, 476 content SLB real server group option ........................ 365 contracts, bandwidth management ....................... 280 copper ports ...................................................... 270 cost STP information ........................................... 86 STP port option........................................... 292 counters, No Server Available (dropped frames) .. 173,
195
CPU statistics ............................................ 209, 211 CPU utilization .......................................... 209, 211 cur (system option) .................................... 240, 243 current bindings ......................................... 172, 194
D
date setup............................................................ 30 system option ............................................. 232 daylight savings time ......................................... 243 debugging ......................................................... 449 default gateway information .................................................. 90 interval, for health checks............................. 302 metrics ....................................................... 347 round robin, load balancing for ..................... 347 default password .................................................. 24 delete FDB entry .................................................. 452 deny (filtering) .................................................. 195 designated port. ................................................... 95 diff (global) command, viewing changes .............. 229 dip (destination IP address for filtering) ............... 387 direct (IP route type) ............................................ 92 directed broadcasts............................................. 306 DISABLED (port state) ........................................ 86 disconnect idle timeout ......................................... 25 Distributed Site State Protocol (DSSP) setting update interval .................................. 402 dmask destination mask for filtering ........................ 387 DNS statistics .................................................... 160 Domain Name System (DNS) health checks .............................................. 368 downloading software ........................................ 444 dropped frames (No Server Available) counter .... 173,
195
dump configuration command ............................... 353 maintenance ............................................... 449 state information ......................................... 457
Index 483
Alteon OS 22.0.2 Command Reference duplex mode ........................................................32 link status .......................................54, 69, 119 setup ............................................................32 dynamic routes ...................................................454
G
gig (Port Menu option) ....................... 266, 270, 272 Gigabit Ethernet configuration .............................. 266, 270, 272 Gigabit Ethernet Physical Link ........... 266, 270, 272 global commands................................................. 49 global SLB maintenance statistics ....................... 177 global SLB statistics .......................................... 174 grace graceful real server failure ............................ 417 Greenwich ........................................................ 242 Greenwich Mean Time (GMT) ........................... 242 group ................................................................ 180 gtcfg (TFTP load command) ............................... 354
E
EMS,Alteon EMS ................................................39 emulation software .............................................475 EtherChannel as used with port trunking .............................292
F
factory configuration block .................................447 factory default configuration .....................25, 27, 28 Fast Ethernet Physical Link .................................266 Fast Ethernet, configuring ports for ......................266 fastage ..............................................................417 FDB statistics ....................................................145 fiber optic ports ..................................................272 File Transfer Protocol .........................................187 filter statistics ....................................................181 filtered (denied) frames ...............................173, 195 filters IP address ranges .........................................387 Final Steps...........................................................38 first-time configuration ......................... 25, 27 to 43 fixed IP route tag ...................................................93 flag field..............................................................95 flow control .................................................54, 119 configuring .........................268, 271, 274, 276 setup ......................................................32, 33 forwarding configuration IP forwarding configuration ..........................306 forwarding database (FDB) .................................449 delete entry .................................................452 Forwarding Database Information Menu ................78 Forwarding Database Menu.................................451 forwarding state (FWD) ............................79, 86, 87 FTP server health checks ....................................368 FTP SLB maintenance statistics...........................189 FTP SLB statistics dump .....................................189 full-duplex ...........................................................32 fwd (STP bridge option) .....................................290 FwdDel (forward delay), bridge port ......................86
H
half-duplex ......................................................... 32 hash metric ....................................................... 370 health check types, SLB ..................................... 367 health checks..................................................... 360 default gateway interval, retries .................... 302 IDSLB....................................................... 367 layer information ........................................ 110 parameters for most protocols ....................... 368 redirection (rport) ........................................ 386 retry, number of failed health checks ............. 302 script ......................................................... 423 SNMP ............................................... 369, 425 WAP ......................................................... 426 hello STP information ........................................... 86 help .................................................................... 49 host routes ........................................................ 314 Hot Standby Router on VLAN (HSRV) use with VLAN-tagged environment ............. 338 VRRP priority increment value ..................... 347 Hot Standby Router Protocol (HSRP) priority increment value for L4 client ports ..... 346 use with VRRP ................................... 338, 344 VRRP priority increment value ..................... 346 Hot Standby Router VLAN (HSRV) use with VRRP ........................................... 344 hot-standby failover ........................................... 342 HP-OpenView ..................................................... 19 hprompt system option ............................................. 232 HSRP. See Hot Standby Router Protocol.
484 Index
Alteon OS 22.0.2 Command Reference HSRV. See Hot Standby Router Protocol. HTTP application health checks ............................. 368 redirects (Global SLB option) ....................... 402 system option ............................................. 259 http .................................................................. 259 HTTP health checks on any port (aphttp) ..................................... 422 IP interfaces .................................................. 35, 92 information .................................................. 90 IP route tag ................................................... 93 priority increment value (ifs) for VRRP ......... 346 IP network filter configuration ............................ 308 IP port configuration .......................................... 330 IP Route Manipulation Menu .............................. 454 IP routing ............................................................ 35 tag parameters .............................................. 93 IP Static Route Menu ......................................... 304 IP statistics ........................................................ 155 IP subnet mask .................................................... 35 IP subnets VLANs ...................................................... 297
I
ICMP statistics .................................................. 161 idle timeout overview...................................................... 25 IDSLB health checks ......................................... 367 IEEE standards 802.1d Spanning-Tree Protocol .............. 85, 288 image downloading .............................................. 444 software, selecting ...................................... 446 IMAP server health checks ................................. 368 imask (IP address mask) ..................................... 416 incorrect VIPs (statistic) ............................. 172, 194 incorrect Vports (dropped frames counter) ... 173, 195 indirect (IP route type) ......................................... 92 Information Trunk Group Information............................... 87 Information Menu ............................................... 53 Interface change stats ......................................... 154 interface statistics .............................................. 163 IP address ........................................................... 35 ARP information .......................................... 94 BOOTP ....................................................... 21 configuring default gateway ......................... 302 filter ranges ................................................ 387 IP interface .................................................. 35 local route cache ranges ............................... 307 Telnet .......................................................... 21 IP address mask for SLB .................................... 416 IP configuration via setup ..................................... 35 IP forwarding .................................................... 330 directed broadcasts ...................................... 306 local networks for route caching ................... 306 IP forwarding information .................................... 90 IP Information Menu ................................... 90, 104 IP interface ....................................................... 301 active ........................................................ 344 configuring address ..................................... 301 configuring VLANs .................................... 301
L
l4apw (L4 administrator system option) ............... 262 Layer 4 administrator account..................................... 24 Layer 4 processing active......................................................... 344 layer 7 SLB maintenance statistics ...................... 184 layer 7 SLB string statistics ................................ 183 layer7 redirection statistics ................................. 182 LDAP version ................................................... 422 LEARNING (port state) ....................................... 86 least connections (SLB Real Server metric) .. 367, 370 licence certificate ............................................... 441 license password ................................................ 441 link speed, configuring ....................... 268, 271, 276 link status............................................................ 54 command ................................................... 119 duplex mode ................................... 54, 69, 119 port speed....................................... 54, 69, 119 Link Status Information ...................................... 119 linkt (SNMP option) .......................................... 246 LISTENING (port state) ....................................... 86 lmask (routing option) .......................................... 90 lnet (routing option) ............................................. 90 local (IP route type) ............................................. 92 local network for route caching ........................... 306 local route cache IP address ranges for.................................... 307 log syslog messages .......................................... 233 logical segment. See IP subnets.
Index 485
M
MAC (media access control) address.55, 78, 94, 441,
451
notice ............................................................... 232 NTP synchronization ......................................... 243 NTP time zone .................................................. 242
switch location ..............................................21 Main Menu ..........................................................47 Command-Line Interface (CLI) .......................25 summary ......................................................48 Maintenance Menu .............................................449 Management Processor (MP)...............................455 display MAC address .....................................55 manual style conventions ......................................17 martian IP route tag (filtered) ......................................93 IP route type (filtered out) ...............................92 mask IP interface subnet address ............................301 MaxAge (STP information) ...................................86 mcon (maximum connections) .............173, 195, 365 MD5 authentication key ......................................316 MD5 cryptographic authentication .......................317 MD5 key ...........................................................320 media access control. See MAC address. metric SLB real server group option.........................364 metrics, SLB ......................................................370 minimum misses (SLB real server metric) ....367, 370 Miscellaneous Debug Menu ................................455 mmask IP address mask for SLB ..............................416 mnet management traffic IP address for SLB ..........416 monitor port.......................................................278 mp packet ........................................................206 MP. See Management Processor. multicast IP route type .................................................92 multi-links between switches using port trunking.................................87, 292 mxage (STP bridge option) .................................290
O
octet counters .................................................... 179 online help .......................................................... 49 operating mode, configuring ............... 268, 271, 276 operations menu ................................................ 433 operations-level BGP options ............................. 440 operations-level BWM options ........................... 439 operations-level IP options ................................. 440 Operations-Level Port Options ............................ 435 operations-level SLB options .............................. 436 operations-level VRRP options ........................... 439 optional software ......................................... 54, 127 activating ................................................... 441 removing ................................................... 442 OSPF area types ............................................. 98, 315 ospf area index .......................................... 315, 317 authentication key ....................................... 320 configuration .............................................. 315 cost of the selected path ............................... 320 cost value of the host ................................... 322 dead, declaring a silent router to be down ....... 320 dead, health parameter of a hello packet ......... 321 export ........................................................ 323 fixed routes ................................................ 325 general ...................................................... 151 global ........................................................ 151 hello, authentication parameter of a hello packet ...
N
nbr change statistics............................................153 Network Address Translation (NAT) filter action .................................................386 network management ............................................19 non TCP/IP frames .....................................172, 194
486 Index
host entry configuration ............................... 322 host routes ................................................. 316 interface .................................................... 315 interface configuration ................................. 319 link state database ....................................... 316 MD5 authentication key............................... 316 Not-So-Stubby Area .................................... 317 priority value of the switch interface.............. 320 range number ............................................. 315 redistribution menu ..................................... 316 route redistribution configuration .................. 323 spf, shortest path first .................................. 318 stub area .................................................... 317 summary range configuration ....................... 318 transit area ................................................. 317 transit delay ............................................... 320 type........................................................... 317 virtual link ................................................. 315 virtual link configuration ............................. 321 virtual neighbor, router ID ........................... 321 OSPF Database Information ............................... 101 OSPF general ...................................................... 99 OSPF General Information ................................. 100 OSPF Information ............................................... 98 OSPF Information Route Codes .......................... 102 OSPF statistics .................................................. 150 overflow server activations ......................... 173, 195 overflow servers ................................................ 360
321
persistent bindings real server .................................................. 377 ping ............................................................ 50, 359 PIP ................................................................... 430 poisoned reverse, as used with split horizon ......... 314 POP3 server health checks..................................... 368 port bandwidth management switch processor statistics switch port contract statistics menu................ 198 port configuration .............................................. 265 port flow control. See flow control. Port Menu configuration options ................................... 270 configuring Fast Ethernet ............................. 266 configuring Gigabit Ethernet (gig) . 266, 270, 272 port mirroring configuration .............................................. 278 Port number ...................................................... 119 port speed ............................................. 54, 69, 119 auto-sense .................................................... 32 setup............................................................ 32 port states UNK (unknown) ........................................... 79 port trunking description ................................................. 292 port trunking configuration ................................. 292 ports configuration ................................................ 31 disabling (temporarily)................................. 277 information ................................................ 120 IP status ....................................................... 90 membership of the VLAN ........................ 78, 88 priority......................................................... 86 RJ-45......................................................... 265 SLB state information .................................. 111 STP port priority ......................................... 292 VLAN ID............................................. 54, 120 preemption assuming VRRP master routing authority ....... 337 virtual router ....................................... 336, 342 priority virtual router ............................................... 342 priority (STP port option) ................................... 292 prisrv primary radius server ................................... 239 proxies IP address translation ................................... 361 Index 487
199
P
panic command ................................................... 457 switch (and Maintenance Menu option) ......... 449 parameters tag .............................................................. 93 type............................................................. 92 Passive FTP SLB Parsing Statistics ..................... 188 Password user access control ...................................... 261 password administrator account .................................... 24 default ......................................................... 24 L4 administrator account ............................... 24 user account ................................................. 24 VRRP authentication ................................... 345 passwords ........................................................... 23
Alteon OS 22.0.2 Command Reference proxy IP address (PIP) ........................................111 proxy IP address (PIP) configuration ....................430 ptcfg (TFTP save command) ...............................354 PVID (port VLAN ID)..................................54, 120 pwd ....................................................................50 round robin as used in gateway load balancing ................. 347 roundrobin SLB Real Server metric ....................... 367, 370 route cache configuration ..................................... 306 route statistics ................................................... 157 router hops ........................................................ 327 routing information protocol configuration .............................................. 313 Routing Information Protocol (RIP) ...................... 93 options ...................................................... 314 poisoned reverse ......................................... 314 split horizon ............................................... 314 version 1 parameters.................................... 313 rport SLB virtual server option ............................. 376 RTSP SLB statistics ........................................... 190 rx flow control .............................................. 32, 33 Rx/Tx statistics.................................................. 152
Q
quiet (screen display option) ..................................50
R
RADIUS server authentication ....................................368 read community string (SNMP option) .................245 real server statistics .....................................................179 real server global SLB statistics ...........................175 real server group options add ............................................................366 real server group SLB configuration.....................364 real server group statistics ...................................180 real server groups combining servers into .................................364 statistics .....................................................180 real server SLB configuration ..............................358 real servers backup .......................................................365 priority increment value (reals) for VRRP .......346 SLB state information ..................................110 reboot .......................................................449, 457 receive flow control 32, 33, 268, 271, 274, 276, 277 redir (SLB filtering option) .................................386 reference ports .....................................................79 referenced port .....................................................95 remote monitoring on the port (rmon) ..................435 remote site servers ..............................................361 removing optional software .................................442 reset key combination .........................................449 restarting switch setup ..........................................29 retries radius server ...............................................239 retry health checks for default gateway ..................302 rip IP route tag ...................................................93 RIP. See Routing Information Protocol. rmkey ...............................................................442
S
save (global command) ...................................... 229 noback option ............................................. 230 save command................................................... 447 script health checks .............................................. 423 scriptable health checks configuration ................. 423 secret radius server ............................................... 239 secsrv secondary radius server ................................ 239 Secure Shell ...................................................... 238 security VLANs...................................................... 297 segmentation. See IP subnets. segments. See IP subnets. serial cable .......................................................... 20 serial download ................................................. 475 Server Load Balancing IDS ........................................................... 363 operations-level options ............................... 436 real server weights ...................................... 359
488 Index
Alteon OS 22.0.2 Command Reference server load balancing client traffic processing................................ 399 health check ............................................... 367 health check types ....................................... 367 metrics ...................................................... 370 port options ................................................ 400 server traffic processing ............................... 399 server load balancing configuration options ......... 356 Server Load Balancing Maintenance Statistics Menu .. server port mapping ........................................... 111 server traffic processing ..................................... 399 Session Binding Table ....................................... 360 session identifier ............................................... 373 setup configuration .............................................. 353 setup command, configuration ............................ 353 setup facility ................................................. 25, 27 BOOTP ....................................................... 30 duplex mode ................................................ 32 IP configuration ............................................ 35 IP subnet mask ............................................. 35 port auto-negotiation mode ...................... 32, 33 port configuration ......................................... 31 port flow control ..................................... 32, 33 port speed .................................................... 32 restarting ..................................................... 29 Spanning-Tree Protocol ................................. 31 starting ........................................................ 28 stopping....................................................... 29 system date .................................................. 30 system time .................................................. 30 VLAN name ................................................ 34 VLAN port numbers ..................................... 34 VLAN tagging ............................................. 33 VLANs ....................................................... 34 SFD statistics mp specific ................................................ 209 SFP GBIC ports ................................................ 272 shortcuts (CLI) .................................................... 52 single-mode ports .............................................. 270 SIP (source IP address for filtering) ..................... 387 SLB filtering option action ........................................................ 386 SLB Information ............................................... 110 SLB layer7 statistics .......................................... 182 SLB real server group health checks arp............................................................. 367 dns ............................................................ 367 ftp ............................................................. 368 http............................................................ 367 icmp .......................................................... 367 imap .......................................................... 368 ldap ........................................................... 369 radius ........................................................ 368 script ......................................................... 368 smtp .......................................................... 367 SNMP ....................................................... 369 sslh............................................................ 368 tcp ............................................................. 367 udpdns ....................................................... 368 wsp ........................................................... 368 wtls ........................................................... 369 SLB real server group option application health checking .......................... 365 health checking ........................................... 365 metric ........................................................ 364 SLB real server option backup ....................................................... 360 intr (interval) .............................................. 360 maxcon (maximum connections) ................... 359 name, alias for each real server ..................... 359 restr (restore) SLB real server UDP option ..... 360 retry .......................................................... 360 RIP, real server IP address ............................ 359 submac ...................................................... 361 tmout (time out) .......................................... 360 weights ...................................................... 359 slowage ............................................................ 417 smask source mask for filtering .............................. 387 smtp ................................................................. 232 SMTP server health checks ................................. 368 snap traces buffer ........................................................ 455 SNMP ........................................................ 19, 130 health checks .............................................. 425 HP-OpenView .............................................. 19 menu options .............................................. 245 set and get access ........................................ 245 SNMP Agent ..................................................... 471 SNMP health check configuration ....................... 425 SNMP health checks .......................................... 369 SNMP statistics ................................................. 218
Index 489
Alteon OS 22.0.2 Command Reference SNMP Support optional setup for SNMP support .....................39 software image file and version ....................................55 license ........................................................441 software image ...................................................444 SP specific statistics ...........................................210 spanning tree configuration...............................................288 Spanning-Tree Protocol ................................87, 229 bridge aging option ......................................291 bridge parameters ........................................290 bridge priority ...............................................86 port cost option ...........................................292 port priority option.......................................292 root bridge ............................................86, 290 setup (on/off) ................................................31 switch reset effect ........................................448 split horizon.......................................................314 SSL ..................................................................377 secure socket layer statistics ..........................186 stacking commands (CLI) .....................................52 starting switch setup .............................................28 state (STP information) .........................................86 state information, client system............................377 static IP route tag ...................................................93 static route rem ............................................................304 static routes Routing Information Protocol (RIP) ...............314 statis route add ............................................................304 statistics group .........................................................180 management processor .................................205 Statistics Menu ..................................................129 stopping switch setup............................................29 subnet address maskconfiguration IP subnet address .........................................301 subnet mask .........................................................35 subnets ................................................................35 IP interface .................................................301 switch resetting .....................................................448 Switch Processor (SP).........................................455 display trace buffer ......................................455 swkey ...............................................................441 SYN attack detection configuration ......................418 490 Index sync ................................................................. 436 synchronization VRRP switch...................................... 413, 436 syslog system host log configuration ....................... 233 system contact (SNMP option) ................................ 245 date and time .......................................... 53, 55 location (SNMP option) ............................... 245 system access control configuration..................... 259 System Maintenance Menu ................................. 451 system options admpw (administrator password) .................. 262 BOOTP ..................................................... 232 cur (current system parameters) ............ 240, 243 date ........................................................... 232 hprompt ..................................................... 232 HTTP access .............................................. 259 l4apw (Layer 4 administrator password) ........ 262 login banner ............................................... 232 time........................................................... 232 tnet............................................................ 259 tnport ........................................................ 259 usrpw (user password) ................................. 261 system parameters, current ......................... 240, 243
T
tab completion (CLI) ........................................... 52 tacacs ............................................................... 240 TACACS+ ........................................................ 240 TCP fragments ................................................... 373 health checking using .................................. 360 health checks .............................................. 368 source and destination ports.......................... 385 TCP statistics ............................................ 165, 208 Telnet ................................................................. 21 BOOTP ....................................................... 21 configuring switches using ........................... 353 telnet radius server ............................................... 240 Telnet support optional setup for Telnet support ..................... 39 terminal emulation ............................................... 20 text conventions .................................................. 17 TFTP ................................................................ 445 PUT and GET commands ............................ 354 TFTP server ...................................................... 354
Alteon OS 22.0.2 Command Reference time setup ........................................................... 30 system option ............................................. 232 timeout radius server ............................................... 239 timeouts idle connection ............................................. 25 timers kickoff.................................................... 154 time-to-live, DNS response (global SLB menu option)
V
verbose ............................................................... 50 vip advertisement of virtual IP addresses as Host Routes ................................................ 314 IP route tag ................................................... 93 virtual IP address (VIP) ...................................... 111 virtual port state, SLB information about ............. 111 virtual router description ................................................. 334 master mode ............................................... 344 priority....................................................... 342 tracking criteria ........................................... 337 virtual router group VRRP priority tracking ................................ 342 virtual router group configuration ........................ 341 virtual router group priority tracking .................... 343 Virtual Router Redundancy Protocol (VRRP) authentication parameters for IP interfaces ..... 345 group options (prio) ..................................... 342 operations-level options ............................... 439 password, authentication .............................. 345 priority election for the virtual router ............. 335 priority tracking options ....................... 326, 337 Virtual Router Redundancy Protocol configuration333 virtual router sharing .......................................... 342 virtual routers HSRP failover .................................... 338, 344 HSRP priority increment value ..................... 346 HSRV........................................................ 344 HSRV priority increment value ..................... 347 increasing priority level of .................... 336, 340 incrementing VRRP instance ........................ 338 master preemption (preem) ........................... 342 master preemption (prio) .............................. 336 priority increment values (vrs) for VRRP ....... 346 virtual server global SLB statistics ...................... 175 virtual server SLB statistics ................................ 181 virtual servers .................................................... 367 SLB state information .................................. 111 statistics ..................................................... 181 VLAN active port .................................................. 344 configuration .............................................. 297 VLAN tagging port configuration................ 267, 270, 273, 275 port restrictions ........................................... 298 setup............................................................ 33
407
tnet system option ............................................. 259 tnport system option ............................................. 259 TPCP (Transparent Proxy Cache Protocol) .......... 417 trace buffer ....................................................... 455 Switch Processor ........................................ 455 traceroute............................................................ 50 Tracking VRRP ............................................... 335, 339 transmit flow control32, 33, 268, 271, 274, 276, 277 transparent proxies, when used for NAT .............. 386 Trunk Group Information ..................................... 87 ttl (time to live, global SLB menu option) ............ 401 tx flow control............................................... 32, 33 type of area ospf........................................................... 317 type parameters ................................................... 92 typographic conventions, manual .......................... 17 tzone ................................................................ 242
U
UCB statistics ................................................... 208 UDP datagrams .......................................... 172, 194 server status using ....................................... 360 source and destination ports ......................... 385 UDP statistics ................................................... 167 unknown (UNK) port state ................................... 79 Unscheduled System Dump ................................ 458 upgrade, switch software .................................... 444 URL for health checks ....................................... 111 user account ........................................................ 24 usrpw (system option) ........................................ 261 Uuencode Flash Dump ....................................... 456
Index 491
Alteon OS 22.0.2 Command Reference VLANs ...............................................................35 ARP entry information ...................................94 broadcast domains .......................................297 information ...................................................88 interface .......................................................36 multiple spanning trees .................................288 name ......................................................78, 88 name setup....................................................34 port membership......................................78, 88 port numbers .................................................34 security ......................................................297 setting default number (PVID) .....266, 270, 272, setup ............................................................34 Spanning-Tree Protocol ................................288 tagging ...................................33, 54, 120, 298 VLAN Number .............................................88 VRID (virtual router ID) .............................335, 342 VRRP interface configuration .................................345 master advertisements ..................................335 tracking ..............................................335, 339 tracking configuration ..................................346 virtual router sharing ....................................336 VRRP Information .............................................105 VRRP master advertisements time interval ................................................342 VRRP statistics ..................................................159
X
XModem .......................................................... 475
275
W
WAP health checks ..............................................426 WAP health check wspport ..............................................425, 426 wtlsprt ................................................425, 427 WAP health check configuration .........................426 WAP SLB statistics ............................................192 watchdog timer ..................................................450 web-based management interface...........................19 weights for SLB real servers .....................................371 setting virtual router priority values ................346 write community string (SNMP option) ................245 wspport WAP health check ...............................425, 426 wtlsprt WAP health check ...............................425, 427
492 Index