Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
NN46212-503
.
Document status: Standard
Document version: 01.00
Document date: 27 March 2008
LEGAL NOTICE
While the information in this document is believed to be accurate and reliable, except as otherwise expressly agreed
to in writing NORTEL PROVIDES THIS DOCUMENT "AS IS" WITHOUT WARRANTY OR CONDITION OF ANY
KIND, EITHER EXPRESS OR IMPLIED. The information and/or products described in this document are subject
to change without notice.
* Nortel, the Nortel logo and the Globemark are trademarks of Nortel Networks.
Notwithstanding any other license agreement that may pertain to, or accompany the delivery of, this computer
software, the rights of the United States Government regarding its use, reproduction, and disclosure are as set forth
in the Commercial Computer Software-Restricted Rights clause at FAR 52.227-19.
The information in this document is subject to change without notice. The statements, configurations, technical
data, and recommendations in this document are believed to be accurate and reliable, but are presented without
express or implied warranty. Users must take full responsibility for their applications of any products specified in this
document. The information in this document is proprietary to Nortel Networks.
Nortel, the Nortel logo and the Globemark are trademarks of Nortel Networks.
Sourced in Canada
Statement of conditions
In the interest of improving internal design, operational function, and/or reliability, Nortel Networks Inc. reserves the
right to make changes to the products described in this document without notice.
Nortel Networks Inc. does not assume any liability that may occur due to the use or application of the product(s) or
circuit layout(s) described herein.
Portions of the code in this software product may be Copyright © 1988, Regents of the University of California. All
rights reserved. Redistribution and use in source and binary forms of such portions are permitted, provided that the
above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising
materials, and other materials related to such distribution and use acknowledge that such portions of the software
were developed by the University of California, Berkeley. The name of the University may not be used to endorse or
promote products derived from such portions of the software without specific prior written permission.
SUCH PORTIONS OF THE SOFTWARE ARE PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE.
In addition, the program and information contained herein are licensed only pursuant to a license agreement that
contains restrictions on use and disclosure (that may incorporate by reference certain limitations and notices
imposed by third parties).
Contents
New in this release 11
Features 11
Enhanced Dual Home Ring ESU 11
IGMP Snooping on EVPN Endpoints 11
Security Enhancements 12
MLT UNI on the ESU1850 in QiQ mode 12
Automatic port shutdown 12
Change the Management of Daylight Saving Time 12
Other changes 12
Introduction 15
Before you begin 16
Setting up and managing the ESU 17
ESU menu 17
Port configuration 18
Editing ports 18
Setting a basic port configuration 18
Viewing DDI SFP types 21
Viewing FFP information 23
Configuring the serial port 24
Configuring the chassis 25
Editing the chassis 25
Editing system information 26
Editing chassis information 31
Editing topology alarms 33
Viewing interface statistics 34
Viewing port utilization statistics 36
Editing trap receivers 37
Editing RRP Hello settings in VPN and IPVLAN mode 38
Resetting the date and time of the chassis 40
Configuring IP management 44
Setting up the routing table 44
Enabling IP forwarding globally 44
Creating default IP routes 46
Features
See the following sections for information about feature changes:
• "Enhanced Dual Home Ring ESU" (page 11)
• "IGMP Snooping on EVPN Endpoints" (page 11)
• "Security Enhancements" (page 12)
• "MLT UNI on the ESU1850 in QiQ mode " (page 12)
• "Automatic port shutdown " (page 12)
• "Change the Management of Daylight Saving Time " (page 12)
Each Metro ESU on a DH ring has its designated Home MERS and Backup
MERS. The Metro ESU receives all egress EVPN traffic from its Home
MERS and sends all ingress EVPN traffic to its Home MERS instead of
sending all ingress traffic to the secondary MERS and receiving egress
traffic from the primary MERS.
on per end-point basis. The PFM bit in the stack tag is used by MERS
to instruct Metro ESU whether or not to forward based on the local
configuration of the IGMP snooping.
Security Enhancements
Release 3.5 introduces new Security Enhancements for Layer 2 and
QinQ modes. The IEEE802.1x standard is implemented to validate the
authorization of products connecting to the access ports of the Metro ESU,
and to pass required information to the MERS8600 to allow end products
connecting to the Metro ESU access into the network.
To support the 802.1x Supplicant for L2 and QinQ modes, new JDM menus
are implemented to control the 802.1x Supplicant setting.
Other changes
See the following list for non-feature changes in this release.
• The previous Nortel Metro Ethernet Services Unit 1800 and 1850 Device
Manager configuration documents have been consolidated into this
single document:
Release 3.4 technical document number and Release 3.5 technical document number and
title title
Nortel Metro Ethernet Services Unit 1800 Nortel Metro Ethernet Services Unit 1800 and
Configuration -- VPN & IP VLAN Services Using 1850 Configuration — Using Device Manager for
Device Manager (NN46210-500) all Modes (NN46212-503)
Nortel Metro Ethernet Services Unit 1800
Configuration -- Layer 2 Switch Mode Using
Device Manager (NN46210-503)
Nortel Metro Ethernet Services Unit 1850
Configuration -- VPN & IP VLAN Services Using
Device Manager (NN46211-502)
Nortel Metro Ethernet Services Unit 1850
Configuration -- Layer 2 Switch Mode Using
Device Manager (NN46211-503)
Nortel Metro Ethernet Services Unit 1850
Configuration -- QiQ Mode Using Device
Manager (NN46211-505)
• The HomeDirectionId field was added to the Procedure job aid: ESU
1850 and the Procedure job aid: ESU 1800 tables, in "Chassis dialog
box, System tab fields" (page 26).
• Added the following fields to "Chassis dialog box, Daylight Saving Time
tab fields" (page 43): Format, StartMinutes, StartNth, StartWeekday,
EndMinutes, EndNth, and EndWeekday.
• In the "Port dialog box, Interface tab fields" (page 144) table, in the
Designating a port as access or uplink section, updated the UplinkMode
field description, added the Pass-thru field, and added the Port Mode
field.
• The Attention box in "Viewing port utilization statistics" (page 36) was
updated with additional information.
• The following variables were added to "Port dialog box, EAPOL tab
fields" (page 177): SuppPaeState, SuppHeldPeriod, SuppAuthPeriod,
SuppStartPeriod, SuppMaxStart, SuppControlledPortStatus,
SuppAccessCtrlWithAuth, and SuppBackendState.
Introduction
This document contains procedural information to help you complete the
task of configuring the Nortel Metro Ethernet Services Unit 1800 and 1850
for the following modes:
• Layer 2 mode
• VPN and IPVLAN mode
• Q-in-Q mode
For conceptual information regarding features in this book, see Nortel Metro
Ethernet Services Unit 1800 and 1850 Fundamentals (NN46212-100).
For definitions of terms and acronyms used in this document, see Nortel
Metro Ethernet Services Unit 1800 and 1850 Documentation Roadmap
(NN46212-101).
Navigation
• "Setting up and managing the ESU" (page 17)
• "Configuring security features" (page 67)
• "Managing firmware configuration files" (page 101)
• "Configuring VLANs in Ring, Standalone, Layer 2, and Q-in-Q mode"
(page 111)
• "Configuring Q-in-Q mode" (page 143)
• "Configuring filters and access control lists" (page 151)
• "Configuring packet policing and policies" (page 159)
• "Configuring EAPoL on Ethernet ports in Layer 2 Switch mode" (page
173)
• "Configuring QoS" (page 181)
• "Configuring RMON" (page 189)
• "Displaying network statistics " (page 215)
Before using this guide, you must complete the following procedures for a
new switch:
• install the switch. See the installation guide that came with your switch)
• connect the switch to the network. See Nortel Metro Ethernet Services
Unit 1800 and 1850 Commissioning (NN46212-303) for instructions.
Enure that you have installed the latest version of Nortel Ethernet Services
Unit software and Device Manager software.
For information about upgrading the Metro ESU and Device Manager
software, see the release notes for your version of the Metro ESU.
ATTENTION
Layer 2 features are available only in Layer 2 mode. All Layer 2 options are
blocked in Ring or stand-alone mode. For Metro ESU 1850 only, most Layer
2 options are blocked in Q-in-Q mode. See Nortel Metro Ethernet Routing
Switch 8600 Fundamentals — Using Device Manager (NN46225-300) for basic
information on using Device Manager.
ATTENTION
IP VLAN applies only in Ring and stand-alone modes.
Navigation
• "ESU menu" (page 17)
• "Port configuration" (page 18)
• "Configuring the chassis" (page 25)
• "Configuring Diagnostic Services" (page 50)
• "Configuring IP management" (page 44)
• "Configuring network time protocol" (page 56)
ESU menu
"ESU menu: ESU 1850" (page 18) shows the Metro ESU Menu that is
common for Ring, stand-alone, Q-in-Q, and Layer 2 modes.
"ESU menu: ESU 1800" (page 18) shows the Metro ESU Menu that is
common for Ring, stand-alone, and Layer 2 modes.
Port configuration
This topic describes how to set the switch ports to operate in a basic
Ethernet environment.
Navigation
• "Editing ports" (page 18)
• "Setting a basic port configuration" (page 18)
• "Viewing DDI SFP types" (page 21)
• "Configuring the serial port" (page 24)
Editing ports
Edit ports to modify current ports settings. To edit a single port or multiple
ports, select the port or ports you want to edit.
• Double-click a port.
• Right-click a port. On the shortcut menu, choose Edit.
• From the Device Manager menu bar, choose Edit > Port.
• On the Device Manager toolbar, click Edit Selected.
Procedure steps
Step Action
—End—
Field Description
OperStatus The current operational state of the interface.
Possible state values are:
• up
• down
Field Description
UplinkMode If a port is an access port or an uplink port. The default is disabled
or access port.
This parameter is only configurable in Q-in-Q mode.
TDPMode Enables or disables TDP/SONMP protocol on a port. If set to bypass,
the TDP/SONMP packet is forwarded as customer traffic. If active,
the TDP/SONMP packet is forwarded and the TDP table is updated.
When active, the TDP/SONMP packet is also forwarded to the
neighboring device.
Procedure steps
Step Action
1 From the Device Manager menu bar, select Edit > Port.
The Interface tab appears.
2 Select DDI/SFP.
The DDI/SFP tab appears.
See the following procedure job aid.
—End—
Procedure steps
Step Action
—End—
Procedure steps
Step Action
1 On the device view (with the whole Metro ESU selected), select
the serial port or console.
2 From the Device Manager menu bar, choose Edit > Console.
The Serial Port dialog box appears with the Serial Port tab
displayed. See "Figure" (page 24).
4 Click Apply.
—End—
Field Description
SerialPortStopBits Read-only field—displays the number of bits used to indicate that a
word has been completely transmitted. The console interface uses
1 stop bit.
Rs232PortConfig Sets the Rs232C mode the console uses at restart. The default value
is console mode.
StatusConsoleInUse Read-only field—indicates whether the console is in use or not in use.
AutoLogoutConfig Sets the time (in minutes) the interface can be idle before the
Metro ESU automatically logs out. The options are never,
autoLogout-2mins, autoLogout-5mins, autoLogout-10mins, and
autoLogout-15mins.
This section describes how to edit the chassis using the Chassis dialog box.
Navigation
• "Editing the chassis" (page 25)
• "Editing system information" (page 26)
• "Editing chassis information" (page 31)
• "Editing topology alarms" (page 33)
• "Viewing interface statistics" (page 34)
• "Viewing port utilization statistics" (page 36)
• "Editing trap receivers" (page 37)
• "Editing RRP Hello settings in VPN and IPVLAN mode" (page 38)
• "Resetting the date and time of the chassis" (page 40)
• "Editing daylight saving time settings" (page 41)
ATTENTION
Nortel recommends that all system IP management changes occur using the
command line interface (CLI). System changes require a resetting of the device,
resulting in the loss of Device Manager service.
Procedure steps
Step Action
2 Enter the information in the fields. For Q-in-Q mode, in the QinqTpid
field, enter the TPID number.
ATTENTION
When rebooting the Metro ESU, Nortel recommends selecting only one
option at a time on this tab. Selecting SystemRestart and SaveCfg resets
the switch to the factory default settings.
—End—
CAUTION
Metro ESU Mod-ID is set to 0. After reset
is applied, access to Metro ESU is lost. To
recover, the Metro ESU Mod-ID must be
reset using the console port.
CAUTION
Metro ESU Mod-ID is set to 0. After reset
is applied, access to Metro ESU is lost. To
recover, the Metro ESU Mod-ID and Metro
ESU IP address must be reset using the
console port.
CAUTION
Metro ESU Mod-ID is set to 0. After reset
is applied, access to Metro ESU is lost. To
recover, the Metro ESU Mod-ID and Metro
ESU IP address must be reset using the
console port
SaveCfg When set to save, the current device configuration is saved into
NV-RAM.
InfoSaveCfg The status of the device configuration. This is a read-only field.
QinqTpid The Q-in-Q TPID. This parameter is only configurable in Q-in-Q
mode.
CPUUtilization The percent of CPU utilized.
CAUTION
Metro ESU Mod-ID is set to 0. After reset
is applied, access to Metro ESU is lost. To
recover, the Metro ESU Mod-ID must be
reset using the console port.
CAUTION
Metro ESU Mod-ID is set to 0. After reset
is applied, access to Metro ESU is lost. To
recover, the Metro ESU Mod-ID and Metro
ESU IP address must be reset using the
console port.
CAUTION
Metro ESU Mod-ID is set to 0. After reset
is applied, access to Metro ESU is lost. To
recover, the Metro ESU Mod-ID and Metro
ESU IP address must be reset using the
console port
SaveCfg When set to save, the current device configuration is saved into
NV-RAM.
InfoSaveCfg The status of the device configuration. This is a read-only field.
QinqTpid The Q-in-Q TPID. This parameter is only configurable in Q-in-Q
mode.
CPUUtilization The percent of CPU utilized.
HomeDirectionId The RDP Home Direction Assignment message is sent from the
MERS 8600, or set by the super user. This field configures and
shows the Metro ESU Home ID.
• 0—no Home
• 1—homed on primary
• 2—homed on secondary
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Chassis.
The Chassis dialog box appears with the System tab displayed.
—End—
Field Description
DeviceSerialNumber Read-only field; the device serial number.
TelnetState Sets the TELNET state to enabled or disabled;
enabled by default.
BootServerAddr Read-only field; the IP Address of Boot Server.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Chassis.
The Chassis dialog box appears with the System tab displayed.
2 Click on the Topology Alarm Control tab. The Topology Alarm
Control tab appears. See the following figures.
Topology Alarm Control tab: Layer 2 and VPN, and IPVLAN mode
ATTENTION
In stand-alone or Ring mode, only one alarm is displayed.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Chassis.
The Chassis dialog box appears with the System tab displayed.
—End—
Field Description
LastChange The value of sysUpTime at the time the interface entered its current operational
state. If the current state was entered prior to the last reinitialization of the local
network management subsystem, then this object is 0. This is a read-only field.
LinkTrap Link up or link down traps are generated on this interface. By default, the
value is enabled.
ATTENTION
Port utilization statistics are view-only.
Utilization is based on bidirectional traffic; it is for transmitting and receiving.
Utilization is not a separate statistic.
Example:
tx 100% & rx 0% => 50 % of line utilization
tx =0 % & rx = 100% => 50 % of line utilization
tx =100% & rx=100% => 100% of line utilization
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Chassis.
The Chassis dialog box appears with the System tab displayed.
—End—
Field Description
TxSec How many transmit packets were transmitted by this port in
one second.
RxSec The number of receive packets received by this port in one
second.
Utilization The port utilization as percentage of bidirectional link
capacity. Transmit at line rate only will show as 50%
utilization, whereas transmit and receive at line rate will show
as 100% utilization.
ATTENTION
If the Trap Receivers tab takes a long time to open, it can be that the IP address
of a trap receiver cannot be resolved to a DNS name. By default, Device Manager
attempts to resolve IP addresses to DNS names. If there is no resolution, it stops
trying to resolve the IP address.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Chassis.
The Chassis dialog box appears with the System tab displayed.
3 Click Insert
The Chassis, Insert Trap Receivers dialog box appears.
5 Click Insert.
The new information is displayed in the Chassis dialog box, Trap
Receivers tab. See "Procedure job aid" (page 38).
—End—
ATTENTION
The enhanced single-homed Metro ESU ring protection is a soft-fault
protocol-based mechanism. The minimum Hello interval is one second. In the
event of a soft-fault detection, the minimum failover time is three to four seconds.
The 50 ms failover recovery period is not supported due to the soft-fault failure
detection.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Chassis.
The Chassis dialog box appears with the System tab displayed.
—End—
Field Description
InfoRespCnt The number of RRP Hellos received. This is a read-only
field.
InfoMissingCnt The number of RRP Hellos missing. This is a read-only
field.
InfoPartnerModid The partner Metro ESU Module ID connected to this
port. This is a read-only field.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Chassis.
The Chassis dialog box appears with the System tab displayed.
3 In the User Set Time tab, enter the appropriate information for your
configuration.
See the following procedure job aid.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Chassis.
The Chassis dialog box appears with the System tab displayed.
3 If necessary, change the value of the parameter. Click the text box
and enter an integer value from the range (shown).
4 Click Apply to save your changes.
—End—
Configuring IP management
This topic explains how to initially set up the routing table and default IP
address using Device Manager. By default, the Metro ESU is not configured
for IP VLAN management, but rather for management through a TDI using
untagged packets. Nortel recommends that in this and future releases, all
Metro ESU management be done using IP VLANs.
WARNING
Changing parameters using Device Manager could result in
the loss of connectivity. Use the console port when making IP
management configuration changes.
Navigation
• "Setting up the routing table" (page 44)
• "Enabling IP forwarding globally" (page 44)
• "Creating default IP routes" (page 46)
• "Deleting a default route" (page 48)
• "Viewing ARP translations in Layer 2 mode" (page 49)
You can enter one route that has different costs, and the lowest-cost route
that is reachable is used in the routing table. Note that if you enter multiple
next hops for the same route with the same cost, the software does not
replace the existing route. If you enter the same route with the same cost
and a different next hop, the first route is used. However, if that first route
becomes unreachable, the second route (with a different next hop) is
activated with no loss of connectivity.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose IP Routing > IP.
The IP dialog box appears with the Globals tab displayed. See the
following figures.
Globals tab: Layer 2 mode
3 Click Apply.
—End—
Field Description
DefaultTTL Sets the Default TTL value for a routed packet. The value is
the maximum number of hops before a frame is discarded.
Enter an integer between 1 and 255. The default value of
255 is inserted in the DefaultTTL field whenever a value is
not supplied in the datagram header.
ReasmTimeout The maximum number of seconds that received fragments
are held while they are waiting for reassembly at this entity.
The default value is 60 seconds. This is a read-only field.
ArpAgingTime Sets the (Address Routing Protocol (ARP) age-out time, in
the range of 0 to 65535 seconds. The default is 20.
This parameter is for Layer 2.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose IP Routing > IP.
The IP dialog box appears with the Globals tab displayed. See
"Globals tab: Layer 2 mode" (page 45).
2 Click the Routes tab.
The Routes tab appears. See the following figures.
Routes tab: Layer 2 mode
3 Click Insert.
The IP, Insert Routes dialog box appears.
4 In the Dest field, type the IP address (0.0.0.0 for the default).
5 In the Mask field, type the mask (0.0.0.0 for the default).
6 In the NextHop field, type the IP address of the router through which
the specified route is accessible.
7 In the HopOrMetric field, type the metric value.
8 Click Insert.
The route appears in the routing table.
—End—
Field Description
NextHop Shows the next hop IP address.
When creating a black hole static route, set this field to
255.255.255.255.
HopOrMetric Shows the primary routing metric for this route. The semantics
of this metric are determined by the routing protocol specified
in the route Proto field.
Interface Shows the ifIndex value, which identifies the local interface
through which the next hop of this route is reached. This is
a Read-only field.
Proto Shows the routing protocol through which this route was learned.
Inclusion of values for gateway routing protocols is not intended
to imply that hosts support those protocols. This is a Read-only
field. This protocol can be one of the following:
• local—a local interface.
• netmgmt—a static route.
Age Shows the number of seconds since this route was last updated
or determined to be correct. This is a Read-only field. This field
applies to Layer 2 mode only.
Type Shows the routing type. This is a Read-only field. This field
applies to Layer 2 mode only.
• reject—a route that discards traffic.
• local—a route created from a local interface.
• remote—a route created from a remote destination.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose IP Routing > IP.
The IP dialog box appears with the Globals tab displayed. See
"Globals tab: Layer 2 mode" (page 45).
2 Click the Routes tab.
The Routes tab appears. See "Routes tab: Layer 2 mode" (page 46).
4 Click Delete.
The route is removed from the Routes tab.
5 Click Close.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose IP Routing > IP.
The IP dialog box appears with the Globals tab displayed. See
"Globals tab: Layer 2 mode" (page 45).
—End—
This topic describes how to use the diagnostic tools provided by Device
Manager.
Navigation
• "Configuring the topology" (page 50)
• "Configuring and monitoring port mirroring in Layer 2 and Q-in-Q mode"
(page 52)
Configuring topology
Use the Topology tab to view Nortel Management MIB (NMM) status
information.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Diagnostics.
The Diagnostics dialog box appears with the Topology tab
displayed.
See the following procedure job aid.
—End—
ATTENTION
The fields in this table are read-only.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Diagnostics.
The Diagnostics dialog box appears with the Topology tab
displayed.
—End—
Navigation
• "Configuring port mirroring ports" (page 53)
• "Selecting ports for mirroring" (page 54)
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Layer 2 > Port Mirror.
The Port Mirror dialog box appears with the Port Mirror tab
displayed.
—End—
Field Description
SourceIngress Specify received traffic to be mirrored (source port). You can
select ports from your configuration by clicking the ellipsis
button (...) to the right of the field.
SourceEgress Specify transmitted traffic to be mirrored (source port). You
can select ports from your configuration by clicking the
ellipsis button (...) to the right of the field.
Procedure steps
Step Action
3 Click Ok.
The Port Mirror dialog box, Port Mirror tab displays the new entry in
the TargetPort field.
5 Select a Source Ingress port or, if you want all ports, select All.
6 Click Ok.
The Port Mirrors dialog box—Port Mirror tab displays the new entry
in the SourceIngress field.
7 Select a source egress port by clicking the ellipsis button (...) in
the SourceEgress field.
The esuSwL2MirrorPortSourceEgress dialog box appears. See
the following figures.
esuSwL2MirrorPortSourceEgress dialog box: ESU 1850
8 Select a Source Egress port or, if you want all ports, select All.
9 Click Ok.
The Port Mirror dialog box—Port Mirror tab displays the new entry
in the SourceEgress field.
—End—
Navigation
• "Configuration prerequisites" (page 56)
• "Setting NTP globals attributes" (page 56)
• "Setting NTP server attributes" (page 58)
• "Setting NTP key attributes" (page 59)
Configuration prerequisites
Before you can configure NTP, you must do the following:
• Configure an IP interface using CLI on the Metro ESU switch and ensure
that the NTP server is reachable through this interface. See Nortel Metro
Ethernet Services Unit 1800 and 1850 Commissioning (NN46212-303).
• Make sure that the Real Time Clock is present on the CPU board.
ATTENTION
NTP server MD5 authentication does not support passwords (keys) that start with
a special character or that contain a space between characters.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > NTP.
The NTP dialog box appears with the Globals tab displayed.
3 Click Enabled.
4 Click Apply to save your changes.
—End—
ATTENTION
If NTP is already enabled, this setting does not take
effect until you disable NTP and then reenable it.
Field Description
GMTHourOffset The number of hours’ difference between the local time
zone and GMT.
GMTMinOffset The number of minutes for local variation from the time
zone.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > NTP.
The NTP dialog box appears.
4 Click Insert to insert the server changes, or Close to exit the insert
function.
5 In the Server tab, click Apply to save changes.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > NTP.
The NTP dialog box appears.
• To add or change the Id, enter a value in the range from 1 to 255.
• If necessary, enter the Secret (private key information used to
generate the MD5 digest).
4 Click Insert to insert the server changes, or Close to exit the insert
function.
5 In the Server tab, click Apply to save changes.
—End—
Field Description
ATTENTION
You cannot specify the number sign (#) as a value in the Secret
field. The NTP server interprets the number sign (#) as the
beginning of a comment and truncates all text entered after the
number sign (#). This is a limitation of xntpd version 3 or lower.
Procedure steps
Step Action
1 From the Device Manager menu bar, select Rapid Ping > Ping.
The RapidPing dialog box appears.
—End—
Field Description
Mode The ESU mode: as round trip time (RTT) or throughput. RTT indicates that
only one IP rapid ping packet is sent, at a time, during the test session.
Throughput indicates IP rapid ping packets are being sent out in the specified
transmission interval during the test session. The only difference in test
results is that RTT information (minimum, maximum, and average) does not
display in Throughput mode. The default value is rtt.
Custvid The customer’s VLAN identification information in the range of 1 to 4094 or
4096. In ring or stand-alone mode, Custvid = 4094 indicates an untagged
test packet. In Layer 2 switch mode, Custvid = 4096 indicates an untagged
test packet.
Pbit The configured pbit value for the tagged test packet. This value applies to
management traffic. Tagged test packet values are 1 through 4094 in ring
and stand-alone mode. The pbit value range is zero through seven; the
default value is zero.
CustPort The ESU port connected to the customer router that forwards and receives
test packets.
PktSize The Ethernet test packet size on the ESU. The range is 64 to 1522 for tagged
packets and 64 to 1518 for untagged packets. The default is 1522.
PktCnt The number of test packets to be sent. The range is 1 to 10 000. The default
is one.
PktInterval The time interval between test packets measured in milliseconds (ms). The
range is 10 to 1000 ms in 10 ms increments. The default is 1000 ms.
TimeoutInterval The maximum interval between transmission and reception of test frame.
After the expiration of this interval time, it is considered that the test packet is
considered to have failed. The range is 1 to 10 seconds (s) in one second
increments. The default is three seconds.
Action The action of the test. Options include:
• ready
• run—conducts the test
• delete—deletes the test
• stop—stops the test
Status The status of the test. Options include:
• running—the test is running
• finished—the test is complete
MinRTT The minimum Round Trip Time, in milliseconds, for the test packet.
MaxRTT The maximum Round Trip Time, in milliseconds, for the test packet.
AverageRTT The average Round Trip Time, in milliseconds, for the test packet.
LossPercent The packet loss percentage.
PktTx The number of test packets transmitted.
Field Description
PktRx The number of test packets received.
PercentComplete The percentage of complete packets received (Read only).
DefaultGatewayIpA The rapid ping session uses the DefaultGatewayIPAddr as the destination
ddr IP or dest-ip-addr. This is the IP address of the customer device within the
subnet.
DefaultGatewayIpN The destination network mask for the rapid ping session.
etMask
DefaultGatewaySta Enables or disables the rapid ping gateway feature on this ESU device.
te
SrcIpAddr The configured source, or sending, IP address of the test.
DestIpAddr The IP address of the destination (receiving) customer router.
Mode The ESU mode: as round trip time RTT or throughput. RTT indicates that
only one IP rapid ping packet is sent, at a time, during the test session.
Throughput indicates IP rapid ping packets are being sent out in the specified
transmission interval during the test session. The only difference in test
results is that RTT information (minimum, maximum, and average) does not
display in Throughput mode. The default value is rtt.
Custvid The customer’s VLAN identification information in the range of 1 to 4094 or
4096. In ring or stand-alone mode, Custvid = 4094 indicates an untagged
test packet. In Layer 2 switch mode, Custvid = 4096 indicates an untagged
test packet.
Pbit The configured pbit value for the tagged test packet. This value applies to
management traffic. Tagged test packet values are 1 through 4094 in ring
and stand-alone mode. The pbit value range is zero through seven; the
default value is zero.
CustPort The ESU port connected to the customer router that forwards and receives
test packets.
PktSize The Ethernet test packet size on the ESU. The range is 64 to 1522 for tagged
packets and 64 to 1518 for untagged packets. The default is 1522.
PktCnt The number of test packets to be sent. The range is 1 to 10 000. The default
is one.
PktInterval The time interval between test packets measured in milliseconds (ms). The
range is 10 to 1000 ms in 10 ms increments. The default is 1000 ms.
TimeoutInterval The maximum interval between transmission and reception of test frame.
After the expiration of this interval time, it is considered that the test packet is
considered to have failed. The range is 1 to 10 seconds (s) in one second
increments. The default is three seconds.
Field Description
Action The action of the test. Options include:
• ready
• run—conducts the test
• delete—deletes the test
• stop—stops the test
Status The status of the test. Options include:
• running—the test is running
• finished—the test is complete
MinRTT The minimum Round Trip Time, in milliseconds, for the test packet.
MaxRTT The maximum Round Trip Time, in milliseconds, for the test packet.
AverageRTT The average Round Trip Time, in milliseconds, for the test packet.
LossPercent The packet loss percentage.
PktTx The number of test packets transmitted.
PktRx The number of test packets received.
PercentComplete The percentage of complete packets received (Read only).
DefaultGatewayIpA The rapid ping session uses the DefaultGatewayIPAddr as the destination
ddr IP or dest-ip-addr. This is the IP address of the customer device within the
subnet.
DefaultGatewayIpN The destination network mask for the rapid ping session.
etMask
DefaultGatewaySta Enables or disables the rapid ping gateway feature on this ESU device.
te
Procedure steps
Step Action
1 From the Device Manager menu bar, select Rapid Ping > Response
to open the Rapid Ping Response dialog box.
2 Click the entry in the State column you want to modify to open the
list.
3 Select enabled.
4 Click Apply.
—End—
Navigation
• "Configuring management station IP addresses" (page 67)
• "Configuring RADIUS authentication and accounting" (page 80)
• "Configuring SNMP communities" (page 68)
• "Configuring SNMPv3" (page 69)
• "Configuring the Supplicant" (page 92)
• "Configuring SSH" (page 94)
• "Configuring EAPoL in Layer 2 mode" (page 98)
CAUTION
You will lose access privileges if the configurations do not include
your IP address.
You can restrict management access to the switch using Device Manager.
ATTENTION
Only administrator-level users can configure community strings. A maximum
of ten community strings is allowed.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Security.
The Security dialog box appears with the SNMP Community tab
displayed.
2 Click Insert
The Security, Insert SNMP Community dialog box appears.
5 Click Insert.
—End—
Configuring SNMPv3
This section describes how to use Device Manager to configure the
SNMPv3 options.
Navigation
• "Default login" (page 69)
• "Loading the encryption module" (page 70)
• "Creating a user security model" (page 71)
• "Creating membership for a group" (page 74)
• "Creating access for a group" (page 75)
• "Assigning MIB view access for an object" (page 77)
• "Creating a community" (page 79)
Default login
When using Device Manager, there are default parameters in effect that you
must use to initially log on when the SNMPv3 check box is enabled. These
default parameters are also listed in the USM table:
• V3 enable checkbox: selected
• Login name: initialmd5
• Authentication Protocol: MD5
• Authentication password: initial
• Privacy Protocol: None
• Privacy Password: None
ATTENTION
To log on using SNMPv3, you must configure SNMPv3. See "Creating a user
security model" (page 71).
Procedure steps
Step Action
ATTENTION
Note the location of this file. Load the file on the switch before you can
use the protocol.
—End—
ATTENTION
You must configure a valid SNMPv3 group and user through the CLI before you
can access the SNMPv3 USM table, VACM table, and Community table. Users
can only be created by cloning from existing users. Since the default user is initial,
you create noauth_nopriv users through the Device Manager. You can create
users with other privileges through the CLI. Additional users can be cloned from
Device Manager. See Nortel Metro Ethernet Services Unit 1850 Configuration
— Using CLI for all Modes (NN46212-501). To enable SNMPv3 before changing
any configurations on the ESU, you must check the SNMPv3 enabled box on the
Device > Open pathway. To gain full access the SNMPv3 configurations, you
must provide a valid username, authentication protocol, authentication password,
privacy protocol, and privacy password.
You can create a user security model (USM) using Device Manager.
Procedure steps
Step Action
1 From the Device Manager menu bar, click Edit > SnmpV3 > USM
Table.
The USM dialog box appears.
2 Click Insert.
The USM, Insert USM Table dialog box appears.
4 In the Clone From User field, select a security name from which the
new entry copies authentication data and private data.
5 In the Auth Protocol field, select an authentication protocol.
CAUTION
To ensure security, change the GroupAccess table default
views after you set up new users in the USM table. This
prevents unauthorized people from accessing the switch
using the default user login. Also, change the Community
table defaults, since the community name is used as a
community string in SNMPv1/v2 PDU.
—End—
Field Description
Priv Protocol Assigns a privacy protocol (or no privacy) from a pulldown
(Optional) menu. If you select this, you must enter and old PrivPass
and a new PrivPass.
Cloned User’s The current privacy password.
Priv Password
New User’s Priv The name of the new privacy password.
Password
Procedure steps
Step Action
1 From the Device Manager menu bar, click Edit > SnmpV3 > VACM
table.
The VACM dialog box appears with the Group Membership tab
options visible opens.
2 Click Insert.
The VACM, Insert Group Membership dialog box appears.
6 Click Insert.
The VACM dialog box appears. The new group membership is
shown in the list.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, click Edit > SnmpV3 > VACM
table.
The VACM dialog box displays.
3 Click Insert.
The VACM, Insert Group Access Right dialog box appears.
8 Click Insert to open the VACM dialog box. The new group access
appears in the list.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, click Edit > SnmpV3 > VACM
table.
The VACM dialog box appears.
2 Select the MIB View tab.
The MIB View tab opens.
3 Click Insert.
The VACM, Insert MIB View dialog box appears.
—End—
Creating a community
A Community table contains objects for mapping between community
strings and the security name created in VACM Group Membership. You
can create a community using Device Manager.
Procedure steps
Step Action
1 From the Device Manager menu bar, click Edit > SnmpV3 >
Community Table.
The Community Table dialog box appears.
2 Click Insert.
The Community Table, Insert Community Table dialog box appears.
6 Click Insert.
The Community Table dialog box appears. The new community
is shown in the list.
—End—
Navigation
• "Enabling authentication type" (page 81)
• "Configuring RADIUS" (page 82)
• "Adding a RADIUS server" (page 83)
• "Deleting a RADIUS configuration" (page 84)
• "Showing RADIUS authentication" (page 85)
• "Showing RADIUS accounting" (page 86)
• "Showing RADIUS server statistics in Layer 2 mode" (page 88)
• "Showing RADIUS statistics" (page 89)
• "Showing RADIUS session" (page 91)
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Security.
The Security dialog box appears with the SNMP Community tab
displayed.
—End—
Configuring RADIUS
You must configure RADIUS globally using Device Manager.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Security.
The Security dialog box appears with the SNMP Community tab
displayed.
—End—
Field Description
Timeout The timeout period that the ESU waits for a server to reply. The valid range
is from 1 to 65535 seconds. The default is 10.
Retransmit The number of retries that can occur if no server responds to a RADIUS
authentication request. The valid range is from 1 to 65536 retries. The
default is 2.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Security.
The Security dialog box appears with the SNMP Community tab
displayed.
3 Click Insert.
The Security, Insert RADIUS Server dialog box appears.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Security.
The Security dialog box appears with the SNMP Community tab
displayed.
4 Click Delete.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Security.
The Security dialog box appears with the SNMP Community tab
displayed.
—End—
Field Description
ServerIpAddress The IP address of the configured RADIUS server.
ServerPortNumber The UDP port the client is using to send requests to the server.
RoundTripTime A measure of the current delay on the network.
AccessAccepts The total number of access accept packets sent to this server. This
number does not include retransmissions.
AccessRejects The total number of access reject packets received from this server.
AccessChallenges The total number of access challenges received from this server.
MalformedAccessRespons The number of malformed response packets received from this
es server. Malformed packets include packets with an invalid length.
BadAuthenticators The total number of packets that contained invalid signature attributes.
PendingRequests Number of request packets destined for this server that have not yet
timed out or received a response.
Timeouts The number of timeouts to this server. After a time out, the system
can retry the same server, send to a different server, or give up.
Retrying the same server is counted as a retransmission as well as
a timeout. Sending to a different server is counted as a request as
well as a timeout.
UnknownTypes The number of packets received from this server that were of
unknown type.
PacketsDropped The number of incoming packets dropped for reasons other than
being malformed, bad authenticators, or unknown types.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Security.
The Security dialog box appears with the SNMP Community tab
displayed.
—End—
Field Description
UnknownTypes The number of packets received from this server that were of
unknown type.
PacketsDropped The number of incoming packets dropped for reasons other than
being malformed, bad authenticators, or unknown types.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Security.
The Security dialog box appears with the SNMP Community tab
displayed.
2 Click the RADIUS Server Statistics tab.
The RADIUS Server Statistics tab appears. See the following figures.
ATTENTION
These fields are read-only.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Security.
The Security dialog box appears with the SNMP Community tab
displayed.
2 Click the RADIUS Statistics tab.
The RADIUS Statistics tab appears. See the following figures.
ATTENTION
These fields are read-only.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Security.
The Security dialog box appears with the SNMP Community tab
displayed.
2 Click the RADIUS Session tab.
The RADIUS Session tab appears.
—End—
Field Description
Level The user level of the RADIUS session: User (3), Admin
(4).
Loginway The log on method for the session: RADIUS or Local.
Navigation
• "Enabling the Supplicant module" (page 92)
• "Modifying Supplicant user name and password" (page 93)
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Security.
The Security dialog box appears with the SNMP Community tab
displayed.
3 Click enabled.
4 Click Apply.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Security.
The Security dialog box appears with the SNMP Community tab
displayed.
—End—
Configuring SSH
You can configure Secure Shell (SSH), a client/server protocol, to specify
methods for secure communications over a network. For more information
on SSH in your network, see Nortel Metro Ethernet Services Unit 1800 and
1850 Fundamentals (NN46212-100).
Navigation
• "Enabling SSH authentication type" (page 94)
• "Setting the SSH algorithm" (page 95)
• "Configuring the existing SSH user information" (page 97)
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Security.
The Security dialog box appears with the SNMP Community tab
displayed.
2 Click the SSH tab.
The SSH tab appears.
4 Click Apply.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Security.
The Security dialog box appears with the SNMP Community tab
displayed.
4 Click Apply.
—End—
Each of the following tab fields sets the administrative state to either enabled
or disabled. The default for each is enabled.
Field Description
ArcfourAdmin Arcfour Algorithm
BlowfishAdmin Blowfish Algorithm
CAST128Admin CAST128 Algorithm
Twofish128Admin Twofish128 Algorithm
Twofish192Admin Twofish192 Algorithm
Twofish256Admin Twofish256 Algorithm
MD5Admin MD5 Algorithm
SHA1Admin SHA1 Algorithm
RSAAdmin RSA Algorithm
DSAAdmin DSA Algorithm
ATTENTION
To configure new SSH user, you must use the CLI. See Nortel Metro Ethernet
Services Unit 1850 Configuration — VPN and IP VLAN Services using the CLI
(NN46211-500).
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Security.
The Security dialog box appears with the SNMP Community tab
displayed.
4 Click Apply.
—End—
Navigation
• "Configuration prerequisites" (page 98)
• "Globally configuring EAPoL in Layer 2 mode" (page 99)
Configuration prerequisites
Use the following configuration rules when using EAPoL:
• Before configuring your switch, you must configure at least one EAPoL
RADIUS server and Shared Secret fields.
• You cannot configure EAPoL on ports that are currently configured for:
— Shared segments
— Multilink Trunking
— Port mirroring
• Change the status to auto for each port to be controlled. The auto
setting automatically authenticates the port according to the results of
the RADIUS server. The default authentication setting for each port is
force-authorized or preauthorized to use the service.
• You can connect only a single client on each port that is configured for
EAPoL. If you attempt to add additional clients on the EAPoL authorized
port, the port goes into force-unauthorized mode.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Security.
The Security dialog box appears with the SNMP Community tab
displayed.
3 Click enabled.
4 Click Apply.
—End—
You can use the Trivial File Transfer Protocol (TFTP) utility to upgrade
the switch firmware by transferring a new firmware image file from a
TFTP server to the switch. You can also use the TFTP server to load a
configuration file into the switch, save switch settings to the TFTP server,
and upload a history log from the switch to the TFTP server.
This section describes how to set up and edit your switch ports.
ATTENTION
Nortel recommends that you maintain no more than three stored images on the
ESU 1800/1850 firmware. If more than three images exist, you update one of the
three existing file numbers or delete one of the files before using firmware create.
Navigation
• "Downloading firmware from the server: ESU 1850" (page 101)
• "Creating firmware: ESU 1850" (page 103)
• "Booting firmware: ESU 1850" (page 104)
• "Uploading and downloading configuration settings to the server: ESU
1850" (page 105)
• "Saving a history log to the server: ESU 1850" (page 106)
• "Downloading firmware from the server: ESU 1800" (page 107)
• "Uploading and downloading configuration settings to the server: ESU
1800" (page 108)
• "Saving a history log to the server: ESU 1800" (page 109)
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > File System >
Firmware.
The Firmware dialog box appears with the Update tab displayed.
ATTENTION
The ESU 1850 automatically reboots after the firmware download
completes. Device Manager connectivity will be temporarily lost.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > File System >
Firmware.
The Firmware dialog box appears with the Update tab displayed.
—End—
Field Description
Addr The IP address where the new firmware file is located.
Ctrl The valid values are:
• none—The specified firmware file is not downloaded.
• download—Downloads the specified firmware file.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > File System >
Firmware.
The Firmware dialog box appears with the Update tab displayed.
—End—
Field Description
Dscr Describes the version of the software file.
Ctrl The valid values are:
• bootup—Identifies the default file to use for bootup.
• nonactive—This file is not used for bootup
• delete—Deletes the file.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > File System >
Configuration.
The Configuration tab opens.
4 Click Apply.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > File System
> HistoryLog.
The HistoryLog dialog box appears with the HistoryLog tab
displayed.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > File System.
The FileSystem dialog box appears with the Firmware Download
tab displayed.
ATTENTION
The ESU 1800 automatically reboots after the firmware download
completes. Device Manager connectivity is temporarily lost.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > File System.
The FileSystem dialog box appears with the Firmware Download
tab displayed.
2 Click the Configuration File tab.
The Configuration File tab appears.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > File System.
The FileSystem dialog box appears with the Firmware tab displayed.
—End—
Navigation
• "Configuring a default VLAN" (page 112)
• "Configuring IP VLANs in Ring and Standalone mode" (page 112)
• "Creating a port-based VLAN in Layer 2 and Q-in-Q mode" (page 114)
• "Viewing current VLANs in Layer 2 mode" (page 117)
• "Configuring FDB in Layer 2 mode" (page 118)
• "Configuring multicast FDB in Layer 2 mode" (page 121)
• "Configuring GVRP in Layer 2 mode" (page 123)
• "Configuring IGMP snooping globally in Layer 2 mode" (page 126)
• "Configuring IGMP snooping in Layer 2 mode" (page 126)
• "Configuring IP VLAN IGMP snooping in Ring and Standalone mode"
(page 128)
• "Configuring IGMP snooping group in Layer 2 mode" (page 131)
• "Configuring IP VLAN IGMP Snooping Group in Ring and Standalone
mode" (page 132)
• "Configuring MLTs in Layer 2 and Q-in-Q mode" (page 133)
• "Configuring STP in Layer 2 mode" (page 137)
Procedure steps
Step Action
1 From the Device Manager menu bar, select IP VLAN > VLANs >
Default VLAN
The Default VLAN dialog box appears.
—End—
Variable definitions
Variable Value
VlanID The ID of the VLAN.
PortList The customer access ports belonging to the
default VLAN. The port members are untagged
ports and cannot overlap.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose IP VLAN > VLAN.
The IPVLAN dialog box opens with the VLAN tab displayed.
2 Click Insert.
The IPVLAN, Insert VLAN dialog box opens.
The IPVLAN, Insert VLAN dialog box opens.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Layer 2 > VLAN >
Static.
The StaticVLAN dialog box opens with the Static VLAN tab
displayed. See the following figures.
StaticVLAN dialog box: Layer 2 mode
2 Click Insert.
The StaticVLAN, Insert Static VLAN dialog box opens. See the
following figures.
StaticVLAN, Insert Static VLAN dialog box: Layer 2 mode
6 Click Ok.
7 In Layer 2 mode, specify the forbidden ports by clicking the
ForbiddenEgressPorts ellipsis button.
The dot1qVlanForbiddenEgressPorts dialog box opens.
ATTENTION
If port 1 is a StaticUntaggedPort in another VLAN, remove it from
that VLAN.
—End—
Procedure steps
Step Action
1 On the Static VLAN tab, select the VLAN you want to advertise.
4 Click Apply.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Layer 2 > VLAN >
Current.
The CurrentVLAN dialog box opens with the Current VLAN tab
displayed.
—End—
Navigation
• "Setting the FDB aging timer in Layer 2 mode" (page 119)
• "Creating an FDB list in Layer 2 mode" (page 120)
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Layer 2 > FDB.
The FDB dialog box opens with the FDB tab displayed.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Layer 2 > FDB.
The FDB dialog box opens with the FDB tab displayed.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Layer 2 > Multicast
FDB.
The MulticastFDB dialog box opens with the Multicast FDB tab
displayed.
4 Select a VLAN.
5 Click OK to add the VLAN Index number.
8 Select a port by clicking on it, or click All for all the ports.
9 Click Ok.
The ports appear in the StaticEgressPorts field.
10 Click Insert.
—End—
ATTENTION
The MacAddress is the multicast MAC Address
starting with 01 in the first octet of the address.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Layer 2 > GVRP.
The GVRP dialog box opens with the GVRP tab displayed. See
the following figures.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Layer 2 > IGMP.
The GVRP dialog box opens with the IGMP Globals displayed.
2 Click enabled.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Layer 2 > IGMP.
The GVRP dialog box opens with the IGMP Globals displayed.
—End—
Field Description
LeaveTimer The frequency (in seconds) at which a querier sends
group-specific queries to group members when the
querier receives a leave group message. The range is
from 1 to 16711450 with a default value of 1.
MaxRespCode The maximum time allowed before sending a responding
report. The range is 1 to 255 seconds with a default
of 100.
CtrlState The current state of the IGMP (disabled or enabled) for
this entry. To enable or disable the current state, click
on the field and a selection box appears with the enable
and disable options.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose IP VLAN > IGMP
Snoop.
The GVRP dialog box opens with the IGMP Snoop tab displayed.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Layer 2 > IGMP.
The GVRP dialog box opens with the IGMP Globals tab displayed.
—End—
Field Description
Query Version The version of IGMP (1, 2 or 3) that you want to
configure on this interface. For IGMP to function
correctly, all routers on a LAN must use the same
version. The default is version 3.
Joint Aggregation The status (enabled or disabled) for Joint
Aggregation, which turns on or turns off the IGMP
proxy feature for the specified VLAN. The default
is disabled.
QueryState Identifies the IGMP query state as enabled or
disabled.
CurrentState Identifies the current IGMP query state as:
• other
• querier
• non-querier
CtrlState Identifies the status of this entry:
• disabled
• enabled
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Layer 2 > IGMP.
The GVRP dialog box opens with the IGMP Globals tab displayed.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose IP VLAN > IGMP
Snooping Group.
The GVRP dialog box opens with the IGMP Snooping Group tab
displayed. See "Figure" (page 132).
—End—
This topic discusses using Device Manager in the Metro ESU switch to
enable and insert an MLT and configure the trunk algorithm.
Navigation
• "Configuring the MLT trunk algorithm in Layer 2 and Q-in-Q mode"
(page 133)
• "Enabling and inserting an MLT in Layer 2 and Q-in-Q mode" (page 134)
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Layer 2 > MLT.
The MLT dialog box opens, with the Global tab displayed.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Layer 2 > MLT.
The MLT dialog box opens, with the Global tab displayed.
7 Click Ok.
8 Specify the member ports by clicking the Member ellipsis button.
The esuSwL2TrunkMember dialog box opens (see the following
figures).
esuSwL2TrunkMember: ESU 1850
10 Click Ok.
11 Set the state to Enabled.
—End—
Navigation
• "Enabling STP in Layer 2 mode" (page 137)
• "Displaying STP port data in Layer 2 mode" (page 140)
Enabling STP
You can enable STP globally using Device Manager.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Layer 2 > Spanning
Tree.
The STP dialog box opens, with the Globals tab displayed.
4 To enable the port status, select a port and choose Layer 2 >
Spanning Tree.
The STP dialog box opens with the Globals tab displayed.
5 Click the STP Ports tab.
The STP Ports tab appears. See the following figures.
6 Select a Port Status field and select Enable or Disable from the
drop-down menu and then click Apply. Note that the STP for each
port is automatically generated.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Layer 2 > STP.
The STP dialog box opens, with the Globals tab displayed.
3 Configure the STP status for each port by editing each field.
—End—
To configure Q-in-Q mode using the Command Line Interface, see Nortel
Metro Ethernet Services Unit 1850 Configuration — Q-in-Q Mode using the
CLI (NN46211-504).
Navigation
• "Designating a port as access or uplink" (page 143)
• "Configuring the SVLAN" (page 147)
• "Configuring automatic port shutdown " (page 148)
Procedure steps
Step Action
2 From the Device Manager menu bar, choose Edit > Port.
The Port dialog box opens with the Interface tab displayed. See
the following figure.
—End—
Field Description
Speed Read-only field; the port current speed (10 Mbit/s, 100 Mbit/s, 1
Gbit/s).
PhysAddress Read-only field; the MAC address assigned to this interface.
AdminStatus Sets the port administrative status value to either of the following
states:
• up
• down
Field Description
AdminSpeedDuplex Sets the port duplex value (half-duplex or full-duplex mode).
Possible duplex values are:
• auto—sets the port to Autonegotiation mode.
• 10Mbps-Half—sets the port to operate at 10 Mbit/s in
half-duplex mode.
• 10Mbps-Full—sets the port to operate at 10 Mbit/s in
full-duplex mode.
• 100Mbps-Half—sets the port to operate at 100 Mbit/s in
half-duplex mode.
• 100Mbps-Full—sets the port to operate at 100 Mbit/s in
full-duplex mode.
• 1Gigabps-Full—sets the port to operate at 1 Gbit/s in
full-duplex mode. Gigabit ports are statically set for 1000
Mbit/s and cannot be set to slower speeds.
OperSpeedDuplex Read-only field; the port current duplex value.
FlowCtrlState Enables or disables flow control on this port interface.
PortName The name of the Ethernet port.
PortMode Used to configure port mode.
Possible values are:
• access
• uplink
• pass-thru
Procedure steps
Step Action
1 From the Device Manager menu bar, choose QinQ > VLAN.
The QinqVlan dialog box opens with the VLAN tab displayed.
2 Click Insert.
The QinqVlan, Insert Vlan dialog box appears.
8 Click Insert.
—End—
ATTENTION
This feature is applicable to ESU 1850 only.
Procedure steps
Step Action
—End—
Procedure steps
Step Action
—End—
Navigation
• "Configuring MAC filters" (page 154)
• "Configuring packet filters" (page 151)
• "Configuring IGMP access lists in Layer 2, and VPN and IPVLAN
modes" (page 156)
• "Applying access control lists in Layer 2, and VPN and IPVLAN modes"
(page 157)
You can apply one of the following actions to the packets that match the
filter criteria:
• drop—the Metro ESU does not forward packets that match the filter
criteria
• forward—the Metro ESU forwards packets that match the filter criteria
• copy to CPU—copy to CPU performs the same function as drop
ATTENTION
If the filter has an implicit deny-all at the end of a filter list, then you must configure
a forward statement for the rest of the traffic otherwise the traffic is dropped.
You can assign one or more packet filters to a port; the priority of the filters is
based on the ID of the filter (the lowest ID number has the highest priority).
You can configure filters for the Metro ESU using Device Manager.
Procedure steps
Step Action
2 Click Insert.
The Filter, Insert Filter dialog box opens.
3 Enter the values you want for the metering rule and click Insert. The
newly created rule appears in the Filter tab.
—End—
Field Description
DataField The field on which filtering occurs. The valid options are:
• etype—if you select this value, you must specify other for the rule
and a value for Etype.
• ipaddr—if you select this value, you must specify a rule (except other)
and the associated value or values. For example, if you specify dest
for the rule, you must enter a value for IpAddrDest.
• ipprot—if you select this value, you must specify other for the rule and
a value for IpProt.
• tcpport—if you select this value, you must specify a rule (except other)
and the associated value or values. For example, if you specify dest
for the rule, you must enter a value for TcpPortDest.
• udpport—if you select this value, you must specify a rule (except other)
and the associated value or values. For example, if you specify dest
for the rule, you must enter a value for UdpPortDest.
Rule Filter packets on the destination address (dest), the source address (src),
the source or destination address (srcordest), the source and destination
address (srcanddest), or other (Ethernet type or IP protocol).
Etype The Ethernet type on which you want to filter packets. An Etype example
is 8046 for AT&T.
IpAddrSrc The source IP address on which you want to filter packets.
IpAddrDest The destination IP address on which you want to filter packets.
IpProt The next-level IP protocol (an 8-bit field) that you want to use to filter
packets. For example, 24 is for multicast route advertisement.
TcpPortSrc The source TCP port on which you want to filter packets.
TcpPortDest The destination TCP port on which you want to filter packets.
UdpPortSrc The source UDP port on which you want to filter packets.
UdpPortDest The destination UDP port on which you want to filter packets.
Procedure steps
Step Action
2 Click Insert.
The MacFilter, Insert MAC Filter dialog box opens.
—End—
Procedure steps
Step Action
2 Click Insert.
The IgmpAccessList, Insert Igmp Access List dialog box opens.
—End—
Procedure steps
Step Action
3 Select the port or ports to which you want to apply the access list,
filter or rule. Use the Shift or Ctrl key to select multiple ports.
4 Click Ok.
The PolicerPorts dialog box reappears. The port or ports that you
chose appear next to the selected access list.
5 Click Apply.
—End—
Navigation
• "Configuring a CoS profile" (page 159)
• "Configuring packet classification" (page 161)
• "Configuring packet policing" (page 164)
• "Applying policies to ports" (page 167)
• "Clearing the out-of-profile counter" (page 169)
• "Configuring EVPN broadcast optimization in VPN and IPVLAN mode"
(page 170)
Procedure steps
Step Action
2 Click Insert.
The CosProfile, Insert COS Profile dialog box opens.
3 Enter the values you want for the CoS profile and click Insert. The
newly created metering rule appears in the CoS Profile tab.
—End—
Procedure steps
Step Action
2 Click Insert.
The PacketClassification, Insert Packet Classification dialog
box opens.
3 Enter the values you want for the packet classification rule and click
Insert. The newly created rule appears in the Packet Classification
tab.
—End—
Field Description
Rule The rule that you want to use to classify packets. The valid options are:
• port—All traffic from a port is mapped to a configured priority value. If you
select this rule, you must also specify a value in the Priority field.
• pbits—Packets with a matching pbit value use the configured priority value.
If you select this rule, you must also specify the pbit field.
• macaddr—Packets with a matching source or destination MAC address use
the configured priority value. If you select this rule, you must also specify
values in the Priority and MacAddr fields.
• etype—Packets with a matching Ethertype use the configured priority value.
If you select this rule, you must also specify values in the Priority and
Etype fields.
• ipaddr—Packets with a matching source or destination IP address use
the configured priority value. If you select this rule, you must also specify
values in the Priority and IPAddr fields.
• ipprot—Packets with a matching IP protocol use the configured priority
value. If you select this rule, you must also specify values in the Priority
and IpProt fields.
• tcpport—Packets with a matching source or destination TCP port number
use the configured priority value. If you select this rule, you must also
specify values in the Priority and TcpPort fields.
• udpport—Packets with a matching source or destination UDP port number
use the configured priority value. If you select this rule, you must also
specify values in the Priority and UdpPort fields.
• dscp—Packets with a matching DiffServ code point (DSCP) use the
configured priority value. If you select this rule, you must also specify
values in the Priority and Dscp fields.
Pbits Enter a value between 0 and 7, inclusive.
MacAddr Enter a valid MAC address.
Etype Enter a value between 0 and 65535, inclusive. For example 8046 is for AT&T.
IpAddr Enter a valid IP address.
IpProt Enter a value between 0 and 255, inclusive.
TcpPort Enter a value between 0 and 65535, inclusive.
UdpPort Enter a value between 0 and 65535, inclusive.
Dscp Enter a value between 0 and 63, inclusive.
Priority The priority of a packet, with 0 representing the lowest priority and 7
representing the highest. Enter a value between 0 and 7, inclusive.
ATTENTION
The last entered policer ID, when a number of policers are entered, is the first to
affect the packet.
You can create a packet policing rule using Device Manager.
Procedure steps
Step Action
2 Click Insert.
The PacketPolicing, Insert Packet Police dialog box opens.
—End—
Field Description
Rule The rule that you want to use for packet policing. The valid options
are:
• none—Indicates that you do not want to use a rule for packet
policing to apply to any traffic. If you select none, you must
specify a value for remarking of the priority bits after the frame
has gone through the ESU.
• vid—Indicates that you do want the packet policing rule to apply
to traffic with the specified VLAN ID. If you select this rule, you
must specify values for VlanID and remarking of the priority bits
after the frame has gone through the ESU.
• vidpbit—Indicates that you want the packet policing rule to apply
to traffic with the specified VLAN ID priority bit value. If you
select this rule, you must specify values for VlanID, Pbit, and the
remarking of the priority bits after the frame has gone through
the ESU.
• dscp—Indicates that you want the packet policing rule to apply to
traffic with the specified DiffServ code point (DSCP). If you select
this rule, you must specify values for the DSCP and the remarking
of the priority bits after the frame has gone through the ESU.
• pbit—Indicates that you want the packet policing rule to apply to
traffic with the specified priority bit value. If you select this rule,
you must specify values for Pbit and remarking of the priority bits
after the frame has gone through the ESU.
• viddscp—Indicates that you want the packet policing rule to apply
to traffic with the specified VLAN ID and the DiffServ code point
(DSCP). If you select this rule, you must specify values for VlanID
and DSCP and the remarking of the priority bits after the frame
has gone through the ESU.
• vidpbitdscp—Indicates that you want the packet policing rule
to apply to traffic with the specified VLAN ID priority bit value
and the DiffServ code point (DSCP). If you select this rule, you
must specify values for the VlanID, Pbit, and the DSCP and the
remarking of the priority bits after the frame has gone through
the ESU.
• pbitdscp—Indicates that you want the packet policing rule to
apply to traffic with the specified priority bit value and DSCP. If
you select this rule, you must specify values for Pbit and DSCP
and remarking of the priority bits after the frame has gone through
the ESU.
• srcmac—Indicates that you want the packet policing rule to limit
received packets to packets originating from the MAC address
entered in the SAMMacAddr box.
Field Description
Procedure steps
Step Action
2 Find the filter, packet classification, or packet policing rule that you
want to apply to a port. Double-click the Port field next to that filter
or rule.
The Port dialog box opens. See the following figures.
Port dialog box: ESU 1850
3 Select the port or ports to which you want to apply the filter or rule.
Use the Shift or Ctrl key to select multiple ports.
4 Click Ok.
5 Click Apply.
—End—
Procedure steps
Step Action
—End—
Procedure steps
Step Action
2 Click Insert.
The Warning dialog box appears.
3 Click OK.
ATTENTION
The EVPN VLAN and the IP VLAN cannot share the same VLAN ID.
ATTENTION
Do not select the CPU port.
7 Click OK.
8 Click Insert.
—End—
EAPoL allows you to set up network access control on internal LANs and
to exchange authentication information between any end station or server
connected to the Metro ESU switch and an authentication server, such
as a RADIUS server. This security feature extends the benefits of remote
authentication to internal LAN clients. For example, if a new client PC fails
the authentication process, EAPoL prevents it from accessing the network.
Navigation
• "Configuration prerequisites" (page 173)
• "Changing a port authentication status in Layer 2 switch mode" (page
174)
Configuration prerequisites
Use the following configuration rules when using EAPoL:
• Before configuring your switch, you must configure at least one EAPoL
RADIUS server and Shared Secret fields.
• You cannot configure EAPoL on ports that are currently configured for:
— Shared segments
— MultiLink Trunking
— Port mirroring
— Tagged ports
• Change the status to auto for each port that you want to be controlled.
See "Changing a port authentication status in Layer 2 switch mode"
(page 174). The auto setting automatically authenticates the port
according to the results of the RADIUS server. The default authentication
setting for each port is force-authorized.
• You can connect only a single client on each port that is configured for
EAPoL. If you attempt to add additional clients on the EAPoL authorized
port, the port goes into force-unauthorized mode.
Procedure steps
Step Action
The Port dialog box for the selected port(s) opens with the Interface
tab displayed.
—End—
Field Description
SuppTimeout Sets the time (in seconds) to wait for a response from a Supplicant
for all EAP packets except EAP Request/Identity packets. The
allowed range is 1 to 65535, and the default is 30.
ServerTimeout Sets the time (in seconds) to wait for a response from the RADIUS
server. The allowed range is 1 to 65535, and the default is 30.
MaxReq Sets the maximum number of times to retry sending packets to the
Supplicant. The allowed range is 1 to 10, and the default is 2.
ReAuthPeriod Sets the time interval (in seconds) between successive
reauthentications. See ReAuthEnabled). The allowed range is 1 to
2147483647, and the default is 3600 (1 hour).
ReAuthEnabled When checked, re-authenticates an existing Supplicant at the time
interval specified in ReAuthPeriod.
SuppPaeState The current state of the Supplicant PAE state machine. The
following states are represented by an integer value:
• 1—disconnected
• 2—logoff
• 3—connecting
• 4—authenticating
• 5—authenticated
• 6—acquired
• 7—held
SuppHeldPeriod The value (in seconds) of the heldPeriod constant currently in use
by the Supplicant PAE state machine. The default is 60 seconds.
SuppAuthPeriod The value (in seconds) of the authPeriod constant currently in use
by the Supplicant PAE state machine. The default is 30 seconds.
SuppStartPeriod The value (in seconds) of the startPeriod constant currently in use
by the Supplicant PAE state machine. The default is 30 seconds.
SuppMaxStart The value of the maxStart constant currently in use by the
Supplicant PAE state machine. The default is 3.
SuppControlledPortStatus The current state of the Supplicant PAE state machine.
Field Description
SuppAccessCtrlWithAuth The setting for the application of the Supplicant authorization
state when the port is operating as both a Supplicant and an
Authenticator. The following states are represented by an integer
value:
• 1—inactive: indicates the port will not apply the Supplicant
authorization state, using only the Authenticator authorization
state to restrict access to the port.
• 2—active: indicates the port will apply the Supplicant
authorization state, as well as the Authenticator authorization
state.
SuppBackendState The current state of the Supplicant Backend state machine. The
following states are represented by an integer value:
• 1—initialize
• 2—idle
• 3—request
• 4—response
• 5—receive
• 6—fail
• 7—success
• 8—timeout
Configuring QoS
This section describes a range of features on the Metro ESU that enable
you to allocate network resources to mission-critical applications at the
expense of applications that are less sensitive to such factors as time
delays or network congestion. You can configure your network to prioritize
specific types of traffic, ensuring that they receive the appropriate Quality of
Service (QoS) level.
This section also describes how you can use Device Manager to configure
and manage the QoS feature on a Metro ESU device (Layer 2 mode only).
For more information about QoS management, see Metro Ethernet Services
Unit 1800 and 1850 Fundamentals (NN46212-100).
Navigation
• "Configuring QoS output scheduling" (page 181)
• "Viewing and configuring IEEE 802.1p default priority" (page 183)
• "Viewing and configuring IEEE 802.1p user priority" (page 185)
• "Configuring broadcast storm control in Standalone, Layer 2, and VPN
and IPVLAN modes" (page 186)
Procedure steps
Step Action
1 From the Device manager menu bar, choose QOS > QOS.
The QOS dialog box appears with the Output Scheduling tab
displayed by default. See the following figures.
"Output Scheduling tab: ESU 1850" (page 182) shows the default
configuration; a value of 0 for MaxPkts for any given queue indicates
strict priority queuing is being used.
See the following procedure job aid.
3 Click Apply.
—End—
ATTENTION
If you specify a value of 0 for MaxPkts and MaxLatency,
the queue uses strict priority.
MaxLatency
The maximum amount of time that the queue needs to wait for
its turn to transmit. You can specify a value between 0 and
255. The value is multiplied by 16 microseconds to arrive at
the maximum amount of time that the queue must wait.
ATTENTION
If you specify a value of 0 for MaxPkts and MaxLatency,
the queue uses strict priority.
ATTENTION
The factory default setting for the ESU 1850 only configures the first 4 queues.
You can view and configure default port priorities using Device Manager.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose QOS > QOS.
The QOS dialog box opens with the Output Scheduling tab
displayed. See "Output Scheduling tab: ESU 1850" (page 182).
—End—
ATTENTION
By factory default, only the first four queues (0 to 3)
are configured on the ESU 1850. Manually configure
queues 4 to 7.
ATTENTION
The factory default setting for the ESU 1850 only configures the first 4 queues.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose QOS > QOS.
The QOS dialog box opens with the Output Scheduling tab
displayed. See "Output Scheduling tab: ESU 1850" (page 182).
—End—
Procedure steps
Step Action
1 On the Device Manage menu bar, choose QOS > Traffic Control.
The Traffic Control dialog box appears with the Traffic Control tab
displayed.
—End—
Field Description
BMStormthreshold Decides how many thousand packets per
second of broadcast/multicast traffic will activate
storm control. It depends upon whether the
BcastStromCtrl,McastStromCtrl, or DlfStromCtrl objects
are enabled.
Whenever a port reaches its configured number of
packets in the one second interval, the device starts
dropping that type of packet, until the time interval
expires. Once the time interval expires, the device
starts forwarding that type of packet. The value range
is 0 to 255.
BcastStormCtrl If the broadcast storm control function is enabled or
disabled.
McastStormCtrl If the multicast storm control function is enabled or
disabled.
DlfStormCtrl If the destination lookup fail function is enabled or
disabled.
Configuring RMON
The Remote Network Monitoring (RMON) MIB is an interface between the
RMON agent on the Metro ESU and an RMON management application,
such as the Device Manager. RMON defines objects that are suitable for
the management of any type of network; some groups are targeted for
Ethernet networks in particular. Enabling RMON on the switch allows the
RMON agent to continuously collect statistics and proactively monitor switch
performance. This data can then be viewed using Device Manager.
ATTENTION
RMON is not supported for access port statistics relating to VPN, IP VLAN, or
Internet Protocol multicast (IPMC) services assigned to the access ports.
ATTENTION
Before using RMON functions, you must globally enable RMON. In addition,
specify certain options to control how RMON operates on the switch. See
"Configuring and enabling RMON options" (page 190).
Navigation
• "Configuring and enabling RMON options" (page 190)
• "Using Ethernet statistics" (page 196)
• "Configuring RMON history" (page 191)
• "Graphing RMON history" (page 202)
• "Configuring RMON alarms" (page 203)
Procedure steps
Step Action
1 From the Device Manager menu bar, choose RMON > Options.
The RMONOptions dialog box opens with the Probe Configuration
tab displayed.
ATTENTION
The Probe Configuration tab displays default values. See the following
figure.
If you want to use non-default RMON parameter values, set these before
enabling RMON or when you create the specific RMON function.
—End—
Both the time interval and the number of buckets is configurable. However,
when reaching the last bucket, bucket 1 is dumped and recycled to hold a
new bucket of statistics. Then bucket 2 is dumped, and so forth.
Navigation
• "Configuring RMON history parameters" (page 192)
• "Disabling RMON history" (page 195)
Procedure steps
Step Action
1 From the Device Manager menu bar, choose RMON > Control.
The RMONOptions dialog box opens with the History tab displayed.
2 Click Insert.
The RmonControl, Insert History dialog box opens. See
"RmonControl, Insert History dialog box: ESU 1850" (page 193) and
"RmonControl, Insert History dialog box: ESU 1800" (page 193).
3 In the Port field, select a port by clicking on the ellipsis button (...).
The historyControlDataSource dialog box opens. See
"RmonControl, Insert History dialog box: ESU 1850" (page 193) and
"RmonControl, Insert History dialog box: ESU 1800" (page 193).
4 Click the button for the desired port and click Ok.
—End—
Field Description
Buckets The number of discrete sampling intervals over which data is saved in the part
Granted of the media-specific table associated with this history control entry. When the
associated BucketsRequested object is created or modified, the probe sets this
object as closely to the requested value as possible for the particular probe
implementation and available resources. The probe must not lower this value
except as a result of a modification to the associated BucketsRequested object.
At times, the actual number of buckets associated with this entry is less than
the value of this object. In this case, at the end of each sampling interval,
a new bucket is added to the media-specific table. When the number of
buckets reaches the value of this object and a new bucket is to be added to the
media-specific table, the oldest bucket associated with this entry is deleted by
the agent so that the new bucket can be added. When the value of this object
changes to a value less than the current value, entries are deleted from the
media-specific table associated with this entry. Enough of the oldest of these
entries is deleted by the agent so that their number remains less than or equal
to the new value of this object. When the value of this object changes to a
value greater than the current value, the number of associated media-specific
entries are allowed to grow.
Interval The interval in seconds over which the data is sampled for each bucket in the
part of the media-specific table associated with this historyControl entry. This
interval can be set to any number of seconds between 1 and 3600 (1 hour).
Because the counters in a bucket can overflow at their maximum value with no
indication, a prudent manager will take into account the possibility of overflow in
any of the associated counters. It is important to consider the minimum time
in which any counter could overflow on a particular media type and set the
historyControlInterval object to a value less than this interval. This is typically
most important for the octets counter in any media-specific table. For example,
on an Ethernet network, the etherHistoryOctets counter could overflow in about
one hour at the Ethernet maximum utilization. This object cannot be modified if
the associated historyControlStatus object is equal to valid (1).
Owner The entity that configured this entry and is therefore using the resources
assigned to it.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose RMON > Control.
The RmonControl dialog box opens with the History tab displayed.
See "RmonControl, Insert History dialog box: ESU 1850" (page
193) and "RmonControl, Insert History dialog box: ESU 1800" (page
193).
2 Select the row that contains the port ID you want to delete.
3 Click Delete.
—End—
ATTENTION
This implementation of RMON requires a control row for Ethernet statistics; this
appears as port 0/1 when you choose RMON > Control > Ethernet Statistics. The
row ID is reserved for the control row. Automated tests, such as ANVL, can fail
when attempts are made to create a row 1.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose RMON > Control.
The RmonControl dialog box opens with the History tab displayed.
See "RmonControl, Insert History dialog box: ESU 1850" (page 193).
2 Click the Ethernet Statistics tab.
The Ethernet Statistics tab appears. See the following figures. Note
that the default owner is the host name on which Device Manager is
running. You can change the host name. See "Configuring a new
host name" (page 199).
—End—
Field Description
Port Identifies the source of the data that this etherStats entry is
configured to analyze.
Owner Identifies the entity that configured this entry and is therefore
using the resources assigned to it.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose RMON > Control.
The RmonControl dialog box opens with the History tab displayed.
6 Click Ok.
The selected port number appears in the RmonControl, Insert
Ethernet Statistics dialog box.
8 Click Insert.
The new host name entry appears in the RmonControl Ethernet
Statistics tab.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose RMON > Control. The
RmonControl dialog box opens with the History tab displayed.
3 Select the row that contains the port ID you want to disable.
4 Click Delete.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose RMON > Control.
The RmonControl dialog box opens with the History tab displayed.
See "RmonControl, Insert History dialog box: ESU 1850" (page
193) and "RmonControl, Insert History dialog box: ESU 1800" (page
193).
2 Select the row for the entry that you want to graph.
—End—
ATTENTION
The example alarm described here is intended only to demonstrate how alarms
fire. This alarm will generate at least one alarm every 5 minutes. Because of the
high frequency, you can delete this alarm in a real world scenario.
When you create an alarm, you select a variable from the variables list
(refer to "RMON alarm reference" (page 241)) and a port, or other switch
component, to which the alarm is connected. Some variables require port
IDs, card IDs, or other indexes (for example, spanning tree group IDs).
To create an alarm using default values and to receive statistics and history:
Procedure steps
Step Action
2 From the Device Manager menu bar, choose RMON > Alarm
Manager.
The Alarm Manager dialog box opens.
3 In the field, select a variable for the alarm and a port (or other ID) on
which you want to set an alarm.
In the example shown, the variable if InOctets has been selected
from the variable list under Interface. (Refer to "RMON alarm
reference" (page 241) for a list of variable definitions.)
Alarm variables are in three formats, depending on the type:
• A chassis, power supply, or fan-related alarm ends in x where
the x index is hard-coded. No further information is required.
• A card, RIP or OSPF, or EtherStat alarm ends with a dot (.). You
must enter a card number, IP address, or EtherStat information.
• A port alarm requires a port ifindex. For example, when you
select a port alarm for ifInOctets (interface incoming octet count),
the Choose port dialog box opens, allowing you to select a port.
4 Click Insert.
If the message "Alarm x already exists" appears, you must assign
a new index.If you want to make field changes, refer to the field
descriptions in "Procedure job aid" (page 205).
—End—
Field Description
Falling Description—Index of the event entry that is used when a falling threshold
is crossed. The event entry identified by a particular value of this index is the
same as identified by the same value of the event index object. (Generally, accept
the default that is already filled in.)
Procedure steps
Step Action
1 From the Device Manager menu bar, choose RMON > Alarms
—End—
The RmonAlarms dialog box opens with the Alarm tab displayed.
Field Description
Description The value of the statistic during the last sampling period. For example, if the
sample type is deltaDescription, this value is the difference between the samples
at the beginning and end of the period. If the sample type is absoluteDescription,
this value is the sampled value at the end of the period.
This is the value that is compared with the rising and falling thresholds. The
value during the current sampling period is not made available until the period is
completed and remains available until the next period completes.
Startup The alarm that can be sent when this entry is first set to valid. If the first sample
Alarm after this entry becomes valid is greater than or equal to the risingThreshold and
alarmStartupAlarm is equal to risingAlarm or risingOrFallingAlarm, then a single
rising alarm will be generated.
If the first sample after this entry becomes valid is less than or equal to
the fallingThreshold and alarmStartupAlarm is equal to fallingAlarm or
risingOrFallingAlarm, then a single falling alarm is generated. This object cannot
be modified if the associated alarmStatus object is equal to valid.
Rising A threshold for the sampled statistic. When the current sampled value is greater
Threshold than or equal to this threshold, and the value at the last sampling interval was
less than this threshold, a single event will be generated. A single event is also
generated if the first sample after this entry becomes valid is greater than or equal
to this threshold and the associated alarmStartupAlarm is equal to risingAlarm or
risingOrFallingAlarm.
After a rising event is generated, another such event is not generated until the
sampled value falls below this threshold and reaches the alarmFallingThreshold.
This object cannot be modified if the associated alarmStatus object is equal to
valid.
RisingEvent The index of the eventEntry that is used when a rising threshold is crossed. The
Index eventEntry identified by a particular value of this index is the same as identified by
the same value of the eventIndex object. If there is no corresponding entry in the
eventTable, then no association exists.
In particular, if this value is zero, no associated event is generated, as zero is not
a valid event index. This object cannot be modified if the associated alarmStatus
object is equal to valid.
Falling A threshold for the sampled statistic.
Threshold
When the current sampled value is less than or equal to this threshold, and the
value at the last sampling interval was greater than this threshold, a single event
is generated.
A single event is also generated if the first sample after this entry becomes valid
is less than or equal to this threshold and the associated alarmStartupAlarm is
equal to fallingAlarm or risingOrFallingAlarm.
After a falling event is generated, another such event is not generated until the
sampled value rises above this threshold and reaches the alarmRisingThreshold.
Field Description
Creating events
You can create an event using Device Manager.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose RMON > Alarms.
The RmonAlarms dialog box opens with the Alarms tab displayed.
2 Click the Event tab.
The RmonAlarms, Event tab appears.
ATTENTION
When you create an alarm, if RisingEvent and FallingEvent do not appear
in the Description field on the RmonAlarms, Event tab, Device Manager
creates them. These events are used during alarm creation and appear
in the RisingEventIndex and FallingEventIndex fields on the RmonAlarms,
Alarm tab.
—End—
Viewing events
You can view a table of RMON Alarm events using Device Manager.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose RMON > Alarms.
The RmonAlarms dialog box opens with the Alarms tab displayed.
2 Click the Event tab.
The Event tab appears.
—End—
Deleting events
You can delete an event using Device Manager.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose RMON > Alarms.
The RmonAlarms dialog box opens with the Alarms tab displayed.
2 Click the Event tab.
The Event tab appears.
4 Click Delete.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose RMON > Alarms.
The RmonAlarms dialog box opens with the Alarm tab displayed.
2 Click the Log tab.
The Log tab appears.
—End—
HP OpenView
You can integrate RMON into HP OpenView. You must set the HP
OpenView path to include the UNIX environment variable. The path is set
in the .cshrc file.
Procedure steps
Step Action
—End—
Procedure steps
Step Action
4 Change the category from Log Only to any event type: Error Events,
Threshold Events (normally used for RMON alarms), Status Events,
Configuration Events, or Application Alert Events. Click OK.
5 Choose File and then choose Save.
—End—
Navigation
• "Graphing port statistics" (page 215)
• "Graphing chassis statistics" (page 226)
All graphing port tables have the following buttons: Line Chart, Area Chart,
Bar Chart, Pie Chart, Export Data, Print table, Clear Counter, Close, and
Help.
To reset the statistics counters, use the Clear Counter button. When you
click this button, all Cumulative, Average, Minimum, Maximum, and LastVal
columns are reset to zero and automatically begin to recalculate statistical
data.
ATTENTION
Device Manager Clear Counter function does not affect the AbsoluteValue
counter of the switch. The Clear Counter function clears all cached data in Device
Manager (except AbsoluteValue). To reset AbsoluteValue(s), use the Reset
Counter function (Edit > Chassis > System).
ATTENTION
Some statistics are available only when you graph a single port.
Navigation
• "Graphing ports for single or multiple ports" (page 215)
• "Graphing interface statistics" (page 216)
• "Graphing Ethernet error statistics" (page 217)
• "Graphing port utilization statistics" (page 220)
• "Graphing bridging statistics" (page 221)
• "Graphing RMON port statistics" (page 222)
• "Graphing EAPOL port statistics" (page 224)
Procedure steps
Step Action
2 From the Device Manager menu bar, choose Graph > Port.
The Graph Port dialog box opens with the Interface tab displayed.
—End—
Procedure steps
Step Action
2 From the Device Manager menu bar, choose Graph > Port.
The Graph Port dialog box opens with the Interface tab displayed.
—End—
Field Description
FCSErrors A count of frames received on a particular interface that are an
integral number of octets in length but do not pass the FCS check.
The count represented by an instance of this object is incremented
when the frameCheckError status is returned by the MAC service
to the LLC (or other MAC user).
Received frames for which multiple error conditions obtained are,
according to the conventions of IEEE 802.3 Layer Management,
counted exclusively according to the error status presented to the
LLC.
InternalMacTransmitErrors A count of frames for which transmission on a particular interface fails
due to an internal MAC sub-layer transmit error.
A frame is only counted by an instance of this object if it
is not counted by the corresponding instance of either the
dot3StatsLateCollisions object, the dot3StatsExcessiveCollisions
object, or the dot3StatsCarrierSenseErrors object.
The precise meaning of the count represented by an instance of this
object is implementation specific. In particular, an instance of this
object can represent a count of transmission errors on a particular
interface that are not otherwise counted.
InternalMacReceiveErrors A count of frames for which reception on a particular interface fails
due to an internal MAC sub-layer receive error.
A frame is only counted by an instance of this object if it
is not counted by the corresponding instance of either the
dot3StatsFrameTooLongs object, the dot3StatsAlignmentErrors
object, or the dot3StatsFCSErrors object.
The precise meaning of the count represented by an instance of this
object is implementation specific. In particular, an instance of this
object can represent a count of receive errors on a particular interface
that are not otherwise counted.
CarrierSenseErrors The number of times that the carrier sense condition was lost or
never asserted when attempting to transmit a frame on a particular
interface. The count represented by an instance of this object is
incremented at most once per transmission attempt, even if the
carrier sense condition fluctuates during a transmission attempt.
FrameTooLongs A count of frames received on a particular interface that exceed
the maximum permitted frame size. The count represented by an
instance of this object is incremented when the frameTooLong status
is returned by the MAC service to the LLC (or other MAC user).
Received frames for which multiple error conditions obtained are,
according to the conventions of IEEE 802.3 Layer Management,
counted exclusively according to the error status presented to the
LLC.
Field Description
SQETestErrors A count of times that the SQE TEST ERROR message is generated
by the physical signaling sublayer (PLS) for a particular interface.
The SQE TEST ERROR message is defined in section 7.2.2.2.4
of ANSI/IEEE 802.3-1985 and its generation described in section
7.2.4.6 of the same document.
DeferredTransmissions A count of frames for which the first transmission attempt on a
particular interface is delayed because the medium is busy. The
count represented by an instance of this object does not include
frames involved in collisions.
SingleCollisionFrames A count of successfully transmitted frames on a particular
interface for which transmission is inhibited by exactly one
collision. A frame that is counted by an instance of this object
is also counted by the corresponding instance of either the
ifOutUcastPkts, ifOutMulticastPkts, or ifOutBroadcastPkts,
objects and is not counted by the corresponding instance of the
dot3StatsMultipleCollisionFrames object.
MultipleCollisionFrames A count of successfully transmitted frames on a particular interface
for which transmission is inhibited by more than one collision.
A frame that is counted by an instance of this object is also
counted by the corresponding instance of either the ifOutUcastPkts,
ifOutMulticastPkts, or ifOutBroadcastPkts, objects and is not counted
by the corresponding instance of the dot3StatsSingleCollisionFrames
object.
LateCollisions The number of times that a collision is detected on a particular
interface later than 512 bit-times into the transmission of a packet;
512 corresponds to 51.2 microseconds on a 10 Mbit/s system. A
(late) collision included in a count represented by an instance of this
object is also considered as a (generic) collision for purposes of other
collision-related statistics.
ExcessiveCollisions A count of frames for which transmission on a particular interface
fails due to excessive collisions.
Procedure steps
Step Action
2 From the Device Manager menu bar, choose Graph > Port.
The Graph Port dialog box opens with the Interface tab displayed.
—End—
Procedure steps
Step Action
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Graph > Port.
ATTENTION
RMON must be enabled globally to view these statistics. See "Configuring
and enabling RMON options" (page 190).
The Graph Port dialog box opens with the Interface tab displayed.
—End—
Field Description
DropEvents Occurrences of dropped traffic.
CRCAlignErrors Frame Check Sequence (FCS) and align errors.
UnderSizePkts Under-sized packets.
OverSizePkts Over-sized packets.
Fragments Fragmented packets.
Collisions Packets in a collision.
Jabbers Packets that are greater than 1518 with bad
Cyclical Redundancy Check (CRC)/Frame Check
Sequence (FCS) due to Carrier-Sense Multiple
Access/Collision Detection (CSMA/CD) violation.
Pkts64Octets Packets that are 64 octets or less.
Pkts65to127Octets Packets that are 65 to 127 octets long.
Pkts128to255Octets Packets that are 128 to 255 octets long.
Pkts256to511Octets Packets that are 256 to 511 octets long.
Pkts512to1023Octets Packets that are 512 to 1023 octets long.
Pkts1024to1528Octets Packets that are 1024 to 1518 octets long.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Graph > Port.
The Graph Port dialog box opens with the Interface tab displayed.
—End—
Field Description
LastEapolFrameVersion Displays the protocol version number that is in the most recently
received EAPoL frame.
LastEapolFrameSource Displays the source MAC address that is in the most recently
received EAPoL frame.
ATTENTION
The Clear Counter function in Device Manager does not affect the AbsoluteValue
counter in the unit. Instead, the Clear Counter function clears all cached data in
Device Manager (except AbsoluteValue). To reset AbsoluteValue(s), use the
Reset Counter function (Edit > Chassis > System).
Navigation
• "Graphing SNMP statistics" (page 226)
• "Graphing IP statistics" (page 229)
• "Graphing ICMP In statistics" (page 231)
• "Graphing ICMP Out statistics" (page 232)
• "Graphing TCP statistics" (page 234)
• "Graphing UDP statistics" (page 235)
Procedure steps
Step Action
1 From the Device Manager Menu bar, choose Graph > Chassis.
The Graph Chassis dialog box opens with the SNMP tab displayed.
—End—
Each field in the following table shows a total number for that field.
Field Description
InGetRequests SNMP Get-Request PDUs that have been accepted and processed
by the SNMP protocol entity.
InGetNexts SNMP Get-Next PDUs accepted and processed by the SNMP
protocol entity.
InSetRequests SNMP Set-Request PDUs accepted and processed by the SNMP
protocol entity.
InGetResponses SNMP Get-Response PDUs accepted and processed by the SNMP
protocol entity.
OutTraps SNMP Trap PDUs generated by the SNMP protocol entity.
OutTooBigs SNMP PDUs generated by the SNMP protocol entity for which the
value of the error-status field is tooBig.
OutNoSuchNames SNMP PDUs generated by the SNMP protocol entity for which the
value of the error-status field is noSuchName.
OutBadDescriptions SNMP PDUs which were generated by the SNMP protocol entity and
for which the value of the error-status field is ’badDescription’.
OutGenErrs SNMP PDUs generated by the SNMP protocol entity for which the
value of the error-status field is genErr.
InBadVersions SNMP messages delivered to the SNMP protocol entity for an
unsupported SNMP version.
InBadCommunityNames SNMP messages delivered to the SNMP protocol entity that used an
SNMP community name not known to said entity.
InBadCommunityUses SNMP messages delivered to the SNMP protocol entity that
represented an SNMP operation not allowed by the SNMP community
named in the message.
InASNParseErrs ASN.1 or BER errors encountered by the SNMP protocol entity when
decoding received SNMP messages.
InTooBigs SNMP PDUs delivered to the SNMP protocol entity for which the
value of the error-status field is tooBig.
InNoSuchNames SNMP PDUs delivered to the SNMP protocol entity for which the
value of the error-status field is noSuchName.
InBadDescriptions SNMP PDUs delivered to the SNMP protocol entity for which the
value of the error-status field is badDescription.
InReadOnlys SNMP PDUs delivered to the SNMP protocol entity for which the
value of the error-status field is readOnly. It is a protocol error
to generate an SNMP PDU containing the value "readOnly" in
the error-status field. This object is provided to detect incorrect
implementations of the SNMP.
InGenErrs SNMP PDUs delivered to the SNMP protocol entity for which the
value of the error-status field is genErr.
Graphing IP statistics
You can graph statistics for all IP packets that enter the chassis from
different interfaces.
Procedure steps
Step Action
1 From the Device Manager Menu bar, choose Graph > Chassis.
The Graph Chassis dialog box opens with the SNMP tab displayed.
—End—
Field Description
InAddrErrors Input datagrams discarded because the IP address in their IP header
destination field was not a valid address to be received at this entity. This
count includes invalid addresses (for example, 0.0.0.0) and addresses of
unsupported Classes (for example, Class E). For entities that are not IP
Gateways and therefore do not forward datagrams, this counter includes
datagrams discarded because the destination address was not a local
address.
ForwDatagrams Input datagrams for which this entity was not their final IP destination, as a
result of which an attempt was made to find a route to forward them to that
final destination. In entities that do not act as IP Gateways, this counter
includes only those packets that were Source-Routed by way of this entity
and had successful Source-Route option processing.
InUnknownProtos Locally addressed datagrams received successfully but discarded because
of an unknown or unsupported protocol.
InDiscards Input IP datagrams for which no problems were encountered to prevent
their continued processing but that were discarded (for example, for lack
of buffer space). Note that this counter does not include any datagrams
discarded while awaiting reassembly.
InDelivers Input datagrams successfully delivered to IP user-protocols (including
ICMP).
OutRequests IP datagrams that local IP user-protocols (including ICMP) supplied to IP
in requests for transmission. Note that this counter does not include any
datagrams counted in ipForwDatagrams.
OutDiscards Output IP datagrams for which no problem was encountered to prevent
their transmission to their destination, but that were discarded (for
example, for lack of buffer space). Note that this counter would include
datagrams counted in ipForwDatagrams if any such packets met this
(discretionary) discard criterion.
OutNoRoutes IP datagrams discarded because no route was found to transmit them to
their destination. Note that this counter includes any packets counted in
ipForwDatagrams that meet this no-route criterion. This counter includes
any datagrams a host cannot route because all of its default gateways
are down.
FragOKs IP datagrams that have been successfully fragmented at this entity.
FragFails IP datagrams that have been discarded because they needed to be
fragmented at this entity but could not be, for example, because their Don’t
Fragment flag was set.
FragCreates IP datagram fragments that have been generated as a result of
fragmentation at this entity.
ReasmReqds IP fragments received that needed to be reassembled at this entity.
Field Description
ReasmOKs IP datagrams successfully reassembled.
ReasmFails Failures detected by the IP reassembly algorithm (for whatever reason:
timed out, errors, and so on). Note that this number is not necessarily
a count of discarded IP fragments because some algorithms (notably
the algorithm in RFC 815) can lose track of the number of fragments by
combining them as they are received.
Procedure steps
Step Action
1 From the Device Manager Menu bar, choose Graph > Chassis.
The Graph Chassis dialog box opens with the SNMP tab displayed.
—End—
Each of the following fields shows a total number of ICMP messages; each
ICMP field type is described.
Procedure steps
Step Action
1 From the Device Manager Menu bar, choose Graph > Chassis.
The Graph Chassis dialog box opens with the SNMP tab displayed.
—End—
Field Description
ParmProbs The number of ICMP Parameter Problem messages sent.
DestUnreachs The number of ICMP Destination Unreachable messages
sent.
TimeExcds The number of ICMP Time Exceeded messages sent.
Procedure steps
Step Action
1 From the Device Manager Menu bar, choose Graph > Chassis.
The Graph Chassis dialog box opens with the SNMP tab displayed.
2 Click the TCP tab.
The TCP tab appears.
—End—
Field Description
PassiveOpens The number of times TCP connections have made a direct
transition to the SYN-RCVD state from the LISTEN state.
AttemptFails The number of times TCP connections have made a direct
transition to the CLOSED state from either the SYN-SENT
state or the SYN-RCVD state, plus the number of times TCP
connections have made a direct transition to the LISTEN
state from the SYN-RCVD.
EstabResets The number of times TCP connections have made a
direct transition to the CLOSED state from either the
ESTABLISHED state or the CLOSE-WAIT state.
CurrEstab The number of TCP connections for which the current state
is either ESTABLISHED or CLOSE- WAIT.
InSegs The total number of segments received, including those
received in error. This count includes segments received on
currently established connections.
OutSegs The total number of segments sent, including those on
current connections but excluding those containing only
retransmitted octets.
RetransSegs The total number of segments retransmitted - that is, the
number of TCP segments transmitted containing one or
more previously transmitted octets.
InErrs The total number of segments received in error (for example,
bad TCP checksums).
OutRsts The number of TCP segments sent containing the RST flag.
Procedure steps
Step Action
1 From the Device Manager Menu bar, choose Graph > Chassis.
The Graph Chassis dialog box opens with the SNMP tab displayed.
—End—
System monitoring
You can capture system events with the Ethernet Services Unit system
monitoring feature. The following system monitoring features are available:
• Logs and syslogs
• RDP sent and received counters on ring facing ports
• RRP Hello counters
Procedure steps
Step Action
4 Click Insert .
The Insert Host dialog box appears.
6 Click Insert.
—End—
Procedure steps
Step Action
4 Click Apply.
—End—
Procedure steps
Step Action
1 Select the port with a syslog host that you want to delete.
2 On the Device Manager menu bar, select Edit > Syslog.
The Syslog dialog box appears.
5 Click Delete.
—End—
Appendix
RMON alarm reference
RMON alarm reference information is divided into three categories: Security,
Errors, and Traffic. Each category can have a number of subcategories.
"Alarm variables" (page 241) lists the alarm variable categories and provides
a brief variable description.
Alarm variables
Category Subcategory Field Definition
Security snmpInBadCommunity The total number of SNMP messages
Names.0 delivered to the SNMP protocol entity
that represented an SNMP operation not
allowed by the SNMP community named
in the message.
Errors Interface ifInDiscards The number of inbound packets chosen to
be discarded even though no errors were
detected to prevent their being deliverable
to a higher-layer protocol. One possible
reason for discarding such a packet is to
free up buffer space.
ifInErrors For packet-oriented interfaces, the
number of inbound packets that contained
errors preventing them from being
delivered to a higher-layer protocol.
For character-oriented or fixed-length
interfaces, the number of inbound
transmission units that contained errors
preventing them from being delivered to a
higher-layer protocol.
ifOutDiscards The number of outbound packets chosen
to be discarded even though no errors
had been detected to prevent their being
transmitted. One possible reason for
discarding such a packet is to free up
buffer space.
Index
A 802.1p User Priority tab 186
access policies 56 Clear Counter button 215, 226
accounting information 86 configuration settings, uploading and
alarms, RMON 203 downloading 105
ARP 49 configuring 53
Configuring the MLT trunk algorithm 133
B creating firmware 103
Current VLAN 117
basic configuration 82
customer access ports, configuring 157,
basic port configuration 18, 143
167
booting firmware 104
Bridging
graphing statistics 221
D
broadcast control date and time, resetting 40
displaying 186 Daylight Saving Time, editing 41
buckets, RMON 191 Default Priority field
802.1p Default Priority tab 185
C default VLAN 112
DefaultTTL field
chassis Globals tab 46, 158, 169
contact information 26 Dest field
Daylight Saving Time 41 IP, Insert Routes dialog box 47
editing 25 Routes tab 47
editing information 31 Downloading firmware 101, 107
graphing statistics 226 duplex, setting value 20, 146
NTP global attributes 56
NTP key attributes 59
NTP server attributes 58
E
software version 26 EAPoL
Chassis tab 31 AuthControlledPortControl 177
Class field AuthControlledPortStatus 177
802.1p Default Priority tab 186 BackendAuthState 177
ClassId field configuration prerequisites 98, 173
Output Scheduling tab 183 configuring authentication status 174
Classpriority field configuring globally 99
Publication: NN46212-503
Document status: Standard
Document version: 01.00
Document date: 27 March 2008
www.nortel.com
LEGAL NOTICE
While the information in this document is believed to be accurate and reliable, except as otherwise expressly agreed to in writing
NORTEL PROVIDES THIS DOCUMENT "AS IS" WITHOUT WARRANTY OR CONDITION OF ANY KIND, EITHER EXPRESS OR
IMPLIED. The information and/or products described in this document are subject to change without notice.
* Nortel, the Nortel logo and the Globemark are trademarks of Nortel Networks.