Access Switching - Curso
Access Switching - Curso
Characteristics
Supported Features
Market Positioning
AOS Software Evolution Releases AOS
6.6.3.R01 6.6.4.R01 R6
User Network Profile 6450L
DHL Active Active 6450-24/48 Remote Stacking
VRRP DHCP Server
OS-6450 OS-6250
OS-6450 OS-6250
6.6.3.R01 6.6.4.R01
May-12 Jun-13
6.4.5.R02 6.4.6.R01
ERPv2 6850E Split Stack Protection
Kerberos snooping BYOD
Sip snooping OS-9000E mDNS Relay
MC-LAG on OS9000E
OS-9000E
OS-6900 OS-10k
AOS Software Evolution Releases AOS
R8
8.1.1.R01
Virtual Chassis
Access Guardian 2.0
OpenFlow
OS-6860 8.1.1.R01
May-14
Aggregation
Core
High end modular core, aggregation,
Data center switches L2-L3
High Availability VRF
High MPLS, VPLS OmniSwitch 6900 OmniSwitch 10K
Performance Virtual Chassis AOS Advanced L2-L3 OmniSwitch 9000E High end modular
10Gig high MC-LAG Aggregation/Core Modular Chassis AOS Advanced L2-L3 Core &
density Green energy DC TOR 10/40 GE AOS Advanced L3 10GE Aggregation 10/40 GE
I.S.S.U
OMNISWITCH 6250
OmniStack 6250
Positioning in the Stackable portfolio
Large
10/P10/10L/P10L 24/P24/24L/P24L
AOS L2+ Basic L3 48/P48/48L/P48L
GE with 1OG AOS L2+ Basic L3
GE with 1OG
Distribution Ports
OmniSwitch Backup
Combo Power
6250 Nbr type Stack Power
SFP/RJ45 Supply
Supply
24 24 10/100 2 2 42 External
8M 8 10/100 4 2 42 External
HDMI ports
2 x 2,5 Gigabit stacking links
30/60/150 centimeters Metro
Up to 8 chassis in a stack
192 FE ports SFP+
16 GE ports Interfaces for additional Gigabit uplinks or
PoE and non-PoE can be mixed stacking capability
Stack element number identify by port LEDs 30/60/150 centimeters
by pressing PB Up to 2 chassis in a stack
48 FE ports
4 GE ports
Stack element number identify by software
configurable
OMNISWITCH 6350
OmniStack 6350 - Positioning in the Stackable portfolio
Large
OmniSwitch 6350-48
OmniSwitch 6350-P48
Set of features for the SMB Market:
Advanced L2 features with basic L3 routing for both IPv4 and IPv6
Simplified VoIP deployments using the advanced Auto-QoS feature
Eight hardware-based queues per port for flexible QoS management
Edge security with Access Guardian, DHCP snooping, LPS and UNP.
Auto-configurable via OmniPCX Office
LLDP with MED extensions for automated device discovery
Model Nominal Input Output Voltage Wattage PoE Power Budget Power Supply
Voltage Efficiency
OS6350-24 90-220 V AC 12 V DC 30 W N/A 80%
OS6350-P24 90-220 V AC 12 V DC / 54 V DC 525 W 380 W 85%
OS6350-48 90-220 V AC 12 V DC 60 W N/A 87%
OS6350-P48 90-220 V AC 12 V DC / 53 V DC 900 W 780 W 85%
OMNISWITCH 6450
OmniStack 6450
Positioning in the Stackable portfolio
Large
24/P24/24L/P24L
10/P10/10L/P10L
48/P48/48L/P48L
AOS L2+ Basic L3
AOS L2+ Basic L3
GE with 1OG
GE with 1OG
OS6450-48/48L/P48/P48L
48 10/100/1000 ports
Lite (L) model: 10/100 RJ-45 non-combo ports upgradable to support 10/100/1000 (*)
2 Fix SFP/SFP+ GE ports upgradable to 10G (**)
IEEE 802.3at POE ports
Expansion module
OS6450-U24
22 100/1000 BaseX ports
2 Combo ports 10/100/1000 BaseT-SFP
2 Fix SFP/SFP+ GE ports upgradable to 10G (*)
Expansion module *Optional 1G RJ45 ports license option (OS6450-24/48L-UPGD)
**Optional 10GigE uplink license option (OS6450-SW-PERF )
OmniSwitch 6450
Models
Model 10/100/1000 10/100/1000 & Fixed (1G/5G) Module Stacking Power Supply
RJ-45 ports SFP combos SFP ports Slot Primary / Backup
OS6450-10L 8 2 2 No - Internal / -
OS6450-P10L 8 2 2 No - Internal / -
OS6450-10 8 2 2 No - Internal / -
OS6450-P10 8 2 2 No - Internal / -
Module
10/100/1000 10/100/1000 & Fixed (1G/10G*)
Model Slot Stacking Power Supply
RJ-45 ports SFP combos SFP+ ports
Options
24
OS6450-P24 (L) 0 2 Yes 10G SFP+ Internal / External
802.3at POE
48
OS6450-P48 (L) 0 2 Yes 10G SFP+ Internal / External
802.3at POE
22 SFP
OS6450-U24 2 2 Yes 10G SFP+ Internal / Internal
100/1000
Model
24 or 48 gigabit port (PoE/PoE+ of “P” Model) 2 GIGABIT SFP+ ports (upgradeable to 10Gb)
POE
NON POE
OmniSwitch 6250
Enterprise 24 ports POE AOS
+
R6
Small
OmniSwitch 6850E-48X
10/100/1000 1 Gig SFP 10Gig SFP+ 10Gig SFP+ plug-in or Max # 802.3af Max # 802.3at
Models
RJ-45 ports ports ports - fixed stacking ports ports ports ( @30W)
OS6850E-24 24 4* 2 * *
OS6850E-24X 24 4* 2 2 * *
OS6850E-48 48 4* 2 * *
OS6850E-48X 48 2* 2 2 * *
OS6850E-U24X 2* 24 2 2 * *
PoE Models
24 24
OS6850E-P24 24 4* 2
(510W PSU) (900W PSU)
24 24
OS6850E-P24X 24 4* 2 2
(510W PSU) (900W PSU)
48 25
OS6850E-P48 48 4* 2
(900W PSU) (900W PSU)
48 25
OS6850E-P48X 48 2* 2 2
(900W PSU) (900W PSU)
P = PoE
H = High-POE PS
X = 10G SFP+ slots
OmniSwitch 6850E
Stacking
All of the models in the 6850E family are stackable
Characteristics
Dedicated 40 Gigabit stacking links on each model
Up to 8 switches in a stack
384 Gigabit ports
16 10 Gig ports
PoE and non-PoE can be mixed
Stack module IDs are set using CLI and displayed on the panel
Each module in the stack is capable to act as Primary
Benefits :
Acts as an OS-9000E chassis
Virtual chassis, single IP for management
Primary, secondary, idle and pass-through elements in the stack
Smart Continuous Switching
Link aggregation (OmniChannel or LACP) distributed over different units
OmniSwitch 6850E
Stacking
Stacking is provided by either using the CX4 stacking cables or the SFP+ module
OS6-XNI-U2
for remote
stacking
• 120W DC • 360W AC
• 126W AC • 510W AC
• 900W AC
One 120/126/360 in a half shelf
Models Models
• 6850E-24 • 6850E-P24
• 6850E-24X • 6850E-P24X
• 6850E-48 • 6850E-P48
• 6850E-48X • 6850E-P48X
One 510W AC taking the whole shelf
2 PS connection options
Directly pluggable in the back of the unit
Attached with a cable for 2U configuration
48X with 126W AC PS
OmniSwitch 6850E
Backup Power Supplies
OS6850E-BPPX High POE 900W Backup Power Supply for P48 model
PoE
Global power POE Capacity
Backup PS 510/900W
360W AC 240W
360W AC 240W
PS 360/900W Main PS
510W AC 390W
900W AC 780W
OMNISWITCH 6855
OmniSwitch 6855
Hardened LAN Access Switch
Industrial, ruggedized L2/L3 GigE
Designed for Harsh Environment Operations
Benefits
Highest hardened port density ( up to 24 GigE) with throughput up to 35.7 Mpps
High performance – full forwarding rate on all ports
OS6850E AOS features supported
L3 features set with IPv4 and IPv6
POE power option (4 ports)
Fully integrated into OmniVista
Designed with redundancy and availability in mind
External, hot-swappable, redundant AC and DC power supplies
Redundant fan operation for the 24 port models
AOS
Defense, Energy, Utilities, Transportation R6
Outdoor deployment (cabinet)
OmniSwitch 6855
Model description
OS6855-U10 0 8 2 - 0 N
4 first
OS6855-14 0 12 - 2 N
ports
OS6855-P14 0 12 - 2 12 N
4 first
OS6855-24 0 20 4 4 N
ports
OS6855-U24X 2 2 2 24 0 Y
OmniSwitch 6855-U24X
Model description and port options
22 hot-pluggable SFP ports plus 2 combo ports individually configurable
10/100/1000Base-T or 1000Base-X/100Base-FX
OS6855-PSS Power brick AC PSU for system power. 40W, 12V, AC-DC OS6855 PSU 80W, 12V, AC-DC
OS6855-PSL
OS6855-PSS-P Power brick AC PSU for PoE only; 66W, 48V, AC-DC OS6855-PSL-P OS6855 PSU 160W, 48V/12V/POE, AC-DC
OS6855-PSS-D Power brick DC PSU for system power; 40W, 24V-48V DC-DC OS6855-PSL-D OS6855 PSU 80W, 48V/12V, DC-DC
OS6855-PSS-P-D Power brick DC PSU for PoE only; 66W, -48V DC-DC OS6855-PSL-DL OS6855 PSU 80W, 24V/12V, DC-DC
OS6855-PSSPH Power brick AC PSU for PoE only; 66W, AC
Fans on the 24 port models are turned on only when critical ambient
temperature is reached
OS6855-U10/OS6855-14 OS6855-U24/OS6855-24
Shutdown temperature 73C 78C
Warning temperature (interrupt) 71C 76C
Automatic Recovery temperature 60C 65C
Fan turn on temperature - 50C
Fan turn off temperature - 35C
OMNISWITCH 6860/6860E
OmniSwitch 6860 AOS
R8
256G wire rate engine
Deep Packet Inspection and Application Monitoring
Coprocessor for enhanced network services
OS6860E model only
OmniSwitch 6860/E
OmniSwitch 6860
AOS
Models R8
OS6860-24 OS6860-48
24 x 10/100/1000 BaseT port, 48 x 10/100/1000 BaseT port,
4 fixed SFP+ (1G/10G) 4 fixed SFP+ (1G/10G)
2 VFL QSFP+ ports (20G each) 2 VFL QSFP+ ports (20G each)
AC and DC power supply AC and DC power supply
OS6860-P24 OS6860-P48
24 x 10/100/1000 BaseT POE port, 48 x 10/100/1000 BaseT POE port,
4 fixed SFP+ (1G/10G) 4 fixed SFP+ (1G/10G)
2 VFL QSFP+ ports (20G each) 2 VFL QSFP+ ports (20G each)
600W AC power supply 920W AC power supply
OmniSwitch 6860E
AOS
Enhanced Models R8
OS6860E-24 OS6860E-48
24 RJ-45 10/100/1000 BaseT ports, 48 x 10/100/1000 BaseT ports
4 fixed SFP+ (1G/10G) 4 fixed SFP+ (1G/10G)
2 VFL QSFP+ ports (20G each) 2 VFL QSFP+ ports (20G each)
AC and DC power supply AC and DC power supply
OS6860E-U28
28 x 100/1000 Base-X SFP ports
4 fixed SFP+ (1G/10G)
2 VFL QSFP+ ports (20G each)
AC and DC power supply
OS6860E-P24 OS6860E-P48
24 x 10/100/1000 BaseT POE 48 x 10/100/1000 BaseT POE
ports, ports,
4 fixed SFP+ (1G/10G) 4 fixed SFP+ (1G/10G)
2 VFL QSFP+ ports (20G each) 2 VFL QSFP+ ports (20G each)
600W AC power supply 920W AC power supply
OmniSwitch 6860 and 6860E
Differences
Features only available on the enhanced models
Specialized built-in co-processor board
Used for running additional applications
With AOS 8.1.1 the Application Monitoring / Fingerprinting function will run on it
A separate LED (OK2) on the front of the chassis indicates the status of the co-processor board
The first 4 ports on OS6860E only can deliver up to for 60W of PoE per port
These ports are clearly marked on the switch overlay
AC power supply. Provides DC power supply ( 48V DC). 600W AC PoE power 920W AC PoE power
150 W system power to Provides 150 W system supply. Provides system supply. Provides system
Description
one OS6860 non-PoE power to one OS6860 non- and PoE power to one 24 and PoE power to one 48
switch. PoE switch. port PoE switch. port PoE switch.
OS6860-24 OS6860-24
OS6860-P24 OS6860-P48
OS6860-48 OS6860-48
OS6860 Models OS6860E-P24 OS6860E-P48
OS6860E-24 OS6860E-24
supported
OS6860E-48 OS6860E-48
OS6860-U28 OS6860-U28
Max PoE budget
N/A N/A 450W of PoE 750E of PoE
with 1 PSU
Max PoE budget
N/A N/A 900W of PoE 1500W of PoE
with 2 PSU
Valid Backup OS6860-BP OS6860-BP-D OS6860-BPPH OS6860-BP-BPPX
Configurations OmniSwitch BPS OmniSwitch BPS OmniSwitch BPS OmniSwitch BPS
AOS L2 + Basic L3 AOS L2 & Basic L3 AOS L2 & Adv. L3 AOS L2 & Adv. L3
Features
Stackable Stackable Stackable Virtual Chassis
Basic static and
Routing Basic static and RIP/RIPng Full, advanced IP Routing Full, advanced IP Routing
RIP/RIPng
10/100 or 10/100/1000 10/100 or 10/100/1000 Mbps
10/100/1000 Mbps
User ports 10/100 Mbps Mbps
IEEE 802.3at / 60W POE on 4
IEEE 802.3at support
IEEE 802.3at support ports
Uplinks 1 Gbps 10 Gbps 10 Gbps 10 Gbps
Stacking 10 Gbps links 20 Gbps links 40 Gbps links 80 Gbps links
Switching 28 Mpps 101,2 Mpps 131 Mpps 190,6 Mpps
Fabric Capacity 24,8 Gb/s 68 Gb/s 240 Gb/s 264 Gb/s
Traffic Analysis DPI, AppMon
Routing Table 1024-entry routing table 16,000-entry routing table 16,000-entry routing table 64,000-entry routing table
Three slots for PoE PSU Two slots for system PSU
Back view
8 DB25 connectors
Advanced Backup Power Shelf
N+1 also called SINGLE backup
Protects against switch primary PSU failure
not against AC power line failure
ABPS Configuration
1 x 1200W 1 x 450W
1x 1200W/2400W (110V/220V AC) PoE power supply PoE PSU system PSU
8 x 1M Cables
If primary AC line fails the BPS will be the only Backup AC Source B
source of power for all switches in the stack
3 x 1200W 2
ABPS Configuration: PoE PSU System PSU
8 x 1M Cables
Primary AC Source A
OMNISWITCH 6900
OmniSwitch 6900-X
High Density 10GigE Switch
High Density 10GigE Switch
20 or 40 SFP+ ports (1G/10G) OS6900-X40
Up to 64 SFP+ ports on the 6900-X40
Up to 32 SFP+ ports on the 6900-X20
OS6900-X20
40 SFP+ Ports
Optional Module #1
OS6900-X40
Optional Module #2
Ethernet
Management
Port
Optional
Module #2
Redundant slide-in
power supplies (AC or
Hot swappable fan
DC)
tray 3+1 fan
redundancy, Front
to Back cooling
OmniSwitch 6900
Optional modules
CLI - May be accessed locally via the console port, or remotely via Telnet
Webview - which requires an HTTP client (browser) on a remote workstation
SNMP, which requires an SNMP manager (such as Alcatel-Lucent’s OmniVista
or HP OpenView) on the remote workstation
Secure Shell - Available using the Secure Shell interface
FTP - File transfers can be done via FTP or Secure Shell FTP
TFTP - File transfers can be done via TFTP
USB device - Disaster recovery, Upload/download image files
MANAGING FILES/DIRECTORIES
AOS
R6
AOS File System
Flash Memory – 128 MB per CMM File System
Provides storage for system and
configuration files
2 versions are present on flash; working
and certified
Swlog1.log *.img files are stored in both working and
network
Swlog2.log certified directories
Boot.params
Configuration rollback
switch Based on the working and certified
Directories
Working Directory Certified Directory
Applies to system files and configuration
Jdiag.img Jdiag.img
file
Jsecu.img Jsecu.img
Jbase.img Jbase.img
A certified version (SW + conf) will be used as a
Jeni.img Jeni.img
backup when dealing with any changes
Jos.img Jos.img
(modification, upgrades, …)
Flash Directory
AOS Flash Organization
Primary
Working Certified
boot.cfg boot.cfg
Running configuration
CMM A
Primary
Working Certified
boot.cfg
3
3. Changes made on
running config -> 2
saved to working
directory 2. Rebooting from
-> copy running-config working directory
working -> reload working no rollback-timeout
Running configuration
CMM A
---> Changes made to the running config are saved to the Working directory
System Boot Sequence
Working and Certified directories now are identical
Primary
4. Finally, contents of working and certified
4 directories are identical
-> copy working certified
Working Certified
boot.cfg boot.cfg
Running configuration
CMM A
---> Now running config matches working and certified matches working
OmniSwitch with Redundant CMM
CMM Role
Synchronization process between switches in a chassis
/flash/working + /flash/certified directories must be the same on both Switches (Primary,
Secondary) in normal operation.
Same software running on both switches
CLI commands to synchronize Primary & Secondary switches in the chassis
->takeover
->show running directory (display switch (CMM) role, primary or secondary)
->show chassis
OmniSwitch - Primary and Secondary CMM Synchonization
In a stack of switches, one of the switches has the primary role and the other
switch has the secondary role at any given time.
The primary switch manages the current switch operations while the secondary
switch provides backup (also referred to as “fail over”).
Additional switches in a stack are set to “idle” for the purposes of redundancy.
Primary Secondary
Swlog1.log Swlog1.log
network network
Swlog2.log Swlog2.log
Jeni.img Jeni.img
Flash Between
Jeni.img
CMMs : SYNCHRONIZED,Jeni.img
Jos.img Jos.img
Running Configuration
Jos.img : SYNCHRONIZED, Jos.img
NIs Reload On Takeover : NONE
CMM A CMM B
OmniSwitch
Software System Architecture
-> show running-directory
CONFIGURATION STATUS
Running CMM : PRIMARY,
CMM Mode : DUAL CMMs,
Current CMM Slot :A
Running configuration : WORKING,
Certify/Restore Status : CERTIFIED
SYNCHRONIZATION STATUS
Flash Between CMMs : SYNCHRONIZED,
Running Configuration : SYNCHRONIZED,
NIs Reload On Takeover : NONE
Swlog1.log Swlog1.log
network network
Swlog2.log Swlog2.log
Boot.params Boot.params
switch switch
CMM-A
Working Directory Certified Directory Working Directory Certified Directory
diag.img diag.img diag.img diag.img
FTP Server
WebView
USB support
Disaster recovery (requires miniboot-uboot upgrade and special directory structure in the
driver to store image files)
Upload/download image and configuration files
Only this USB device will be supported and guaranteed to function correctly
CLI commands used on the /flash directory can also be used on the /uflash directory
AOS
R7/8
Module Objectives
You will learn about:
AOS R7/8 system administration
ISSU
Software Licensing
AOS
AOS File System – Multi image/config
OS 10K OS 6900/6860 Directories
Flash Memory 2GB* 2GB Certified directory
Read only version of *.img files and
Ram Memory 4GB* 2GB boot.cfg files
* per CMM Configuration changes CANNOT be saved
directly to the certified directory
Swlog1.log Working directory
Swlog2.log Network Directory
Boot.params
Policy.cfg
Saved versions of *.img files and boot.cfg
files
Files in the working directory must be
tested before committing them to the
Certified Directory Working Directory User Defined Directory
certified directory.
Ros.img Ros.img Ros.img
Configuration changes can be saved to
Reni.img Reni.img Reni.img
the working directory.
Boot.cfg Boot.cfg Boot.cfg User-defined directories
Any other directories created by the user
These directories can have any name and
can be used to store additional switch
configurations.
Flash Directory Configuration changes CAN be saved
directly to any user-defined directory
AOS File System – Multi image/config
Running directory
Directory from which the switch booted from.
Directory where the configuration changes will be saved.
Except when the Running directory is the Certified directory.
Running configuration
Current operating configuration of the switch obtained from the running directory in
addition to any configuration changes made by the user.
It resides in the switch’s RAM.
Configuration rollback
Based on the working, certified and User-defined directories
-> takeover
-> show running directory (display switch (CMM) role, primary or secondary)
-> show chassis
Reload Commands
Reload [ secondary] [in | at ]
This command reloads the primary by default.
No CMM failover during this reload.
This command can also be used on the secondary CMM.
Reload From
Immediately reboots the primary CMM.
No CMM failover during this reload.
All the NIs reboot, including the secondary CMM.
Command Auto-completion
Built-in Filtering
Unix piping mechanisms built into bash redirections
-> show vlans | more
-> show mac-learning | grep 00:20:da:55:56:76
-> show ip ospf routes | egrep "^10\.10.*" | sort | less
CLI Commands
AOS/ Bash shell (Switch Specific)
Arp, aaa, boardinfo, clear, capability, configuration, copy, clicomp,
cliwrapper, command-log, diusin, debug, ethernet-service, expr, erp-ring
fsck, ftp, freespace, gvrp, hash-control, health, installsshkey, icmp, ipv6,
issu, Ipsec, interfaces, ip, kill, linkagg, lldp, mount, mac-range, mvrp,
modify, mac-learning, multi-chassis, netsec, newfs, no, ntp, nslookup,
pam_cli, powersupply, power, port-session, security, port-mapping, port-
mirroring, port-monitoring, ping6, policy, password, ping, qos, rmon, rcp,
rdf, reload, rls, revokesshkey, rrm, swlog, sftp, system, scp, sflow, show,
snmp, snmp-trap, spantree, ssh, sh, takeover, telnet, tps, traceroute,
traceroute6, tty, temp-threshold, Umount, update, user, udld, Usb, verbose,
vrrp, vlan, vrf, vrrp3, who, webview, write, whoami.
Busybox commands (see www.busybox.net for reference)
Awk, cat, chmod, cmp, cp, diff, dmesg, du, egrep, fgrep, find, free, grep,
head, less, ls, mkdir, more, mv, reset, rm, rmdir, sed, stty, sync, tail, tftp,
time, vi, wc, xargs
System Commands
Directory Commands include:
pwd - display current directory
cd – change directory
dir – list directory contents
mkdir – create new directory
rmdir – remove existing directory
File Commands include:
ls / rls – list directory content (No “dir”) / list secondary CMM directory content
Cp / rcp – copy a file / copies file from secondary CMM
scp – secure file copy
mv – move a file
vi – invoke editor
rm / rrm – remove a file / remove from secondary CMM
Utility Commands include:
freespace - command displays the amount free file system memory
fsck – performs file system check
Software System Architecture
-> show running-directory
CONFIGURATION STATUS
Running CMM : PRIMARY,
CMM Mode : DUAL CMMs,
Current CMM Slot : A
Running configuration : WORKING,
Certify/Restore Status : CERTIFIED
SYNCHRONIZATION STATUS
Flash Between CMMs : SYNCHRONIZED,
Running Configuration : SYNCHRONIZED,
NIs Reload On Takeover : NONE
Swlog1.log Swlog1.log
Swlog2.log Network Directory Swlog2.log Network Directory
Policy.cfg Policy.cfg
Boot.params Boot.params
CMM-A
Certified Directory Working Directory User Defined Directory Certified Directory Working Directory User Defined Directory
Ros.img Ros.img Ros.img
Ros.img Ros.img Ros.img
New CMM image should work with the previous NI version until it is upgrade
Individual NI upgrade capability from main postGA tree only
There is backward compatibility with a N-1 version of the protocol
ISSU
Software supports only N-1 compatibility
It is possible to upgrade from GA to any post-GA, it might take more than one
upgrade to accomplish this because protocols could change more than once
Following shows a upgrade from GA to some post-GA maintenance build
Only upgrading from one major release’s maintenance release to the next
major release is guaranteed
Version of the GA build is fixed at the version of the one of the maintenance release
of the previous major release
7.2.100 - GA
main trunk
7.2.1.200.R01 – 7.2.1.300.R01 –
Protocol protocol version 2 protocol version 3 ISSU
version 1
7.2.R01
maintenance
branch
ISSU
Specifications
ISSU Files:
Operation
No “boot.cfg” exists, IP connectivity (address,
mask and default route) will be set using DHCP DHCP Server
DHCP Server will return the path and the filename
OmniSwitch
of an instruction file containing
Firmware
Configuration file
Script file
File server details
TFTP Server
Once downloaded, the instruction file is parsed and
executed
Guidelines
3. FTP stores Firmware,
Requires DHCP server and TFTP server for first boot Config, Scripts
Increased Boot-up time FTP Server
No EMP port supported
Filename and path length limited to 63 and 255 2. TFTP stores Instruction file.
characters Can also store Firmware and config
No IPv6 support
Out-of-the-box Auto-configuration
Yes
Download
Does dhcp offer Found
Connect to server Firmware
Has a tftp server Instruction
Get Instruction File and/or boot
and filename? File?
•! Alcatel-Lucent OmniSwitch OS6850 - Instruction file Config?
•! Firmware version 2
•Firmware version:OS_6_4_3_339_R01 No
•Firmware location:/home/ftpboot/firmware
•! Configuration file No No
•Config filename:boot_OS6850.cfg No Download
Script?
4
•Config location:/tftpboot/
•! Debug file Yes
•!Debug filename:AlcatelDebug.cfg
•!Debug location:/home/ftpboot/debug
•! Script file Switch is available remotely Execute Script
•!Script filename:OS6850_script.txt
•! Primary File Server
•Primary server: 10.255.204.100
vlan 10
•Primary protocol: FTP
•Primary user: tftptest vlan port mobile 1/10
•! Secondary File Server vlan 10 mobile-tag enable
•!Secondary server:10.200.110.111
•!Secondary protocol:SFTP
•!Secondary user:admin
CONFIGURATION METHODS
Configuration Methods
Command Line Interface
Command Line Interface
Online configuration via real-time sessions using CLI commands
Console or Telnet
Slot 7 - Idle -> interfaces slot[/port[-port2]] speed {auto | 10 | 100 | 1000 | 10000 |
max {100 | 1000}}
Slot 8 - Idle -> interfaces slot[/port] mode {uplink | stacking}
-> interfaces slot[/port[-port2]] autoneg {enable | disable | on | off}
-> interfaces slot[/port[-port2]] crossover {auto | mdix | mdi}
Slot 1 - Pri -> interfaces slot[/port[-port2]] pause {tx | rx | tx-and-rx | disable}
-> interfaces slot[/port[-port2]] duplex {full | half | auto}
Slot 2 - Sec -> interfaces slot[/port[-port2]] admin {up | down}
-> interfaces slot/port alias description
Slot 3 - Idle -> interfaces slot[/port[-port2]] no l2 statistics [cli]
-> interfaces slot[/port[-port2]] max frame bytes
Slot 4 - Idle -> interfaces slot[/port[-port2]] flood multicast {enable | disable}
-> interfaces slot[/port[-port2]] flood [broadcast | multicast | unknown-unicast|all]
[enable | disable]
Slot 5 - Idle -> interfaces violation-recovery-time
-> interfaces violation-recovery-trap
-> interfaces clear-violation-all
• Ethernet Ports
Fixed 10/100/1000BaseT
• SFP Ports
SFP connectors for 100/1000 Base-
X SFP connectors
• Combo Ports
Combo RJ45/SFP connectors for
10/100/1000BaseT or 1000Base-X
• XFP Ports
10 Gbps Small Form Factor
Pluggable (XFP) transceivers
• SFP+ Ports
10 Gbps Small Form Factor
Pluggable Plus (SFP+) transceivers
Ethernet Ports
CLI Monitoring
-> show interfaces port
Slot/ Admin Link Violations Alias
Port Status Status
-----+----------+---------+----------+-------------
1/1 enable down none “ sales "
1/2 enable down none " sales "
1/3 enable down none " sales "
1/4 enable down none " sales "
1/5 enable down none " sales "
1/6 enable down none " sales "
-> show interfaces 1/7 enable down none " sales "
1/8 enable down none " sales “
-> show interfaces capability ….
-> show interfaces flow control ….
-> show interfaces pause
-> show interfaces e2e-flow-vlan -> show interfaces 1/20
-> show interfaces accounting Slot/Port 1/20 :
Operational Status : up,
-> show interfaces counters Last Time Link Changed : TUE NOV 22 12:19:52 ,
-> show interfaces counters errors Number of Status Change: 1,
-> show interfaces collisions Type : Ethernet,
SFP/XFP : Not Present,
-> show interfaces status MAC address : 00:e0:b1:c5:3a:0b,
-> show interfaces port BandWidth (Megabits) : 1000, Duplex : Full,
Autonegotiation : 1 [ 1000-F 100-F 100-H 10-F 10-H ],
-> show interfaces ifg Long Frame Size(Bytes) : 9216,
-> show interfaces flood rate Rx :
Bytes Received : 233117328, Unicast Frames : 51104,
-> show interfaces traffic Broadcast Frames: 22156, M-cast Frames : 3542048,
-> show interfaces transceiver UnderSize Frames: 0, OverSize Frames: 0,
Lost Frames : 0, Error Frames : 0,
CRC Error Frames: 0, Alignments Err : 0,
Tx :
Bytes Xmitted : 14720188, Unicast Frames : 12,
Broadcast Frames: 1870, M-cast Frames : 227257,
UnderSize Frames: 0, OverSize Frames: 0,
Lost Frames : 0, Collided Frames: 0,
Error Frames : 0
Ex.
Please supply your user name and password at the prompts.
login : user123
password :*****
WebView
Monitoring and configuring the switch by using WebView
Embedded in switch software
The following web browsers are supported
Internet Explorer 6.0 and later for Windows NT, 2000, XP, 2003
Firefox 2.0 for Windows and Solaris SunOS 5.10
WebView configuration
ip http(s) server (R6) or webview server enable (R7/8) – Enables the WebView Application
(default= enabled)
ip http(s) ssl (R6) or webview force-ssl enable (R7/8) – Forces SSL connection between browser
and switch (default=enabled)
ip http(s) port (R6) or webview http(s) port (R7/8) - Changes the port number for the
embedded Web server
aaa authentication http local – Checks the local database for http authentication
OmniVista
Advanced Applications Discovery
OmniVista 2500 Series Topology
Infrastructure
Access Guardian, UNP, HIC
OmniVista Web Based Performance
Programmatic ELMs
ELMs
Traps/Events
VLAN Manager
Locator
Policy Mgt
Resource Manager
Inventory
OmniVista Applications
Quarantine Manager and
Remediation
Provides Global device
containment
OmniVista Advanced
Applications
SecureView ACL
Provides Global ACL Configuration OmniVista
Infrastructure Web Services
Provides XML interface & Web
OmniVista Web Based browser GUI for Read-only
Programmatic ELMs monitoring capabilities
ELMs
PolicyView
Provides Global QoS Configuration
SecureView Switch Access
Provides Global User Management
Access Guardian
Provides Proactive Network Security Management
ACCESS METHODS AND USER ACCOUNTS
Access Methods
Specifications
The switch may be set up to allow or deny access through any of the available
management interfaces
Console, Telnet, HTTP, HTTPS, FTP, Secure Shell, and SNMP
Password expiration
-> user password-expiration 5 (Expires in 5 days for all users)
-> user user1 password userpass expiration 5 (Specific user)
-> user user1 password userpass expiration 12/01/2006 15:30
User Accounts
Monitoring
If a profile is deleted, but the profile By default, new profiles do not allow
name is still associated with a user, access to any ports or VLANs
the user will not be able to log into
the switch
User Accounts
User Session Customization
-> session login-attempt
Sets the number of times a user can attempt unsuccessfully to log into the
switch before the TCP connection is closed
-> session login-timeout
Sets the amount of time the user can take to accomplish a successful login to
the switch
-> session banner
Sets the file name of the user–defined banner (cli, ftp and/or http)
-> session timeout
Configures the inactivity timer for a CLI, HTTP (including WebView), or FTP
interface
-> session prompt
Configures the default CLI prompt for console and Telnet sessions
-> user profile save
Saves the user account settings for aliases, prompts, and the more mode
screen setting
Authenticated Switch Access (ASA)
Authentication Methods
ASA
Method of authenticating users who want to manage the switch using the
console, Telnet, FTP, SNMP, Secure Shell, or HTTP
1
2
4
3
Telnet/HTTP/SNMP/SSH/FTP
AAA
• Access through console (local) port is always enabled Server
• By default all remote access is disabled
Authenticated Switch Access
CLI
Backup 3
Grant user access to manage the switch local
Local Authentication
aaa authentication <management interface> local
External Authentication
aaa authentication <management interface> server1 server2 server3 local
console
telnet
ftp Backup 2
Primary
http AAA server
AAA server
snmp Backup 1
ssh AAA server
default
Accounting servers
Track network resources such as time, packets, bytes, etc., and user activity (when a user logs in and out, how many
login attempts were made, session length, etc.)
May be located anywhere in the network
-> aaa accounting session rad
tells the switch to send accounting information to the RADIUS server rad
Notes: Server can be disable only by interface as follow: ntp interface n.n.n.n disable
1
OmniSwitch
Overview
OBJECTIVE
This lab is designed to familiarize you with the:
1. Code, switch information, including code versions and revision levels (lab1)
2. Operation of the WORKING and CERTIFIED directories of an OmniSwitch including how to
determine which directory the switch will boot from (lab2)
3. OmniSwitch Operating System including the directory structure, configuration and CLI (lab3)
4. USB drive support (lab4)
5. Remote and GUI Webview interface access (lab5)
6. Different admin user access rights (lab6)
EQUIPMENT/SOFTWARE REQUIRED
One OmniSwitch
One PC
RELATED COMMANDS
Show hardware info, show microcode, show microcode history
show chassis, show cmm, show ni, show power supply, show fan, show temperature
reload, show running-directory, show system, reload working no rollback-timeout, show
microcode
usb enable, mount /uflash, cp /flash/working/boot.cfg /uflash/boot.cfg, umount /uflash
cd, pwd, mkdir, ls, dir, rename, rm, delete, cp, mv, move, chmod, attrib, freespace, fsck,
newfs, snapshot, copy working certified, copy flash-synchro, write memory
SUPPORTED PLATFORMS
All
OmniSwitch Overview
2
It’s important to determine code versions and serial numbers of the switches. These can be
helpful for troubleshooting when dealing with customer support or for upgrading switch
hardware and software.
LAB STEPS
The following will show you how to gather code and module information on a switch.
Gathering Switch Information
Enter the following commands to gather basic switch information about hardware and
software.
Type the following:
-> show hardware info – Information on CPU, Memory, Miniboot.
-> show microcode – Code descriptions and versions.
-> show chassis – Chassis type and part numbers.
-> show cmm – Processor and fabric board information.
-> show ni – Networking interface information.
-> show power – Power supply information.
-> show fan – Fan Information.
-> show temperature – Temperature and temperature threshold.
-> show health – health statistics.
The commands listed on page 1 will tell you the version of code running on the switch as well
as revision level and serial numbers for the modules, power supplies and fans.
Ethernet Port Configuration
You can allow Ethernet ports to auto-negotiate the speed and duplex, or you can manually set
them. Enter the following commands to change and view the configuration of the Ethernet
ports as well as gather frame statistics and error counts:
Enter:
-> show interfaces slot/port – Tells whether the port is active or not as well as
traffic statistics.
-> interfaces slot/port duplex [half,full,auto] – Sets the duplex mode.
-> interfaces slot/port speed [10,100,1000,auto] – Sets the speed.
-> interfaces slot/port admin [up,down] – enable or disable a port.
-> show interfaces status – Display line interface settings
-> show interfaces slot/port accounting – gather frame statistics.
-> show interfaces slot/port counters – gather error and frame counts.
Use ‘?’ to experiment with other interface commands
SUMMARY
This lab briefly introduced you to the hardware and software of an OmniSwitch and how to
gather basic information.
OmniSwitch Overview
3
LAB CHECK
What commands would be used to determine the following?
UBOOT-miniboot Version -> _______________________________
Code Release -> _______________________________
Date of Upgrade -> _______________________________
Chassis Part # -> _______________________________
Chassis MAC-Address -> _______________________________
NI Part Numbers -> _______________________________
OmniSwitch Overview
4
WORKING/CERTIFIED DIRECTORIES
An OmniSwitch provides the user with the ability to keep two separate configurations stored
on the switch. These configurations are stored in the WORKING and CERTIFIED directories.
The switch can boot from either configuration.
LAB STEPS
Working/CERTIFIED Directory
Ensure that there is a console connection to the switch, open your communication
software such as HyperTerminal or ProComm and power cycle the switch.
Default Com Settings:
BPS – 9600
Data Bits – 8
Parity – None
Stop Bits – 1
Flow Control - None
Watch as the switch boots, take note of the various messages that scroll across the screen as
well as which directory the switch is booting from. Once prompted, log in to the switch.
Type the following:
login: admin
password: switch
-> exit
login: admin
password: switch
-> show system
After logging back in, check to see which directory the switch booted from. It will show either
CERTIFIED or WORKING. The switch boots from the CERTIFIED directory when the
configurations in the WORKING and CERTIFIED directories differ. If the configurations are
identical, including code and the boot.cfg file, it will boot from WORKING, this is shown
under ‘Running Configuration’.
Type the following:
-> show running-directory
CONFIGURATION STATUS
Running CMM : PRIMARY,
CMM Mode : DUAL CMMs,
Current CMM Slot : A,
Running configuration : WORKING,
Certify/Restore Status : CERTIFIED
SYNCHRONIZATION STATUS
Flash Between CMMs : NOT SYNCHRONIZED,
Running Configuration : NOT SYNCHRONIZED,
NIs Reload On Takeover : ALL NIs (RUNNING Directories OUT-OF-SYNC)
Now let’s check to see what version of code is running on the switch as well as what files are
stored in both the WORKING and CERTIFIED directories. These topics will be discussed in more
detail in a later lab.
OmniSwitch Overview
5
The switch can be forced to boot from the WORKING directory even if the configurations are
different. If changes were made, but not saved, you will be prompted to confirm the reboot.
Type the following (on Release 6 switches) :
-> reload working no rollback-timeout
Confirm Activate (Y/N) : y
This will reboot the switch, but it will now boot from the WORKING directory. The ‘no
rollback’ parameter tells the switch to continue running under the WORKING directory
permanently rather than rebooting after a specified amount of time.
Once the switch boots, verify that it booted from the WORKING directory.
Type the following:
-> show running-directory
CONFIGURATION STATUS
Running CMM : PRIMARY,
CMM Mode : DUAL CMMs,
Current CMM Slot : A,
Running configuration : WORKING,
Certify/Restore Status : CERTIFIED
SYNCHRONIZATION STATUS
Flash Between CMMs : NOT SYNCHRONIZED,
Running Configuration : NOT SYNCHRONIZED,
NIs Reload On Takeover : ALL NIs (RUNNING Directories OUT-OF-SYNC)
SUMMARY
The WORKING and CERTIFIED directories provide the opportunity to have two different
configurations or versions of code on the switch. The CERTIFIED version can be used as a
backup to the WORKING directory. These two directories will be discussed in more detail in a
later lab.
LAB CHECK
2. What command would be used to determine the version of operating code running on a switch?
OmniSwitch Overview
6
OPERATING SYSTEM
An OmniSwitch provides the user with the ability to keep two separate configurations stored
on the switch. These configurations are stored in the WORKING and CERTIFIED directories.
The switch can boot from either configuration.
LAB STEPS
This lab will introduce the commands necessary to navigate the directory structure of the
switch. Also, to introduce the CLI and line editing feature as well as saving and applying
configuration files.
The switch can be configured using SNMP, WebView or the CLI. In this section, we’ll
concentrate on the CLI, its syntax, and its line-editing feature. The CLI gives you the ability
to search for parameters if the complete command is not known as well as recall and edit
previous commands.
Using ‘?’
A ‘?’ can be used to get a list of possible commands. Additionally, a question mark can be
entered after a command is started to get a list of available parameters.
Type the following:
login: admin
password: switch
-> ?
-> vlan ?
Notice the list of options available with the vlan command. Experiment with this for some
other commands such as ‘show ?’, ‘aaa ?’, or ‘copy ?’; this can be a useful feature when
you are unsure of the entire command.
Also, entering a ‘?’ after a letter or string of letters, will list all commands that begin with
that string.
Type the following:
-> po?
Using <TAB>
Abbreviated commands are not allowed, however, pressing the <TAB> key will automatically
complete any partial commands.
Type the following:
-> sh<TAB> vl<TAB>
OmniSwitch Overview
7
You can now modify the command as necessary. Additionally, you can use the arrow keys
to scroll through previous commands.
You can also display a list of previously entered commands, copy one of those commands
to the CLI, modify it if needed, and re-enter it.
Type the following:
-> show history
-> !# (‘#’ = command number)
You now have the ability to edit the command as needed and re-enter it.You can bring up the
last command that begins with a prefix. Bring up the last command previously entered that
begins with ‘show’. Enter:
-> !show
Directory Structure
It is important to understand the directory structure of an OmniSwitch. Different directories
store different configurations on the switch. There are two main directories, flash/Working
and flash/Certified. Each contains a configuration for the switch. The switch uses basic UNIX
commands to create, delete, move and copy files and directories.
pwd – show current directory.
cd – change directory.
mkdir – create a new directory.
ls – list contents of a directory.
dir – list contents of a directory.
mv – move a file.
cp – copy a file.
rm – remove a file.
Type the following:
-> ls
-> pwd
-> cd /flash/working
-> ls -l (view file date/times including boot.cfg)
-> pwd
-> cd ..
-> cd certified
-> pwd
-> cd /flash
-> pwd
OmniSwitch Overview
8
The above commands created three VLANs with their respective numbers. Entering the
commands makes changes to the Running Configuration. The changes take effect
immediately, but have not been written permanently. To demonstrate this, reboot the
switch.
Type the following :
-> reload working no rollback-timeout
When the switch reboots, login and check to see which VLANs have been created.
Type the following:
-> show vlan
Notice that the VLANs do not exist. This is because the changes were made to the Running
Configuration, but not saved. Let’s do the same again, but this time we’ll save the changes
to the WORKING directory.
Working Directory
The WORKING directory is a directory on the switch where the configuration file and code are
stored. This directory can be read when the switch boots and the configuration stored in the
boot.cfg file will be applied.
Re-Type the following:
-> vlan 2
-> vlan 3
-> vlan 99
-> show vlan
The configuration file the switch reads upon boot is called boot.cfg. The boot.cfg file can
exist in either the WORKING or CERTIFIED directory.
Type the following:
-> write memory
File /flash/working/boot.cfg replaced.
This file may be overwritten if "takeover" is executed before "certify"
The command above writes the running configuration to the boot.cfg file in the WORKING
directory. Now if the switch is rebooted from the WORKING directory, the configuration will
be saved. Let’s reboot the switch, giving it the command to reboot from the configuration
stored in the WORKING directory.
Type the following:
-> reload working no rollback-timeout
When the switch reboots log in and type the command to view the VLANs.
Type the following:
-> show vlan
Notice the VLANs are still there since they were saved to the boot.cfg file in the WORKING
directory and the switch booted from the WORKING directory.
The boot.cfg file contains the switch configuration that gets read when the switch boots, we
will view this file in the next section. By using the parameter ‘no rollback-timeout’ with
the reload command, the switch will permanently run with that configuration. The
‘rollback-timeout’ parameter could be used to have the switch automatically reboot
after a specified amount of time. The following command will cause the switch to reboot to
the WORKING directory, then after 1 minute, reboot again.
-> reload working rollback-timeout 1
OmniSwitch Overview
9
Certified Directory
Recall that the CERTIFIED directory can be used to store a backup configuration on the
switch. When the switch boots, it compares the configurations in both the WORKING and
CERTIFIED directories, if they’re the same it boots from the WORKING directory, if they
differ, it boots from the CERTIFIED directory. Let’s reboot the switch, without telling it to
specifically boot from the WORKING directory (please be aware that in case of two CMMs,
e.g, 9700, a takeover will happened and the secondary CMMs becomes Primary and
former Primary reboots and comes back as Secondary).
Enter:
-> reload
Notice they are gone, this is because the switch booted from the CERTIFIED directory. Enter
the command to show what directory the switch booted from.
Enter:
-> show running-directory
The switch booted from the CERTIFIED directory because the changes saved to the WORKING
directory have not been saved to the CERTIFIED directory, causing the two directories to be
different.
Changes cannot be written directly to the CERTIFED directory, they can only be copied to the
CERTIFIED directory from the WORKING directory. Let’s reboot the switch from the WORKING
directory once again.
Enter:
-> reload working no rollback-timeout
When the switch reboots, log in and enter the command to see which directory the switch
booted from as well the Certify/Restore status.
-> show running-directory
CONFIGURATION STATUS
Running CMM : PRIMARY,
CMM Mode : DUAL CMMs,
Current CMM Slot : A,
Running configuration : WORKING,
Certify/Restore Status : CERTIFIED NEEDED
SYNCHRONIZATION STATUS
Flash Between CMMs : NOT SYNCHRONIZED,
Running Configuration : NOT SYNCHRONIZED,
NIs Reload On Takeover : ALL NIs (RUNNING Directories OUT-OF-SYNC)
Notice that the entry reads ‘CERTIFY NEEDED’. This indicates that the WORKING directory has
not been copied to the CERTIFIED directory. Enter the command to copy the configuration in
the WORKING directory to the CERTIFIFIED directory.
Enter:
-> copy working certified
OmniSwitch Overview
10
The above command “Certifies” the WORKING directory. You now have a backup
configuration stored in the CERTIFIED directory. Enter the command to check the
Certify/Restore status, notice it reads ‘CERTIFIED’.
-> show running-directory
CONFIGURATION STATUS
Running CMM : PRIMARY,
CMM Mode : DUAL CMMs,
Current CMM Slot : A,
Running configuration : WORKING,
Certify/Restore Status : CERTIFIED
SYNCHRONIZATION STATUS
Flash Between CMMs : NOT SYNCHRONIZED,
Running Configuration : NOT SYNCHRONIZED,
NIs Reload On Takeover : ALL NIs (RUNNING Directories OUT-OF-SYNC)
Note: The ‘copy working certified’ command should be used only after the configuration
in the WORKING directory is known to be good (or valid).
Snapshot / Text Based Configuration
The snapshot feature allows a text file to be created based on the current running
configuration. This file can then be uploaded from the switch, manipulated, and applied to
other switches.
The command “more” enables the more mode for your console screen display.
Type the following:
-> show configuration snapshot all
-> write terminal
The commands above list your current running configuration on the screen. You can capture
your configuration to a text file. Either command can be used.
Type the following.
-> configuration snapshot all snapall
The above command creates a snapshot of the entire switch configuration and copies it to a
file called snapall in the current directory.
Type the following:
-> view snapall
The above command will bring up the vi editor but allows you to only view the file. Notice
the syntax of the ASCII file. Use the ‘j’ and ‘k’ keys to scroll up and down respectively.
Note: Entering ‘vi’ instead of ‘view’ will allow you to use the vi editor to edit the file.
Exit from viewing the snapshot file. If vi is used, ‘<esc> :q!’ exits the vi session.
Type the following:
-> :q
OmniSwitch Overview
11
This will copy only the VLAN configuration to a file called snapvlan in the current directory.
Additional options can be specified for creating snapshots. Enter the following to see the
additional parameters and experiment with creating additional snapshots.
Enter:
-> configuration snapshot ?
After running a syntax check, the snapshot can be applied to the switch. Let’s delete some
existing VLANs and then reapply them using the VLAN snapshot.
Enter:
-> no vlan 5-7
-> show vlan
Notice the VLANs have been removed. Apply the VLAN snapshot saved earlier.
-> configuration apply snapvlan
-> show vlan
This will reapply the snapshot file used in the command and recreate VLANs 5, 6, and 7. This
command can be used to apply a snapshot taken from another switch to help make
configuration easier.
OmniSwitch Overview
12
An Alcatel-Lucent certified USB flash drive can be connected the CMM and used to transfer
images to and from the flash memory on the switch. This can be used for upgrading switch code
or backing up files. Additionally, automatic code upgrades as well having the capability to boot
from the USB flash drive for disaster recovery purposes are also supported.
This lab will introduce the Omniswitches usb port utilization. For this lab, we will only
demonstrate how to copy a file from the switch to the USB memory stick.
LAB STEPS
You will need to plug an USB memory stick to the USB port of the Omniswitch.
Then you will type the following commands on Omniswitches to mount and transfer files using
USB flash drive. For this lab, we will only copy the configuration file (boot.cfg) from the
switch to the usb flash driver.
-> usb enable
-> cp /flash/working/boot.cfg /uflash/boot.cfg
Then check that files are well transferred on your USB drive.
-> cd /uflash
-> ls
OmniSwitch Overview
13
LAB STEPS
Before beginning, reboot the switch from the WORKING directory.
Enter:
-> rm /flash/working/boot.cfg
-> reload working no rollback-timeout
When the switch reboots, save the configuration to the boot.cfg file.
Enter:
-> write memory
Steps for connecting to a virtual IP address on the switch
For switches without EMP interface (6450 and 6850E) :
Create a virtual router IP address for VLAN 1 with a class C netmask.
Enter:
-> ip interface VLAN1 address 10.0.1.1/24 vlan 1
Ensure you have IP connectivity by pinging the switch via the PC attached to the switch. Once
IP connectivity has been established, enter the command to show the current status of Web
Management.
Enter:
-> show http
Web Management = on
Web Management Force SSL = off
Web Management Http Port = 80
Web Management Https Port = 443
Bring up a web browser, and enter the IP address of the switch in the URL.
You should still not be able to access the switch. If a message in your browser displays
telling you that Web Management is disabled enter the following to enable Web
Management.
Enter:
-> ip http server
Now that Web Management has been enabled, try connecting again using a web browser using
admin and switch to login. You still do not have the ability to login and configure the switch
with WebView.
You should receive a message indicating an invalid username and password was entered.
Display the current AAA authentication settings.
Enter:
-> show aaa authentication
OmniSwitch Overview
14
Under the HTTP section, it indicates that HTTP access is denied. By default, all remote access
is denied. Let’s enable remote access.
Enter:
-> aaa authentication http local
-> show aaa authentication
This configures the switch to check the local database for any type of login. You could also
have entered ‘aaa authentication default local’ to have it check the local database for
all access methods such as FTP or TELNET. Take note of the various methods of access and
their default values.
Attempt remote access via your browser again, you should have access to the switch.
Try connecting by using https://{IP Address} in your web browser, the communication is now
encrypted using SSL.
Now, look around:
1. Under Networking --- IP (vertical options on left) rollover IP (along horizontal at the
top) and then click on Global. What are the IP Route Preferences?
2. Under Networking --- IP rollover IP and Interfaces then click on Configured.
3. Under System -- Interfaces, click on General. Make note of the MAC address of the
port your PC is connected to. Also, take a look at Statistics (Input and Output).
OmniSwitch Overview
15
This lab is designed to familiarize you with the switch security features of an OmniSwitch.
With this feature, users with different access rights and configuration abilities can be
created.
Security is an important element on an OmniSwitch. In this lab, we’ll discover how to create
users and manipulate the read and write privileges on the switch.
LAB STEPS
Before you begin this lab, remove the boot.cfg file in the working and certified directories,
and type reload, to set your switch back to factory defaults. [You may also need to remove
userTable5 from the network directory.
To view a list of users already created enter the following.
Enter:
show user
You should see at least 2 users: admin and default. Notice the read and write privileges for
each user and domain, as well as the SNMP privileges.
Admin – Default user with full capability to configure the switch and create additional
users.
Default – This account cannot be used to login to the switch. These privileges are applied
to all new users created on the switch. By default, new users have no privileges; however
the privileges of the default user can be modified if desired.
-> show user
User name = admin
Password expiration = None,
Read-Only for domains = None,
Read/Write for domains = All ,
SNMP allowed = NO
User name = default
Password expiration = None,
Read-Only for domains = None,
Read/Write for domains = None ,
Snmp Allowed = NO
As you can see, new users have no administrative rights by default. (In the next section we’ll
see how to create new users and configure administrative rights for them).
Creating/Deleting Users
If the user accounts of userread and userwrite have already been created, then use the
following commands to delete them before continuing.
Enter:
-> no user userread
-> no user userwrite
-> write memory
Next, we’ll create two new users called userread and userwrite, assign them passwords, and
save the configuration.
OmniSwitch Overview
16
Enter:
-> user userread password userread
(You have created a new user, but they can’t do anything yet. You don’t have
privileges because the default user privileges get assigned to all new users, and the
default user has no privileges. If you do not set the privilege for a user, that user will
not even be able to login).
-> user userread read-only ip
-> user userwrite password userwrite
-> user userwriteIread-write ip
-> write memory
You will now log back in with either of these users. Then attempt to enter four commands
(show vlan, show ip interface, ip interface…, and reload).
Enter:
-> exit
login: userread
password: ********
-> show vlan
-> show ip interface
-> ip interface vlan-1-20 address 192.168.20.1/24 vlan 1
-> reload
Which of these four commands worked? Try running various commands to see what access
your privileges have given you.
-> show vlan
ERROR: Authorization failed. No functional privileges on this command
Login as userwrite and attempt the same three commands. What have you learned?
Now, log back in under the admin account and enter the command to see the new users.
Enter:
-> exit
login: admin
password: *****
-> show user
You will see the privileges you assigned to userread and userwrite.
User name = userread
Password expiration = None,
ReadOnly for domains = ,
Read only for families = ip ,
Read/Write for domains = None,
SNMP allowed = NO
Now let’s change the privileges of userread and then view the changes.
Enter:
-> user userread read-only all
-> show user userread
-> write memory
OmniSwitch Overview
17
You should now see that this user has full read access.
-> show user userread
User name = userread
Password expiration = None,
Read-Only for domains = All,
Read/Write for domains = None ,
SNMP allowed = NO
Log in as userread and type the following commands. Notice you now have the ability to view
the information.
Enter:
-> exit
login: userread
password: ********
-> show vlan
-> show user
-> show chassis
Now let’s test the ability of this user to make changes to the switch.
Enter:
-> vlan 2
You will get an error saying you’re not authorized. This is because userread only has read
privileges, not write privileges.
-> vlan 2
ERROR: Authorization failed. No functional privileges on this command
Log back in under admin and modify the privileges of userwrite to allow changes to the
switch.
Enter:
-> exit
login:admin
password: *****
-> user userwrite read-write all
-> show user userwrite
-> write memory
You should now see that this user has full write privileges.
-> show user userwrite
User name = userwrite
Password expiration = None,
Read-Only for domains = None,
Read/Write for domains = All ,
SNMP allowed = NO
Login as userwrite, and enter the command to create a VLAN. You can now create VLANs
since you have full write privileges.
Enter:
-> exit
login: userwrite
password: *********
-> vlan 2
PARTITION MANAGEMENT
You can give users privileges based on specific commands or groups of commands known as
domains. This is known as Partition Management.
Let’s modify the privileges of userread and only give permission to run commands in the
Layer2 domain.
OmniSwitch Overview
18
Enter:
-> user userread read-only none
-> user userread read-only domain-layer2
-> show user userread
-> write memory
This gives the user read-only privileges to the commands under the Layer2 domain.
-> show user userread
User name = userread,
Password expiration = None,
Read-Only for domains = Layer 2,
Read/Write for domains = All ,
SNMP allowed = NO
Login in as userread and run the following commands.
Enter:
login: userread
password: ********
-> show vlan
-> show running-directory
You have the ability to run VLAN commands since they are under the layer2 domain.
However, the ‘running-directory’ command will fail since you do not have access to the
admin domain.
-> show running-directory
ERROR: Authorization failed. No functional privileges on this command
A list of the domains and the associated commands are available in the user guide. The
same domain privileges can be applied for write access also.
Authenticated Switch Access
ASA provides the ability to restrict which users are able to configure the switch remotely.
Switch login attempts can be challenged via the local database, or a remote database such as
RADIUS or LDAP. ASA applies to Telnet, FTP, SNMP, SSH, HTTP, and the console and modem
ports.
Enter the following to configure the switch to check the local database when a TELNET
connection is attempted.
Enter:
-> aaa authentication telnet local
Ensure you have IP connectivity through a virtual router interface as shown in the Remote
Access lab. Perform the following to test TELNET connectivity.
Telnet to the IP address on the switch from your PC
login: admin
password: *****
You will now be allowed to access the switch using a TELNET connection. This capability can
be disabled if desired. From your console connection, perform the following to check the
remote access status and then disable it.
Enter:
-> show aaa authentication
OmniSwitch Overview
19
Notice that it shows TELNET authentication is being done locally, or by the switch’s internal
database. No external authentication (RADIUS, LDAP) is being done at this time.
-> show aaa authentication
Service type = Default
1rst authentication server = local
Service type = Console
1rst authentication server = local
Service type = Telnet
Authentication = Use Default,
1rst authentication server = local
Service type = Ftp
1rst authentication server = local
Service type = Http
Authentication = Use Default,
1rst authentication server = local
Service type = Snmp
1rst authentication server = local
Service type = Ssh
Authentication = Use Default,
1rst authentication server = local
Now, let’s disable TELNET access and try connecting once again. From your console
connection enter the following.
Enter:
-> no aaa authentication telnet
-> show aaa authentication
Service type = Default
1rst authentication server = local
Service type = Console
1rst authentication server = local
Service type = Telnet
Authentication = Denied,
Service type = Ftp
1rst authentication server = local
Service type = Http
Authentication = Use Default,
1rst authentication server = local
Service type = Snmp
1rst authentication server = local
Service type = Ssh
Authentication = Use Default,
1rst authentication server = local
OmniSwitch Overview
20
Let’s begin by creating a few VLANs and a new user called customer1.
Enter:
-> vlan 100
-> vlan 200
-> vlan 300
-> user customer1 password customer1
Now, let’s create an End-User Profile with read-write access but limit the profile to VLANs
100-200.
Enter:
-> end-user profile profile1 read-write all
-> end-user profile profile1 vlan-range 100-200
-> end-user profile profile1 port-list 1/1-12
Now associate the user to the profile and save the configuration.
-> user customer1 end-user-profile profile1
-> write memory
Logout out and then log back in under the newly created user account. Then run the
commands listed below. Notice that you do not have access to VLAN 300 since it is not part of
the user profile for customer 1.
-> exit
login: customer1
password: *********
-> show vlan
-> vlan 300 port default [slot /port] ( port within the range 1-12 as specified in
the end-user-profile profile1)
(For instance, use slot/port 1/5)
Password Expiration
An administrator has the ability to set the expiration date on passwords. It can be set in days
or at a specific date and time. Let’s change the password expiration time to 5 days for
customer1.
Log in under admin.
-> user customer1 expiration 5
-> write memory
Log in under customer1
The switch now informs you that your password expires in 5 days.
OmniSwitch Overview
21
SUMMARY
This lab introduced you to the Operating System of an OmniSwitch. The WORKING and
CERTIFIED directories allow multiple configurations to be stored on the switch. The CERTIFIED
configuration can be used as a backup in case of any mis-configurations to the WORKING
directory. Once a WORKING configuration is known to be valid, it can then be copied to the
CERTIFIED directory, and used as a backup.
The snapshot feature can be helpful if you have a number of switches with similar
configurations, perhaps with only IP addresses having to be changed. Saving the configuration
to an ASCII file, modifying it, then applying it to a different switch can make configuring a
group of switches easier.
It introduced also the WebView remote access feature. WebView can be used to configure the
switch using a Web Browser instead of the CLI. Additionally, using the SSL feature, the
communication can be encrypted between the browser and the switch.
As well as the authenticated access feature of an OmniSwitch. Using this feature an
administrator is able to configure a security scheme to allow only authorized users access to
the switch. Additionally, read and write privileges as well as remote access can be strictly
controlled.
LAB CHECK
1. What command is used to create a text-based listing of all or part of your configuration?
2. What is the UNIX command used to list the contents of a text file?
3. What is the command one would use to verify a text-based configuration file?
5. How does one save configuration changes into the working directory?
6. How does one make a configuration the default for the switch?
8. How does one take a text-based configuration (or snapshot) and invoke it as the switch configuration?
10. What three things must you do on an OmniSwitch before you can start a WebView session?
11. Where would you go in WebView to set the Inactivity Timer for Web Management from the default time
of 4 minutes?
12. What command would one use to create a user “vlan3user” with password “password”?
OmniSwitch Overview
22
SECURE SHELL
This lab is designed to familiarize you with the SSH feature on an OmniSwitch.
Secure Shell provides a secure (encrypted) mechanism to remotely login to an OmniSwitch as
well as securely transfer files.
LAB STEPS
In order to demonstrate the SSH and SFTP capabilities of an OmniSwitch, let’s connect two
OmniSwitches using VLAN 1 with the appropriate IP addresses to allow IP connectivity. Perform
the following:
Connect the two OmniSwitches together using slot/port 1/20 on Switch X3 (OS6900) and 1/24 on
Switch X2 (OS6850) by enabling appropriate ports.
Note: Replace ‘X’ with your pod number.
On switch X3, type the following:
-> interfaces 1/20 admin-state enable
-> ip interface int_v1 address 192.168.10.3 vlan 1
Now that we have IP connectivity and have enabled the switch to accept SSH connections,
establish an SSH session from each switch to his neighbor.
From switch X2, type the following:
-> ssh 192.168.10.3
login as: admin
OS6900 S2
Password: switch
Once the Secure Shell session is established, you may want to verify by using the who command
as well as run some commands.
-> who
-> show vlan
-> show ip interface
-> exit
An SSH session can be used to securely manage a remote switch. Additionally, you can use SFTP
to securely transfer files to and from a remote switch.
OmniSwitch Overview
23
SUMMARY
This lab introduced the Secure Shell functionality of the OmniSwitch. Secure Shell and Secure
FTP can be used to securely manage and transfer files to and from remote switches.
OmniSwitch Overview
ALCATEL-LUCENT OMNISWITCH ACCESS
SWITCHING – CONFIGURATION AND MANAGEMENT
OMNISWITCH ACCESS SWITCHING – CONFIGURATION AND MANAGEMENT
How to
familiarize you with the image files stored int the switch and how to
upgrade code
Contents
1 CURRENT CODE VERSION ....................................................................... 2
1.1. Gathering Switch Code Version ...................................................................... 2
2 Transferring files using FTP .................................................................. 3
2.1. Setting up FTP session ................................................................................ 3
2.2. Upgrading the code version .......................................................................... 3
2.3. Lab Check ............................................................................................... 4
2
Installing and Upgrading Code
Implementation
Ask your instructor where the switch code is located before continuing
For additional information in transferring files using zmodem or FTP consult the user manual
or ask your instructor.
- Open a console session to switch 6450-A or B with the following authentication credentials:
Login: admin
Password: switch
- Before performing any upgrades check the current versions of code on the switch.
- Type the following:
-> show microcode loaded – Version currently loaded
-> show microcode working – Version in WORKING directory
-> show microcode certified – Version in CERTIFIED directory
- These commands give you an explanation of each image file and its current version for the various
directories.
-> show microcode working
Package Release Size Description
-----------------+---------------+--------+-----------------------------------
Gbase.img 6.6.4.425.R01 17499295 Alcatel-Lucent Base Software
Gos.img 6.6.4.425.R01 1864653 Alcatel-Lucent OS
Geni.img 6.6.4.425.R01 5470896 Alcatel-Lucent NI software
Gsecu.img 6.6.4.425.R01 607273 Alcatel-Lucent Security Management
Gdiag.img 6.6.4.425.R01 1599514 Alcatel-Lucent Diagnostic Software
3
Installing and Upgrading Code
Are the contents in the WORKING and CERTIFIED directory the same? Why?
- Remove configuration from previous labs and reboot the switch from the WORKING directory
- Type the following:
-> rm /flash/working/boot.cfg
-> reload working no rollback-timeout
- After the switch reboots, save the configuration to the boot.cfg file
-> write memory
Ask your instructor how to open and configure a virtual client when using the remote lab.
- Assign an IP address within the same subnet to your PC an ensure there is IP connectivity by pinging the
switch from the PC.
Before you can transfer the files using FTP, you must configure the switch to accept FTP
connections
- Have your instructor show you where to get the code for upgrading the switch if necessary.
- Use an FTP program or the command line to FTP from the PC to the switch.
- Once connected, type the following command to display the current directory:
-> pwd
- Reboot the switch forcing it to load from the now upgraded WORKING directory.
-> reload working no rollback-timeout
- Once the switch has rebooted and everything is functioning properly, use the command below to copy the
WORKING directory to the CERTIFIED directory.
-> copy working certified
AOS
OMNISWITCH AOS 6250,6450 & 6850E -
STACKING
OmniSwitch 6250/6400/6450/6850E Stacking - Overview
All of the models in the same family
are stackable
Only 6250, or 6400, or 6450, or 6850E or Distributed and
20G full
resilient
6855-U24X management duplex
stack loop
Dedicated 2 stacking links on each
Smart
model Continuous
Switching
Up to 2 or 8 chassis in a stack
384 Gigabit ports
16 10 Gig ports
Image /
PoE and non-PoE can be mixed config
rollback
Virtual chassis, single IP for
management 802.3ad
802.1w
Primary, secondary, idle and pass- Hot swap OSPF
through elements in the stack everything ECMP
VRRP
Each module in the stack is capable to
act as Primary
Stack module IDs are set using CLI and
displayed on the panel -> more boot.slot.cfg
boot slot 1
OmniSwitch Stacking - Overview
OmniSwitch 6450
2 stacking/uplink ports on 6450-10
5G Full Duplex 2 units maximum in a stack of 6450-10
Dedicated 2 –10 Gigabit stacking links on 6450-
stacking 24/48/U24
Up to 8 units in a stack of 6450-24/48/U24
OmniSwitch 6855 Stacking - Overview
Two 10G SFP+ Ports at the back of the unit can
be used either as stacking or uplinks -> interfaces 1/25 mode stacking
WED Nov 04 09:08:29 : HSM-CHASSIS (101) info message:
+++ Ni 1 Port 25,26 are set to stackable for next boot:OK
-> reload working no rollback-timeout
OmniSwitch 6855-U24X ONLY!
Cannot be mixed with any other models
Stack Manager is the first process (present on all CMM ’s) to be started
for CMM Role election during Stack boot up
OmniSwitch Stacking - “Slot-Id” setup
A switch uses a unique Slot-Id in the virtual stack. This Slot-Id can be:
Dynamically assigned in case no “boot.slot.cfg” file (or in case of out-of-the-
box)
All switches are interconnected and boot up within a 15s timer (MAC @ method)
The switch with the lowest MAC @ will get Slot-Id 1, and then gets the role Primary
The switch connected to the Primary switch on Stack port A, gets Slot-Id 2 and becomes
Secondary
The switch connected on Stack port A of the secondary gets Slot-Id 3 and becomes Idle, and…
All switches are interconnected, but a timer of 15s elapses between each switch startup
(Chassis uptime method)
The first started switch gets Slot-Id 1 and uses Primary role
The second started switch (but connected to the Primary), gets Slot-Id 2, and becomes Secondary
The third started switch, connected to one of the previous ones, gets Slot-Id 3, and becomes
Idle…
Manually assigned, the slot-Id is managed switch by switch
All switches boot up simultaneously, the Slot-Id 1 become Primary…
OmniSwitch
Stacking supervision
Checking the stack status
show stack topology
Link A Link A Link B Link B
NI Role State Saved Link A Remote Remote Link B Remote Remote
Slot State NI Port State NI Port
----+-----------+--------+------+-------+-------+-------+-------+-------+-------
1 PRIMARY RUNNING 1 UP 1001 StackB UP 1003 StackA
1001 PASS-THRU DUP-SLOT 1 UP 1002 StackB UP 1 StackA
1002 PASS-THRU DUP-SLOT 1 UP 1003 StackB UP 1001 StackA
1003 PASS-THRU DUP-SLOT 1 UP 1 StackB UP 1002 StackA
In this example all switches started simultaneously. All of them had the
“1” as their ID in their corresponding “boot.slot.cfg” file
The upper one on the list has the lowest MAC address and is given the
“Primary” role
The Primary switch assigns “1001, 1002 & 1003” to the other switches
This can be checked with the Slot LED on the front panel of the switches.
“1, 2 & 3” digits are blinking whereas the Primary displays a fixed “1”
Omniswitch
“Pass Through” role modification
New slot-id will be written on the flash and will be in effect after the next
reboot
reload all(1)
Confirm Reload All (Y/N) : Y
OmniSwitch - Rebooting the stack or the CMM
Resetting all the stack at once (Remember that the stack must be
synchronized!)
“reload all”
At next startup, the switch with lowest slot-id becomes “Primary”, the following one
becomes “Secondary”… But it can be on “Certified” partition if the there is a difference
between Working/Certified
Default mechanism
If inserting a switch with a duplicated Slot-id, the Primary CMM
automatically detects it:
FRI JAN 13 14:05:26 : STACK-MANAGER (27) warning message:
+++ == SM == Duplicate slots: 1 - Remote must relinquish its slot number
FRI JAN 13 14:05:27 : STACK-MANAGER (27) warning message:
+++ == SM == An element(253) enters passthru mode (duplicate slot)
Working Certified
Primary
CMM
Running
Working Certified
Switch Slot 8
OmniSwitch - Stack Synchronization - Example
-> write-memory
Working Certified
Primary
CMM
Running
Working Certified
Switch Slot 8
OmniSwitch - Stack Synchronization - Example
-> copy working certified
Working Certified
Primary
CMM
Running
Working Certified
Switch Slot 8
OmniSwitch - Stack Synchronization - Example
-> copy flash-synchro
Working Certified
Primary
CMM
Running
Working Certified
Switch Slot 8
OmniSwitch - Stack Synchronization - Example
-> copy flash-synchro – automatic certification
Working Certified
Primary
CMM
Running
Working Certified
Switch Slot 8
OmniSwitch - Stack Synchronization - Example
Stack is now synchronized
Working Certified
Switch Slot 8
OmniSwitch - Software System Architecture
-> show running-directory
CONFIGURATION STATUS
Running CMM : PRIMARY,
CMM Mode : DUAL CMMs,
Current CMM Slot :A
Running configuration : WORKING,
Certify/Restore Status : CERTIFIED
SYNCHRONIZATION STATUS
Flash Between CMMs : SYNCHRONIZED,
Running Configuration : SYNCHRONIZED,
NIs Reload On Takeover : NONE
OmniSwitch 6250/6400/6850E
Allows a stack of switches to retain the MAC address of the primary switch for a
fixed or indefinite time, even after multiple takeovers.
Makes the system resilient to failures of the current primary
Smart Continuous Switching for the stack-based products
Reduces disruption of services during failure of primary
Primary
• If primary element in Stack 1 fails
Secondary
X (Power or hardware failure) then:
• Secondary becomes the new
primary and shares the MAC address
of the former primary of the stack
• Retention of the base MAC address
is acceptable
Virtual Chassis - MAC Retention
LACP Primary
all LACP ports torn down and
restarted
IP X
Gratuitous ARP packets are sent HW Sec X 00:D0:95:E6:DD:E4
tables updated, incoming routed Primary
traffic - disrupted
With MAC retention
Idle
New primary use the MAC of the old one
User configurable (disabled by default) Sec
A trap is raised to notify the administrator of
possible duplicate MACs Idle
Releasing the MAC address currently being used as the primary base MAC
-> mac release
1 OBJECTIVE
This lab is designed to familiarize you with the concept of Virtual chassis. In addition to their working as
individual stand-alone switches, OmniSwitch 6450 switches can also be linked together to work as a single
virtual chassis known as a stack. With stacks, users can easily expand their switching capacity simply by
adding additional switches to the stack. In addition, stacks provide enhanced resiliency and redundancy
features.
Notes
You cannot mix OS6450, OS6850 and OS6250 switches in the same stack - all switches in a stack must be from
the same family but can be different models within the family.
3 Equipment/Software Required
2 OmniSwitch 6850 or 6450 or 6250
1 PC
4 Related Commands
show hardware info, show chassis, show stack topology
Stack set slot, show cmm, show ni, show power supply, show fan, show temperature
Reload primary, reload secondary
5 Supported Platforms
OmniSwitch 6850, 6450 and 6250
3
Virtual Chassis - Stacking
Do not insert stacking cables at this time in any of the two switches.
When planning the stack cabling configuration, keep in mind that by default the switch connected to stacking
port A of the primary switch will be assigned the secondary management role.
To avoid a pass-through condition following a reboot, make sure that all saved slot values for the two
switches are unique.
Prior to beginning this lab remove any prior configurations from all switches to ensure any previous labs do
not affect the outcome. Also, remove any pre-configured slot configuration by removing the
/flash/boot.slot.cfg file and reboot the switch. For the remote-lab, reset the pod.
After the reboot and synchronization of the stack, you should now see what was the secondary switch as the
Primary :
4
Virtual Chassis - Stacking
CMM in slot 2
Model Name: OS6450-10,
Description: CMM,
Part Number: 903005-90,
Hardware Revision: 08,
Serial Number: P0980781,
Manufacture Date: FEB 27 2013,
Firmware Version: n/a,
Admin Status: POWER ON,
Operational Status: SECONDARY,
Power Consumption: 0,
Power Control Checksum: 0xe489,
CPU Model Type : MV88F6281 Rev 2,
MAC Address: e8:e7:32:78:ae:ac,
-> ls
Switch 5
Switch 6
-> more boot.slot.cfg
boot slot 2
->
5
Virtual Chassis - Stacking
Notes
Although, for ease-of-management purposes, it is recommended that slot numbers are assigned beginning with
slot number 1, it is not a requirement. In other words, a stack of four switches can have slot assignments 3, 4,
5, and 6. However, it is important that each element in a stack is assigned a unique slot number. Do not assign
duplicate slot numbers to elements in a stack. Otherwise, one or more switches will be forced into pass-
through mode. It is also recommended that Slot's are configured from the top down to ease of management
purposes.
CONFIGURATION STATUS
Running CMM : PRIMARY,
CMM Mode : DUAL CMMs,
Current CMM Slot : 1,
Running configuration : WORKING,
Certify/Restore Status : CERTIFY NEEDED
SYNCHRONIZATION STATUS
Flash Between CMMs : SYNCHRONIZED,
Running Configuration : SYNCHRONIZED,
6
Virtual Chassis - Stacking
Chassis 1
Model Name: OS6450-10,
Description: 8 10/100/1000 + 2 Combo + 2 5G STK/UPLINK,
Part Number: 903005-90,
Hardware Revision: 08,
Serial Number: P0980885,
Manufacture Date: FEB 27 2013,
Admin Status: POWER ON,
Operational Status: UP,
Number Of Resets: 26
MAC Address: e8:e7:32:78:af:ee,
Chassis 2
Model Name: OS6450-10,
Description: 8 10/100/1000 + 2 Combo + 2 5G STK/UPLINK,
Part Number: 903005-90,
Hardware Revision: 08,
Serial Number: P0980781,
Manufacture Date: FEB 27 2013,
Admin Status: POWER ON,
Operational Status: UP,
MAC Address: e8:e7:32:78:ae:ac,
-> show ni
Module in slot 1
Model Name: OS6450-10,
Description: 8 10/100/1000 + 2 Combo + 2 5G STK/UPLINK,
Part Number: 903005-90,
Hardware Revision: 08,
Serial Number: P0980885,
Manufacture Date: FEB 27 2013,
Firmware Version: ,
Admin Status: POWER ON,
Operational Status: UP,
Power Consumption: 0,
Power Control Checksum: 0x7090,
CPU Model Type : ARM926 (Rev 1),
MAC Address: e8:e7:32:78:af:f0,
ASIC - Physical 1: MV88F6281 Rev 2,
FPGA - Physical 1: 006/00,
UBOOT Version : n/a,
UBOOT-miniboot Version : 6.6.3.259.R01,
POE SW Version : n/a
Module in slot 2
Model Name: OS6450-10,
Description: 8 10/100/1000 + 2 Combo + 2 5G STK/UPLINK,
Part Number: 903005-90,
Hardware Revision: 08,
Serial Number: P0980781,
Manufacture Date: FEB 27 2013,
Firmware Version: ,
Admin Status: POWER ON,
Operational Status: UP,
Power Consumption: 0,
Power Control Checksum: 0xe489,
CPU Model Type : ARM926 (Rev 1),
MAC Address: e8:e7:32:78:ae:ae,
ASIC - Physical 1: MV88F6281 Rev 2,
7
Virtual Chassis - Stacking
Using the reload ni <slot> command, it’s possible to reload a specific switch within Stack :
-> reload ni 2
When the switch finishes booting, from the primary check the stack topology:
Had we rebooted both switches, the one with the lower MAC would have been the primary switch. Since we
just changed slot 2's configuration this did not occur. To bring the switch in pass-thru mode back to normal
let's change the slot number back and reload the entire stack:
-> stack set slot 1001 saved-slot 2
-> reload all
Confirm Reload All (Y/N) : y
-> vlan 2
-> copy running-config working
File /flash/working/boot.cfg replaced.
This file may be overwritten if "takeover" is executed before "certify"
->
-> copy working certified
CONFIGURATION STATUS
Running CMM : PRIMARY,
CMM Mode : DUAL CMMs,
Current CMM Slot : 1,
Running configuration : WORKING,
Certify/Restore Status : CERTIFIED
SYNCHRONIZATION STATUS
Flash Between CMMs : NOT SYNCHRONIZED,
Running Configuration : NOT SYNCHRONIZED,
Stacks Reload on Takeover: ALL STACKs (SW Activation)
CONFIGURATION STATUS
Running CMM : PRIMARY,
CMM Mode : DUAL CMMs,
Current CMM Slot : 1,
Running configuration : WORKING,
Certify/Restore Status : CERTIFIED
11
Virtual Chassis - Stacking
SYNCHRONIZATION STATUS
Flash Between CMMs : SYNCHRONIZED,
Running Configuration : SYNCHRONIZED,
Stacks Reload on Takeover: PRIMARY ONLY
In order to synchronize the time and date settings between primary and secondary switches, enter the
following command:
Flash Space:
Primary CMM:
Available (bytes): 57632768,
Comments : None
7 Test of resiliency
-> takeover
Confirm Takeover (Y/N) :
->
MON JAN 01 02:58:05 : INTERFACE (6) info message:
+++ NIs are ready
Successfully sent the I2C
9 Summary
This lab briefly introduced you to the OmniSwitch virtual chassis concept.
13
Virtual Chassis - Stacking
10 Lab Check
1) What commands would be used to perform the following?
.....................................................................................................................
2) Determine the Slot number of primary switch
.....................................................................................................................
3) Cause the secondary switch to take over the functions of the primary switch
.....................................................................................................................
4) Reboot the primary CMM only
.....................................................................................................................
5) Which role is assuming by each of the switches
.....................................................................................................................
6) Reload all modules in one way
.....................................................................................................................
7) Determine which stacking cables connected to which switch
.....................................................................................................................
8) Verify if redundant stacking cable is currently installed
.....................................................................................................................
OMNISWITCH AOS R6/R7/R8
VLAN Management
VLAN Management - Module objectives
You will:
Understand the VLAN implementation and
features on AOS based switches
Learn how to:
Deploy static or dynamic VLAN in order to
segment a network
Configure VLAN Tagging over Ethernet links
DHCP Client High
Ava ila bility
Implement and monitor the MVRP protocol
AOS
Opera ting
System
Extensive Enha nced
Ma na gea bility Security
VLANs - Overview
VLAN - Virtual LAN
A broadcast domain
Ease of network management
Provides a more secure network
VLAN
Yellow
VLAN
Blue
Red
VLAN
Static VLAN Membership
Static VLAN
VLAN is assigned to the data port (aka the default VLAN of the port).
By default, all ports belong to VLAN 1.
Segmentation of VLANs is done according to topology, geography, etc.
VLAN 1
1/2
Virtual Router
VLAN 2
VLAN 4
VLAN 5
1/4
VLAN 6
1/6
*chassis/slot/port for R8
VLANs - CLI
Defining a VLAN
-> vlan 2
Optional commands
-> vlan 4 enable (R6)
-> vlan 4 admin-state enable (R7/8)
-> vlan 4 name Engineering
Use quotes around string if the VLAN name contains multiple words with spaces between them
-> vlan 10-15 100-105 200 name “Training Network”
Monitoring
-> show vlan 4
-> show vlan port (R6)
-> show vlan members (R7/8)
-> show ip interface
Static VLAN assignment configuration
Example
VLAN VLAN
Data Voice DHCP Server
IP Phone
Data VLAN Voice VLAN
VLAN 2 VLAN 3
dynamic @IP dynamic @IP
VLAN 1
Virtual Router
VLAN 2
VLAN
VLAN 4
VLAN 5
VLAN 6
Dynamic VLAN Membership
Dynamic assignment.
Applies only to mobile (R6) or UNP (R7/8)* ports
Requires additional configuration of VLAN rules or UNP classification rules*.
Appletalk devices
IPX network/protocol MAC Address
Single
Range
Protocol
IP
IPX
DECNET
APPLETALK
Specified by Ether-type
Specified by DSAP and SSAP
Specified by SNAP
192.168.10.0/24
Network Layer Address
IP Subnet
IPX network number
0005d3:123456
Dynamic VLAN Membership - DHCP Policy
DHCP VLAN Membership
DHCP PORT policy
Devices generating DHCP requests on these ports
2 BootP Relay delivers request
to DHCP server
DHCP MAC/MAC Range policy 1 Client needing IP address appears
Devices with specified MAC addresses generating
in default DHCP VLAN
DHCP requests
BootP Relay
BootP Relay
DHCP Generic policy
Any DHCP packet (one rule per switch)
Without internal BootP Relay entity DHCP 3 After receiving IP address, now
frames are only forwarded to ports within participates in authorized VLANs
the VLAN
With an internal BootP Relay entity DHCP
frames are forwarded to the Relay
Dynamic VLAN Membership - Binding Policy (R6)
A device must match multiple criteria for assignment to a VLAN
Failure to match all criteria is a “violation” and the device is not assigned to any VLAN
If user’s IP changes while connected
Users will be disconnected 192.168.10.2 192.168.10.3
Trap will be generated AAAAAA:AAAAAA BBBBBB:BBBBBB
192.168.10.4
3/3 DDDDDD:DDDDDD
Successful login
The client MAC is associated with the correct VLAN
Switch running
Authentication Agent
Host
Using
802.1x Default
client RADIUS, TACACS+, or LDAP
VLAN
Server
Supplicant
User
Target
VLAN
Monitoring
-> show vlan 4
-> show vlan port
-> show vlan rules
-> show vlan 4 rules
-> show vlan port mobile
Vlan Mobility rules
Example
VLAN VLAN
Data Voice DHCP Server
IP Phone
Data VLAN Voice VLAN
VLAN 2 VLAN 3
dynamic @IP dynamic @IP
1. Frame Type
2. DHCP MAC
3. DHCP MAC Range
4. DHCP Port
5. DHCP Generic
6. MAC-Port-IP
7. MAC-Port Binding
8. Port-Protocol Binding
9. MAC Address
10. MAC Range
11. Network Address
12. Protocol
13. Default (No Match -> port default VLAN)
VLAN Mobility
Default behaviour
Default VLAN handling (renaming)
Default VLAN
-> vlan port slot/port default vlan {enable | disable}
Enabled -> user will join default VLAN when no rule matches (default)
Disabled -> user’s traffic will be dropped, when no rule matches
Enabled -> user will join default VLAN when traffic ages out (default)
Disabled -> user will remain in the VLAN membership even after traffic ages out
VLANs
IEEE 802.1Q
Aggregates multiple VLANs across Ethernet links
Combines traffic from multiple VLANs over a single link
Encapsulates bridged frames within standard IEEE 802.1Q frame
Enabled on fixed ports
Tags port traffic for destination VLAN
Tagged Frames
802.1Q
VLAN Tag 802.1P
802.3 MAC header change Three bit field within 802.1Q header
4096 unique VLAN Tags (addresses) Allows up to 8 different priorities
VLAN ID == GID == VLAN Tag Feature must be implemented in hardware
4 Bytes
VLANs
802.1Q Configuration
-> vlan 1-3
VLAN 3 VLAN 3
3/4 VLAN 2
3/4
VLAN 2
VLAN 1 VLAN 1
-> show vlan 2 port
-> show 802.1q 3/4 (R6)
-> show vlan members (R7/8)
*chassis/slot/port for R8
VLAN - Mobile Tag
Allows the dynamic assignment of mobile ports to more than one VLAN at the
same time
Enabled on mobile ports
-> vlan 3 mobile-tag enable
Allows mobile ports to receive 802.1Q tagged packets
Enables the classification of mobile port packets based on 802.1Q VLAN ID tag 3
Takes precedence over all VLAN Rules
OmniPCX
Communication Enterprise
Server
Voice VLAN
Tagged packets
Data VLAN
With tag=3
Default VLAN
VLAN mobile - Tagging vs 802.1Q tagging
IP is enabled by default.
-> ip interface name [address ip_address] [mask subnet_mask] [admin [enable | disable]]
[vlan vid] [forward | no forward] [local-proxy-arp | no local-proxy-arp] [eth2 | snap]
[primary | no primary]
MULTIPLE VLAN REGISTRATION PROTOCOL
IEEE 802.1ak - MVRP
MVRP close to GVRP operation
Controls and signals dynamic VLAN registration entries across the bridged
network
Standards-based Layer 2 network protocol
MVRP sends one PDU that includes the •Static VLAN •Dynamic VLAN (GVRP/ MVRP)
state of all 4094 VLANs on a port
VLAN10 VLAN11
IEEE 802.1ak MVRP
CLI configuration
MVRP is supported only in STP flat mode
-> mvrp ?
transparent-switching port maximum linkagg enable disable clear-statistics
-> mvrp {enable | disable}
Enables/Disables MVRP on a switch globally
-> mvrp {linkagg <agg_num [-agg_num2]> | port <slot/port [– port2]>} { enable | disable}
Enables/Disables MVRP on specific port(s) or aggregate(s) on the switch
-> mvrp {linkagg <agg_num [-agg_num2]> | port <slot/port [– port2]>} registration {normal | fixed |
forbidden}
Normal: both registration and de-registration of VLANs are allowed
VLANs can be mapped either dynamically (through MVRP) or statically (through management application) on such a port
Fixed: Only static mapping of VLANs is allowed on the port but de-registration of previously created dynamic or
static VLANs is not allowed
Forbidden: dynamic VLAN registration or de-registration is not allowed on the port. Any dynamic VLAN created
earlier will be deregistered
IEEE 802.1ak MVRP
CLI configuration
-> mvrp {linkagg <agg_num [-agg_num2]> | port <slot/port [– port2]>} applicant {participant | non-
participant | active}
applicant mode determines whether or not MVRP PDU exchanges are allowed on a port depending on the Spanning
Tree state of the port
Normal participant: State machine participates normally in MRP protocol exchanges for forwarding ports only
Non-participant: State machine does not send any MRP message
Active: State machine participates normally in MRP protocol exchanges for both forwarding and blocking ports. This
is an Alcatel-Lucent proprietary mode
-> mvrp {linkagg <agg_num [-agg_num2]> | port <slot/port [– port2]>} restrict-vlan-registration vlan
<vlan-list>
Restricts MVRP processing from dynamically registering the specified VLAN(s) on the switch
IEEE 802.1ak MVRP
CLI monitoring
-> show mvrp ?
timer statistics port linkagg configuration
Contents
1 OBJECTIVE...................................................................................... 2
2 VLANs ........................................................................................... 2
3 Equipment/Software Required .............................................................. 2
4 Related Commands............................................................................ 2
5 Supported Platforms .......................................................................... 2
6 Lab Steps ....................................................................................... 2
6.1. Creating Additional VLANs ........................................................................... 6
6.2. Mobility .................................................................................................. 8
7 Summary ...................................................................................... 10
8 Lab Check .................................................................................... 10
2
VLANs
1 OBJECTIVE
This lab is designed to familiarize you with VLANs on an OmniSwitch.
2 VLANs
VLANs provide the ability to segregate a network into multiple broadcast domains. This can be done
statically or dynamically by creating policies. Additionally, Virtual Router ports can be assigned to VLANs
to allow traffic to be switched at Layer 3.
3 Equipment/Software Required
One OmniSwitch (Any Model)
2 or more PCs.
4 Related Commands
vlan, show vlan, show vlan [vid], ip interface,
show vlan [vid] ports, vlan [vid] ip, vlan [vid] mac
5 Supported Platforms
All
6 Lab Steps
Before continuing, remove the existing configuration from the WORKING directory and reboot, or in the remote
lab, use the reset script.
Type the following:
-> rm /flash/working/boot.cfg
-> reload working no rollback-timeout
In its default configuration, the switch has only one VLAN; VLAN 1. This is the default VLAN and all ports are
initially associated with it. This VLAN CANNOT be deleted, but it can be disabled if so desired.
3
VLANs
Let’s run the command to see the VLANs that exist on the switch as well as information on a single VLAN.
Type the following:
-> show vlan port (or 'show vlan 1 port' to display just vlan 1 ports)
vlan port type status
------+-------+---------+-------------
1 1/1 default inactive
1 1/2 default inactive
1 1/3 default inactive
1 1/4 default inactive
1 1/5 default inactive
1 1/6 default inactive
1 1/7 default inactive
1 1/8 default inactive
1 1/9 default inactive
4
VLANs
Notice we did not associate a VLAN with the interface yet, this is indicated by the 'unbound' status in the Device
column. To bind a VLAN:
Note: The last two commands could have been consolidated as one command:
Take note of the Status field. If it reads DOWN, this indicates no active ports or devices have been associated
with the VLAN that the Virtual Router has been assigned to. If a Virtual Router interface is down, it cannot be
5
VLANs
connected to, will not reply to PING requests nor will it be advertised in any router updates. This will not affect
the Layer 2 broadcast domain, however.
Let’s activate a port in VLAN 1 to change the status to UP.
Perform the following:
Connect PC1 to an Ethernet port on the switch. (remember, all ports by default are members of VLAN
1 so any port can be used)
In remote lab, activate associated interface :
-> interfaces 1/1 admin up
Now, type:
Since all ports currently belong to VLAN 1, this will now cause VLAN 1 to become active. Run the command to
check the status of the IP interface to see this.
Type the following:
Now that the VLAN has an active port, let’s modify the IP information of PC1 and PING the router interface
associated with VLAN 1. Perform the following:
Modify the IP information of client 3:
To begin, let’s create a new VLAN and assign an IP address to that VLAN as done previously;
-> vlan 20
-> ip interface int_20 address 192.168.20.3/24
-> ip interface int_20 vlan 20
How would you enter the last two commands as one command?
________________________________________________________________________
Let's look at what we have configured so far:
Now let’s assign a port to VLAN 20, connect client7 to that port, and modify its IP addressing to allow
communication to the Virtual Router interface. Remember from earlier that all ports belong to VLAN 1 by
default so we must move a port into VLAN 20.
-> vlan 20 port default 1/2 (1/2 = slot/port the PC is connected to)
-> interfaces 1/2 admin up
Make sure you have connected PC2 to the slot and port above. Modify the IP information of PC2 to match the
following:
---------+---------+--------------
1/1 default forwarding
The following diagram represents the current configuration. By default the switch will route the packets
between VLAN 1 and VLAN 20 using the Virtual IP interfaces you created.
From client 7 ping the Virtual Router port for VLAN 20. (For example, ping 192.168.20.1)
This should be successful since they are in the same IP subnet range.
From client 7 ping the virtual router port for VLAN 1. (For example, ping 192.168.10.1)
This should be successful since you’ve set the Default Gateway of PC2 to the virtual router interface of VLAN 20.
The switch will route the packets to interface int_1.
Perform the same steps from client 3 – that is 1) ping the virtual router for VLAN 1, 2) ping the virtual router for
VLAN 20, and 3) ping client 7.
You should receive successful responses to all the above PINGs. If the PINGs are not successful, check your IP
addressing (and Gateway) on both the PC and the switch as well as checking the VLAN associations using the
following commands. Again, you may type:
8
VLANs
6.2. Mobility
We just saw how ports can be statically associated with VLANs. In this section, we will configure mobility to
dynamically associate MACs based on the traffic they are receiving.
Let’s begin by moving the port PC2 is connected to back to the default VLAN 1.
Type the following:
-> vlan 1 port default 1/2 (or the port you configured earlier)
You should now see that the port PC2 is connected to has been moved back to VLAN 1.
You should no longer be able to ping the router interface from PC2 since the PC is now in VLAN 1 and you have
an IP address that belongs to the VLAN 20 interface (int_20).
In order to have ports dynamically move from one VLAN to another, two things must occur; 1) The port has to be
configured as mobile, and 2) the traffic being sent has to match a rule. Making a port mobile, gives it the
ability to dynamically move a client or MAC from one VLAN to another based on the traffic it is receiving.
9
VLANs
Now that the port has been configured as a mobile port, we need to create a rule that client 7 will match. Rules
get applied to VLANs and devices (MACs) join that VLAN when they match a rule.
Type the following:
From client 7, ping the Virtual Router IP address associated with VLAN 20.
You should see successful responses since the PC was dynamically moved to VLAN 20. It was dynamically moved
because it is sending traffic with a source address of 192.168.20.0/24, which matches the rule for VLAN 20.
Type the following:
-> show vlan 20 port
port type status
10
VLANs
---------+---------+--------------
1/2 mobile forwarding
->
The above commands will show you that the port was successfully associated with VLAN 20 as well as client 7’s
MAC address being learned on VLAN 20.
Why is the MAC of your PC in both VLANs? _____________________________________.
Your PC MAC was in both VLAN's because it initially was source learned on VLAN 1. After 300 seconds (the default
aging time) your MAC would be aged out of VLAN 1 and remain only in VLAN 20.
An IP network address rule is only one method of dynamically moving devices. Experiment with the following
commands to create a MAC address rule as well as an IP protocol rule.
-> vlan 30
-> ip interface int_30 address 192.168.30.3/24 vlan 30
-> vlan 30 mac <client 7's mac address>
-> vlan 40
-> ip interface int_40 address 192.168.40.3/24 vlan 40
-> vlan 40 protocol ip-e2
By plugging your PCs (client 3, client 7) into mobile ports, you can determine the precedence for IP, MAC, and
protocol rules. What have you discovered?
1. _______________________________________________________________________
2. _______________________________________________________________________
3. _______________________________________________________________________
7 Summary
VLANs are an important concept to understand when configuring an OmniSwitch. They provide the ability
to segregate the network into multiple broadcast domains. This can be done either statically or
dynamically. Also, in order for devices in different VLANs to communicate, they must be routed. A virtual
router interface can be associated for each VLAN to allow for the routing of traffic.
8 Lab Check
- What is the purpose of a VLAN?
________________________________________________________________________
- In this lab, name two methods that were used to associate a port with a VLAN?
1)
2)
- What type of rule(s) were used to dynamically move a port into a VLAN?
11
VLANs
________________________________________________________________________
- Is it necessary to have a routing protocol configured in order to route between VLANs on the same switch?
____________________________________________________________ (yes or no – why?)
- In order for a VLAN to route traffic, what must be created on the switch?
________________________________________________________________________
- Which VLAN does a port belong to by default?
VLAN ______________________________________________________________________
- What is the command to move a port into a different default VLAN?
________________________________________________________________________
- What are two commands to check which VLAN a port is associated with?
________________________________________________________________________
VLANS and 802.1Q Tagging
Contents
1 Objective .......................................................................................2
2 802.1Q ..........................................................................................2
3 EQUIPMENT/SOFTWARE REQUIRED ..........................................................2
4 Related Commands ............................................................................2
5 Supported Platforms ..........................................................................2
6 Clear Configuration and Reset VLAN 1 IP interface ......................................2
7 Lab Steps .......................................................................................3
7.1. Additional VLAN Creation ............................................................................ 3
7.2. Configure 802.1Q ...................................................................................... 4
8 Summary ........................................................................................4
9 Lab Check ......................................................................................5
2
VLANs and 802.1Q Tagging
1 Objective
This lab is designed to familiarize you with IEEE802.1Q. Two OmniSwitch's must be used to understand
these concepts; any combination of switches will work.
THIS MEANS YOU MAY NEED TO BE WORKING COOPERATIVELY WITH ANOTHER TEAM! PLAN
ACCORDINGLY!!!
2 802.1Q
In a Layer 2 environment the Ports default VLAN is used for bridging traffic across a physical connection
between switches. In an IEEE 802.1Q environment, the Default VLAN for the port is bridged all other
VLANs will have the IEEE 802.1Q tag inserted for proper VLAN association at the remote side.
3 EQUIPMENT/SOFTWARE REQUIRED
Two OmniSwitches of any type (OS9xxx, OS685x, OS6450 or OS6250)
Two PCs
4 Related Commands
vlan <vid> 802.1q slot/port, vlan <vid> no 802.1q,
show 802.1q slot/port
5 Supported Platforms
All
7 Lab Steps
Bridged VLAN Physical Connections
8 Summary
This lab introduced you to the 802.1Q feature of an OmniSwitch. 802.1Q can be used to carry multiple
broadcast domains, or VLANs, over the same physical link. This is accomplished by adding new
information to the packet known as a VLAN tag. This tag determines which VLAN the packet belongs to.
5
VLANs and 802.1Q Tagging
9 Lab Check
1. What is the purpose for configuring 802.1Q?
....................................................................................................................
....................................................................................................................
3. Did you have to move a port into VLANs 11 or 12 before you could ping either interface? Why or Why
Not?
....................................................................................................................
....................................................................................................................
How to
This lab is designed to familiarize you with the MVRP feature and learn
how to configure it through the CLI.
Contents
1 Enabling MVRP ................................................................................. 2
2 Configuring the Maximum Number of VLANs .............................................. 3
2
Multiple VLAN Registration Protocol
1 Enabling MVRP
MVRP is used primarily to prune unnecessary broadcast and unknown unicast traffic, and dynamically create
and manage VLANs.
MVRP has to be globally enabled on a switch before it can start forwarding MVRP frames.
In order to have MVRP enabled, switch must be in spanning-tree flat mode.
- On 6850E-A or B enter the following commands:
6850E-A/B -> mvrp enable
ERROR: STP Mode is 1X1
MVRP can be enabled on ports regardless of whether it is globally enabled or not. However, for
the port to become an active participant, MVRP must be globally enabled on the switch. By
default, MVRP is disabled on the ports. To enable MVRP on a specified port, use the mvrp port
command
Notes: MVRP can be configured only on fixed, 802.1 Q and aggregate ports. It cannot be
configured on mirror, aggregate, mobile, VPLS Access, and VLAN Stacking User ports.
- Notice that vlans 555 and 777 have been automatically created:
6900-A/B -> show vlan
stree mble src
vlan type admin oper 1x1 flat auth ip ipx tag lrn name
-----+------+------+------+------+------+----+-----+-----+-----+-----+----------
1 std on on on on off on NA off on VLAN 1
555 mvrp on on off on off off NA off on VLAN 555
777 mvrp on off off on off off NA off on VLAN 777
Ports supported
Ethernet, Fast/ Gigabit Ethernet, 10/ 40 Gigabit Ethernet.
Sessions supported
2 per standalone switch and per stack
Destination
Switch
Mirroring Policy
Policy Based Mirroring
Example 1
-> policy condition c1 source ip 1.1.1.1
-> policy action a1 ingress egress mirror 1/1
-> policy rule r1 condition c1 action a1
-> qos apply
Policy rule r1 will cause all packets with a source IP of 1.1.1.1 to be ingress and egress mirrored to
port 1/1
Example 2
-> policy condition c1 source ip 1.1.1.1
-> policy action a2 ingress egress mirror 1/1 disposition drop
-> policy rule r2 condition c1 action a2
-> qos apply
Policy rule r2 drops traffic with a source IP of 1.1.1.1, but the mirrored traffic from this source is
not dropped and is forwarded to port 1/1
PORT MONITORING
Port Monitoring
Captures data and stores in Sniffer format on switch
Ports supported
Ethernet, Fast/ Gigabit Ethernet, 10/40 Gigabit Ethernet
Data stored in compliance with the ENC file format (Network General Sniffer
Format)
->port monitoring 6 source 2/3 enable
6 – session ID
Session can be paused, resumed, disabled and associated with a timeout
->show port monitor file
Remote Monitoring - RMON
RMON probes are used to collect, interpret and forward statistical data about
network traffic from designated active ports in a LAN segment
Can be monitored using OmniVista
4 groups supported:
Ethernet Statistics – Gather Ethernet port statistics (e.g. port utilization, error statistics)
History Group - Stores sampling such as utilization and error count
Alarms Group – Compare samplings to thresholds (e.g. absolute or relative, rising and falling
thresholds)
Events Group – Controls generation an notification to NMS station
Threshold level
sFlow
sFlow
sFlow
sFlow
Contents
1 Objective .......................................................................................2
2 EQUIPMENT/SOFTWARE REQUIRED ..........................................................2
3 Related Commands ............................................................................2
4 Supported Platforms ..........................................................................2
5 Lab Steps .......................................................................................3
5.1. Switch Logging ......................................................................................... 3
5.2. Command Logging ..................................................................................... 4
5.3. Port Mirroring........................................................................................... 6
5.4. Health.................................................................................................... 6
5.5. Port Monitoring ......................................................................................... 7
5.6. RMON..................................................................................................... 8
6 Summary ........................................................................................9
7 Lab Check .................................................................................... 10
2
Switch Logging
1 Objective
This lab is designed to familiarize you with some basic troubleshooting and debugging tools on an
OmniSwitch.
2 EQUIPMENT/SOFTWARE REQUIRED
One OmniSwitch
One PC
3 Related Commands
swlog, show swlog, swlog appid, show health
port mirror, rmon probes, show rmon probes
4 Supported Platforms
All
3
Switch Logging
5 Lab Steps
You should see that logging is running and sending its output to both flash and the console. It does not
mean that all messages will be displayed on the console, only messages matching the severity level, by
default, informational (6). Logging can be disabled if desired.
Type the following:
6850E-> no swlog
6850E-> swlog
6850E-> more
6850E-> show log swlog
Displaying file contents for '/flash/swlog1.log'
4
Switch Logging
Let’s change the level of the IP process to gather some additional information.
Type the following:
Application ID Level
--------------------+----------------
IP ( 15) debug3 (9)
The above command modified the IP application to a level of debug 3, which is the most verbose.
From a PC, ping the router interface of any VLAN on the switch, or any IP address at all to generate IP
packets.
You should see debugging information scrolling across the screen indicating the switch received an ARP
packet as well as additional information on the slot/port the PC is connected to. Set the level back to info:
6850E-> swlog appid ip level info
Like switch logging, commands entered on the OmniSwitch can captured to a log file. These can then be
reviewed at a later time to see what changes have been made. This is a very valuable tool, especially when
doing changes to your configurations.
6850E-> vlan 11
6850E-> vlan 12
6850E-> no vlan 11
6850E-> no vlan 12
Command : no vlan 11
UserName : admin
Date : WED OCT 23 18:00:10
Ip Addr : console
Result : SUCCESS
Command : vlan 12
UserName : admin
Date : WED OCT 23 18:00:07
Ip Addr : console
Result : SUCCESS
Command : vlan 11
UserName : admin
Date : WED OCT 23 18:00:05
Ip Addr : console
Result : SUCCESS
You should now see the commands you entered displayed on the screen with information about the time
and where they were entered from, such as a console or TELNET session.
6
Switch Logging
Use the ‘?’ to view additional parameters. Notice you can capture just incoming or outgoing traffic if
desired.
5.4. Health
The Health feature can be used to gather basic information on the state of the switch such as CPU, memory
and traffic utilization information.
Device 1 Min 1 Hr 1 Hr
Resources Limit Curr Avg Avg Max
-----------------+-------+------+------+-----+----
Receive 80 01 01 01 01
Transmit/Receive 80 01 01 01 01
Memory 80 53 53 52 53
Cpu 80 29 23 21 100
Notice that when we attempted to enable monitoring for source port 1/1 we received an error message.
Earlier in this lab, we had enabled port mirroring for that port, a port can only belong to one session at a
time. How do we go about enabling port mirroring for port 1/1?
Generate traffic by issuing pings to any address.
The above commands enabled a port monitoring session with an ID of 1 on the slot and port your PC is
connected to. The session can be paused and resumed if necessary.
Type the following:
You should now see a message indicating that it has finished writing the capture file. The data is stored in a
file called pmonitor.enc in the /flash directory.
Type the following:
6850E-> ls
5.6. RMON
Remote Monitoring can be used to gather statistics for displaying in OmniVista or other NMS
packages.
.
46 1/46 History Active 01:10:30 5460 bytes
47 1/47 History Active 01:10:30 5460 bytes
48 1/48 History Active 01:10:30 5460 bytes
6 Summary
This lab introduced you to some basic debugging and troubleshooting features of an OmniSwitch.
10
Switch Logging
7 Lab Check
- What is the command to view the switch log?
-
- Port mirroring will capture source and destination traffic to a Sniffer file format?
-
- Port Monitoring is currently supported on which platform?
-
- What’s the command for capturing just inbound or outbound packets using port monitoring?
-
OMNISWITCH AOS R6/R7
High
Ava ila bility
AOS
Opera ting
System
Extensive Enha nced
Ma na gea bility Security
OmniSwitch 6250/6400/6450/6850E/6855/9000
Power Over Ethernet
Specifications
IEEE 802.3af and/or IEEE 802.3at DTE Power via MDI
Cable distances supported: 100m
Default in-line power per port
Total number of PoE-capable ports per switch
IEEE Standards supported IEEE 802.3af, 802.3at IEEE 802.3af IEEE 802.3af, 802.3at IEEE 802.3af, 802.3at
Def PoE oper status Disabled (PoE must be activated on a switch-by-switch basis (lanpower start)
Platforms supporting PoE OS6250-P24 OS 6400-P24 & P48 OS 6850-P10 OS 6450-P24
OS 6850-P10L OS 6450-P48
Cable distances 100 meters (approx.)
supported
Total nb of PoE-capable 24 24 or 48 8 24 or 48
ports per switch
Def amount of inline 240W (360W PS) 120W 390W (530W backup PS)
power available per
390W (510W PS) 780W (900W backup PS)
switch
Default amount of Inline Ports 1-6, 23/24 or 25/26:30W 15.4W
power Available
Ports (7-24): 16W
Range of inline Power Ports 1-6, 23/24 or 25/26:3- 3–18W Ports 1-8:3-30W 3-30W
Allowed per Port 30W
Ports (7-24): 3 - 16 W
PoE Power Supply 225 W 390W (510W PS) 120W 390W (530W PS)
240W (360W PS) 780W (900W PS)
OmniSwitch 6850E/6855/9000
Power over Ethernet Specifications
OmniSwitch 6850E OmniSwitch 6855 OmniSwitch 9000
Def PoE oper status Disabled (PoE must be activated on a switch-by-switch basis (lanpower start)
Platforms supporting PoE OS 6850-P24, P24L, P24X, P48, OS 6855-14 OS9600, 9700/9702, 9800
P48L, P48X
OS 6855-24 Module OS9-GNI-P24
Cable distances supported 100 meters (approx.)
Total nb of PoE-capable ports per 24 or 48 4 first ports 96 (OS9600); 192 (OS9700); 384
switch (OS9800)
Def amount of inline power 240W (360W PS)
available for each Slot
390W (510W PS)
Range of inline power allowed for 37-240 (360W PS) 260W
each slot
37–390 (510W PS)
Default amount of Inline power 15,4W 15,4W
Available
Range of inline Power Allowed per 3–18W 3-20W 3 – 18W
Port
PoE Power Supply 390W (510W PS) 80W (OS6855-C24) 240W of PoE w/ PS 360W
240W (360W PS) 66W (OS6855-C14) 390W of POE w/ PS 510W
OmniSwitch 6250/6400/6450/6850E/6855/9000
POE Management
Viewing PoE Power Supply Status
AOS
Opera ting
System
Extensive Enha nced
Ma na gea bility Security
Link Aggregation Groups
Overview
What is Link Aggregation?
Method of aggregating (combining) more than 2 ports/links so that the switch will
“see” them as one logical link
Provides an aggregated link (multiple physical links combined into one logical
link)
Ports that belong to the same aggregate group do not have to be configured sequentially
and can be on any Network Interface (NI) or unit within a stack
Static Link Aggregation Groups
CLI
Creating a Static Aggregate Group 8 (enabled by default)
-> static linkagg 8 size 4 name training admin state enable (R6)
-> linkagg static agg 8 size 4 name training admin-state enable (R7/8)
Adding Ports to a Static Aggregate Group
-> static agg 1/1 agg num 8 (R6) -> linkagg static port 1/1* agg 8 (R7/8)
-> static agg 1/2 agg num 8 -> linkagg static port 1/2 agg 8
-> static agg 1/3 agg num 8 -> linkagg static port 1/3 agg 8
Removing Ports from a Static Aggregate Group
-> static agg no 1/3 (R6) -> no linkagg static port 1/3* (R7/8)
*chassis/slot/port for R8
Dynamic Link Aggregation Groups
CLI
Creating a dynamic link aggregation group 1
-> lacp linkagg 1 size 4 admin state enable (R6)
-> lacp linkagg 1 actor admin key 2
Static and dynamic link aggregation groups can be used for VLAN tagging
(802.1q)
-> vlan 3 802.1q 1 (R6) -> vlan 3 members linkagg 1 tagged (R7/8)
*chassis/slot/port for R8
Monitoring
-> show linkagg
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
------+----------+--------+-----+-------------+------------+-------------
1 Static 40000001 8 ENABLED UP 2 2
2 Dynamic 40000002 4 ENABLED DOWN 0 0
3 Dynamic 40000003 8 ENABLED DOWN 0 2
4 Static 40000005 2 DISABLED DOWN 0 0
-> show linkagg port 2/1
Dynamic Aggregable Port
SNMP Id : 2001,
Slot/Port : 2/1,
Administrative State : ENABLED,
Operational State : DOWN,
Port State : CONFIGURED,
Link State : DOWN,
Selected Agg Number : NONE,
Primary port : UNKNOWN,
LACP
Actor System Priority : 10,
Actor System Id : [00:d0:95:6a:78:3a],
Actor Admin Key : 8,
Actor Oper Key : 8,
Partner Admin System Priority : 20,
Partner Oper System Priority : 20,
Partner Admin System Id : [00:00:00:00:00:00],
Partner Oper System Id : [00:00:00:00:00:00],
Partner Admin Key : 8,
Partner Oper Key : 0,
Attached Agg Id : 0,
Actor Port : 7,
Actor Port Priority : 15,
Partner Admin Port : 0,
Partner Oper Port : 0,
Partner Admin Port Priority : 0,
Partner Oper Port Priority : 0,
Actor Admin State : act1.tim1.agg1.syn0.col0.dis0.def1.exp0,
Actor Oper State : act1.tim1.agg1.syn0.col0.dis0.def1.exp0,
Partner Admin State : act0.tim0.agg1.syn1.col1.dis1.def1.exp0,
Partner Oper State : act0.tim0.agg1.syn0.col1.dis1.def1.exp0
LOAD BALANCING CONTROL
Link Aggregation Groups - Hashing Control
Two hashing algorithms available
Brief Mode: Brief Mode
UDP/TCP ports not included Source Link #
Addresse
Only Source IP and destination IP addresses are
considered
-> hash-control brief
Destination
Extended Addresse
Extended Mode
Default Hashing Modes Source
Addresse
Link #
Contents
1 Objective ....................................................................................... 2
2 Link Aggregation............................................................................... 2
3 EQUIPMENT/SOFTWARE REQUIRED ......................................................... 2
4 Related Commands............................................................................ 2
5 Supported Platforms .......................................................................... 2
6 Clear Configuration ........................................................................... 2
7 Lab Steps ....................................................................................... 3
7.1. Link Aggregation – Static option..................................................................... 3
7.2. Link Aggregation – Dynamic .......................................................................... 5
8 Summary ........................................................................................ 7
9 Lab Check ...................................................................................... 7
2
Link Aggregation
1 Objective
This lab is designed to familiarize you with link aggregation. Two OmniSwitch's must be used to understand
these concepts; any combination of switches will work.
THIS MEANS YOU MAY NEED TO BE WORKING COOPERATIVELY WITH ANOTHER TEAM! PLAN ACCORDINGLY!!!
2 Link Aggregation
Link Aggregation provides the ability to combine multiple physical ports into a single logical port for added
throughput and redundancy; this can be done statically using OmniChannel or dynamically using the IEEE
802.3ad (LACP) protocol.
3 EQUIPMENT/SOFTWARE REQUIRED
Two OmniSwitches of any type (OS6900, OS6850, OS6450)
Two PCs
4 Related Commands
show linkagg, static linkagg, static agg [slot/port],
show linkagg port, lacp linkagg # size #,
lacp agg [slot/port] actor admin key #
5 Supported Platforms
All
6 Clear Configuration
Before you begin this exercise, remove boot.cfg in the Working directory on all switches and reboot so that
previous labs do not affect the outcome (or reset the pod for remote lab):
-> rm /working/boot.cfg
-> reload working no rollback-timeout (R6)
-> reload from working no rollback-timeout (R7)
3
Link Aggregation
7 Lab Steps
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+----------+---------+----+------------+--------------+-------------
5 Static 40000005 2 ENABLED DOWN 0 0
-> show linkagg 5 (R6)
-> show linkagg agg 5 (R7)
Static Aggregate
SNMP Id : 40000005,
Aggregate Number : 5,
SNMP Descriptor : Omnichannel Aggregate Number 5 ref 40000005 size 2,
Name : ,
Admin State : ENABLED,
Operational State : DOWN,
Aggregate Size : 2,
Aggregate Min-Size : 1,
Number of Selected Ports : 0,
Number of Reserved Ports : 0,
Number of Attached Ports : 0,
Primary Port : NONE
4
Link Aggregation
Add ports to your aggregate, by typing: static agg [slot/port] agg num # (R6) or linkagg static port
[slot/port] agg # (R7),
In this example, ports 1/23 and 1/24 have been added to aggregate 5 on 6850 and ports 2/1 and 2/2 been
added to aggregate 5 on 6900
Let’s see what we have accomplished. (You might want to make note of this information to compare it to
what you see when you connect your switches and repeat these steps.)
Type:
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+----------+---------+----+------------+--------------+-------------
5 Static 40000005 2 ENABLED DOWN 0 2
Static Aggregate
SNMP Id : 40000005,
Aggregate Number : 5,
SNMP Descriptor : Omnichannel Aggregate Number 5 ref 40000005 size 2,
Name : ,
Admin State : ENABLED,
Operational State : DOWN,
Aggregate Size : 2,
Aggregate Min-Size : 1,
Number of Selected Ports : 2,
Number of Reserved Ports : 2,
Number of Attached Ports : 0,
Primary Port : NONE
Now, connect your switches via the linkagg 5 ports, or bring up corresponding interface on remote-lab (In the
above example 1/23 on switch1 to 1/23 on switch2 and 1/24 on switch1 to 1/24 on switch 2.)
Note: Ports don't necessarily have to be the same on both ends of the link.
Using the commands you learned earlier, compare the outputs:
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+----------+---------+----+------------+--------------+-------------
5 Static 40000005 2 ENABLED UP 2 2
Test your configuration; do a ping test – i.e., ping all of your routers and PCs from console session and from
each PC.
To demonstrate the redundancy capabilities, experiment with removing a link and monitor the results of your
pings tests
We will now perform a similar configuration exercise using the IEEE 802.3ad standard (LACP). Before
proceeding remove the static link aggregation group you created. You can either return your switch to
factory default or remove them manually. Note that you cannot delete a link aggregation group if there are
ports still associated with it:
Ensure the link aggregation groups are removed on both switches as described above. There is no need to
disconnect the physically connections to continue to the next lab section.
Unlike static link aggregations where we physically assigned the ports to the link aggregation number, ports
are associated to a dynamic link aggregation using the actor admin key. Although in the above example the
actor admin key matches the link agg number, this is not a requirement as the admin key has local
significance only.
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+----------+---------+----+------------+--------------+-------------
5 Dynamic 40000005 2 ENABLED DOWN 0 0
Notice we have no ports associated, using the actor admin key assigned to the link aggregation, let's associate
6
Link Aggregation
the ports:
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+----------+---------+----+------------+--------------+-------------
5 Dynamic 40000005 2 ENABLED UP 2 2
Test your configuration; do a ping test – i.e., ping all of your routers and PCs from console session and from
each PC.
To demonstrate the redundancy capabilities, experiment with removing a link (or bring down interfaces) and
monitor the results of your pings tests
7
Link Aggregation
8 Summary
This lab introduced you to the link aggregation feature of an OmniSwitch. Link aggregation allows you to
logically group multiple physical links into a single logical link. This logical link can be used to provide
increased throughput for a backbone connection.
9 Lab Check
- What command is used to add port 5/10 to a dynamic link aggregate 7?
.......................................................................................................................
- What command is used to check the status of a particular link aggregate?
.......................................................................................................................
- Do actor admin keys have to match on both ends of the physical link?
.......................................................................................................................
802.1Q and Link Aggregation
Contents
1 Objective ....................................................................................... 2
2 802.1Q and Link Aggregation ................................................................ 2
3 EQUIPMENT/SOFTWARE REQUIRED ......................................................... 2
4 Related Commands............................................................................ 2
5 Supported Platforms .......................................................................... 2
6 Clear Configuration ........................................................................... 2
7 Lab Steps ....................................................................................... 3
7.1. Additional VLAN Creation............................................................................. 3
7.2. Link Aggregation – Dynamic .......................................................................... 4
7.3. Configure 802.1Q ...................................................................................... 4
8 Summary ........................................................................................ 5
9 Lab Check ...................................................................................... 5
2
802.1Q and Link Aggregation
1 Objective
This lab is designed to familiarize you with 802.1Q over link aggregation. Two Omni Switch’s must be used to
understand these concepts; any combination of switches will work.
THIS MEANS YOU MAY NEED TO BE WORKING COOPERATIVELY WITH ANOTHER TEAM! PLAN ACCORDINGLY!!!
3 EQUIPMENT/SOFTWARE REQUIRED
Two OmniSwitches of any type (OS6900, OS6850, OS6450)
Two PCs
4 Related Commands
show linkagg, static linkagg, static agg [slot/port],
show linkagg port, lacp linkagg # size #,
lacp agg [slot/port] actor admin key #, show linkagg,
static linkagg, static agg [slot/port],
show linkagg port, lacp linkagg # size #,
lacp agg [slot/port] actor admin key #
5 Supported Platforms
All
6 Clear Configuration
Before you begin this exercise, remove boot.cfg in the Working directory on all switches and reboot so that
previous labs do not effect the outcome:
-> rm /working/boot.cfg
-> reload working no rollback-timeout (R6)
-> reload from working no rollback-timeout (R7)
3
802.1Q and Link Aggregation
7 Lab Steps
Identify your two switches and on each of them create a router interface for VLAN 1 with an IP address
192.168.10.X/24, where X represents the number of the switch you are on:
Connect one PC to a VLAN 1 port each switch. Don’t forget to configure your PCs for the VLAN 1 subnet, i.e. –
assign them IP addresses in subnet 192.168.10.0/24. Interconnect your switches or bring up corresponding
interfaces.
At this point you should be able to ping BOTH VLAN 1 IP interfaces from either PC, however you should NOT
be able to ping ANY of the VLAN 11 or 12 Interfaces. Why_________________?
You should not be able to ping any of the VLAN 11 or 12 interfaces as we have no members of those VLANs
yet. Change PC2's default VLAN to VLAN 11 (Along with PC2's IP configuration). You should now be able to
ping the 192.168.11.2 IP interface as well as the 192.168.10.2.
4
802.1Q and Link Aggregation
Next add ports to the aggregate using the admin key 5, by typing:
Our ping tests should stay the same as before since we still do not have the additional VLANs associated with
our link aggregation ports.
You should see that the link aggregate group is carrying tagged information for VLANs 11 and 12. You should
now have full connectivity from PC to any PC as well as all router interfaces.
Experiment with what happens when you change your PC’s IP address and move it to VLAN 11 or 12 and ping
all IP interfaces. To accomplish this on your switch, remember to move the port to which your PC is
connected into the appropriate VLAN.
5
802.1Q and Link Aggregation
8 Summary
This lab introduced you to the link aggregation feature of an OmniSwitch. Link aggregation allows you to
logically group multiple physical links into a single logical link. This logical link can be used to provide
increased throughput for a backbone connection.
9 Lab Check
- What command is used to add port 5/10 to a dynamic link aggregate group 7?
.......................................................................................................................
- What command is used to check the status of a particular link aggregate?
.......................................................................................................................
- What command is used to determine which port a VLAN is associated with?
.......................................................................................................................
- What command is used to see the state of 802.1Q?
.......................................................................................................................
- What is different about implementing 802.1Q on a link aggregate?
.......................................................................................................................
- When traffic is traversing a link aggregate configured with 802.1Q, is it bridged? Routed? Both?
.......................................................................................................................
OMNISWITCH AOS R6/R7/R8
X X
Active link
Standby link
Spanning Tree - Parameters
Controlling STP parameters
Mode
Protocol
Bridge ID/ priority
Path Cost
Spanning Tree - Modes
Modes
Flat mode - one spanning tree instance per switch
1x1 mode - one spanning tree instance per VLAN (default)
To determine which mode the switch is operating in, use the ‘show spantree
mode’ command
Fixed (untagged) and 802.1Q tagged ports are supported in each VLAN
BPDU always untagged
When the Spanning Tree mode is changed from 1x1 to flat, ports still retain
their VLAN associations but are now part of a single Spanning Tree instance
that spans across all VLANs
vlan1 vlan1
vlan2 X vlan2
vlan3 X vlan3
Spanning Tree
1x1 Mode
Single STP instance enabled for each VLAN configured on the switch
Fixed (untagged) ports single STP instance -> configured Port default VLAN
vlan1 vlan1
vlan2 vlan2
vlan3 vlan3
Spanning Tree
Protocols
Protocols
802.1D Standard Spanning Tree Algorithm and Protocol (STP)
802.1w Rapid Spanning Tree Algorithm and Protocol (RSTP) (default)
802.1s Multiple Spanning Tree Protocol (MSTP)
Ring Rapid Spanning Tree Protocol (RRSTP)
How it works:
BPDUs are exchanged among the Switches/Bridges
Root bridge selection based on
lowest numerical bridge priority (0 to 65535)
If same priority, use of lowest MAC address
Port roles
Root Port and Designated Ports
BPDU with the lowest value (Bridge ID, Path Cost and/or Port MAC) will decide the Root Port
Others will be designed as Designated or Disabled ports
A logical tree will then be built with the Root Bridge at the top of the tree (an inverted
tree)
Physical changes of the network force spanning-tree recalculation
802.1D Spanning Tree Protocol
Root election and Port states
Root bridge decisions based on:
Lowest Root Bridge ID
Lowest Root Path Cost to Root Bridge
Lowest Sender Bridge ID
Lowest Sender Port ID
5 ports states
X Disabled
Blocking
20 sec
Listening
Operational Status STP Port State Active Port? 15 sec
Enabled Blocking No
Learning
Enabled Listening No
15 sec
Enabled Learning Yes
Enabled Forwarding Yes Forwarding // Blocking
Disabled Disabled No
Spanning Tree Protocol
IEEE 802.1D
< 1 sec
Forwarding // Discarding
Rapid Spanning Tree Protocol
802.1w
Port Roles
Root Port - provides the best path (lowest cost) to the root switch.
Designated Port - Connects the LAN to the designated bridge. This bridge provides the
LAN with the shortest path to the root.
Alternate Port - Offers an alternate path to the root bridge if the root port on its own
bridge goes down.
Backup Port - Provides a backup connection for the designated port. It can only exist
when there are redundant designated port connections to the LAN.
If path_cost=0 If path_cost=0
Link Speed IEEE Recom. Value – 16bit Link Speed IEEE Recom. Value – 32bit
10 Mbps 100 10 Mbps 2,000,000
100 Mbps 19 100 Mbps 200,000
1 Gbps 4 1 Gbps 20,000
10 Gbps 2 10 Gbps 2,000
Set the path cost mode to always use a Set the path cost mode to always use a
16-bit when STP/RSTP protocol is active 32-bit regardless of which protocol is
active
->bridge path cost mode auto
->bridge path cost mode 32bit
->spantree path-cost-mode auto
->spantree path-cost-mode 32bit
Per VLAN Spanning tree
PVST+
PVST+ PVST+
Cisco-proprietary
-> bridge port {slot/port | agg_num} pvst+ {auto | enable | disable} (R6)
-> spantree pvst+compatibility {port slot/port* | linkagg linkagg_id}
{enable | disable | auto} (R7/8)
*chassis/slot/port for R8
1 Objective
This lab is designed to familiarize you with the Spanning Tree Protocol (STP) options on an OmniSwitch.
Two OmniSwitch's must be used to understand these concepts, any combination of switches will work.
2 Spanning Tree
The Spanning Tree Protocols (STP) are an important concept to understand in a bridged network. We’ll
discuss the different STP configurations including single vs. multiple STP, Rapid STP, and 802.1s.
3 EQUIPMENT/SOFTWARE REQUIRED
Two OmniSwitches of any type (OS9xxx, OS6850, OS6450 or OS6250)
One PC
4 Related Commands
show spantree, show spantree <vid> port, show spantree port forward, show spantree port block, bridge
mode, , bridge <vid> mode, vlan stp, bridge msti, bridge cist
5 Supported Platforms
All
3
Spanning Tree Protocol
6 Lab Steps
Spanning tree can be configured multiple ways depending on the network configuration. This first section will
demonstrate some common STP commands.
To ensure other labs don't impact this lab, return the switches to their factory default settings or reset the Pod:
-> rm /flash/working/boot.cfg
-> reload working no rollback-timeout
Bridge two OmniSwitches together with at least two cables. On remote-lab, activate corresponding interfaces. In
the examples below we used ports 1/23-24.
Hello Time = 2
Parameters system uses when attempting to become root
System Max Age = 20,
System Forward Delay = 15,
System Hello Time = 2
This will give you the configured STP parameters of VLAN 1. Notice the mode, it’s 1X1, meaning each VLAN runs
a separate STP. Additionally, take note of the Bridge ID and the Designated Root. If they’re the same then your
switch is the Root Bridge for VLAN 1. Is your switch the root_________? If not, where is the root
located__________?
In the screen capture above, this switch is not the root. The root in this example is a cost of 4 away on slot 1
port 23. Since we know that Gigabit Ethernet, by default, has a path cost of 4 we can deduct that the Root
Bridge is the upstream neighbor on that port. If the path cost was 8, we could deduct that the root bridge was 2
hops away (Assuming default configurations) on port 1/23.
We can also deduct from the above output that our STP is relatively stable, it has been 12 hours since the last
topology change (Topology Age) and we have only had 2 Topology changes.
By default, the bridge priority is 32768 (0x8000). Since all priorities are identical by default, the switch with the
lowest MAC address is selected as the root bridge.
Type the following:
The commands above display the status and parameters of each port, as well as show which ports are forwarding
and which are blocking. If your switch is not the root bridge, you should have at least one port in blocking mode
to prevent a loop. Also, notice that only one side of the link(s) have a port in blocking. This ensures the
neighbor(s) are still able to initiate a topology change in the event of a failure. What determines which side of
the link is blocking____________________?
You should also notice that there is data going between the switches; this is the BPDU exchange between the
switches. Show the statistics counts on the forwarding ports (issue the command a few times to see the packet
count increment):
Connect a PC to each of the switches and configure an IP Interface for VLAN 1 (replace x with your switch
number):
From the PC's start a continuous ping to the router interface on your neighbors switch:
Once your ping is successful, remove the connection that is forwarding between the two switches. Notice how
quickly Rapid STP recovers from a link failure. Review the previous commands. Has our Topology age changed?
Has the Root port changed? What will happen when we re-connected the disconnected port? (hint: Remember
that anytime there is a physical change STP will re-converge)
Using the configuration parameters already configured create an additional VLAN and move a port into that
VLAN, this will demonstrate how 1X1 mode works on an OmniSwitch.
Type the following (on both switches): (replace slot/port with the 2nd port connecting your OmniSwitches)
6
Spanning Tree Protocol
-> vlan 2
-> vlan 2 port default slot/port (R6)
-> vlan 2 members port slot/port untagged (R7)
-> show spantree 2
-> show spantree 2 ports
Notice the switch is running a separate STP for each VLAN. This is because the bridge mode is set to 1X1, or a
separate STP for each VLAN. Even though there are two physical connections between the switches, neither
connection blocks since each is in a different VLAN and STP domain. With your previous Ping test still running,
remove the port connection for VLAN 2 between the switches, notice that this has no effect on the Spanning
Tree for VLAN 1.
Re-connect the port connections and move to the next step of the lab.
ERROR: Please use 'show spanntree 1' for flat spanning tree display
-> show spantree vlan 1 (R7)
Single/Multiple Spanning Tree is enforced !! (flat mode)
INACTIVE Spanning Tree Parameters for Vlan 1
Spanning Tree Status : ON,
Protocol : IEEE Rapid STP,
Priority : 32768 (0x8000),
TxHoldCount : 3,
System Max Age (seconds) = 20,
System Forward Delay (seconds) = 15,
System Hello Time (seconds) = 2
Notice the message telling you a single STP is configured on the chassis. The switch will only allow STP changes
only to VLAN 1 when running in flat mode.
Type the following:
Notice that the port in VLAN 2 is blocking and showing as a bridge 1 port even though it’s in a separate VLAN. In
Flat STP mode there is only 1 STP built, so even though the two ports are in different VLANs, STP see's them as a
single STP domain.
Notice that VLAN 1 is IEEE 802.1D STP and VLAN 2 is IEEE 802.1w Rapid STP showing that you can "mix and
match" the protocols within a switch. Currently, we do not have a loop in our network, let's add a port for each
VLAN between the switches so we have two ports connecting the switches for VLAN 1 and two ports connecting
the switch for VLAN 2 (i.e tag vlan 1 on port which is on default vlan 2 and tag vlan 2 on port which is on default
vlan 1). Notice that the pings from your PC's stopped when you added the 2nd port for VLAN 1. Also, notice the
length of time it took for the port to begin forwarding again. Remember, anytime there is a physical change the
STP protocol has to reconverge the network.
Before continuing, determine which port is forwarding and which port is blocking on the non-root bridge.
Type the following:
Now, test the failover time when running in standard 802.1d STP mode:
Fast (or Rapid) Spanning - 802.1w - can significantly reduce the time it takes for STP to converge. Change the
protocol being used and perform the same test. Reconnect both physical links for VLAN
Notice the short amount of time needed for the ping to recover. This is one of the benefits of the Rapid STP
Protocol.
Now, create 2 additional STP instances and map the appropriate VLANs to them. Type the following:
13
Spanning Tree Protocol
-> show spantree mst port 1/24 (the slot/port # interconnecting the switches)
MST Role State Pth Cst Edge Boundary Op Cnx Loop Guard Note Vlans
-----+------+-----+--------+----+--------+------+----------+------+-----
0 DESG FORW 20000 NO NO PTP DIS
1 DESG FORW 20000 NO NO PTP DIS 1-5
2 DESG FORW 20000 NO NO PTP DIS 6-10
You should see the switch take over as the root bridge for MSTI 1 and all VLANs associated with it. Also notice
the priority value. Why is it not 4096 as we configured?
Remember, in Multiple Spanning Tree the bridge priority is the assigned Bridge Priority value PLUS the MSTI
instance value. In this example we configured MST 1 to a bridge priority of 4096 - hence bridge priority is now
4097 (4096 + 1).
7 Summary
This lab introduced you to the STP operation of an OmniSwitch. The STP mode can be configured for
either flat or multiple STP. Multiple STP is useful in an environment with multiple VLANs to allow each
VLAN to run its own STP. Additionally, the bridge mode can be set for 802.1d or 802.1w for faster
convergence times. Also, the IEEE 802.1s protocol can be configured to allow for multiple spanning
instances.
8 Lab Check
What is the purpose of STP?
What’s the difference between Flat mode and 1X1 mode?
What is the difference between 1X1 mode and 802.1s?
When would it be appropriate to run a single spanning tree for the entire switch?
What is the default spanning tree setting on your switch? (Circle all correct answers.)
802.1d 802.1w 802.1s
1x1 flat none
OMNISWITCH AOS R6/R7/R8
You will:
Learn how to setup LLDP protocol
parameters
IEEE 802.1AB – Link Layer Discovery Protocol
(LLDP)
High
Ava ila bility
AOS
Opera ting
System
Extensive Enha nced
Ma na gea bility Security
Link Layer Discovery Protocol
Accurate physical topology and device inventory simplifies management and maintenance
L2 discovery protocol
Exchange information with neighboring devices to build a database of adjacent devices
I’ m a OXE
switch
I’ m a
switch
I’ m an
IP - PBX
I’ m a I’ m a
switch I’ m a switch
switch
I ’m a
I’m a
switch
switch
I ’m a PC
I’ m a PC I’m an
I ’m an IP - Phone
IP - Phone
LLDP
Configuring and monitoring
Enabling LLDP PDU flow on a port, slot, or all ports on a switch
-> lldp {slot/port | slot | chassis} lldpdu {tx | rx | tx-and-rx | disable}
Sent out/received even in STP blocked ports
LLDP PDUs
Extensions optional fields
802.1: Vlan name, port vlan
802.3: MAC Phy
MED: Power and Capability
Inventory Management
Network Policy
LLDP-Media Endpoint Devices (LLDP-MED)
Capabilities
Network
Policy
Location ID
Extended
Power-via-MDI
Inventory
LLDP-MED
Admin
1 2
IP Phone
Configuring
LLDP Network Policies
Specifying whether or not LLDP-MED TLVs are included in transmitted LLDPDUs
-> lldp {slot/port | slot | chassis} tlv med {power | capability | network policy} {enable |
disable}
Configuring a local Network Policy on the switch for a specific application type
-> lldp network-policy policy_id - [ policy_id2] application { voice | voice-signaling | guest-
voice | guest-voice-signaling | softphone-voice | video-conferencing | streaming-video | video-
signaling } vlan { untagged | priority-tag | vlan-id } [ l2-priority 802.1p_value ] [ dscp
dscp_value ]
Admin
Link Layer Discovery Protocol (LLDP)
How to
Configure LLDP parameters on the OmniSwitch family of products.
Contents
1 Link Layer Discovery Protocol (LLDP) ...................................................... 2
2
Link Layer Discovery Protocol (LLDP)
Implementation
- Two Omniswitches are used on the following sections
Link Layer Discovery Protocol (LLDP) is an emerging standard that provides a solution for the configuration
issues caused by expanding networks. LLDP supports the network management software used for complete
network management. LLDP is implemented as per the IEEE 802.1AB standard.
The exchanged information, passed as LLDPDU, is in TLV (Type, Length, Value) format. The information
available to the network management software must be as new as possible; hence, remote device
information is periodically updated.
- To enable the transmission and the reception of LLDPDUs on a port, enter the following commands on
both switches:
-> interfaces 1/11 admin up
-> lldp 1/11 lldpdu tx-and-rx
- To control per port notification status about a change in a remote device associated to a port, use the
following command :
-> lldp 1/11 notification enable
LLDPDU administrative status must be in receive state before using this command
- To control per port management TLV to be incorporated in the LLDPDUs, use the following command.
-> lldp 1/11 tlv management port-description enable
- Verify the LLDP per port statistics by entering the following command:
-> show lldp statistics
----------+--------------------------------------+---------------------+----------
| LLDPDU | TLV | Device
Slot/Port | Tx Rx Errors Discards | Unknown Discards | Ageouts
----------+--------+----------+----------+----------+----------+----------+-------
1/11 52 0 0 0 0 0 0
3
Link Layer Discovery Protocol (LLDP)
- The commands below specify the switch to control per port management TLVs to be incorporated in the
LLDPDUs. This will allow to have additional information such as system description, name, capabilities and
management IP address of neighbouring devices.
- Type the following on both switches:
-> lldp 1/11 tlv management system-name enable
-> lldp 1/11 tlv management system-description enable
-> lldp 1/11 tlv management system-capabilities enable
-> lldp 1/11 tlv management management-address enable
- To display remote system information, enter the following command on the remote switch :
-> show lldp remote-system
Compare the output of this command with the same command that was entered before
- To display the general LLDP configuration information for LLDP ports, type the following command:
-> show lldp config
----------+-------------------------------------------+-----------------+-------
| Admin | Notify | Std TLV | Mgmt | 802.1 | 802.3| MED
Slot/Port | Status | Trap | Mask | Address | TLV | Mask | Mask
----------+----------+----------+----------+----------+----------+------+------
1/11 Rx + Tx Disabled 0x00 Enabled Disabled 0x00 0x00
OMNISWITCH AOS R6/R7/R8
IP Interfaces
Module Objectives
You will learn about how to setup IP
parameters on an AOS OmniSwitch
IP Router Interface
Optional parameters
DHCP Client Interface
Loopback0 interface
DHCP Relay
High
Multinetting
Ava ila bility
AOS
Opera ting
System
Extensive Enha nced
Ma na gea bility Security
IP ROUTER INTERFACE
IP VLAN Interface
CLI
Creating a new VLAN with a specified VLAN ID (VID)
Name description is optional
-> vlan vid [enable | disable] [name description] (R6)
-> vlan vid admin-state {enable | disable} name description (R7/8)
Configuring an IP interface
Enable IP routing on a VLAN
Without an IP interface, traffic is bridged within the VLAN or across connections to
the same VLAN on other switches
-> ip interface if_name [address ip_address] [mask subnet_mask] [admin [enable | disable]]
[vlan vid] [forward | no forward] [local-proxy-arp | no local-proxy-arp] [eth2 | snap] [primary | no
primary]
-> ip interface if_name [address ip_address] [mask subnet_mask] [admin [enable | disable]]
[vlan vid] [forward | no forward] [local-proxy-arp | no local-proxy-arp] [eth2 | snap] [primary | no
primary]
Forward
Interface sends IP frames to other subnets
Default
no forward
Interface only receives frames from other hosts on the same subnet
Primary
Specified IP interface as the primary interface for the VLAN
By default, first interface bound to a VLAN becomes the primary interface for that VLAN
IP Vlan Interface
Local-proxy-arp
-> ip interface name [address ip_address] [mask subnet_mask] [admin [enable |
disable]] [vlan vid] [forward | no forward] [local-proxy-arp | no local-proxy-arp]
[eth2 | snap] [primary | no primary]
Allows the network administrator to Normal ARP
Switch B
It is enabled per VLAN
ARP
Switch C
All ARP requests received on VLAN Switch A
member ports are answered with
the MAC address of the VLAN’s
virtual IP router port
PC 1 PC 2
192.168.10.101 192.168.10.102
IP Vlan Interface
Local-proxy-arp
Proxy ARP commands
-> arp filter ip_address [mask ip_mask] [vid] [sender | target] [allow | block]
-> arp filter 198.0.0.0 mask 255.0.0.0 sender block
-> show arp filter
DHCP client IP interface
Allows OmniSwitches 6250/6450 to
Function as DHCP client on any configured VLAN
Get an IP address from the DHCP server
Create IP interface for that VLAN in the switch
Create a default static route
Use
RP (Rendez-Vous Point) in PIMSM
sFlow Agent IP address
Source IP of RADIUS authentication
NTP Client
BGP peering
OSPF router-id
Switch and Traps Identification from an NMS station (i.e OmniVista)
IP choosable Interface/Loopback0 for applications
Applications will be able to choose the source interface IP
any IP interface/ loopback
in the particular VRF based on an application specific command
130.1.1.1
-> ip helper address <address1> <address2> vlan <id> VLAN 3
DHCP DHCP
Client Client
Generic UDP Port Relay
Relay for generic UDP service ports
i.e., NBNS/NBDD, other well-known UDP service ports, and service ports that are not
well-known
*R7/8
Multinetting
Ability to have multiple IP subnets Subnet renumbering during transition
assigned to the same VLAN
More hosts to a broadcast domain than
Maximum of 8 subnets per VLAN (R6)
addressing allows
Maximum of 16 subnets per VLAN (R7/8)
Multi-homed server to a single switch
Ability to route between multi-netted port
interfaces
Dynamic routing protocols supported on VLAN IP subnet of
multi-netted interfaces 192.168.10.0/24
VRRP supported
192.168.11.0/24
ACLs supported
UDP/DHCP relay supported
VLAN 10
Broadcast traffic from one subnet will be
seen by users in different subnets Interface “Sales”
192.168.10.1
Interface “marketting”
192.168.11.1
Broadcast traffic in the 192.168.10.0 network will be seen by users in the 192.168.11.0 network
Multinetting
Contents
1 Objective ....................................................................................... 2
2 Multinetting .................................................................................... 2
3 Equipment Required .......................................................................... 2
4 Related Commands............................................................................ 2
5 Supported Platforms .......................................................................... 2
6 Lab Steps ....................................................................................... 3
6.1. VLAN Configuration .................................................................................... 3
6.2. Routing................................................................................................... 4
7 Summary ........................................................................................ 5
8 Lab Check ...................................................................................... 5
2
Multinetting
1 Objective
This lab will introduce the Multinetting feature on an OmniSwitch. Multinetting allows for the creation of
multiple IP router interfaces on a single VLAN. Three OmniSwitch's must be used to understand these
concepts, any combination of switches will work.
THIS MEANS YOU MAY NEED TO BE WORKING COOPERATIVELY WITH ANOTHER
TEAM! PLAN ACCORDINGLY!!!
2 Multinetting
In this lab you’ll use the CLI to create multiple IP interfaces for a VLAN. Additionally, routing using RIP will be
enabled.
This lab, as with other Layer 3 labs, assumes a basic knowledge of the OmniSwitch products. Specific
commands for creating VLANs, associating ports with VLANs and creating Virtual IP interfaces may not be
listed. Refer to previous labs or the CLI Quick Reference Guide if necessary.
3 Equipment Required
Three OmniSwitches (OS6900, OS685x, OS6450 or OS6250)
Three PCs
4 Related Commands
ip interface <name> address <ip_address> vlan <vid>
5 Supported Platforms
All
3
Multinetting
6 Lab Steps
6.2. Routing
In order to advertise the other networks, enable RIP on the 192.168.10.X interface and create a route map to
distribute the routes (remember to replace 'X' with your switch number):
6900 -> ip load rip
6900 -> ip rip admin-state enable
6900 -> ip rip interface int_1
6900 -> ip rip interface int_1 admin-state enable
6900 -> ip route-map switchXrip sequence-number 10 action permit
6900 -> ip redist local into rip route-map switchXrip admin-state enable
6850E&6450 -> ip load rip
6850E&6450 -> ip rip status enable
6850E&6450 -> ip rip interface int_1
6850E&6450 -> ip rip interface int_1 status enable
6850E&6450 -> ip route-map switchXrip sequence-number 10 action permit
6850E&6450 -> ip redist local into rip route-map switchXrip status enable
ALL -> show ip rip peer
Total Bad Bad Secs since
IP Address Recvd Packets Routes Version last update
----------------+------+-------+------+-------+-----------
192.168.10.3 14 0 0 2 4
192.168.10.5 10 0 0 2 3
ALL -> show ip rip interface
Interface Intf Admin IP Intf Updates
Name vlan status status sent/recv(bad)
---------------------+------+-----------+-----------+---------------
int_1 1 enabled enabled 17/26(0)
ALL -> show ip route (R6)
ALL -> show ip routes (R7)
+ = Equal cost multipath routes
Total 5 routes
Dest Address Gateway Addr Age Protocol
------------------+-------------------+----------+-----------
127.0.0.1/32 127.0.0.1 00:17:12 LOCAL
192.168.10.0/24 192.168.10.1 00:10:55 LOCAL
192.168.11.0/24 192.168.11.1 00:10:37 LOCAL
192.168.13.0/24 192.168.10.3 00:05:59 RIP
192.168.15.0/24 192.168.10.5 00:04:42 RIP
ALL -> show ip rip routes
Legends: State: A = Active, H = Holddown, G = Garbage
Destination Gateway State Metric Proto
-----------------+-----------------+----+------+------
192.168.10.0/24 +192.168.10.1 A 1 Redist
192.168.11.0/24 +192.168.11.1 A 1 Redist
192.168.13.0/24 +192.168.10.3 A 2 Rip
192.168.15.0/24 +192.168.10.5 A 2 Rip
ALL -> show ip router database
Legend: + indicates routes in-use
b indicates BFD-enabled static route
r indicates recursive static route, with following address in brackets
Total IPRM IPv4 routes: 5
Destination Gateway Interface Protocol Metric Tag Misc-Info
---------------------+---------------+------------+--------+-------+----------+-----------------
+ 127.0.0.1/32 127.0.0.1 Loopback LOCAL 1 0
+ 192.168.10.0/24 192.168.10.1 int_1 LOCAL 1 0
+ 192.168.11.0/24 192.168.11.1 int_1_1 LOCAL 1 0
+ 192.168.13.0/24 192.168.10.3 int_1 RIP 2 0
+ 192.168.15.0/24 192.168.10.5 int_1 RIP 2 0
Inactive Static Routes
Destination Gateway Metric Tag Misc-Info
--------------------+-----------------+------+----------+-----------------
Now that RIP has been enabled and the proper filter configured, you should begin to see your neighbor’s
routes appear. From your PC, ping the additional IP interfaces. You should be able to communicate, routing
between the different IP subnets even though they’re in the same VLAN.
Modify your PCs address to 192.168.1X.10X and a gateway of 192.168.1X.X.
Ping to check connectivity.
5
Multinetting
You should still have connectivity since your PC is associated with VLAN 1 and both IP interfaces are assigned
to VLAN 1.
7 Summary
This lab introduced you to Multinetting on an OmniSwitch. Multinetting allows for multiple IP interfaces to
be associated to a single VLAN. However, traffic still needs to be routed from one IP subnet to another.
8 Lab Check
- Is broadcast traffic sent on the 192.168.10.0 network seen on the 192.168.1#.0 network?
- Since both IP interfaces were associated with VLAN 1, why did RIP have to be enabled?
- What does multinetting do to the concept that a VLAN is a broadcast domain?
OMNISWITCH AOS R6/R7/R8
IP Routing
Module Objectives
You will learn about the alternative
solutions to implement a basic IP routing
available on the AOS OmniSwitch
Static routing and associated options
Discuss the benefits when using RIP in an
OmniSwitch network
Basic configuration
Monitoring High
Ava ila bility
AOS
Opera ting
System
Extensive Enha nced
Ma na gea bility Security
STATIC AND DYNAMIC ROUTING BASICS
Static Versus Dynamic routing
Static routes
Entered manually by the network administrator
Anytime the network topology changes, administrator must update the routes
Static routes always have priority over dynamic routes
Suitable for environments where network traffic is relatively predictable and where
network design is relatively simple.
Supports IPv4
RIP I (RFC-1058)
Single mask on all subnets of a network
Updates sent via broadcasts
RIP II (RFC-1723)
Carries additional subnet mask information
Carries next hop routing information
Updates sent as Multicasts (224.0.0.9)
Supports authentication
RIP Limitations
Maximum network diameter = 15
RIPv1
Updates are sent via broadcast
No prefix length is carried in the updates (Classful routing)
No authentication mechanism
RIP - CLI Commands
Minimum configuration
Contents
1 Objective .......................................................................................2
2 RIP/RIP2 ........................................................................................2
3 EQUIPMENT/SOFTWARE REQUIRED ..........................................................2
4 Related Commands ............................................................................2
5 Supported Platforms ..........................................................................2
6 Lab Steps .......................................................................................3
6.1. Enabling RIP ............................................................................................ 3
6.2. 6900 Configuration .................................................................................... 4
6.3. 6850E Configuration ................................................................................... 5
6.4. 6450 Configuration .................................................................................... 5
6.5. Verification of the Backbone ........................................................................ 6
6.6. Distributing Routes .................................................................................... 7
6.7. RIP Updates using V1 and V2......................................................................... 9
6.8. Metrics ................................................................................................... 9
6.9. RIP Authentication – Simple......................................................................... 11
7 Summary ...................................................................................... 11
8 Lab Check .................................................................................... 12
2
RIP/RIP2
1 Objective
This lab will introduce RIP and RIP2 on an OmniSwitch. This includes loading RIP and enabling both
version 1 and version 2. Three OmniSwitch's must be used to understand these concepts, any
combination of switches will work.
THIS MEANS YOU MAY NEED TO BE WORKING COOPERATIVELY WITH
ANOTHER TEAM! PLAN ACCORDINGLY!!!
2 RIP/RIP2
This lab will introduce the routing protocols of RIP and RIP2. Also, we’ll briefly discuss the routing table
and how to display it.
This lab, as with other Layer 3 labs, assume a basic knowledge of the OmniSwitch products. Specific
commands for creating VLANs, associating ports with VLANs and creating Virtual IP interfaces may not be
listed. Refer to previous labs or the CLI Quick Reference Guide if necessary.
3 EQUIPMENT/SOFTWARE REQUIRED
Three OmniSwitches of any type (OS9xxx, OS6850, OS6450 or OS6250)
Three PCs
4 Related Commands
show ip rip, ip load rip, ip rip, show ip routes
IP rip status enable
5 Supported Platforms
All
3
RIP/RIP2
6 Lab Steps
When the switches completes the boot cycle configure the VLAN 1 parameters and interconnect the
switches. Ensure you have basic Layer 2 connectivity before continuing. As in all labs, replace 'X' with
your switch number. Don’t forget to activate all needed ports (uplink and clients).
Loopback0 = 10.X.X.X
VLAN 1:
IP interface = int_1
IP address = 192.168.10.X/24 (X=your switch number)
Default Ports = All
Once you are satisfied you have L2 connectivity between all switches, load the RIP kernel and enable
the RIP Protocol:
-> show ip rip
ERROR: The specified application is not loaded
Notice the status of RIP is still Disabled. The next step is to enable the protocol itself:
4
RIP/RIP2
Although we have loaded the RIP Protocol, we have not assigned it to any IP interfaces yet. Review the
RIP Command set to see the status (Remember the '?'):
-> show ip rip ?
^
ROUTES PEER INTERFACE <cr>
(IP Routing & Multicast Command Set)
Our next configuration step will be to enable RIP on our Virtual IP Interfaces. We are going to use VLAN
1 as our RIP backbone so the following assumes the interfaces you created for VLAN 1 earlier are named
as described:
The commands above enabled RIP on the 192.168.10.1 interface named int_1. Notice the RIP version
being sent and received by default.
The commands above enabled RIP on the 192.168.10.3 interface named int_1. Notice the RIP version
being sent and received by default.
The commands above enabled RIP on the 192.168.10.5 interface named int_1. Notice the RIP version
being sent and received by default.
Notice we see the Loopback0 addresses of your neighbors learned via RIP. Loopback0 will always be
7
RIP/RIP2
advertised, even if there are no users on the switch; no route re-distribution is necessary. A VLAN must
have associations for it to be active and advertised.
Take note of the number of updates sent and received and the secs since last update. In the example
above, 6900 should see another update from 6450 in 3 seconds (Remember, RIP's default update timer is
30 secs), and 8 seconds before it will see an update from switch2.
Since we have no members in VLAN 10X on any of the switches the IP Interface status is DOWN. In our
lab we are going to cheat and tag this VLAN on the client port which is already up.
6900-> vlan 101 members port 1/1 tagged
6900-> show ip interface
Total 6 interfaces
Name IP Address Subnet Mask Status Forward Device
------------------+---------------+---------------+------+-------+--------
EMP 10.4.5.1 255.255.255.0 UP NO EMP
EMP-CMMA 0.0.0.0 0.0.0.0 DOWN NO EMP
Loopback 127.0.0.1 255.255.255.255 UP NO Loopback
Loopback0 10.1.1.1 255.255.255.255 UP YES Loopback0
int_1 192.168.10.1 255.255.255.0 UP YES vlan 1
int_101 192.168.101.1 255.255.255.0 UP YES vlan 101
You should only see the local networks for your VLANs at this time. In order for routes not learned via
RIP to be advertised, they must be redistributed. Let’s enable route redistribution for the local routes
on all three switches. Remember, routing protocols will only advertise routes they learned by that
protocol. If route is learned by another protocol or of they are local or static routes redistribution is
required. (Replace X with your switch number)
6900-> ip route-map switchXrip sequence-number 10 action permit
6900-> ip redist local into rip route-map switchXrip admin-state enable
6900->
8
RIP/RIP2
In this example, switchXrip is an alias for the route-map statement. We then added a re-distribution
command to that alias to re-distribute all local routes into rip.
6900-> show ip rip routes
Legends: State: A = Active, H = Holddown, G = Garbage
Destination Gateway State Metric Proto
------------------+-----------------+----+------+------
10.1.1.1/32 +10.1.1.1 A 1 Redist
10.3.3.3/32 +192.168.10.3 A 2 Rip
10.5.5.5/32 +192.168.10.5 A 2 Rip
192.168.10.0/24 +192.168.10.1 A 1 Redist
192.168.101.0/24 +192.168.101.1 A 1 Redist
You should see the other switches as peers and their VLAN 1 router interfaces as gateways to their other
VLANs.
Ping all router interfaces on all switches from both the OmniSwitch and your PCs to test connectivity.
The commands above enabled route redistribution for all local routes only. We could have used an ip
access-list to identify specific routes to redistribute. Refer to User Manuals for details. Additional
commands were included to display RIP peers and the routing database.
9
RIP/RIP2
After approximately 180 seconds switch 1 should see the metrics for the routes change to 16, meaning
unreachable, and the route will age out shortly after. This is because switch 2 and switch 3 are sending
RIP v2 packets and RIP v1 will not accept RIP v2 packets. Take a look at the tables on switches 2 and 3.
Notice they still see switch 1.
Now, configure Switch 1 to accept either RIP v1 or RIP v2 on the interface.
Type the following:
6900-> ip rip interface int_1 recv-version both
You will see switches 2 and 3 show back up in the router database.
6.8. Metrics
Metrics can be manually configured for RIP. Let’s check the current metric for the 192.168.103.0
network on 6900 and 6450. Type the following on 6850E:
The command above says that switch2 will add a metric of 5 to all routes being learned on interface
int_1. Check the current metric to see this.
Type the following:
switch2-> show ip router database
Legend: + indicates routes in-use
* indicates BFD-enabled static route
r indicates recursive static route, with following address in brackets
Check the routing table on all switches; the routes should be removed after their aging period.
Type the following:
6850E-> show ip rip peer
Total Bad Bad Secs since
IP Address Recvd Packets Routes Version last update
----------------+------+-------+------+-------+-----------
192.168.10.1 87 2 0 2 15
192.168.10.5 76 2 0 2 1
You should see that you are now receiving bad packets from switch2 since authentication is not enabled
on all switches. Type the following on 6900 and 6450:
6900-> ip rip interface int_1 auth-type simple
6900-> ip rip interface int_1 auth-key alcatel
6450-> ip rip interface int_1 auth-type simple
6450-> ip rip interface int_1 auth-key alcatel
6900-> show ip rip peer
6900-> show ip rip routes
You should see that you are now receiving valid RIP updates since Authentication is configured correctly
on all switches.
7 Summary
This lab introduced you to RIP v1 and RIP v2 on an OmniSwitch. RIP and RIP v2 are part of the basic
routing package for the OmniSwitch. The RIP protocol can be used in smaller networks to advertise
routing information.
12
RIP/RIP2
8 Lab Check
- What command must be run before RIP can be enabled on an interface?
........................................................................................................................
- RIP will advertise routes to inactive VLANs. (T/F)
- What is the purpose of enabling redistribution for local routes?
........................................................................................................................
- What is the command for redistributing only a single IP subnet instead of all local routes?
........................................................................................................................
- What are some concerns when running both RIPv1 and RIPv2?
........................................................................................................................
- What are some advantages of enabling authentication?
........................................................................................................................
OMNISWITCH AOS R6/R7/R8
Quality of service
Module Objectives
You will:
Learn about Quality of Service
implementation and associated features on
an AOS switch based
Overview
QOS Global default
QOS and ports Configuration
QOS Policies High
Policy Condition
Classifies the flow Policy Action
Determines how
packets are queued
Using QoS, a network administrator can gain more control over networks where
different types of traffic are in use
I.E. VoIP traffic or mission critical data may be marked as priority traffic and given
more bandwidth on the link.
In fact, the QoS may also be scheduled to run at a certain time
QoS may be defined through the CLI, Webview or OmniVista-PolicyView
Queuing
QoS is responsible for enforcing user-
defined policies on switch traffic
QoS policies can affect such things as
Accept/Drop behavior of a packet
Queuing priority
Next hop for routing QoS
Bandwidth shaping
Setting 802.1p/TOS/DSCP packet priorities Routing Classification
IGMP/MLD join behavior Engine Engine
Incoming
Packet
H Forwarding Engine
E Action
A Packet Classification
D
E
R
Classifier (policy database)
Condition Action
---- ----
(source&dest) ---- ----
Gets Policies from : L2
Prioritization, Bandwidth shaping
MAC, Vlan,
CLI ICMP filtering
slot/port, Inter typ
Webview, or IPMS Filtering ICMP prioritizing, ICMP rate limiting
PolicyView 802.1p/ToS/DSCP marking and mapping
Policy Based Routing PBR for redirecting
L3
---- ---- routed traffic
Maintains QoS tables
Rules L3/L4 Policy Based Mirroring
Actions, SIP, DIP, Advanced Layer 2 to 4 Filtering
Conditions, TCP,UDP,IP proto Server Load Balancing
Services, Source TCP/UDP port
Groups Dest. TCP/UDP port
QoS
Specifications
Default Priority Queues
8 CoS queues per egress port
802.1p/TOS used to select queues
Strict priority for scheduling
Maximum
Conditions = 2048
Actions = 2048
Rules
2048 (6400/6850/6855)
1400 (6250)
Queuing
Local Destination
Packet does not flow through the Fabric
Packet goes to one of the 8 CoS Queues for
the destination port C
o
SCHEDULER
s
EGRESS
MMU
MAC
MAC
TLU
Remote Destination Q
u
Packet goes to one of the 8 CoS Queues e
s
SCHEDULER
s
EGRESS
Selects Queues based on either:
MMU
MAC
MAC
TLU
Q
Strict Priority u
e
Starting w/ highest priority first s
Discards frames at the ingress port if the egress port is congested (on a per priority basis)
i.e. the queue length at the egress port exceeds its limit
=> Avoids wasting fabric bandwidth on frames that would be dropped at egress
=> Frames destined for non-congested ports not dropped
Configuring the maximum rate at which to send traffic on the specified port
-> qos port 1/1 maximum egress-bandwidth 10M
Takes precedence over an egress queue limit configured on the same port
Configuring a minimum and maximum bandwidth for each of the COS egress queue on the specified port
-> qos port 2/10 q7 minbw 2k q7 maxbw 10k
QOS POLICIES CONFIGURATION
QOS
Policy types
Access Guardian
• User Network Profile
QOS
802.1p / ToS / DSCP
• Marking Policy Based
• Stamping Routing
• Routed traffic redirecting
Filtering
• Layer 2 and Layer 3/4 Policy Based
ACLs Mirroring
• Mirror traffic based
on QoS policies
QOS Policy Rule
Configuration
-> policy rule rule_name [enable | disable] [precedence precedence] [condition condition] [action action]
[validity period name | no validity period] [save] [log [log-interval seconds]] [count {packets | bytes}]
[trap | no trap] [default-list | no default-list]
Incoming
Packet
Action
Packet Classification
applies to outgoing traffic
classifies incoming traffic
Condition Action
policy rule
-> policy validity period vp01 hours 13:00 to 19:00 days monday friday
-> policy rule r1 validity period vp01
Configures a validity period for rule r1
Action
Packet Classification
applies to outgoing traffic
classifies incoming traffic
Condition Action
policy rule
Actions
Egress policies
Grouped in a policy list with a policy list type of “egress”
Same rule allowed in both ingress and egress policy list
By default, a policy rule is treated as an ingress policy
-> policy list list_name type [unp | egress] rules rule_name [rule_name2...] [enable | disable]
-> policy list eggress1 type egress rules rule1 rule2 rule3
QOS
Monitoring Policies
Displaying the actual number of matches for the configured rules
->show active policy rules
Policy From Prec Enab Act Refl Log Trap Save Def Matches
R1 cli 0 Yes Yes No No Yes Yes Yes 2
(L2/3): C1 -> QoS_Action1
R2 cli 0 Yes Yes No No Yes Yes Yes 0
(L2/3): C2 -> QoS_Action1
R3 cli 0 Yes Yes No No Yes Yes Yes 0
(L2/3): C3 -> QoS_Action1
OS6400/OS685X/OS9000 platforms
-> show qos queue 1/9
To capture statistics on a per port basis Slot/ Q Bandwidth Packets
Port VPN No Pri Wt Min Max Xmit Drop Type
-> qos port 1/1 monitor -----+----+--+---+--+-----+-----+---------+---------+----
Automatically active on OmniSwitch 1/9 8 0 0 - - - 0 0 PRI
6855-U24X or 9000E 1/9 8 1 1 - - - 0 0 PRI
1/9 8 2 2 - - - 0 0 PRI
1/9 8 3 3 - - - 0 0 PRI
1/9 8 4 4 - - - 0 0 PRI
Port queues Reset statistics 1/9 8 5 5 - - - 0 0 PRI
1/9 8 6 6 - - - 0 0 PRI
-> qos stats reset egress 1/9 8 7 7 - 2K 10K 0 0 PRI
-> qos stats interval
AUTO-QOS CONFIGURATION
Auto QoS on Alcatel-Lucent voice applications
If you see Alcatel-
Lucent phone place
Trusts and prioritizes traffic from Alcatel-Lucent it in priority queue –
phones based on the priority in the packet set by OXE, i.e.
priority 5
Treat the rest as needed
on trusted and un-trusted ports
The administrator has the option to prioritize the phone traffic instead of
merely trusting it
-> qos phones [priority priority_value | trusted]
When enabled, qos policies specifying priority will not take effect on the
phone traffic
Administrator can still apply other policies such as ACLs and Rate limiting
policies
Auto QoS - Alcatel-Lucent NMS applications
Prioritizes NMS traffic to the switch that aims to alleviate access problems to
the switch that is under attack
Supported only on R6 switches
Allows management access to the switch even under heavy load conditions
Avoids the possibility of the switch being DOS condition by rate limiting the
high priority NMS traffic to 512 pps
SIP SNOOPING
Session Initiation Protocol (SIP)
It is a network communications protocol commonly applied for Voice over IP
(VoIP) signaling.
It is an alternative approach to signaling using the H.323 protocol standard.
It can work with other protocols to establish connections between all sorts of
different devices and it is capable of supporting audio, video and instant
messaging.
Regardless the particular device or media through which the content is delivered
The SIP snooping feature also allows basic and global QOS treatments for the
SIP signaling messages themselves and the SOS call.
When SIP snooping is disabled, the SIP packets forwarded by hardware are not
subject to any specific QOS treatment.
Treated as normal packets following the same QOS treatment according to qos port or
policy rules configuration.
SIP Snooping Overview
SIP network Components
Edge switches, aggregation switches and core
switches
SIP Server (registrar, proxy, redirect, gateway) External
SIP Phones (User Agents) WAN
SIP Snooping supports a 4 byte lookup, only “INVI” lookup will be done instead
of complete INVITE.
Packets with similar strings at the beginning of their payload may be identified
as SIP. It is expected that software on CPU will do further filtering, but marking
will done anyway.
SIP Snooping - Configuring Edge Port
SIP snooping has two modes:
Automatic - (Default) The edge/non edge mode is derived from LLDP
non-edge port – Port receives LLDP with a “switch/router” capability.
edge port – Port receives no LLPD or LLPD without the switch/router capability.
Note: For AOS, the switch/router capability is by default not advertised.
This can be enabled with the command:
-> lldp <slot/port> tlv management system-capabilities enable”
Force mode - The edge/non edge mode is forced by configuration
PDU signaling messages are rate limited to 1Mbps. This rate limiter is not
configurable.
The QOS treatment for SOS call is limited to a global DSCP marking for all SOS
calls. When a call is deemed to be a SOS call, a default DSCP of 46 (EF) is
assigned for both RTP and RTCP flows of that call.
The DSCP marking can be configured to any value.
Contents
1 Objective .......................................................................................2
2 Quality of Service Settings ...................................................................2
3 EQUIPMENT/SOFTWARE REQUIRED ..........................................................2
4 Related Commands ............................................................................2
5 Supported Platforms ..........................................................................2
6 Discussion .......................................................................................2
7 Global QoS Defaults ...........................................................................3
8 Lab Steps .......................................................................................3
8.1. Global Configuration .................................................................................. 3
8.2. Bandwidth Shaping .................................................................................... 7
8.3. Port Default 802.1P/ToS/DSCP Configuration .................................................... 9
8.4. Configuring Trusted Ports ............................................................................ 9
8.5. Configuring Servicing Mode and Thresholds ...................................................... 10
8.6. Configuring Policies .................................................................................. 11
8.7. policy rule keywords ................................................................................. 14
8.8. Rule Precedence ...................................................................................... 14
8.9. policy network group................................................................................. 15
8.10. policy service group .................................................................................. 15
8.11. policy mac group...................................................................................... 16
8.12. policy port group ..................................................................................... 16
8.13. policy map group ..................................................................................... 17
9 Summary ...................................................................................... 17
10 Lab Check .................................................................................... 17
2
Quality of Service
1 Objective
This lab will provide an overview of the myriad of QOS settings on the OmniSwitch family of products.
It introduces many different configurations. It allows you to become familiar with the syntax. By the
end of this lab, you will realize how complex QoS can be and steps to make it work properly. The
final section will challenge you to create a configuration based a scenario.
3 EQUIPMENT/SOFTWARE REQUIRED
One OmniSwitch (any Model)
Two or more PCs.
4 Related Commands
qos (enable, disable, apply, reset, flush), qos port …,
policy (condition, action, rule, …), show qos …, show policy …, policy … group, policy service …
5 Supported Platforms
All
6 Discussion
While policies may be used in many different types of network scenarios (QOS ACLs, SLB, PBR), we will
address the following:
Basic QoS – including traffic prioritization and bandwidth shaping;
ICMP policies – including filtering, prioritizing and rate limiting;
802.1p/ToS/DSCP – for marking and mapping;
QoS configuration may interact with other configured features – like SLB, dynamic link aggregation (LACP),
802.1Q, mobile ports, IP routing, and LDAP policy management. Also, one can configure combinations of
policies. These topics will not be addressed in this lab exercise, and are left to the student for further
study and investigation.
Use the Policy Condition Combination table in the Network Configuration Guide for a list of valid
combinations and further discussion on combinations.
3
Quality of Service
8 Lab Steps
following commands: qos default bridged disposition, qos default routed disposition, or qos default
multicast disposition.
For example, to deny any routed flows that do not match policies, type:
Notice that the global policy needs activation. To activate the setting, type:
Userports:
Filter : spoof
Shutdown: none
Quarantine Manager:
Quarantine MAC Group : Quarantined
Quarantined Page : Yes
Remediation URL :
Debug : info
Typically, the disposition is only configured when you are using policies for Access Control Lists (ACLs).
If you set qos default bridged disposition to deny, as well, you effectively drop all traffic (bridged or
routed) that does not match any policy. If you want to create ACLs to allow some Layer 2 traffic through
the switch, you must configure two rules for each type of Layer 2 traffic, one for source and one for
destination.
Default queues : 8
Default queue service : strict-priority
Trusted ports : No
NMS Priority : Yes
Phones : trusted
Default bridged disposition : accept
Default routed disposition : accept
Default IGMP/MLD disposition: accept
Logging:
Log lines : 256
Log level : 6
Log to console : No
Forward log : No
Stats interval : 60 seconds
Userports:
Filter : spoof
Shutdown: none
Quarantine Manager:
Quarantine MAC Group : Quarantined
Quarantined Page : Yes
Remediation URL :
Debug : info
Although it is not covered in this lab exercise, there is a significant amount of information to be gathered
using qos log and debug qos. (Please consult the configuration guides for further information.)
Another command that is useful for gathering some basic information about QoS is the statistics command:
Software resources
Applied Pending
Table CLI LDAP ACLM Blt Total CLI LDAP ACLM Blt Total Max
rules 0 0 0 0 0 0 0 0 0 0 2048
actions 0 0 0 0 0 0 0 0 0 0 2048
conditions 0 0 0 0 0 0 0 0 0 0 2048
services 0 0 0 0 0 0 0 0 0 0 256
service groups 1 0 0 0 1 1 0 0 0 1 1024
network groups 0 0 0 1 1 0 0 0 1 1 1024
port groups 2 0 0 8 10 2 0 0 8 10 1024
7
Quality of Service
For the next few sample configurations, reset the Pod. On the switch 6900, create VLAN 10 with an IP
router address 192.168.10.254/24, and VLAN 20 with IP address 192.168.20.254/24, put the ports 1/7 in
default vlan 10 and the port 1/3 in default vlan 20. Enable ports 1/3 and 1/7.
6900 -> vlan 10
6900 -> ip interface int_10 address 192.168.10.254/24 vlan 10
6900 -> vlan 20
6900 -> ip interface int_20 address 192.168.20.254/24 vlan 20
6900 -> vlan 10 members port 1/7 untagged
6900 -> vlan 20 members port 1/3 untagged
6900 -> interfaces 1/3 admin-state enable
6900 -> interfaces 1/7 admin state enable
On 6450, activate port 1/1 (client) and 1/7 (uplink) :
6450 -> interfaces 1/1 admin up
6450 -> interfaces 1/7 admin up
On 6850E, activate port 1/1 (client) and 1/3 (uplink) :
6850E -> interfaces 1/1 admin up
6850E -> interfaces 1/3 admin up
Clients 5/6 are connected on port 1/1 of 6450, client 3/4 on port 1/1 of 6850E. Configure Client 5/6 with
the following parameters:
IP = 192.168.10.10
MASK = 255.255.255.0
GW = 192.168.10.254
8
Quality of Service
In this next example, any flow from a source IP address is sent to a queue supporting its maximum
bandwidth requirement.
Modify the policy action that you have been created earlier to limit the maximum bandwidth, from the
same source:
The bandwidth may be specified in abbreviated units, in this case, 100k. Try to launch a ping from client
5/6 to client 3/4
ping 192.168.20.10
As it doesn’t exceed the maximum bandwidth, it should works. Try now to launch a ping by specifying a
greater datagram size :
ping –l 65000 192.168.20.10.
Your ping is now using a greater bandwidth, so it shouldn’t works.
Once testing is complete, remove the condition, action and rule:
In this example, any untagged traffic (traffic without any 802.1p setting) arriving on port 1/1 will be
stamped with an 802.1p value of 7 (highest priority). If the port is configured to be untrusted, any tagged
traffic will be stamped with an 802.1p value of 7. If the port is configured to be trusted, any tagged traffic
will preserve the 802.1p value in the flow. By default, switched ports are not trusted.
In most environments, all ports are not typically trusted. To configure individual ports to recognize 802.1p
or ToS, use the qos port trusted command with the desired slot/port number. For example:
the switch on slot 1 port 7. A policy rule called 802.1p_rule puts the condition and the action together.
Type:
6850E & 6450 -> qos port 1/7 servicing mode strict-priority
In this example, the servicing mode of port 6 on slot 2 is set to strict priority (this is also the default value),
which means that highest priority packets will always be sent out first.
The OmniSwitch also support WRR and DRR (Deficit Round Robin). The weight assigned to a WRR queue
designates the number of packets the queue sends out before the scheduler moves on to the next queue.
For example, a queue weight of 10 sends out 10 packets at each interval. What do you think happens when
the following commands are applied?
6850E & 6450 -> qos port 1/7 servicing mode wrr 8 1 5 0 4 0 3 0
Port 1/7 is now configured with a mix of Strict Priority and WRR:
Queues 0, 2, 4 and 6 are configured WRR with weights 8 5 4 3 respectively. They are
serviced only after the Strict Priority queues are serviced. Based on the
weights, Q0 will have the best throughput, then Q2, then Q4 and then Q6
To reset the servicing mode for the port back to the global default mode, use the default parameter with
this command and do not specify a queuing scheme. For example,
11
Quality of Service
6850E & 6450 -> qos port 1/7 servicing mode default
Configuring a minimum and maximum bandwidth value for each of the eight egress port queues is allowed
on the OmniSwitch. By default the bandwidth values are set to zero, which means best effort for the
minimum bandwidth and port speed for the maximum bandwidth.
To configure the bandwidth values use the qos port q minbw maxbw command. For example, the following
command sets the minimum and maximum bandwidth for queue 7 on port 1/10 to 2k and 10k:
6850E & 6450 -> qos port 1/10 q7 minbw 2k q7 maxbw 10k
Define a rule (named my_rule) that will give all traffic from IP address 10.10.2.3 the highest priority (7) as
it passes through the switch:
Source ip tos
destination ip dscp
multicast ip 802.1p
source network group source mac
destination network group destination mac
multicast network group source mac group
source ip port destination mac group
destination ip port source vlan
source tcp port destination vlan
destination tcp port source port
source udp port source port group
destination udp port destination port
service destination port group
service group source interface type
ip protocol destination interface type
To create or modify a policy condition, use the policy condition command with the keyword for the type of
traffic you want to classify, for example, an IP address or group of IP addresses. In this example, a
condition named c1 is created for classifying traffic from destination IP address 10.10.10.100 and
destination port 23.
6850E & 6450 -> policy condition c1 destination ip 10.10.10.100 destination tcp
port 23
6850E & 6450 -> show policy condition c1
Condition Name From Src -> Dest
+c1 cli
*IP : Any -> 10.10.10.100
*TCP : Any -> 23
6900 -> policy condition c1 destination ip 10.10.10.100 destination tcp-port 23
6900 -> show policy condition c1
Condition name : c1
State = new,
Destination IP = 10.10.10.100,
Destination TCP port = 23
To remove a classification parameter from the condition and retain the destination IP information, use no
with the relevant keyword; in this case destination TCP port. For example:
More than one action parameter may be specified. Some parameters, like ToS and DSCP, are mutually
exclusive. In addition, some action parameters are only supported with particular condition parameters.
To remove an action parameter or return the parameter to its default, use no with the relevant keyword as
we did in the above example
6850E & 6450 -> policy condition c1 destination ip 10.10.10.100 destination tcp
port 23
6900 -> policy condition c1 destination ip 10.10.10.100 destination tcp-port 23
ALL -> policy action bw_action maximum bandwidth 300k
ALL -> policy rule telnet_rule condition c1 action bw_action
ALL -> qos apply
precedence
validity period
save
log
log interval
count
trap
By default, rules are enabled. Rules may be disabled or re-enabled through the policy rule command
ALL -> policy rule telnet_rule precedence 1000 condition c1 action bw_action
Logging a rule may be useful for determining such things as the source of attacks. Often, at least when
initially configuring your rules, it is recommended to use the log option to monitor how your policies are
being used. To specify that the switch should log information about flows that match the specified policy
rule, use the policy rule command with the log option. For example, type:
ALL -> policy network group netgroup3 173.21.4.39 mask 255.255.255.0 10.10.5.3
10.10.5.5
ALL -> policy condition c4 source network group netgroup3
Shortcut for UDP service source udp port source udp-port Keywords may be used in
destination udp port destination udp-port combination.
Or a shortcut for this command replaces the protocol and destination ip port keywords with
destination tcp port, by typing:
6850E & 6450 -> policy service telnet1 destination tcp port 23
6900 -> policy service telnet1 destination tcp-port 23
When mapping to a different type of value, however (802.1p to ToS, 802.1p to DSCP), any values in the
incoming flow that matches the rule but that are not included in the map group will be zeroed out. For
example, the following action specifies the same map group but instead specifies mapping 802.1p to ToS,
type:
ALL -> policy action Map2 map 802.1p to tos using Group2
9 Summary
This lab introduced you to the process many QoS configurations of the OmniSwitch.
10 Lab Check
- What are the three basic steps to forming a policy?
........................................................................................................................
- What are the types of condition groups available and how are they used?
........................................................................................................................
- What is the command used to set QoS back to its default configurations?
........................................................................................................................
- (True or False)
By default, bridged, routed, and multicast flows that do not match any policies are accepted on the
switch.
- (True or False)
By default, switched ports are not trusted.
OMNISWITCH AOS R6/R7/R8
AOS
R6
QOS
Policy Types
Access Guardian
• User Network Profile
QOS
802.1p / ToS / DSCP
• Marking Policy Based
• Stamping Routing
• Routed traffic redirecting
Filtering
• Layer 2 and Layer 3 & 4 Policy Based
ACLs
Mirroring
• Mirror traffic based
on QoS policies
Policy Based Filtering
ACLs
ACLs are the filtering part of policies
Other policies can apply to prioritization and bandwidth management
Parameters are:
Policy name <name>
Policy Rule
Condition name <name>
Action name <name> Condition Action “disposition”
Precedence 0-65535 (higher first)
Established (used when needing a response, e.g.. Telnet)
-> policy rule rule_name [enable | disable] [precedence precedence] [condition condition_name]
[action action_name] [validity period name | no validity period] [save] [log [log-interval seconds]]
[count {packets | bytes}] [trap | no trap] [default-list | no default-list]
Incoming
Packet Action
Packet Classification
Forward or block
outgoing traffic
Accept or deny incoming traffic
policy rule
ACL
Default Settings
Default settings allow all traffic but can be modified
Allows all bridged traffic except for traffic matching the source MAC address and VLAN 5.
Layer 3 ACL
Example
L3 Conditions can be defined for the following:
Source IP address or source network group
Destination IP address or destination network group
IP protocol
ICMP code
ICMP type
Source TCP/UDP port
Destination TCP/UDP port or service or service group
Subnet
192.168.100.024
Host1
172.16.30.2/24
->policy condition allow-host1 source ip 172.16.30.2 mask 255.255.255.255 destination ip 192.168.100.0 mask 255.255.255.0
->policy condition subnet-100 source ip 192.168.100.0 mask 255.255.255.0 destination ip 172.16.30.2 mask 255.255.255.255
->policy action action-allow disposition accept
->policy rule rule1 condition allow-host1 action action-allow log
->policy rule rule2 condition subnet-100 action action-allow log
->qos apply
This set of commands globally denies routed traffic on the switch and allows communication to and from
Host1 to subnet 192.168.100.0/0
ACL
Established example
To allow TCP connections initiated from Inside only
Outside
Inside
policy network group internal 10.0.0.0 mask 255.0.0.0 192.168.0.0 mask 255.255.0.0 172.16.0.0 mask 255.240.0.0
policy condition condition1 destination network group internal established*
policy action allow disposition allow
policy rule rule1 condition condition1 action allow
policy condition condition2 destination network group internal
policy action drop disposition drop
policy rule rule2 condition condition2 action drop
•TCP header information is examined to determine if the ack or rst flag bit is set
•This condition is used in combination with a source/destination IP or source/destination TCP
port condition.
ACL MANAGER (ACLMAN)
ACL Manager Overview
ACL Types
Standard – Compares source address of packet
Numbered - Valid Ranges are 1-99 and 1300-1999
Named - Example. ACLDemo, ACLDataCenter
192.168.2.101
10.0.66.101
1/1
policy condition cond2 source port 1/1 source ip 192.168.2.101 destination ip 10.0.66.101
policy action block disposition deny
policy rule rule2 condition cond2 action block
Contents
1 Objective ......................................................................................... 3
2 ACL Settings ...................................................................................... 3
3 EQUIPMENT/SOFTWARE REQUIRED ........................................................... 3
4 Related Commands ............................................................................. 3
5 Supported Platforms ............................................................................ 3
6 Discussion......................................................................................... 3
7 ACL Specifications .............................................................................. 4
7.1. Global QoS Defaults ................................................................................... 4
8 Reminders ........................................................................................ 5
8.1. Global Configuration .................................................................................. 5
8.2. Condition ................................................................................................ 6
8.3. Policy network group.................................................................................. 6
8.4. Policy service group ................................................................................... 7
8.5. Policy mac group....................................................................................... 7
8.6. Policy port group....................................................................................... 7
8.7. Action .................................................................................................... 7
8.8. Rule ...................................................................................................... 8
8.9. Rule Precedence ....................................................................................... 8
8.10. How Precedence is Determined ..................................................................... 8
8.11. Logging .................................................................................................. 8
8.12. Monitoring ............................................................................................... 8
2
ACL Settings
10 Summary ......................................................................................... 11
11 Lab Check ....................................................................................... 12
3
ACL Settings
1 Objective
This lab will provide an overview of ACL settings on the OmniSwitch family of products. It introduces
many different configurations. It allows you to become familiar with the syntax. By the end of this
lab, you will realize how complex ACLs can be and steps to make it work properly. The final section
will challenge you to create a configuration based on a scenario.
2 ACL Settings
The OmniSwitch family of products was designed with Security in mind. As a result, there are a
variety of features and settings available. And, the feature set will continue to expand as new
standards and functional needs emerge.
3 EQUIPMENT/SOFTWARE REQUIRED
Two (2) OmniSwitches and two or more PCs.
4 Related Commands
qos (enable, disable, apply, reset, flush), qos port …,
policy (condition, action, rule, …), show qos …, show policy …, policy … group, policy service …
5 Supported Platforms
All
6 Discussion
While policies may be used in many different types of network scenarios, we will address the following:
- ICMP policies – including filtering
- ACLs – used for Layer 2, Layer 3/4 and multicast filtering.
ACLs configuration may interact with other configured features – like SLB, dynamic link aggregation (LACP),
802.1Q, mobile ports, IP routing, and LDAP policy management. Also, one can configure combinations of
policies. These topics will not be addressed in this lab exercise, and are left to the student for further
study and investigation.
Use the Policy Condition Combination table in the Network Configuration Guide for a list of valid
combinations and further discussion on combinations.]
This lab covers the QoS CLI commands used specifically to configure ACLs.
ACLs are basically a type of QoS policy, and the commands used to configure ACLs are a subset of the
switch’s QoS commands.
4
ACL Settings
7 ACL Specifications
These specifications are the same as those for QoS in general:
Maximum number of policy rules 2048 (1024 for OS6250& 6450, 8192 for 6900)
Maximum number of policy conditions 2048 (8192 fro 6900)
Maximum number of policy actions 2048 (8192 for 6900)
Maximum number of policy services 256 (512 for 6900)
Maximum number of groups (network, MAC, service, port) 1024 (2048 fro 6900)
ACLs provide moderate security between networks. The following illustration shows how ACLs may be
used to filter subnetwork traffic through a private network, functioning like an internal firewall for
LANs.
When traffic arrives on the switch, the switch checks its policy database to attempt to match Layer 2 or
Layer 3/4 information in the protocol header to a filtering policy rule. If a match is found, it applies the
relevant disposition to the flow. Disposition determines whether a flow is allowed or denied. There is a
global disposition (the default is accept), and individual rules may be set up with their own dispositions.
Notes
The current software release, the deny and drop options, produce the same effect. That is, the traffic is
silently dropped.
Notes
There are no defaults for the policy condition command
Globally, in order to configure an ACL, the following general steps are basically required:
1. Set the global disposition
2. Create a condition for the traffic to be filtered
3. Create an action to accept or deny the traffic
4. Create a policy rule that combines the condition and the action
8 Reminders
Notes
Individual policy rules may be enabled or disabled with the policy rule command
By default, bridged, routed, and multicast flows that do not match any policies are accepted on the
switch. To change the global default disposition (which determines whether the switch will accept,
deny, or drop the flow), use the desired disposition setting (accept, drop, or deny) with any of the
following commands: qos default bridged disposition, qos default routed disposition, or qos
default multicast disposition.
For example, to deny any routed flows that do not match policies, type:
-> qos default routed disposition deny
To activate the setting, type:
-> qos apply
Typically, the disposition is only configured when you are using policies for Access Control Lists
(ACLs).
Note:
Notes
If you set qos default bridged disposition to deny, as well, you effectively drop all traffic (bridged or routed)
that does not match any policy. If you want to create ACLs to allow some Layer 2 traffic through the switch,
you must configure two rules for each type of Layer 2 traffic, one for source and one for destination.
6
ACL Settings
What would be the command to reset all QoS parameters back to their defaults?
Type:
-> qos reset
Although it is not covered in this lab exercise, there is a significant amount of information to be
gathered using qos log and debug qos. (Please consult the configuration guides for further
information.)
To quickly gather some basic information about QoS settings, type:
-> show qos config
-> show qos statistics
8.2. Condition
There are many options for configuring a condition, depending on how you want the switch to
classify traffic for this policy. More than one condition parameter may be specified.
The condition will not be active on the switch until you enter the qos apply command.
8.7. Action
More than one action parameter may be specified. Some parameters, like ToS and DSCP, are
mutually exclusive. In addition, some action parameters are only supported with particular condition
parameters.
8.8. Rule
policy rule keywords
precedence
validity period
save
log
log interval
count
trap
By default, rules are enabled. Rules may be disabled or re-enabled through the policy rule command
using the disable and enable options. For example:
-> policy rule telnet_rule disable
[Another option is to turn off QoS completely by typing: -> qos disable.]
8.11. Logging
Logging a rule may be useful for determining such tings as the source of firewall attacks. To specify
that the switch should log information about flows that match the specified policy rule, use the
policy rule command with the log option. For example, type:
-> policy rule telnet_rule log
-> show qos log
8.12. Monitoring
To view QoS configuration and activity, type:
-> show policy condition
-> show policy action
-> show policy rule
-> show active policy rule
9
ACL Settings
9 LABS STEPS
To allow Layer 2 traffic into the switch, one rule must be configured, for Layer 2 source traffic, and for
Layer 2 destination traffic.
On 6450, type:
-> qos reset
-> qos flush
-> qos apply
-> qos default bridged disposition deny
-> policy condition cond4 source mac 00:50:56:00:00:00 mask ff:ff:ff:00:00:00
destination port 1/3
-> policy action AllowTraffic disposition accept
-> policy rule Filter1 condition cond4 action AllowTraffic
Since the QoS software classifies the MAC address twice, after Filter1 is applied to the configuration,
the switch will classify any traffic with a MAC address starting with 00:50:56 as both source and
destination
Condition cond4 allows the source traffic on the switch, but the destination traffic will be denied
unless another rule is set up.
Condition cond4 is set up for classifying Layer 2 destination traffic on physical ports 9. Now when
Layer 2 flows with a MAC address starting with 005056 arrive on the switch destined for destination
ports 9, the flows will be allowed on the switch.
In this example, the default routed disposition is accept (the default). Since the default is accept,
the qos default routed disposition command would only need to be entered if the disposition had
previously been set to deny. The command is shown here for completeness. Type:
-> qos reset
-> qos default routed disposition accept
-> policy condition addr2 source ip 192.168.82.1 destination tcp port 23
-> policy action Block disposition deny
-> policy rule FilterL31 condition addr2 action Block
Traffic with a source IP address of 192.168.82.0, a destination IP port of 23, using protocol 6 (TCP),
will match condition addr2, which is part of FilterL31. The action for the filter (Block) is set to
deny traffic. The flow will be dropped on the switch.
This policy (icmpRule) drops all ICMP traffic. To displays debugging information for QoS internal to
the switch to ICMP echo requests (pings), use the debug qos internal command with the pingonly
keyword, then the show qos log command to display stored log messages.
When you are finished, remove the rule, action and condition for this policy, and get ping working
again.
In this application for IP filtering, FTP traffic from an engineering group is routed through the
OmniSwitch. A policy is configured to accept this traffic on the switch.
Another policy denies traffic from the outside world to the engineering group; however, reverse
flows (reply packets) in response to the Telnet session are allowed through the switch.
3 policies must be created in this example to affect only FTP sessions.
In a first step, set up a service group (ftp) to identify ftp traffic only:
->policy service ftp1 destination tcp port 20
->policy service ftp2 destination tcp port 21
->policy service group ftp ftp1 ftp2
9.2.1. Policy 1
Set up a policy rule called DenyFromOutside to deny FTP traffic to the private network.
1) Create a policy condition (FromOutside) that references the input port 1/1 and ftp traffic:
-> policy condition FromOutside source port 1/1 destination ip any service group
ftp
2) Create a policy action (deny) to deny the traffic.
-> policy action deny disposition deny
3) Then combine the condition and the action in a policy rule (outside).
-> policy rule DenyFromOutside condition FromOutside action deny precedence 2
(or another alternative)
1) Create a policy condition (FromOutside) that references the destination IP subnet.
-> policy condition FromOutside destination ip 10.1.1.0 mask 255.255.255.0 service
group ftp
2) Create a policy action (deny) to deny the traffic.
-> policy action deny disposition deny
3) Then combine the condition and the action in a policy rule (outside).
-> policy rule DenyFromOutside condition FromOutside action deny precedence 20
-> qos apply
4) Check you don’t have any ftp connectivity from the outside network
11
ACL Settings
9.2.2. Policy 2
Set up a second rule called FromInsideFTP to accept FTP traffic from the private network out to the
public network.
1) Create a policy condition (FromInsideFTP) for the FTP traffic.
->policy condition FromInsideFTP source ip 10.1.1.0 mask 255.255.255.0 destination
ip any service group ftp
2) Create a policy action (accept) to allow the flow.
-> policy action accept disposition accept
3) Create a rule that references the policy condition and the policy action.
-> policy rule FromInsideFTP condition FromInsideFTP action accept precedence 10
This rule condition would normally make the FTP reply packets to be denied by the previous
DenyFromOutside policy rule.
-> qos apply
4) Check you don’t have any ftp connectivity from the inside network
9.2.3. Policy 3
An ACL can be defined using the established parameter to identify packets that are part of an
established TCP connection and allow forwarding of the packets to continue. When this parameter is
invoked, TCP header information is examined to determine if the ack, fin or rst flag bit is set. If this
condition is true, then the connection is considered established.
Set up a new rule called Established to accept FTP traffic from the private network out to the public
network.
1) Create a policy condition (FromInsideFTPestablished) for the FTP traffic.
-> policy condition FromInsideFTPestablished destination ip 10.1.1.0 mask
255.255.255.0 destination ip any established
2) Create a rule that references the policy condition and the policy action. The rule condition using
the keyword established, so that reply packets that would normally be denied by the outside policy
rule will be able to get through.
-> policy rule Established condition FromInsideFTPEstablished action accept
precedence 30
This configuration is not applied on the switch until the qos apply command is entered. You can test
the rule first by using the policy classify l3 command.
10 Summary
This lab introduced you to the process many ACL configurations of the OmniSwitch.
12
ACL Settings
11 Lab Check
- What are the three basic steps to forming a policy?
........................................................................................................................
- What are the types of condition groups available and how are they used?
........................................................................................................................
- What does established do?
........................................................................................................................
- What are ACLs used for?
........................................................................................................................
- What is the command used to set QoS back to its default configurations?
........................................................................................................................
- (True or False)
By default, bridged, routed, and multicast flows that do not match any policies are accepted on the
switch.
- (True or False)
By default, switched ports are not trusted.
OMNISWITCH AOS R6/R7/R8
Captive Portal
Concept AOS
Opera ting
System
Customization Extensive Enha nced
Ma na gea bility Security
Parameter definition
Monitoring
User Network Profile
Role Based Access Control by User Network Profile
UNP and AAA Packet Classification Rule
802.1x Authentication server down classification policy
Windows Logon Snooping
Concept
Configuration
Access Guardian 2.0
Overview
Configuration
BYOD with ClearPass
ACCESS GUARDIAN
Access Guardian - Description
Auto-sensing, multi-client authentication on a port
Automatic detection of 802.1X and non-802.1X devices
Port must be mobile and 802.1x enabled
I do not
speak
The network is configured to 802.1X
Default VLAN
Block
Admin
Teacher Student
Student
Default Admin/Teacher
Vlan
Vlan Vlan
ACCESS GUARDIAN
RADIUS SERVER SETUP
External Authentication
Configuring a RADIUS server
1
2
4
3 Radius
Server
The default ports are based on the new RADIUS standards (port 1812 for
authorization and 1813 for accounting).
Some servers may be set up using the old standards (ports 1645 and 1646 respectively)
Selectable IP Interface/Loopback0 for applications
Applications will be able to choose the source IP interface
any IP interface/ Loopback0
in the particular VRF based on an application specific command
Application Interface-Name
-----------------+------------------------------
tacacs -
sflow -
ntp Loopback0
syslog -
dns -
telnet -
ssh -
tftp -
ldap-server -
radius Loopback0
snmp Loopback0
ftp -
802.1x Supplicant and Non-Supplicant
Device classification
Received EAP
frames on 802.1x
enable port
Source
NO YES
is
MAC 802.1x 802.1X
client?
Non-Supplicant 802.1x
Device Device
MAC Authentication 802.1x Authentication
Radius
Server
802.1x Authentication server down
classification policy
Users are moved to a specific profile when RADIUS server is not available
Supplicant?
Yes No
Captive Portal Captive Portal Captive Portal Captive Portal Captive Portal
Group mobility Group mobility Group mobility Group mobility Group mobility Group mobility Group mobility
Default VLAN Default VLAN Default VLAN Default VLAN Default VLAN Default VLAN Default VLAN
Policies can only be used once for a ‘pass’ condition and once for a ‘fail’ condition
Except for the VLAN policy. Up to 3 VLAN ID policies are allowed within the same compound
policy, as long as the ID number is different for each instance specified (e.g., Vlan 20 Vlan 30
Vlan 40)
The order in which policies are configured determines the order in which the policies
are applied
Access Guardian Security Policies - WebView
List of available policies to be applied if no VLAN is For both pass and fail policies, order in which
returned from RADIUS parameters are specified determines the order in
Group Mobility which they are applied
Specific VLAN(s) Type of policy must end with either the default-vlan,
Captive Portal block, or captive-portal
User Network Profile Terminal parameter block parameter is used by
Default VLAN default
Block
Same type of policies but in different order can be
configured for non-supplicant on the same port
Access Guardian Policies
802.1x Supplicant device classification policy
Enabling 802.1x Authentication
-> aaa authentication 802.1x rad1 rad2
1 Radius Server
2
4
3
Supplicant will send an EAP frame
with login + password Switch will act as a relay between
supplicant and radius server
•Received frame on
802.1x enable port
Before sending frame to server, switch adds MAC of supplicant
MAC will be placed in the Calling Station ID field of Radius frame
First pass First fail In cases where device is known but VLAN doesn’t exist, this is
supplicant policy supplicant policy considered a failed authentication
Security Policies for 802.1X Supplicant clients - Configuration
-> 802.1x slot/port supplicant policy authentication [[pass] {group-mobility | user-network-profile
profile_name | vlan vid | default-vlan | block | captive portal}...] [[fail] {user-network-profile
profile_name | vlan vid | block | captive-portal}...]
Supplicant?
Yes
802.1x
Pass Fail
Radius Vlan
Captive Portal
Captive Portal
RADIUS request
Group mobility Vlan 10
VLAN
I speak RADIUS
I speak I speak
802.1X
Default VLAN Block 802.1X 802.1X
Server
Block
I speak
802.1X
Supplicant Policy - CLI Examples
-> 802.1x 1/19 supplicant policy authentication pass group-mobility default-
VLAN fail VLAN 10 block
If the 802.1x authentication process is successful but does not return a VLAN ID for the
device
Group Mobility rules are applied
If Group Mobility classification fails, then the device is assigned to the default VLAN for port
1/19
If the device fails 802.1x authentication
If VLAN 10 exists and is not an authenticated VLAN, then the device is assigned to VLAN 10
If VLAN 10 does not exist or is an authenticated VLAN, then the device is blocked from accessing
the switch on port 1/19
Radius
Server
1
2
•Received frame on
802.1x enable port 3
Supplicant?
No
MAC No
auth authentication
Pass
Fail RADIUS request
Radius Vlan
1 1
MAC No
802.1x Authentication
auth
Pass Fail Pass Fail
RADIUS
Yes
DONE RADIUS
Yes
DONE Radius
Attribute Classified Attribute Classified Classification
through AVP through AVP
No No
2 2
No 5 No 5
Captive Portal Captive Portal Captive Portal Captive Portal Captive Portal
Group mobility Group mobility Group mobility Group mobility Group mobility
1 3
AAA Radius
http://www.alcatel-lucent.com
2
1
You have to log in fist!
Supplicant?
Yes No
MAC No
802.1X authentication
auth
Pass Pass
Fail Fail
Captive
RADIUS Profile RADIUS Profile Portal
Captive Portal Captive Portal Captive Portal Captive Portal Pass
Group mobility Captive Portal Group mobility Group mobility Group mobility Fail
Profile Profile
Block
Block
Policies can be interchanged
Some policies (Captive portal, Profile, Block) are terminal policies (cannot be followed by other policies)
Captive Portal policy will start a new authentication branch
“Fail” branches will only classify devices into non-authenticated Profiles
Captive Portal
Use case example
Supplicant?
Yes No
Captive
MAC
802.1X Portal
auth
Pass Pass
Pass
Fail
Fail Fail
Radius Profile
DHCP
1 Offer
Switch DHCP and DNS Server
DHCP
Default DHCP scope
Request
10.123.0.0/16
Def GW: 10.123.0.1
1 DNS Request DNS server: 10.123.0.1
HTTP redirect to
captive portal login
Welcome text
Background image
/flash/switch
• cpPolicy.html
• logo.png ( prefered ), jpg, gif
• background.png, jpg, gif
• banner.jpg My Company Welcome text message
• cpLoginWelcome.inc
• cpStatusWelcome.inc
• cpFailWelcome.inc
• cpLoginHelp.html
• cpStatusHelp.html
• cpFailHelp.html
• cpBypassHelp.html
Captive Portal
Customization
Configuring a URL for the Captive Portal users proxy web server
-> 802.1x captive-portal proxy-server-url www.training.com
URL redirection
capability of redirecting the user to a
Redirection URL upon successful authentication
Redirection URL upon failure/bypass authentication
-> 802.1x captive-portal success-redirect-url http://test-cp.com/fail.html
-> 802.1x captive-portal fail-redirect-url http://test-cp.com/fail.html
• For both pass and fail policies, order in which parameters are specified determines the order in
which they are applied
• Type of policy must end with either the default-vlan, block, or captive-portal
• Terminal parameter block parameter is used by default
Supplicant Policy with Captive Portal
Example
-> 802.1x 1/1 supplicant policy authentication pass group-mobility captive-portal fail vlan 70
block
Supplicant?
Yes
802.1x
-> show 802.1x users
Pass Slot MAC Port User
Fail Port Address State Policy Name
-----+-----------------+---------------+--------------+-------------------------
01/01 00:1a:4b:6c:d0:b0 Authenticated -- john
Radius Vlan
MAC
NO auth
Supplicant? Pass
Fail
Block
-> show 802.1x non-supplicant 1/1 -> show 802.1x non-supplicant 1/1
Slot MAC MAC Authent Classification Vlan
Slot MAC MAC Authent Classification Vlan Port Address Status Policy Learned
Port Address Status Policy Learned -----+-----------------+----------------+------------------+-------
-----+-----------------+----------------+------------------+------- 01/01 00:1a:4b:6c:d0:b0 failed CP - In Progress -
01/01 00:1a:4b:6c:d0:b0 Authenticated Group Mobility - 12 -----+-----------------+----------------+------------------+-------
-----+-----------------+----------------+------------------+------- 01/01 00:1a:4b:6c:d0:b0 failed CP - In Progress -
-----+-----------------+----------------+------------------+-------
01/04 00:1a:4b:70:33:db failed Auth srv - CP 11
-> show vlan port 1/1 -> show vlan port 1/1
vlan type status vlan type status
--------+---------+-------------- --------+---------+--------------
1 default forwarding 1 default forwarding
12 mobile forwarding 11 mobile forwarding
Non-Supplicant Policy with Captive Portal
Example
-> 802.1x 1/1 captive-portal policy authentication pass vlan 42 fail vlan 220
Captive
MAC
Portal
auth
NO
Supplicant?
-> show 802.1x non-supplicant 1/1 -> show 802.1x non-supplicant 1/1
Slot MAC MAC Authent Classification Vlan Slot MAC MAC Authent Classification Vlan
Port Address Status Policy Learned Port Address Status Policy Learned
-----+-----------------+----------------+------------------+-------- -----+-----------------+----------------+------------------+-------
01/01 00:1a:4b:6c:d0:b0 Authenticated Auth srv - CP 11 01/01 00:1a:4b:6c:d0:b0 Failed (timeout) CP - In Progress -
Slot MAC MAC Authent Classification Vlan Slot MAC MAC Authent Classification Vlan
Port Address Status Policy Learned Port Address Status Policy Learned
-----+-----------------+----------------+------------------+-------- -----+-----------------+----------------+------------------+-------
01/01 00:1a:4b:6c:d0:b0 Authenticated Auth srv - CP 11 01/01 00:1a:4b:6c:d0:b0 Failed (timeout) Vlan ID - CP 220
Access Guardian Device Classification Policies
Captive Portal Monitoring
show 802.1x device classification policies
Guest Patient
ACLs, QoS, Confidential
HIC, VLAN
Doctor 100 M Access All Info
Captive Portal
Switch 3
mapping Request granted
table
No
Group mobility
Apply Local profile
Local Profile UNP Name defined locally on the
switch
VLAN
Block
• Local Profile is now one of the Access Guardian policies
• Order of policies can be interchanged
Access Guardian policies - UNP
The UNP name is obtained from the RADIUS server and is mapped to the same
profile name configured on the switch.
When both VLAN ID and UNP name are returned from the RADIUS server and the UNP
profile is configured on the switch; the VLAN ID in the User Network Profile will take
precedence if it is different from the VLAN ID returned from the RADIUS server.
If the RADIUS server does not return a UNP name, then a local UNP profile can
be applied if this is included in the set of policies.
1. Configuring a user network profile for an Access Guardian device classification policy
-> aaa user-network-profile name profile_name vlan vlan-id [hic [enable | disable]]
[policy-list-name list_name]
UNP
VLAN
HIC
Policy List
2. Applying a UNP to classify all devices connected to a port for QOS
Only one policy list per UNP is allowed, but a policy list can be associated with
multiple profiles
UNP Policy List - Configuration
Assigning a QoS policy list to a User Network Profile UNP
Enforce the access of a device to network resources VLAN
ACL
1. QOS policy by assigning a name and the list of existing QOS policies
-> aaa user-network-profile name profile_name vlan vlan-id [hic [enable | disable]]
[policy-list-name list_name]
User Network Profile Policy – Example (1)
Radius server
UNP missing
OmniSwitch
UNP missing
OmniSwitch
Non-Supplicant:
authentication:
pass: group-mobility, default-vlan
fail: UNP guest, block
Employee Guest
UNP "Employee"
vlan 30 UNP “Voice" UNP “Guest"
hic enable vlan 21 vlan 26
Policy List “qos_gold” Policy list “internet_only
hic enable
It is based on the concept of symmetric encryption keys; the same key is used
to encrypt and decrypt a message.
This is also referred to as a shared private key.
Kerberos agent is placed between the client and the Kerberos server.
Mobility
Mobility on the same switch is supported w/ no re-authentication
Switch to switch mobility is not yet supported: user needs to logoff/login to get back
on the network
Boundary Conditions
Maximum Kerberos server’s ip-address that can be configured on switch – 4
Maximum number of Kerberos users can be learned on switch is 1000.
Policy List
Once user is authenticated through Kerberos server then qos-policy-list configured for
Kerberos (global or per domain) will be updated in hardware l2 table for this user
(MAC). Kerberos qos-policy-list will overwrite qos-policy-list of UNP/HIC if user is
already classified as a UNP/HIC user with few exception listed below:
If user is learned in filtering mode then Kerberos shall not overwrite the hardware l2 table for
Kerberos qos-policy-list.
If user is in HIC-IN-PROGRESS state then Kerberos shall not overwrite the HIC qos-policy-list with
Kerberos qos-policy-list
Windows Logon Snooping - Configuration
Data Center Evolution Example
CLI show commands to display the Kerberos configuration for the switch
-> show aaa kerberos configuration
-> show aaa kerberos port
-> show aaa kerberos users
-> show aaa kerberos statistics
-> show aaa kerberos port statistics
ACCESS GUARDIAN 2.0
AOS 8.X
Access Guardian 2.0 - AOS 8.X
Ports are classified into Access, Bridge and Edge Ports
Access and Bridge ports are supported only on OS10K and OS6900
Edge ports are supported only on OS6860
In addition to this, user may be placed into a new Role after captive portal
authentication and other user defined roles
The initial UNP (which provides the initial policy list and role) and Vlan does
not change during the lifetime of the user. Only the roles change dynamically
Access Guardian 2.0 - AOS 8.X
AG 2.0 shall support Built-in restricted roles determined by
the state of the following AOS components
Location and Time based Policies (Unauthorized)
Quarantine Manager and Remediation
Captive Portal (pre-login)
Redirect (byod guest registration/onboard)
The explicitly configured restricted roles have higher precedence over the
built-in restricted roles
Access Guardian 2.0 - AOS 8.X
Access Guardian 2.0 - Atomic Classification Rules
MAC Port + IP
Authentication-Type
802.1x, MAC
Allow-EAP
Pass perform 802.1x upon Mac-authentication pass
Fail perform 802.1x upon Mac-authentication fail
Noauth perform 802.1x upon Mac-authentication disable
None always skip 802.1x
Access Guardian 2.0 - Edge Templates
AAA Profile
Specifies the default AAA profile for the Edge Template
Default Edge-Profile
When edge-template is attached to UNP port/linkagg any existing default profile is
overriden
Pass-alternate
If classification does not return a valid UNP then the pass-alternate is assigned
Access Guardian 2.0 – Edge Profile
Edge Profile
Edge-profile <name> Edge-Profile
Qos-policy-list <name> QoS Policy Location
The name of a Policy List (ACL or QoS) associated list Policy
with the UNP
Defines the initial Role for the user
Captive Period
Location-policy <string> Portal Policy
Slot/port, System name, location
Period-policy <string>
Captive-portal-authentication [enable|disable]
Vlan-Mapping
Captive-portal-profile <name> VLAN ID
Authentication-flag [enable|disable]
Mobile-tag [enable|disable]
Redirect
Vlan-mapping
Access Guardian 2.0 - Edge Profile
Once a user is L2-authenticated/classified into a UNP,
The initial role of the user is determined by the qos policy-list attached to the UNP.
This role could be replaced with one of the more specific roles based on result of
enforcing one or more properties/methods enabled on the UNP Edge Profile as listed
below
Captive Portal
Location/Time based Policy
QMR based Policy
User Derived Role using
Authentication Type
BYOD
Access Guardian 2.0 - Edge Profile
Edge Profile Location Policy
Location-policy <string>
The location policy is used to restrict the network access based on the location of the
user/device
When the specified location-policy is not met by the UNP user, the user role will be
automatically changed to an unauthorized role.
The location of a wired user would be determined with:
Chassis/Slot/Port on which the user is attached
Switch Name on which the user is attached
Switch Location String, identifying a group of Switches
Setting Location
system location <string>
unp policy validity location “Alcatel” port 1/1/10
Access Guardian 2.0 – Edge Profile
Edge Profile Time Period Policy
Period-policy <string>
The period policy is used to restrict the network access based on the time of access by
the user/device
The time criteria for network access by a user could be specified in days, hours,
months and intervals comprising of date/time.
A period policy is said to have matched if any of the specified day/month/time/date
criteria is matched
Setting Time
unp policy validity period “Office-Time”
unp policy validity period “Office-Time” days MONDAY
unp policy validity period “Office-Time” days MONDAY time-zone
unp policy validity period “Office-Time” hours 9:00 to 17:00
Access Guardian 2.0 - Edge Profile
Captive-portal-authentication [enable|disable]
If Enabled, it allows the UNP user to undergo Captive-Portal Authentication
Authentication-flag [enable|disable]
If Enabled, the UNP-name can be selected only if the UNP user gets learnt into it
through L2-authentication (802.1x/Mac)
Mobile-tag [enable|disable]
Enable/Disable mobile tag mode on a UNP Port for wired users.
If Enabled, it enforces the Port where the UNP-user gets learnt to be added as Tagged
Member of the vlan associated with the UNP
Access Guardian 2.0 - AAA Profile
AAA profile defines
AAA authentication servers associated with different authentication methods.
Up to 4 authentication servers can be specified per authentication method
AAA accounting servers associated with different authentication methods.
Up to 4 accounting servers can be specified per authentication method.
A syslog server may be specified as an accounting server
The properties of the various radius attributes
Specifying a mac-address or ip-address as the calling-station-id in the RADIUS attributes
Specifying 802.1x properties with RADIUS server
enable/disable of re-authentication
Reauthentication interval
Specifying the periodicity of the RADIUS Accounting-Request Interim message for
802.1x/MAC/Captive-Portal authenticated users
Specifying the inactivity logout timer for mac and captive portal authentication
Access Guardian 2.0 - Captive-Portal Profile
Captive Portal Profile
Mode [internal|external] - 8.1.1 only internal supported
Success-Redirect URL
Redirect URL on Successful Authentication
Retry-Count
Number of retry attempts before authentication is declared to fail
Policy-List <name>
Policy List to be attached on successful authentication
Realm [prefix|suffix] Domain <domain-name>
For example in “domain-name\user1”, domain-name refers to the domain name if prefix option
is chosen.
For example in “user@domain-name” , domain-name refers to the domain name if the suffix
option is chosen.
AAA-Profile <name> Name of AAA Profile
Access Guardian 2.0
Quarantine Manager and Remediation
This stage is after the primary L2 authentication stage during which a UNP is
assigned.
Based on the UNP in which the user is learnt to, the user may undergo QMR,
Location or Time based validations and assignment of dynamic roles (policylist).
If QMR/Location/Time based validations fail the user is put into a Restricted
Role (policy list)
QMR allows
Configuration of the quarantine page
Enable/disable the ability to send the configuration page to the client
Specify a list of IP addresses that the device can communicate with
Configure a custom proxy port
BYOD WITH CLEARPASS
BYOD with ClearPass
Unified access policy management solution for Wireline and Wireless networks
Disconnect Message to terminate user session and discard all user context
• Sponsors
Guest • Branded portals
• Self-registration
Onboard
• Device certificates
• User driven portal
• Built-in CA
Employee Owned device On-boarding
Policies to control type of device to be on-boarded
Quick Connect supports native supplicants on Windows Vista, XP, 7, Apple &
Android
Redirect HTTP
traffic to
Onboard URL
No No Yes
No
Restricted No Yes
Initiate Prompt to install
UNP Block .1x
MAC Auth Quick Connect TM
returned credentials
.1x Auth reinitiated
match?
with EAP-TLS
Employee Owned device On-boarding
ClearPass AD Auth
Access Points
WLAN Controller
Edge Switch
Guest
devices Access Points
password
Guest Devices
Unified Device Profiling
Automated function in CPPM. Identifies the
Device category – Computer, Printer, AP etc.
OS family – MAC, Android, Windows, Linux
Device name and OS Version
Useful for silent wired devices that can’t authenticate themselves – Printers, IP
Phones, Cameras etc.
Also used for profiling Guest, Employee owned devices
Profiling based on contextual data
DHCP fingerprinting,
MAC OUIs,
HTTP User Agent
SNMP or other device centric identity information
Initial MAC authentication for device will fail and switch will place the endpoint
in restricted UNP.
Posture determination by ClearPass is done through
Permanent agent running on Hosts
A specific TCP port traffic should be allowed in the Restricted UNP
Web-based dissolvable agent
HTTPS traffic should be allowed through restricted UNP.
How to
Implement Access Guardian security feature on an AOS OmniSwitch. This includes device
classification policies. Both supplicant and non-supplicants user authentication methods will be
configured as well as Captive portal and User Network profiles.
Contents
1 Basic 802.1X Authentication ................................................................. 2
1.1. Configuration ........................................................................................... 2
1.2. Verification ............................................................................................. 4
2 Access Guardian Authentication ............................................................ 4
2.1. Supplicant (802.1x client) policy configuration .................................................. 5
2.1.1. Verification .................................................................................................. 5
2.2. Non-supplicant (Non-802.1x client) policy configuration ....................................... 5
2.2.1. Verification .................................................................................................. 6
Implementation
A single Omniswitch is used in the following sections
1.1. Configuration
- Open a console session to the 6850 with the following authentication credentials:
Login: admin
Password: switch
- Remove configuration from previous labs and reboot the switch from the WORKING directory
- Type the following:
-> rm /flash/working/boot.cfg
-> reload working no rollback-timeout
- Create a Loopback0 interface with an IP address according to your switch. This IP address is used for
RADIUS server authorization
-> ip interface Loopback0 address #.#.#.# (where # is your switch number)
- Create the VLAN 100 and assign the IP address 192.168.100.# to VLAN 100, where # is your switch number.
- Type the following :
-> vlan 100
-> vlan 100 port default 1/9
-> ip interface vl100 address 192.168.100.# vlan 100
-> interfaces 1/9 admin up
- Create an Authenticated VLAN with an IP address. For this example VLAN 11 will be the Authenticated
3
Access Guardian
VLAN
- Type the following on the 6850 :
-> vlan 11
-> ip interface vl11 address 192.168.11.1 vlan 11
- In order to assign dynamically an IP address to users, configure a DHCP Relay and DNS server addresses on
the switch as follows:
-> ip helper address 192.168.100.102
-> ip name-server 192.168.100.102
- The next step is to enable mobility and 802.1x Authentication on the port the Client is connecting to
(1/1). Type the following:
-> interfaces 1/1 admin up
-> vlan port mobile 1/1
-> vlan port 1/1 802.1x enable
- The next step is to tell the switch where to forward the Authentication requests, this will be the address
of the RADIUS server (192.168.100.102)
-> aaa radius-server rad1 host 192.168.100.102 key alcatel-lucent
The command above, adds the RADIUS server, called rad1 with an IP address of 192.168.100.102, to the
switch. The switch will use the shared secret of ‘alcatel-lucent’ to communicate with the RADIUS server.
- Now we must tell the OmniSwitch to forward 802.1x requests to the RADIUS Server.
- Type the following:
-> aaa authentication 802.1x rad1
The switch will now know where to send 802.1x and MAC authentication requests
The RADIUS server has been configured to return VLAN 11 to the switch if the authentication is
successful. The switch will then move the user into VLAN 11, the authenticated VLAN.
- Open the client PC that will be used to test authentication. For this example, client 3 is used.
- The following steps are performed on the client to setup 802.1X authentication:
A Windows XP client is being used for this example. Ask your instructor in case a different
Operating System is used.
If the Authentication Tab doesn’t appear, run “services.msc” and start service “Wired Autoconfig
service”
4
Access Guardian
1.2. Verification
Windows stores previous authentication information in the registry and uses it for automatically
authenticating users. If you are not being prompted for a username/password, follow the
instruction below showing how to clear out the credential cache by editing the registry.
Fire up the registry editor (START->RUN->REGEDIT) and delete the
HKEY_CURRENT_USER\Software\Microsoft\EAPOL\UserEAPinfo registry key.
- The client PC can be set to DHCP, if a valid address has not been applied after authentication, check that
your configuration is relevant to your switch number.
- You should see that you have been authenticated using the 802.1x method and your client PC has obtained
an IP address matching VLAN 11’s subnet IP address.
- Let’s check connectivity, now that you have been authenticated. You should see that your port and MAC
address have been moved to VLAN 11.
- Type/Perform the following:
-> show mac-address-table
-> show vlan 11 port
-> show 802.1x 1/1
-> show 802.1x statistic
-> show 802.1x users
For more information about the displays that result from these commands and others, see the
OmniSwitch CLI Reference Guide and Network Configuration Guide
2.1.1. Verification
- Perform different type of authentication tests by using credentials as follow:
o Login = user10, password = user10 VLAN returned does not exist in the switch
o Login = user11, password = user11 VLAN 11 returned
o Login = unknown, password = unknown authentication fails
2.2.1. Verification
- A non-supplicant will authenticate on the radius with its MAC address.
- As the RADIUS server is not configured with different MAC addresses, the authentication will fail. You
should see that your port and MAC address have been moved to VLAN 11.
- For non-supplicant attempt, just disable 802.1x on your client PC in the Local area connection properties
window and make a new port connection.
- Verify this by typing the following
-> show mac-address-table
-> show vlan 11 port
-> show 802.1x non-supplicant 1/11
-> show aaa-device all-users
For more information about the displays that result from these commands and others, see the
OmniSwitch CLI Reference Guide and Network Configuration Guide
3.1. Configuration
- In this section, a way to identify users through a web portal will be configured. This is usually done for
guest access.
7
Access Guardian
- Let’s create a new authentication policy for non-supplicant users on port 1/1
- Type the following:
-> 802.1x 1/1 non-supplicant policy authentication pass group-mobility block fail captive-portal
-> 802.1x 1/1 captive-portal policy authentication pass vlan 11
Explain the new non-supplicant policy that has been configured on the switch
-
- Use a standard browser available on the client device and access the following URL:
http://www.google.com
- Enter credentials as requested on web page and select submit.
o Login = user11, password = user11 vlan 11
3.2. Verification
- Let’s check connectivity now that you have been authenticated.
- Type the following:
-> show mac-address-table
-> show vlan port 1/1
-> show 802.1x non-supplicant 1/1
-> show aaa-device captive-portal-users
-> show aaa-device all-users
- To display the global Captive Portal configuration for the switch type the following:
-> show 802.1x captive-portal configuration
User Network Profiles (UNP) are applied to host devices using Access Guardian device classification policies.
A profile name and the following associated attributes are required prior to assigning the profile using
device classification policies:
• VLAN ID. All members of the profile group are assigned to the VLAN ID specified by the profile.
• Host Integrity Check (HIC). Enables or disables device integrity verification for all members of the profile
group.
• QoS policy list name. Specifies the name of an existing list of QoS policy rules. The rules within the list
are applied to all members of the profile group. Only one policy list is allowed per profile, but multiple
profiles may use the same policy list.
4.1. Configuration
- Configure two User Network Profiles unp_sample1 and unp_sample2 as follows:
-> aaa user-network-profile name unp_sample1 vlan 11
-> aaa user-network-profile name unp_sample2 vlan 1000
8
Access Guardian
- Let’s configure a basic device classification policy using the following UNP mapping configuration on port
1/1:
-> 802.1x 1/1 supplicant policy authentication pass user-network-profile unp_sample1 block fail captive-
portal
-> 802.1x 1/1 non-supplicant policy authentication pass block fail user-network-profile unp_sample2 block
4.1.1. Verification
- Connect the Client PC, and make sure the client is classified based on the User Profile Mapping Table.
- Verify that client (supplicant) is able to authenticate and classified based on the User Profile Mapping
Table.
- Use the following username and password for testing purposes:
o Login = user13, password = user13
The RADIUS server is configured to return a different VLAN from the ones that are configured in the
switch. Therefore, the user will be assigned to the UNP unp_sample1 as indicated by the policy
Ask your instructor in case a different user or password is used.
The RADIUS server is configured to return the UNP unp_sample1 if this user/password combination
is used for authentication.
Ask your instructor in case a different user or password is used.
- Use the previous CLI commands in order to check the UNP that has been associated to the client and the
VLAN ID returned by the RADIUS server.
- Configure a qos rule that gives the highest priority to the user traffic
-> policy condition high_prio source ip any destination ip any
-> policy action prio7 priority 7
-> policy rule traffic_prio condition high_prio action prio7 no default-list
-> qos apply
A default policy list is available when the switch boots up. This list has no name and is
not configurable. All QoS policy rules are assigned to this default list and applied to the
switch unless the no default-list option of the policy rule command is used.
- Let’s configure a new device classification policy using the configured UNP “high-prio” for successful
authentication for 802.1x users; and for unsuccessful authentication for non-802.1x users:
-> 802.1x 1/1 supplicant policy authentication pass user-network-profile high-prio fail block
-> 802.1x 1/1 non-supplicant policy authentication pass block fail user-network-profile high-prio block
4.2.1. Verification
- Connect one supplicant on the switch, and make sure the client is classified based on the User Profile
Mapping Table.
10
Access Guardian
Do the same for a non-supplicant user (in a simple manner, uncheck 802.1x authentication on your client)
- Verify that both clients are able to authenticate and classified based on the User Profile Mapping Table.
- Check that UNP profiles and their associated rules are matching specific user traffic with detailed
information.
- Type the following commands:
-> show active policy rule
-> show active policy list
-> show 802.1x device classification policies 1/1
-> show aaa-device all-users
-> show vlan port 1/1
If you want to verify that the QoS policies are applied, assign the 10.0.0.10 address to another
client PC and connect it to a different port on the switch. In the switch create a separate VLAN
with an IP address in the 10.0.0.X/24 subnet and assign this VLAN to the port that the new client is
connected to. Verify that the connection between the two clients is not successful.
- Configure a UNP mobile rule with 172.30.#.0 as the source IP value and “employee” as the user network
profile. Any devices connecting to port 1/1 with a source IP address that falls within the 172.30.#.0
network will be assigned to the “Employee” profile.
- For this example, let’s type the following commands:
-> vlan 30
-> ip interface employee address 172.30.#.# vlan 30 (where # is your switch number)
-> aaa user-network-profile name employee vlan 30
-> aaa classification-rule ip-address 172.30.#.0 255.255.255.0 user-network-profile name employee
Mobility and 802.1X authentication must be enabled to use UNP mobile rules. The default 802.1x policy on
the port is enough for using UNP mobile rules.
- In this example, we need to modify the Access Guardian supplicant policy as follows:
-> 802.1x 1/1 supplicant policy authentication pass group-mobility fail block
-> 802.1x 1/1 non-supplicant policy authentication pass group-mobility fail block
4.3.1. Verification
- On the client PC, assign an IP address in the 172.30.#.0 subnet. Then ping the IP address configured for
VLAN 30 on the switch (172.30.#.#).
11
Access Guardian
- Verify that the client is authenticated and classified based on the User Profile Mapping Table.
- Check UNP profiles and associated rules are matching specific user traffic with detailed information.
- Type the following:
-> show aaa-device all-users
-> show vlan port 1/1
Recall to perform the following if you want to make different authentication attempts:
-Disable the Local interface on the client PC
-Type the following command: -> aaa admin-logout port 1/1
-Re-enable the Local interface on the client PC
Security Network Access Control
How to
Configure Omniswitch 6860 to integrate ClearPass Solution
Contents
1 Setup ClearPass Policy Manager ............................................................. 2
2 Setup OS6860 .................................................................................. 5
3 Test ............................................................................................. 6
2
Security Network Access Control
- Click Close
- Once the revert snapshot is completed,start the ClearPass Virtual machine, as well as DHCP_RADIUS and
DomainController
- On the 6850E-A, configure the management VLAN 100:
OS6850E-A -> vlan 100 name “management”
OS6850E-A -> vlan 100 port default 1/9
OS6850E-A -> vlan 100 port default 1/1
OS6850E-A -> vlan 100 port default 1/7-8
OS6850E-A -> ip interface vl100 address 192.168.100.254/24 vlan 100
OS6850E-A -> interfaces 1/1 admin up
OS6850E-A -> interfaces 1/9 admin up
OS6850E-A -> interfaces 1/7-8 admin up
- On the client3 desktop, open the file CPPM_License.txt and copy/paste the license on ClearPass admin
page. Tick the box “I agree to the above terms and conditions” and click on Add License.
4
Security Network Access Control
- On the login screen, enter the following credentials and click on Login.
Username = admin
Password = eTIPS123
- Once the database restore is done, your ClearPass Policy Manager is ready to use. Click on Close.
2 Setup OS6860
We will now configure the 6860 to apply different User Network Profile depending on user type :
An employee is authenticated through 802.1x and will be assigned an employee VLAN and Allow-All policy
list. A guest is by default on restricted role which only allow him DHCP, DNS and HTTP request to the
Captive Portal. And once authenticated, a new role will be assigned giving him more access rights.
- On the 6860 (A or B) configure the different VLAN :
OS6860-A/B -> vlan 20 admin-state enable name “employee”
OS6860-A/B -> vlan 21 admin-state enable name “guest”
OS6860-A/B -> vlan 100 admin-state enable name “management”
OS6860-A/B -> vlan 4092 admin-state disable name “default”
OS6860-A -> vlan 100 members port 1/1/7 untagged
OS6860-A -> vlan 20-21 members port 1/1/7 tagged
OS6860-A -> interfaces 1/1/7 admin-state enable
OS6860-A -> ip interface vl100 address 192.168.100.47/24 vlan 100
OS6860-B -> vlan 100 members port 1/1/8 untagged
OS6860-B -> vlan 20-21 members port 1/1/8 tagged
OS6860-B -> interfaces 1/1/8 admin-state enable
OS6860-B -> ip interface vl100 address 192.168.100.48/24 vlan 100
- On the 6860 (A or B) create the different edge-profiles and assign them the corresponding vlan.
Note that we should also define some policy list and associate them with the edge-profile. By default, the
Allow-All policy list is applied, except for edge-profile with captive-portal flag enabled, in that case for
UNP-restricted which will get a redirect URL to reach ClearPass Captive Portal, so only DHCP, DNS, ARP
and HTTP(S) URL are allowed.
OS6860-A/B -> unp edge-profile UNP-employee
OS6860-A/B -> unp edge-profile UNP-contractor
OS6860-A/B -> unp edge-profile UNP-guest
OS6860-A/B -> unp edge-profile UNP-guest redirect enable
OS6860-A/B -> unp edge-profile UNP-restricted
OS6860-A/B -> unp edge-profile UNP-restricted redirect enable
OS6860-A/B -> unp edge-profile UNP-default
6
Security Network Access Control
A supplicant user is authenticated by the ClearPass which send back the UNP as Filter-Id
attibutes (UNP-employee or UNP-contractor).
A non-supplicant user is authenticated with mac address. The ClearPass is configured to send
back the UNP-restricted and the captive portal redirect URL. Once authenticated on the
captive portal, the user get the UNP-guest profile
3 Test
- First, we will test if radius is properly configured and reachable. From 6860 (A or B) type :
OS6860-A/B -> aaa test-radius-server cppm type authentication user employee password password
Testing Radius Server <192.168.100.21/cppm>
Access-Challenge from 192.168.100.21 Port 1812 Time: 8 ms
Please wait.Reply from 192.168.100.21 port 1812 req_num<0>: timeout
Access-Reject from 192.168.100.21 Port 1812 Time: 0 ms
Returned Attributes
- From Client 3, open the web admin page of cppm and go to Monitoring > Live monitoring > Access
Tracker
- The request failed because EAP method is not provided, but at least you know that your radius server is
reachable.
7
Security Network Access Control
- We will now test the different authentication methods to check the edge-profile associate to the user
- Open client 15 or 16 console from vsphere
- Open the Networks Connections and right-click on the Local Area Connection
- Check the box Enable IEE 802.1X authentication and uncheck the box Cache user information for
subsequent connections to this network
8
Security Network Access Control
- Keep default authentication method (Secured password EAP-MSCHAP v2) and click on configure.
- Uncheck the box Automatically use my windows logon name and password.
- On client 15 or 16 right click on the network connection and disable it then re-enable it.
- You should get a pop-up asking to connect on the network.
Total users : 1
Which UNP Profile is assigned to the user ? __________________________________
Which VLAN ? ___________________________________________________________
9
Security Network Access Control
- To get more details, you can also type the following commands :
OS6860-A/B -> show unp edge-user status
Profile Authentication
Port Mac address Profile Name Source Type Status Role Name Role Source CP Redirect
------+-----------------+--------------+-------+-----+-------------+----------+-------------+--+--------+
1/1/10 00:50:56:ac:46:1c UNP-employee Radius 802.1x Authenticated - N N
Total users : 1
Total users : 1
- From the ClearPass Admin page, go to the Access Tacker page and select the radius request
10
Security Network Access Control
What RADIUS attribute has been send back to the switch ? _______________________________
With which value ? _________________________________________________________________
- Now disconnect from the switch by typing :
OS6860-A/B -> unp edge-user flush port 1/1/10
- Disable the 802.1x on the network interface (from authentication tab of the LAN connection properties)
on client 15 or 16.
11
Security Network Access Control
From the Summary tab, what is the authentication method used ? _____________________________
12
Security Network Access Control
From the Output tab, expand the RADIUS response, what RADIUS attribute has been send back to the
switch ? _______________________________
With which value ? _________________________________________________________________
- From Client 15 or 16, try to telnet the 6850-A :
From the Summary tab, what is the authentication method used ? _____________________________
14
Security Network Access Control
From the Output tab, expand the RADIUS response, what RADIUS attribute has been send back to the
switch ? _______________________________
With which value ? _________________________________________________________________
- From Client 15 or 16, try to telnet the 6850-A :
Now it works !
Part No. 060407-00 Rev. B
September 2015
enterprise.alcatel-lucent.com
enterprise.alcatel-lucent.com Alcatel-Lucent and the Alcatel-Lucent Enterprise logo are trademarks of
Alcatel-Lucent. To view other trademarks used by affiliated companies of ALE Holding, visit: enter-
prise.alcatel-lucent.com/trademarks. All other trademarks are the property of their respective owners. The
information presented is subject to change without notice. Neither ALE Holding nor any of its affiliates
assumes any responsibility for inaccuracies contained herein. (July 2015)
This chapter provides a brief overview of the Alcatel-Lucent Enterprise SMB (small-medium business)
solution along with the steps for quickly configuring the various components. For more detailed step-by-
step instructions refer to the appropriate configuration chapter.
In This Chapter
The information described in this chapter includes:
• “Overview” on page 1-2
Overview
This configuration guide covers how to install the various components of the Alcatel-Lucent Enterprise
SMB (small-medium business) solution. The SMB market can be addressed via two Alcatel-Lucent Enter-
prise solutions: one includes an OmniSwitch™ and OmniAccess™ Instant Access Points (IAPs), enabling
high speed wired and wireless (Wi-Fi) LAN access, referred to as the Mobility solution, while the second
includes OmniPCX™ Office RCE, providing IP Telephony, for a complete voice/data/Wi-Fi solution.
This SMB Configuration Guide describes the installation steps based on the following products.
• OmniPCX™ Office RCE
Note: Minimum version R10.2 is required for the OmniPCX Office RCE information described
in this document. See “Upgrade Information” on page 1-5 for information on upgrading to R10.2.
• OmniSwitch OS6450-P24
• OmniSwitch OS6450-P48
• OmniSwitch OS6450-P10
• OmniSwitch OS6450-P10L
• OmniSwitch OS6250-P24
• OmniSwitch OS6450-P24L
• OmniSwitch OS6450-P48L
• OmniSwitch 6350-P24
• OmniSwitch 6350-P48
• OAW-IAP
Chapter 1 provides quick steps to configure these products, Chapter 2 provides a detailed procedure to
configure OmniPCX Office RCE, the OmniSwitch and the OAW-IAP, and Chapter 3 provides a detailed
procedure to configure the OmniSwitch and OAW-IAP when OmniPCX Office RCE is not installed.
For additional solution information please refer to the SMB Solution Sheet.
2 The os_script script file contains the following command for certifying the configuration:
3 The os_ins.alu instruction file contains the following entries describing the location and file names
needed by the OmniSwitch:
1 Connect an Ethernet cable between the OmniPCX Office RCE and the OmniSwitch.
3 The OmniSwitch will boot up and automatically download the configuration files from the OmniPCX
Office RCE. Once the download is complete, the OmniSwitch will reboot again. This process will take
approximately 6 to 8 minutes.
Note. Alcatel-Lucent recommends that you change the administrator credentials after the initial configura-
tion.
Note. If the country code window is displayed after a successful login, select a country from the list.
5 From the AOS-W Instant UI main window, click New under the Networks section. The New WLAN
window is displayed.
6 In the New WLAN setting tab, enter an SSID name for the network and click Next.
7 In the VLAN tab, select the required Client IP assignment and Client VLAN assignment options and
click Next.
8 In the Security tab, enter a unique passphrase and retype it to confirm and click Next.
9 In the Access tab, ensure that the Unrestricted access control is specified and click Finish.
Note. After the secure wireless network access is configured, Alcatel-Lucent recommends deleting the
instant SSID to protect from unauthorized wireless access.
Upgrade Information
When upgrading to OmniPCX Office RCE version R10.2:
• The old default configuration files will be replaced with the new default configuration files of R10.2.
This chapter describes the detailed configuration steps to install the SMB solution with the OmniPCX
Office RCE.
In This Chapter
The information described in this chapter includes:
• “OmniPCX Office RCE Setup for OmniSwitch Auto Configuration” on page 2-2
2 Connect an Ethernet cable between the OmniPCX Office RCE and the OmniSwitch.
4 The OmniSwitch will boot up and automatically download the configuration files from the OmniPCX
Office RCE. Once the download is complete, the OmniSwitch will reboot again. This process will take
approximately 6 to 8 minutes.
IAP Configuration
The next process in the installation of SMB is the IAP configuration. This section describes the steps to
configure the IAP.
2 Connect an Ethernet cable between IAP and OmniSwitch, wait for approximately 6 minutes for the
IAP to initialize.
Ethernet
3 Wait for all LEDs on the IAP to turn green and blink.
Connecting to SSID
Note. Alcatel-Lucent recommends that you change the administrator credentials after the initial configura-
tion. For more information, see the Management Authentication Settings section in AOS-W Instant User
Guide.
Note. If the country code window is displayed after a successful login, select a country from the list. The
country code window is displayed only when OAW-IAP-ROW (Rest of world) variants are installed. The
country code setting is not applicable to the OAW-IAPs designed for US, Japan, and Israel.
a. From the AOS-W instant UI main window, click New under the Network section. The New
WLAN window is displayed.
b. In the New WLAN setting tab. Enter an SSID name for the network and click Next.
c. In the VLAN tab, select the required Client IP assignment and Client VLAN assignment
options and click Next.
d. In the security tab, enter a unique passphrase and retype it to confirm. Click Next.
e. In the Access tab, ensure that the Unrestricted access control is specified and click Finish.
f. Try connecting to the new SSID that was just created. Ensure network access before proceeding to
deleting instant SSID step.
3 Delete the instant SSID to protect from unauthorized wireless access. Follow the steps below to delete
Note. For multiple OAW-IAPs deployment, IAPs automatically find each other in same subnet and form a
single functioning network managed by a Virtual Controller. It is recommended to configure a virtual
controller IP in a multiple IAP deployment scenario. Please refer to user manual for configuration proce-
dure.
This chapter describes the detailed configuration steps to configure the SMB solution without an
OmniPCX Office RCE.
In This Chapter
The information described in this chapter includes:
• “OmniSwitch Configuration” on page 3-2
OmniSwitch Configuration
To install the SMB solution without an OmniPCX Office RCE the OmniSwitch must be manually config-
ured. To configure the OmniSwitch follow the below steps:
1 The OmniSwitch should be in the factory default mode with no boot.cfg file.
3 Connect to the console and log in to the OmniSwitch CLI with admin and switch as the username and
password, respectively.
Console Connection
IAP Configuration
The next process in the installation of the SMB solution is the IAP configuration. This section describes
the steps to configure the IAP.
2 Connect an Ethernet cable between IAP and OmniSwitch, wait for approximately 6 minutes for the
IAP to initialize.
Ethernet
3 Wait for all LEDs on the IAP to turn green and blink.
Connecting to SSID
Note. Alcatel-Lucent recommends that you change the administrator credentials after the initial configura-
tion. For more information, refer the Management Authentication Settings section in AOS-W Instant User
Guide.
Note. If the country code window is displayed after a successful login, select a country from the list. The
country code window is displayed only when OAW-IAP-ROW (Rest of world) variants are installed. The
country code setting is not applicable to the OAW-IAPs designed for US, Japan, and Israel.
a. From the AOS-W instant UI main window, click New under the Network section. The New
WLAN window is displayed.
b. In the New WLAN setting tab, enter a SSID name for the network and click Next.
c. In the VLAN tab, select the required Client IP assignment and Client VLAN assignment
d. In the security tab, enter a unique passphrase and retype it to confirm and click Next.
e. In the Access tab, ensure that the unrestricted access control is specified and click Finish.
f. Try connecting to new SSID that was just created. Ensure network access before proceeding to
deleting instant SSID step.
3 Delete the instant SSID to protect from unauthorized wireless access. Follow the below steps to delete
the instant SSID:
Note. In a multiple OAW-IAP deployment, the IAPs automatically find each other in the same subnet and
form a single functioning network managed by a Virtual Controller. It is recommended to configure virtual
controller IP in multiple IAP deployment scenario. Please refer to AOS-W user manual for configuration
procedure.
OmniSwitch 10K AOS 7.3.4.R01 or greater OmniAccess 4005 AOS-W 6.4.2.6 or greater
OmniSwitch 9000E AOS 6.4.6.218.R01 or greater OmniAccess 4010 AOS-W 6.4.2.6 or greater
OmniSwitch 6900 AOS 7.3.4.R01 or greater OmniAccess 4030 AOS-W 6.4.2.6 or greater
OmniSwitch 6860E AOS 8.1.1.585.R01 or greater OmniAccess 4504XM AOS-W 6.4.2.6 or greater
OmniSwitch 6860 AOS 8.1.1.585.R01 or greater OmniAccess 4604 AOS-W 6.4.2.6 or greater
OmniSwitch 6850E AOS 6.4.6.218.R01 or greater OmniAccess 4704 AOS-W 6.4.2.6 or greater
OmniSwitch 6850 AOS 6.4.4.707.R01 or greater OmniAccess 4550 AOS-W 6.4.2.6 or greater
OmniSwitch 6855 AOS 6.4.6.218.R01 or greater OmniAccess 4650 AOS-W 6.4.2.6 or greater
OmniSwitch 6450 AOS 6.6.5.R02 or greater OmniAccess 4750 AOS-W 6.4.2.6 or greater
enterprise.alcatel-lucent.com
Alcatel-Lucent and the Alcatel-Lucent Enterprise logo are trademarks of Alcatel-Lucent. To view other trademarks used by affiliated
companies of ALE Holding, visit: enterprise.alcatel-lucent.com/trademarks. All other trademarks are the property of their respective
owners. The information presented is subject to change without notice. Neither ALE Holding nor any of its affiliates assumes any
responsibility for inaccuracies contained herein. (April 2016)
LGS CODEGUARDIAN
TECHNOLOGY IN ALCATEL-LUCENT
OMNISWITCH PRODUCTS
SWITCH-LEVEL SOFTWARE INTEGRITY
ENHANCES NETWORK SECURITY
We have partnered with LGS Innovations to bring their CodeGuardian™ technology to the Alcatel-
Lucent OmniSwitch® family of products. CodeGuardian™ is a solution that hardens network devices
at the binary software level to enhance overall network security.
The increasing number of malicious FEATURES • The solution hardens network devices at
network attacks worldwide are causing both the software source code and binary
• Offered as a simple 1-year subscription
administrators to reformulate security executable level to identify and remove
software service with access to any AOS
strategies to protect the integrity of their hidden vulnerabilities, so that it can
with CodeGuardian™ updates
networks and the data that traverses enhance overall network security.
them. • Software diversification to prevent
• This three-layer approach not only
software exploitation while maintaining
ensures security, but chain of software
the same software functionality and
Together with our partner LGS custody control as well.
performance as the standard AOS software
Innovations, we recognize the importance
of switch-level software integrity as • Five different CodeGuardian™ diversified
images available per release to prevent TECHNICAL SPECIFICATIONS
a component of the larger network
security ecosystem. CodeGuardian is a memory map address vulnerabilities • Addresses potential software threats:
security evolution for mission critical • CodeGuardian™ IV&V and vulnerability ¬¬ Back door threats
network enterprise devices. The LGS analysis addresses external device ¬¬ Embedded malware
CodeGuardian™ technology hardens the interfaces
¬¬ Exploitable vulnerabilities
OmniSwitch software on three levels: • Secure download server with file integrity
¬¬ Exposure of proprietary or classified
• Independent verification and validation checksum to ensure your software images
information
(IV&V) and vulnerability analysis of switch are original and not compromised
source code • Available on AOS 6.4.6, 6.7.1 and soon
• Software diversification to prevent 8.3.1* • CodeGuardian™ IV&V and vulnerability
exploitation analysis addresses external interfaces
such as:
• Secure delivery of software to our
BENEFITS ¬¬ HTTPS interface
customers
• Proactive security approach through ¬¬ Login interface
operational vulnerability scanning and
Markets trusting AOS with CodeGuardian: ¬¬ NTP interface
analysis of switch software reduces
• Healthcare institutions the threat potential of back doors, ¬¬ Command line interface
• Government agencies embedded malware and other exploitable ¬¬ IP port usage
• Information technology organizations vulnerabilities. ¬¬ SNMP interface
• Military operations • CodeGuardian™ protects networks from ¬¬ Data packet interface
intrinsic vulnerabilities, code exploits,
• Academic institutions
embedded malware, and potential back
doors that could compromise mission-
Available AOS releases: critical operations.
• AOS 6.7.1R01 (OmniSwitch 6450)
• CodeGuardian™ promotes a defense-in-
• AOS 6.6.4R01 (OmniSwitch 6855, depth approach toward network security
OmniSwitch 6850E, OmniSwitch 9000E) that continuously defines and implements
• AOS 8.3.1R01 (OmniSwitch 6860, value-add capabilities to address both
OmniSwitch 6900, OmniSwitch 9900, current and future threats.
OmniSwitch 10K)*
*Future Release
CODEGUARDIAN SUPPORTED OMNISWITCH RELEASES
STANDARD AOS LGS AOS CODEGUARDIAN™
CHASSIS AOS RELEASE CODEGUARDIAN™ RELEASE RELEASE
OmniSwitch 6450 AOS 6.7.1R01 AOS 6.7.1RX1 AOS 6.7.1.LX1
OmniSwitch 6850E
OmniSwitch 6855 AOS 6.4.6R01 AOS 6.4.6RX1 AOS 6.4.6.LX1
OmniSwitch 9000E
OmniSwitch 6860
OmniSwitch 6900
AOS 8.3.1R01* AOS 8.3.1RX1* AOS 8.3.1LX1*
OmniSwitch 9900E
OmniSwitch 10K
*Future Release
ORDERING INFORMATION
MODEL NUMBER DESCRIPTION
SD1N-OS6450 1YR AOS With CodeGuardian software subscription for all OS6450 models. Includes access to AOS with CodeGuardian
software and updates during the subscription period. One subscription per switch and must be accompanied by a
valid maintenance agreement.
SD1N-OS6850E 1YR AOS With CodeGuardian software subscription for all OS6850E models. Includes access to AOS With
CodeGuardian software and updates during the subscription period. One subscription per switch and must be
accompanied by a valid maintenance agreement.
SD1N-OS6855 1YR AOS With CodeGuardian software subscription for all OS6855 models. Includes access to AOS With CodeGuardian
software and updates during the subscription period. One subscription per switch and must be accompanied by a
valid maintenance agreement.
SD1N-OS9000E 1YR AOS With CodeGuardian software subscription for all OS9000E models. Includes access to AOS With
CodeGuardian software and updates during the subscription period. One subscription per switch and must be
accompanied by a valid maintenance agreement.
enterprise.alcatel-lucent.com
Alcatel-Lucent and the Alcatel-Lucent Enterprise logo are trademarks of Alcatel-Lucent. To view other trademarks used by affiliated
companies of ALE Holding, visit: enterprise.alcatel-lucent.com/trademarks. All other trademarks are the property of their respective
owners. The information presented is subject to change without notice. Neither ALE Holding nor any of its affiliates assumes any
responsibility for inaccuracies contained herein. (April 2016)
Alcatel-Lucent OmniSwitch 6250
S TACK A BL E FA S T E T HERNE T L A N S W I TCH
The Alcatel-Lucent OmniSwitch™ 6250 is a new value layer-2+ Fast Ethernet stackable LAN family of switches
for both the enterprise and Ethernet access segments. Enterprise models address the small- and medium-sized
enterprise edge and branch office environments, while the metro models address the residential and business
Ethernet access supplied by service providers.
With an optimized design for flexibility product family, embedding the latest
and scalability as well as low power technology and AOS innovations.
consumption, the OmniSwitch 6250
runs the field-proven Alcatel-Lucent Solutions benefiting from the
Operating System (AOS), providing OmniSwitch 6250 family of
OmniSwitch 6250-8M an outstanding edge solution for switches are:
highly available, self-protective, easily • Edge of small- to medium-sized
managed and eco-friendly networks. networks
• Branch office enterprise
The OmniSwitch 6250 family is an work groups
evolution of the current Alcatel-Lucent
• Residential/metro Ethernet
OmniStack™ 6200 Stackable LAN Switch
triple play applications
OmniSwitch 6250-24/P24/24M/24MD
FEATURES BENEFITS
OmniSwitch 6250 switches offer innovative half-rack-wide models for a great Provides simplified selection with only two enterprise models: Power-over-
variety of switch combination deployments Ethernet (PoE) and non-PoE
• Reduces sparing and inventory costs
• Allows any combination of PoE and non-PoE, up to 416 ports
OmniSwitch 6250 switches are highly efficient and optimized in their form Small form factor and low noise output make the OmniSwitch 6250 ideal for
factor, power consumption and acoustic output collocation environments. The low power consumption reduces operating
expenses and cooling costs, lowering operating expenditures (OPEX), resulting
in faster return on investment (ROI).
Developed to satisfy customers’ requests for feature-rich, cost-effective, Leads the industry in price/feature-performance ratio and offers customers a
10/100 stackable switch built on the latest technologies cost-efficient network technology upgrade, without the necessity to move to
a higher priced, layer-2+ Gigabit solution
Feature-rich services incorporated in the operating system: Outstanding list of features and performance for supporting scalable, real-time
• Integrated security including Access Guardian, 802.1x and captive portal voice, data and video applications for converged networks
• Alcatel-Lucent virtual chassis design provides resiliency and 5G performance
• Quality of service (QoS) and static, RIP routing and IPv6
OmniSwitch 6250 switches run the same AOS as the other OmniSwitch Existing AOS customers/users are immediately familiar with the product from
products and are fully manageable by Alcatel-Lucent CLI, WebView browser, day one, reducing their ownership and training costs. New users may choose the
the OmniVista™ network management system and the Alcatel-Lucent 5620 method of switch access most beneficial to their needs
Service Aware Manager (SAM)
Limited Lifetime Warranty Software and Hardware Support included The lifetime warranty eliminates service program costs and ongoing service
renewals, lowering total cost of ownership (TCO) and allowing customers to reach
ROI targets more quickly.
Alcatel-Lucent OmniSwitch 6250 models
All models in the OmniSwitch 6250 switch family are stackable, with a half-rack width (21.59 cm/8.5 in.), fixed-configuration
chassis in a 1U form factor. A variety of PoE (enterprise) and non-PoE (enterprise and metro) models are available. They can be
optionally equipped with Alcatel-Lucent-approved small form factor pluggable (SFP) transceivers supporting short, long and
very long distances.
Enterprise models
Chassis 10/100 ports Gigabit combo ports HDMI stacking Power supply Backup power supply
ports (2.5 Gb/s) supported supported
The OmniSwitch 6250-P24 supports 30 W per port PoE (complies with both IEEE 802.3af and 802.3at standards).
Metro models
Chassis 10/100 ports 10/100/1000 combo SFP uplink (gigabit) Power supply Backup power
ports SFP stacking (2.5 Gb/s) supported supply supported
OmniSwitch 6250 metro models support additional metro software features outlined later in this document.
• Gigabit combo port supporting RJ45 10/100/1000 and SFP 100/1000
• M model SFP interfaces support only Gigabit SFP transceivers or OmniSwitch 6250 SFP direct stacking cable
Technical specifications
Switch width 21.5 cm (8.50 in.) 21.5 cm (8.50 in.) 21.5 cm (8.50 in.) 21.5 cm (8.50 in.) 21.5 cm (8.50 in.)
Switch height 4.4 cm (1.73 in.) 4.4 cm (1.73 in.) 4.4 cm (1.73 in.) 4.4 cm (1.73 in.) 4.4 cm (1.73 in.)
Switch depth 29.21 cm (11.5 in.) 29.21 cm (11.5 in.) 29.21 cm (11.5 in.) 29.21 cm (11.5 in.) 29.21 cm (11.5 in.)
(no PS shelf attached)
Switch depth 47.6 cm (18.88 in.) 47.6 cm (18.88 in.) N/A 47.6 cm (18.88 in.) 47.6 cm (18.88 in.)
(with PS shelf attached)
Switch weight (*no PS) 1.72 kg (3.80 lb) 1.91 kg (4.20 lb)* 1.72 kg (3.80 lb) 1.72 kg (3.80 lb) 1.72 kg (3.80 lb)
Switch tray weight 0.61 kg (1.35 lb) 0.61 kg (1.35 lb) 0.61 kg (1.35 lb) 0.61 kg (1.35 lb) 0.61 kg (1.35 lb)
WIRE-RATE PERFORMANCE OS6250-24 OS6250-P24 OS6250-8M OS6250-24M OS6250-24MD
Raw switch capacity: 12.4 Gb/s/24.8 Gb/s 12.4 Gb/s/24.8 Gb/s 10.8 Gb/s/21.6 Gb/s 12.4 Gb/s/24.8 Gb/s 12.4 Gb/s/24.8 Gb/s
(full duplex/aggregated)
Throughput no stacking 13 Mpps @ 8.8 Gb/s 13 Mpps @ 8.8 Gb/s 14.3 Mpps @ 9.6 Gb/s 19 Mpps @ 12.8 Gb/s 19 Mpps @ 12.8 Gb/s
at aggregated
Throughput with stacking 28 Mpps @ 18.8 Gb/s 28 Mpps @ 18.8 Gb/s 23.2 Mpps @ 15.6 Gb/s 28 Mpps @ 18.8 Gb/s 28 Mpps @ 18.8 Gb/s
at aggregated
Stacking capacity 5 Gb/s/10 Gb/s 5 Gb/s/10 Gb/s 5 Gb/s/10 Gb/s 5 Gb/s/10 Gb/s 5 Gb/s/10 Gb/s
(full duplex/aggregated)
OPERATING CONDITIONS OS6250-24 OS6250-P24 OS6250-8M OS6250-24M OS6250-24MD
Operating temperature 0°C to 45°C 0°C to 45°C 0°C to 45°C 0°C to 45°C 0°C to 45°C
(32°F to 113°F) (32°F to 113°F) (32°F to 113°F) (32°F to 113°F) (32°F to 113°F)
Storage temperature -40°C to +75°C -40°C to +75°C -40°C to +75°C -40°C to +75°C -40°C to +75°C
(-40°F to +167°F) (-40°F to +167°F) (-40°F to +167°F) (-40°F to +167°F) (-40°F to +167°F)
Humidity (operating and 5% to 95% 5% to 95% 5% to 95% 5% to 95% 5% to 95%
storage)
MTBF (hours) 268,730 189,585 290,108 268,698 268,715
Fanless design Yes 1 fan Yes Yes Yes
Acoustic (dB) – all fans on* Silent <35db(A) Silent Silent Silent
System power consumption 17.40 W 24.90 W 12.80 W 16.20 W 15.89 W
(watts)**
Heat dissipation (BTU)*** 59 85 44 55 54
* Acoustic levels measured with a single power supply at room temperature
** Power consumption of the OmniSwitch 6250 PoE model is tested under fully loaded traffic conditions using a 225 W PoE supply.
*** Power consumption measured under fully loaded traffic conditions
The OmniSwitch 6250-P24 external 225 W power supply acts as both the primary supply and the redundant supply. The
primary supply/tray combination attaches directly to the rear of the chassis. The redundant supply/tray combination mounts
to the side of the switch and attaches using remote cable.
Indicators Detailed product features • GARP VLAN Registration Protocol (GVRP) for
System LEDs Simplified management 802.1Q-compliant VLAN pruning and dynamic
VLAN creation
• System (OK) (chassis HW/SW status) Management interfaces
• Auto-QoS for switch management traffic as
• PWR (primary power supply status) • Intuitive Alcatel-Lucent CLI with familiar well as traffic from Alcatel-Lucent IP phones
• PRI (virtual chassis primary) interface reducing training costs
• Network Time Protocol (NTP) for network-wide
• BPS (backup power status) • Easy-to-use, point-and-click, web-based time synchronization
element manager (WebView) with built-in
• STK (stacking indicator for metro models) help for easy configuration • Stackable to eight units (*16 units – check
• Switch ID via port LED indicates the stack availability)
• Integration with Alcatel-Lucent OmniVista™
ID of the unit in the stack: 1 to 8 Network Management System (NMS)
• Full configuration and reporting using SN- Resiliency and high availability
Per-port LEDs MPv1/2/3 across all OmniSwitch families • Ring Rapid Spanning Tree Protocol (RRSTP)
• 10/100/1000: PoE, link/activity to facilitate third-party NMS integration optimized for ring topology to provide less
• SFP: link/activity • Remote Telnet management or Secure Shell than 100 ms convergence time
• Stacking: link/activity access using SSH • IEEE 802.1s Multiple Spanning Tree Protocol
• File upload using TFTP, FTP, SFTP, or SCP for (MSTP) encompasses IEEE 802.1D Spanning Tree
faster configuration Protocol (STP) and IEEE 802.1w Rapid Spanning
Compliance and certifications Tree Protocol (RSTP)
• Human-readable ASCII-based configuration
Commercial files for off-line editing and bulk configuration • Per-VLAN Spanning Tree (PVST) and
EMI/EMC Alcatel-Lucent 1x1 STP mode
• Managed by Alcatel-Lucent 5620 Service
• FCC CRF Title 47 Subpart B (Class A limits. Aware Manager (SAM)* • IEEE 802.3ad Link Aggregation Control Protocol
Note: Class A with UTP cables) (LACP) and static link aggregation (LAG) groups
Monitoring and troubleshooting
• VCCI (Class A limits. Note: Class A with across modules are supported
• Local (on the flash) and remote server logging:
UTP cables) • Broadcast and multicast storm control to avoid
Syslog and command log
• AS/NZS 3548 (Class A limits. Note: Class A degradation in overall system performance
• Port-based mirroring for troubleshooting and
with UTP cables) • Uni-Directional Link Detection (UDLD) detects
lawful interception, supports four sessions
• CE marking for European countries (Class A. and disables unidirectional links on fiber optic
with multiple sources-to-one destination
Note: Class A with UTP cables) interfaces
• Policy-based mirroring allows selection of the
• EN 55022: 2006 (Emission Standard) • Redundant and hot-swappable power supplies,
type of traffic to mirror by using QoS policies*
transceivers, modules offering uninterruptable
• EN 61000-3-3:1995 • Remote port mirroring facilitates passing service
• EN 61000-3-2:2006 mirrored traffic through the network to a
• Dual-image and dual-configuration file storage
remotely connected device
• EN 55024: 1998 (Immunity Standards) provides backup
• Port monitoring feature allows capture of
¬ EN 61000-4-2:1995 + A1:1998 Ethernet packets to a file, or for on-screen
¬ EN 61000-4-3:1996 + A1:1998 display to assist in troubleshooting Advanced security
¬ EN 61000-4-4:1995 • sFlow v5 and RMON for advanced monitoring Access control
¬ EN 61000-4-5:1995 and reporting capabilities (statistics, history, • AOS Access Guardian framework for compre-
alarms and events) hensive user-policy-based Network Access
¬ EN 61000-4-6:1996
• IP tools: ping and traceroute Control (NAC)*
¬ EN 61000-4-8:1994
Network configuration • Auto-sensing 802.1X multi-client, multi-VLAN
¬ EN 61000-4-11:1994
• Auto-negotiating 10/100/1000 ports • MAC-based authentication for non-802.1x hosts
• IEEE 802.3: Hi-Pot Test (2250 V DC on all automatically configure port speed and • Web-based authentication (captive portal) – a
Ethernet ports) duplex setting customizable web portal residing on the switch
• Auto-MDI/MDIX automatically configures that can be used for authenticating supplicants
Safety agency certifications transmit and receive signals to support as well as non-supplicants
• US UL 60950 straight-through and crossover cabling • Group mobility rules and “guest” VLAN support
• IEC 60950-1:2001; all national deviations • BOOTP/Dynamic Host Configuration Protocol • The host integrity check (HIC) agent on each
• EN 60950-1:2001; all deviations (DHCP) client allows auto-configuration of switch makes it an HIC enforcer and facilitates
switch IP information for simplified deployment endpoint device control for company policy
• CAN/CSA-C22.2 No. 60950-1-03
• DHCP relay to forward client requests to a compliance; quarantine and remediation are
• NOM-019 SCFI, Mexico supported as required.*
DHCP server
• AS/NZ TS-001 and 60950:2000, Australia • User Network Profile (UNP) simplifies NAC
• Alcatel-Lucent Mapping Adjacency Protocol
• UL-AR, Argentina (AMAP) for building topology maps management and control by dynamically
providing pre-defined policy configuration to
• UL-GS Mark, Germany • IEEE 802.1AB Link Layer Discovery Protocol authenticated clients – VLAN, ACL, BW, HIC
• EN 60825-1 Laser, EN 60825-2 Laser (LLDP) with MED extensions for automated
device discovery • SSH for secure CLI session with PKI support
• CDRH Laser
• Centralized RADIUS and LDAP user authentication
POWER SUPPLIES
OS6250-BP OS6250-BP 40 W power brick AC backup power supply. Provides backup power to one non-PoE switch.
Ships with country-specific power cord, backup power supply tray and securing brackets.
OS6250-BP-P OS6250-BP-P 225 W AC PoE backup power supply. Provides backup power to one PoE switch. Ships with
country-specific power cord and backup power supply tray.
OS6250-BP-D OS6250-BP-D 30 W DC power brick backup power supply. Provides backup DC power to one non-PoE
switch. Ships with chassis connection cable, backup power supply tray and securing brackets.
CABLES AND MOUNTING
SFP-GIG-LH70 1000Base-LH transceiver with an LC interface for single-mode fiber over 1550 nm wavelength.
Typical reach of 70 km
SFP-GIG-LH40 1000Base-LH transceiver with an LC interface for single-mode fiber over 1310 nm wavelength.
Typical reach of 40 km
SFP-GIG-LX 1000Base-LX transceiver with an LC interface for single-mode fiber over 1310 nm wavelength.
Typical reach of 10 km
SFP-GIG-SX 1000Base-SX transceiver with an LC interface for multimode fiber over 850 nm wavelength.
Typical reach of 300 m
SFP-GIG-BX-D 1000Base-BX bidirectional transceiver with an LC-type interface for use over single-mode fiber on a
single strand link up to 10 km point-to-point. Transmits 1490 nm and receives 1310 nm optical signal
SFP-GIG-BX-U 1000Base-BX bidirectional transceiver with an LC-type interface for use over single-mode fiber on a
single strand link up to 10 km point-to-point. Transmits 1310 nm and receives 1490 nm optical signal
100 MEGABIT TRANSCEIVERS
SFP-100-MM 100Base-FX transceiver with an LC interface for multimode fiber optic cable
SFP-100-SM15 100Base-FX transceiver with an LC-type interface for single-mode fiber optic cable up to 15 km
SFP-100-SM40 100Base-FX transceiver with an LC-type interface for single-mode fiber optic cable up to 40 km
SFP-100-BX-U 100Base-BX bidirectional transceiver with an SC-type interface for use over single-mode fiber on a
single strand link up to 20 km point-to-point, where the client (ONU) transmits 1310 nm and receives
1550 nm optical signal
SFP-100-BX-D 100Base-BX bidirectional transceiver with an SC-type interface for use over single-mode fiber on a
single strand link up to 20 km point-to-point, where the client (OLT) transmits 1550 nm and receives
1310 nm optical signal
Replacement parts will be shipped within 5 business days of receipt of the order with the refurbished product.
For more information about the Alcatel-Lucent OmniSwitch 6250 warranty, service and support programs, please visit:
www.alcatel-lucent.com/support
The network capabilities of the OmniSwitch 6350 family include advanced security, quality
of service and high availability features for your business-class data, voice and wireless
technologies. These switches are simple to deploy, configure and manage.
All OmniSwitch 6350 switches use the • Comprehensive security features for your
field-proven Alcatel-Lucent Operating small business network or campus edge at
System (AOS) to deliver highly available, no additional cost
secure, self-protective, easily managed, and • Supports cost-effective installation and
eco-friendly networks. deployment with automated switch setup
OmniSwitch 6350-24 and configuration
The OmniSwitch 6350 family is embedded
OmniSwitch 6350-P24 with the latest technology innovations and
offers maximum investment protection. FEATURES
• 24-port and 48-port, PoE and non-PoE
The following type of deployments benefit models, with four fixed small form-factor
from the OmniSwitch 6350 family: pluggable (SFP) Gigabit uplink interfaces
• Provides up to 48 ports of PoE
• Small business network solutions
connectivity for simplified IP phones,
wireless and IP surveillance deployments
BENEFITS over a single Ethernet cable. All 6350
OmniSwitch 6350-48 • Meets all customer configuration needs models are IEEE 802.3af as well as IEEE
OmniSwitch 6350-P48 and offers excellent investment protection 802.3at PoE compliant
and flexibility with easy deployment, • Provides native IPv4 and IPv6 support
operation and maintenance for routing, Access Control Lists (ACLs)
• Provides outstanding performance when and Dynamic Host Configuration Protocol
supporting real-time voice, data and (DHCP) relay
video applications for converged scalable • Advanced IPv6 threat protection (DHCP
networks snooping, router advertisement protection
• Ensures efficient power management, and source address filter protection)
reduces operating expenses (OPEX) and providing protection against a wide range
lowers total cost of ownership (TCO) of address spoofing attacks
through low power consumption and • Simplified Voice over IP (VoIP)
dynamic PoE allocation, which delivers deployments using the advanced Auto-
only the power needed by the attached Quality of Service (Auto-QoS) feature
device that configures the IP telephony devices
• Field-upgradeable solution makes the into the proper virtual LAN (VLAN) with
network highly available and reduces the correct QoS parameters to prioritize
OPEX voice traffic
MANAGEMENT • Protection of management sessions using • Triple-speed (10/100/1000) user
radius, Terminal Access Controller Access- interfaces and fiber interfaces (SFPs)
• AOS field-proven software managed
Control System Plus (TACACS+) and local supporting 1000Base-X optical
through a web interface (WebView),
database authentication as well as secure transceivers
command line interface (CLI), and Simple
management sessions over Secure Sockets • Wire-rate switching and routing
Network Management Protocol (SNMP)
Layer (SSL), Secure Shell (SSH), and Simple performance
• Supported by Alcatel-Lucent OmniVista® Network Management Protocol version 3
2500 Network Management System (NMS)* • High availability redundant uplinks,
(SNMPv3)
hot-swappable SFPs, dual-image and
• Extensive support for user-oriented configuration file support
SECURITY features, such as learned port security
• Flexible device and user authentication (LPS), port mapping, DHCP binding tables,
CONVERGENCE
with Alcatel-Lucent Access Guardian (IEEE and User Network Profile (UNP)
802.1x/MAC) • Enhanced VoIP and video performance
with policy-based QoS
• Advanced QoS and ACLs for traffic control, PERFORMANCE AND
• Support for multimedia applications with
including an embedded denial of service REDUNDANCY
(DoS) engine to filter out unwanted traffic wire-rate multicast to help you prepare
• Advanced layer-2+ features with basic for the future
attacks
layer-3 routing for both IPv4 and IPv6
• IEEE 802.3at PoE+ support for IP phones,
wireless LAN (WLAN) access points and
video cameras
Non-PoE models
PoE models
DETAILED PRODUCT FEATURES Monitoring and troubleshooting • IP tools: Ping and trace route
• Local (on the Flash) and remote server • Digital Diagnostic Monitoring (DDM):
Management
logging: Syslog and command log Real-time diagnostics of fiber connections
Configuration management interfaces
• Port-based mirroring for troubleshooting for early detection of optical signal
• Intuitive CLI with a familiar interface, deterioration
and lawful interception supports four
reducing training costs
sessions with multiple sources-to-one • Time Domain Reflectometry (TDR) for
• Easy-to-use, point-and-click web-based destination locating breaks or other discontinuity in
element manager (WebView) with built-in copper cables
• Policy-based mirroring that allows
help for easy configuration
selecting the type of traffic to mirror using
• Integration with Alcatel-Lucent OmniVista QoS policies Network configuration
2500 for network management*
• Remote port mirroring that facilitates • Remote auto-configuration download
• Full configuration and reporting using passing mirrored traffic through the • Auto-negotiating: 10/100/1000 ports
SNMPv1/2/3 across all OmniSwitch network to a remotely connected device automatically configure port speed and
families to facilitate third-party NMS
• Port monitoring feature that allows duplex setting
integration
capturing Ethernet packets to a file, • Automatic medium-dependent interface
• Remote Telnet management or Secure or to an on-screen display to assist in / medium-dependent interface crossover
Shell access using SSHv2 troubleshooting (Auto-MDI/MDI-X) configuring to transmit
• File upload using USB, TFTP, FTP, SFTP, or • sFlow v5 and Remote Network Monitoring and receive signals to support straight-
SCP for faster configuration (RMON) for advanced monitoring and through and crossover cabling
• Human-readable ASCII-based configuration reporting capabilities for statistics, history,
files for offline editing and bulk alarms and events
configuration
PoE ports 0 24 0 48
DIMENSIONS OS6350-24 OS6350-P24 OS6350-48 OS6350-P48
Width 44.0 cm (17.32 in) 44.0 cm (17.32 in) 44.0 cm (17.32 in) 44.0 cm (17.32 in)
Height 4.4 cm (1.73 in) 4.4 cm (1.73 in) 4.4 cm (1.73 in) 4.4 cm (1.73 in)
Depth 23.87 cm (9.4 in) 23.87 cm (9.4 in) 23.87 cm (9.4 in) 32.3 cm (12.72 in)
Weight 4.08 kg (9.0 lb) 5.05 kg (11.0 lb) 5.44 kg (12.0 lb) 6.8 kg (15.0 lb)
OPERATING CONDITIONS OS6350-24 OS6350-P24 OS6350-48 OS6350-P48
Operating temperature 0°C to +45°C 0°C to +45°C 0°C to +45°C 0°C to +45°C
32°F to +113°F 32°F to +113°F 32°F to +113°F 32°F to +113°F
Storage temperature -40°C to +75°C -40°C to +75°C -40°C to +75°C -40°C to +75°C
-40°F to +167°F -40°F to +167°F -40°F to +167°F -40°F to +167°F
Humidity (operating and storage) 5% — 95% 5% — 95% 5% — 95% 5% — 95%
Fan (variable speed)* Fanless 3 fans 1 fan 4 fans
Acoustic (dB) 0 dB (A) < 40 dB (A) < 40 dB (A) < 40dB (A)
Mean Time Between Failures (MTBF) at 1,250,292 421,866 774,351 448,312
25°C (hours)
System power consumption (W)** 24W 30W 50W 58W
* Acoustic levels measured with the primary power supply at room temperature
** Power consumption measured with 64-byte packets at varied traffic conditions on all ports, including the 1 Gigabit Ethernet uplinks
ORDERING INFORMATION
GIGABIT TRANSCEIVERS
SFP-GIG-LH70 1000Base-LH transceiver with an LC interface for single mode fiber over 1550 nm wavelength. Typical reach of 70 km.
SFP-GIG-LH40 1000Base-LH transceiver with an LC interface for single mode fiber over 1310 nm wavelength. Typical reach of 40 km.
SFP-GIG-LX 1000Base-LX transceiver with an LC interface for single mode fiber over 1310 nm wavelength. Typical reach of 10 km.
SFP-GIG-SX 1000Base-SX transceiver with an LC interface for multimode fiber over 850 nm wavelength. Typical reach of 300 m.
SFP-GIG-EXTND 1000Base-SX transceiver with an LC interface for single mode fiber over 850 nm wavelength. Typical reach of 2 km.
SFP-GIG-T 1000Base-T Gigabit ethernet transceiver Supports category 5, 5E, and 6 copper cabling up to 100m. SFP supports
1000 Mbit/s ONLY on the OS6350 SFP ports.
enterprise.alcatel-lucent.com Alcatel-Lucent and the Alcatel-Lucent Enterprise logo are trademarks of Alcatel-Lucent. To view other
trademarks used by affiliated companies of ALE Holding, visit: enterprise.alcatel-lucent.com/trademarks. All other trademarks are the
property of their respective owners. The information presented is subject to change without notice. Neither ALE Holding nor any of its
affiliates assumes any responsibility for inaccuracies contained herein. (August 2015)
Alcatel-Lucent
OmniSwitch 6450-10
GIGABIT ETHERNET
LAN SWITCH
The Alcatel-Lucent OmniSwitch™ 6450 Stackable Gigabit Ethernet LAN value switch family
includes a series of 10-port models (non-PoE, Power over Ethernet [PoE], Fast and Gigabit
Ethernet) for classroom, workgroup and small enterprise segments. Designed with an optimized
size, low-power consumption, fanless operation and a rich software feature set, the OmniSwitch
6450-10 models provide a highly available, self-protective, easily managed and eco-friendly
collocation solution.
Combo ports:
• RJ-45 combo port configurable to be RJ10/100/1000Base-T
• SFP combo port supporting 100/1000Base-X transceivers for short, long and very long distances
• SFP fixed fiber interfaces support only gigabit SFP transceivers or SFP stacking cable.
Technical specifications
PORT OS6450-10L OS6450-10 OS6450-P10L OS6450-P10
RJ-45 10/100 ports 8 0 8 0
RJ-45 10/100/1000 ports 0 8 0 8
RJ-45/SFP 10/100/1000 combo ports 2 2 2 2
SFP uplink/stacking ports 2 2 2 2
PoE ports 0 0 8 8
Maximum units stackable* 2 2 2 2
Dimensions
Switch width 8.50 in. (21.5 cm) 8.50 in. (21.5 cm) 8.50 in. (21.5 cm) 8.50 in. (21.5 cm)
Switch height 1.73 in. (4.4 cm) 1.73 in. (4.4 cm) 1.73 in. (4.4 cm) 1.73 in. (4.4 cm)
Switch depth 11.5 in. (29.21 cm) 11.5 in. (29.21 cm) 11.5 in. (29.21 cm) 11.5 in. (29.21 cm)
Performance (FD/Aggregated)
Switch capacity (2GigE uplinks) 2.8/5.6 Gb/s 10/20 Gb/s 2.8/5.6 Gb/s 10/20 Gb/s
Switch capacity (4GigE uplinks) 4.8/9.6 Gb/s 12/24 Gb/s 4.8/9.6 Gb/s 12/24 Gb/s
Stacking capacity 10/20 Gb/s 10/20 Gb/s 10/20 Gb/s 10/20 Gb/s
Operating conditions
Operating temperature 0°C to +45°C 0°C to +45°C 0°C to +45°C 0°C to +45°C
32°F to +113°F 32°F to +113°F 32°F to +113°F 32°F to +113°F
Storage temperature -40°C to +75°C -40°C to +75°C -40°C to +75°C -40°C to +75°C
-40°F to +167°F -40°F to +167°F -40°F to +167°F -40°F to +167°F
Humidity (operating and storage) 5% to 95% 5% to 95% 5% to 95% 5% to 95%
MTBF (hours) 695, 192 695, 192 499, 729 499, 729
Power supply efficiency 85.6% 85.6% 90.1% 90.1%
Fanless design Yes Yes Yes Yes
Acoustic (dB) Silent Silent Silent Silent
System power consumption (watts)** ~17 W ~17 W ~23.5 W ~23.5 W
Heat dissipation (Btu) 58 58 78 78
PoE power budget N/A N/A 120 W 120 W
PoE device heat dissipation (Btu) N/A N/A 409 409
Gigabit transceivers
SFP-GIG-LH70 1000Base-LH transceiver with an LC interface for single mode fiber over 1550 nm wavelength. Typical reach
of 70 km
SFP-GIG-LH40 1000Base-LH transceiver with an LC interface for single mode fiber over 1310 nm wavelength. Typical reach
of 40 km
SFP-GIG-LX 1000Base-LX transceiver with an LC interface for single mode fiber over 1310 nm wavelength. Typical reach
of 10 km
SFP-GIG-SX 1000Base-SX transceiver with an LC interface for multimode fiber over 850 nm wavelength. Typical reach
of 300 m
SFP-GIG-BX-D 1000Base-BX bidirectional transceiver with an LC type interface for use over single mode fiber optic on
a single strand link up to 10 km point to point. Transmits 1490 nm and receives 1310 nm optical signal
SFP-GIG-BX-U 1000Base-BX bidirectional transceiver with an LC type interface for use over single mode fiber optic on
a single strand link up to 10 km point to point. Transmits 1310 nm and receives 1490 nm optical signal
100 Megabit transceivers
SFP-100-MM 100Base-FX transceiver with an LC interface for multimode fiber optic cable
SFP-100-SM15 100Base-FX transceiver with an LC type interface for single mode fiber optic cable up to 15 km
SFP-100-SM40 100Base-FX transceiver with an LC type interface for single mode fiber optic cable up to 40 km
SFP-100-BX-U 100Base-BX bidirectional transceiver with an SC type interface for use over single mode fiber optic on
a single strand link up to 20 km point to point, where the client (ONU) transmits 1310 nm and receives
1550 nm optical signal
SFP-100-BX-D 100Base-BX bidirectional transceiver with an SC type interface for use over single mode fiber optic on
a single strand link up to 20 km point to point, where the client (OLT) transmits 1550 nm and receives
1310 nm optical signal
www.alcatel-lucent.com Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of
Alcatel-Lucent. All other trademarks are the property of their respective owners. The information presented
is subject to change without notice. Alcatel-Lucent assumes no responsibility for inaccuracies contained herein.
Copyright © 2012 Alcatel-Lucent. All rights reserved. 2012034193C (March)
Alcatel-Lucent
OmniSwitch 6450
STACKABLE GIGABIT ETHERNET
LAN SWITCH FAMILY
The Alcatel-Lucent OmniSwitch™ 6450 Stackable Gigabit Ethernet LAN value switch family
offers versatile, 24/48 port fixed configuration gigabit switches with optional upgrade paths
for 10 Gigabit Ethernet (GigE) stacking, 10 GigE uplinks and metro Ethernet services.
Offering a design optimized for flexibility and scalability as well as low power consumption,
the OmniSwitch 6450 is an outstanding edge solution. It uses the field-proven Alcatel-Lucent
Operating System (AOS) to deliver highly available, secure, self-protective, easily managed and
eco-friendly networks.
Switch width 17.32 in. 17.32 in. 17.32 in. 17.32 in. 17.32 in.
(44.0 cm) (44.0 cm) (44.0 cm) (44.0 cm) (44.0 cm)
Switch height 1.73 in. (4.4 cm) 1.73 in. (4.4 cm) 1.73 in. (4.4 cm) 1.73 in. (4.4 cm) 1.73 in. (4.4 cm)
Switch depth 12.3 in. 12.3 in. 15.4 in. 15.4 in. 12.3 in.
(31.24 cm) (31.24 cm) (39.1 cm) (39.1 cm) (31.24 cm)
Switch weight 9 lb. (4.08 kg) 11 lb. (5.05 kg) 12 lb. (5.44 kg) 15 lb. (6.8 kg) 9 lb. (4.08 kg)
Performance
Switch capacity with 2x10G ports 44 Gbps 44 Gbps 68 Gbps 68 Gbps 44 Gbps
(full duplex/aggregated) 88 Gbps 88 Gbps 136 Gbps 136 Gbps 88 Gbps
Switch throughput with 2x10G ports 65.5 Mpps 65.5 Mpps 101.2 Mpps 101.2 Mpps 65.5 Mpps
Stacking capacity 20 Gbps/ 20 Gbps/ 20 Gbps/ 20 Gbps/ 20 Gbps/
(full duplex/aggregated) 40 Gbps 40 Gbps 40 Gbps 40 Gbps 40 Gbps
Operating conditions
Operating temperature 0°C to +45°C 0°C to +45°C 0°C to +45°C 0°C to +45°C 0°C to +45°C
32°F to 113°F 32°F to 113°F 32°F to 113°F 32°F to 113°F 32°F to 113°F
Storage temperature -40°C to +75°C -40°C to +75°C -40°C to +75°C -40°C to +75°C -40°C to +75°C
-40°F to +167°F -40°F to +167°F -40°F to +167°F -40°F to +167°F -40°F to +167°F
Humidity (operating and storage) 5% - 95% 5% - 95% 5% - 95% 5% - 95% 5% - 95%
Fan (variable speed)* Fan less 4 fan 3 fan 4 fan 3 fan
Acoustic (dB) 0 db(A) <40dB(A) <40dB(A) <40dB(A) <40dB(A)
MTBF (hours) 894,251 231,542 337,583 135,087 364,214
System power consumption (watts)** 35.67W 37.89W 64.68W 66.54W 56.26W
System heat dissipation (BTU) 122 129 221 227 192
PoE Power Budget N/A 390W N/A 780W N/A
PoE device heat dissipation (BTU) N/A 1332 N/A 2663 N/A
The OmniSwitch 6450 P24/48 port models offer a 2RU external backup supply configuration where the redundant supply/tray combination
mounts above the switch and uses a remote cable for the switch/supply connection. All parts and accessories are included with the backup
supply kit.
OS6450S-CBL-60 OS6450 60 centimeters long SFP+ direct stacking cable for OS6450 24 and 48 port models
OS6450S-CBL-1M OS6450 100 centimeters long SFP+ direct stacking cable for OS6450 24 and 48 port models
www.alcatel-lucent.com Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of
Alcatel-Lucent. All other trademarks are the property of their respective owners. The information presented
is subject to change without notice. Alcatel-Lucent assumes no responsibility for inaccuracies contained herein.
Copyright © 2012 Alcatel-Lucent. All rights reserved. 2012013924-B (March)
Alcatel-Lucent OmniSwitch 6850E
STACKABLE LAN SWITCH
The Alcatel-Lucent OmniSwitch™ 6850 Stackable LAN Switch family offers versatile, fixed-
configuration Layer 3 Gigabit and 10 Gigabit Ethernet switches, which provide advanced
services, high performance, and 802.3at compliant power over Ethernet (PoE). All of the
models in the family are stackable and perform wire-rate, Gigabit switching and routing for
both IPv4 and IPv6, delivering intelligent services to the edge of the network with optimal
quality of service (QoS) and integrated security, as well as network admission control (NAC).
These versatile LAN switches can very well be positioned at the edge of mid to large size
enterprise networks, at the aggregation layer, small enterprise core and are suitable advanced
CPE for the Ethernet access for metro and managed services.
FEATURES BENEFITS
Versatile features and models offering Gigabit and 10 With the variety of interfaces and models, the
Gigabit interfaces, IEEE 802.3af and 802.3at -compliant OmniSwitch 6850 family meets any customer configuration
PoE. Optional 10G plug-in module delivers additional 2 10 need and offers excellent investment protection and
Gigabit ports. flexibility, as well as ease of deployment, operation and
maintenance.
Wire-rate performance for switching and routing at 10G Outstanding performance when supporting real-time
and gigabit speeds. Advanced services are incorporated in voice, data, and video applications for converged scalable
the operating system; for example, QoS, access control networks
lists (ACLs), L2/L3, VLAN stacking, and IPv6.
Low power consumption and dynamic PoE allocation The OmniSwitch 6850E ensures efficient power
management, reduces operating expenses and lowers
total cost of ownership (TCO) through the low power
consumption and dynamic PoE allocation, which delivers
only the power needed by the attached device.
Redundancy at all levels including power supplies, A field-upgradeable solution that makes the network
software and hot-swappable Small Form Factor Pluggable highly available and reduces operating expenses
(SFP) modules
Wire-rate switching and routing at gigabit speeds. Outstanding performance when supporting real-time
Advanced services incorporated in the operating system voice, data, and video applications for converged scalable
(OS): quality of service (QoS), access control lists (ACLs), networks
L2/L3, VLAN stacking, and IPv6
Extensive security features for network access control Fully secures the network at the edge, at no additional
(NAC), policy enforcement and attack containment cost
Hardware-based virtual routing and forwarding (VRF) Enterprise-wide cost reduction through hardware
support consolidation to achieve network segmentation and
security without additional hardware installation.
Advanced, out-of-the-box auto-configuration, Link Layer Automated switch setup and configuration, and end-to-
Discovery Protocol (LLDP) network policies and dynamic end VLAN provisioning support cost-effective installation
VLAN allocation and deployment
Ready for Metro Ethernet access: VLAN stacking, Simplifies Metro Ethernet network OA&M for service
multicast switching, Dynamic Host Configuration Protocol providers
(DHCP) snooping/option 82, ITU-T Y.1731, IEEE 802.1ag,
IEEE 802.3ah and MAC-Forced Forwarding
Alcatel-Lucent OmniSwitch 6850E Models
The OmniSwitch 6850E family offers customers an extensive selection of gigabit and 10 GigE
fixed-configuration switches with PoE and power supply options that accommodate most needs.
All models are in a 1RU form factor and have two 10GBase-CX4 ports that can be used either
for stacking or as a connector to a plug-in module for additional two 10 Gigabit SFP+ ports.
OS6850E-U24X OS6-XNI-U2
POWER SUPPLIES
MODEL NAME DESCRIPTION SUPPORTED
Non-PoE models
20 Ethernet 10/100/1000 RJ-45 ports, four combo ports, and two 10GBase-
OS6850E-24 CX4 ports 126W AC / 120W DC
20 Ethernet 10/100/1000 RJ-45, two 10G SFP+, four combo ports, and two
OS6850E-24X 10GBase-CX4 ports 126W AC / 120W DC
44 Ethernet 10/100/1000 RJ-45, four combo ports, and two 10GBase-CX4
OS6850E-48 ports 126W AC / 120W DC
46 Ethernet 10/100/1000 RJ-45, two 10G SFP+, two combo ports, and two
OS6850E-48X 10GBase-CX4 ports 126W AC / 120W DC
22 Ethernet 100/1000 Base-X SFP ports, two 10G SFP+ , two combo ports, and
OS6850E-U24X two 10GBase-CX4 ports 126W AC / 120W DC
PoE models
24 PoE ports — 20 Ethernet 10/100/1000 RJ-45, four combo ports, and two
OS6850E-P24 10GBase-CX4 ports 360W / 510W AC
24 PoE ports — 20 Ethernet 10/100/1000 RJ-45, two 10G SFP+, four combo
OS6850E-P24X ports, and two 10GBase-CX4 ports 360W / 510W AC
48 PoE ports — 44 Ethernet 10/100/1000 RJ-45, four combo ports, and two
OS6850E-P48 10GBase-CX4 ports 360W / 900W AC
48 PoE ports — 46 Ethernet 10/100/1000 RJ-45, two 10G SFP+ , two combo
OS6850E-P48X ports, and two 10GBase-CX4 ports 360W / 900W AC
Power supplies
All OmniSwitch 6850E models support redundant, hot-swappable AC, DC or PoE power
supplies. The primary and the backup power supply units are modular, allowing for easier
maintenance and replacement.
There is no interruption of service when a new power supply is installed or an old one replaced
2
Alcatel-Lucent OmniSwitch 6850E Data Sheet
Table 2. OmniSwitch 6850E power supply dimensions
NON-POE PS DIMENSIONS
MODELS DESCRIPTION (W x D x H) WEIGHT
Power supply Comes with every bundle and holds one 510-W AC or 35.3 x 21 x 4.4 cm
shelf two 360-W AC, 126-W AC, or 120-W DC power supplies (13.9 x 8.3 x 1.73 in.) 1.26 lb (0.57 kg )
Any power supply can be remotely connected with a cable that enables rack mounting with the
mounting ears provided with the unit. This feature allows for space-sensitive installations
requiring reduced depth, for example, in a wall-mounted cabinet.
Technical Specifications
Physical dimensions • Total size including PS and shelf:
• Chassis size without PS and shelf: - Width: 48.2 cm (19.00 in.)
- Width: 44.0 cm (17.32 in.) - Depth: 44.6 cm (17.56 in.)
- Depth: 27.0 cm (10.63 in.) - Height: 4.4 cm (1.73 in.)
- Height: 4.4 cm (1.73 in.) - Indicators
Indicators
• Per-port LEDs • System LEDs
- 10/100/1000: PoE, link/activity -Switch ID (indicates the stack ID of the
- SFP: link/activity unit in the stack: 1 to 7)
- SFP+: link/activity -System (OK) (chassis HW/SW status)
- PWR (primary power supply status)
- PRI (virtual chassis primary)
- BPS (backup power status)
Acoustic levels
• Under 44 dB for all models, measured with a single power supply at room temperature
Environmental requirements
• Operating temperature: 0°C to +45°C (+32°F to +113°F)
• Storage temperature: –10°C to +70°C (+14°F to +158°F)
• Humidity (operating and storage): 5% to 95% non-condensing
3
Alcatel-Lucent OmniSwitch 6850E Data Sheet
- 24 port: 35.7 Mp/s
- 24 port with 10G: 65.5 Mp/s
- 48 port: 71.4 Mp/s
- 48 port with 10G: 101.2 Mp/s
• Stacking capacity: 40 Gb/s
Simplified manageability
Management interfaces ITU-T Y.1731 and IEEE 802.1ag Ethernet OA&M:
Intuitive, familiar Alcatel-Lucent CLI reduces training costs Connectivity Fault Management and performance
Easy to use, point-and-click, web-based element manager measurements (layer-2 ping and link trace)
(WebView) with built-in help for easy configuration IEEE 802.3ah Ethernet in the First Mile (EFM) for link
Integrated with Alcatel-Lucent OmniVista™ products for monitoring , remote fault detection, and loopback control
network management (layer-1 ping)
Full configuration and reporting using SNMPv1/2/3 across Unidirectional Link Detection (UDLD) detects and disables
all OmniSwitch families to facilitate third-party network unidirectional links on fiber optic interfaces.
management system integration Digital Diagnostic Monitoring (DDM): Real-time diagnostics
Remote switch access using Telnet or Secure Shell (SSH) of fiber connections for early detection of optical signal
File upload using USB, TFTP, FTP, SFTP, or SCP for faster deterioration
configuration
Human-readable ASCII-based configuration files for off-line Network configuration
editing, bulk configuration and out-of-the-box auto- Auto-negotiating 10/100/1000 ports automatically
provisioning configure port speed and duplex setting
Auto MDI/MDIX automatically configures transmit and
Monitoring and troubleshooting receive signals to support straight through and crossover
Local (on the flash) and remote server logging: Syslog and cabling
command log BOOTP/DHCP client with option 60 allows auto-
Port based mirroring for troubleshooting and lawful configuration of the switch for simplified deployment
interception; supports four sessions with multiple sources- DHCP relay to forward client requests to a DHCP server
to-one destination Alcatel-Lucent Mapping Adjacency Protocol (AMAP) for
Policy based mirroring allows selection of the type of building topology maps
traffic to mirror by using QoS policies IEEE 802.1AB LLDP with MED extensions for automated
Remote port mirroring facilitates passing mirrored traffic device discovery and IP phone provisioning
through the network to a remotely connected device Multiple VLAN Registration Protocol (MVRP) and GARP VLAN
Port monitoring feature allows capture of Ethernet packets Registration Protocol (GVRP) for 802.1Q/1ak-compliant
to a file to assist in troubleshooting VLAN pruning and dynamic VLAN creation
sFlow v5 and RMON for advanced monitoring and reporting Auto QoS for switch management and IP phone traffic
capabilities for statistics, history, alarms and events Network Time Protocol (NTP) for network-wide time
IP tools: ping and trace route synchronization
4
Alcatel-Lucent OmniSwitch 6850E Data Sheet
Bidirectional Forwarding Detection (BFD) for fast failure Redundant and hot-swappable power supplies, transceivers
detection and reduced re-convergence times in a routed modules offering uninterruptable service
environment. Dual image and dual configuration files storage provides
Broadcast, unknown unicast and multicast storm control to backup
avoid degradation in overall system performance Stacking capability for virtual chassis redundancy. Up to 10-
km fault-tolerant remote stacking supported.
Advanced security
Access control
AOS Access Guardian framework for comprehensive user- Containment, monitoring and quarantine
policy-based NAC Support for Alcatel-Lucent OmniVista 2500 Quarantine
Autosensing 802.1X multi-client, multi-VLAN support Manager and quarantine VLAN
MAC-based authentication for non-802.1x hosts Learned Port Security (LPS) or MAC address lockdown
Web based authentication (captive portal): A customizable secures the network access on user or trunk ports based on
web portal residing on the switch MAC address
IEEE 802.1X and MAC-based authentication, with group DHCP Snooping, DHCP IP and Address Resolution Protocol
mobility and “guest” VLAN support (ARP) spoof protection
Host integrity check (HIC) agent on each switch makes it an Embedded traffic anomaly detection (TAD) monitors traffic
HIC enforcer and facilitates endpoint device control for patterns typical for worm-like viruses and either shuts
company policy compliance; quarantine and remediation down the port or reports to the management system
are supported as required. ARP poisoning detection
User Network Profile (UNP) simplifies NAC by dynamically ACLs to filter out unwanted traffic including denial of
providing pre-defined policy configuration to authenticated service (DOS) attacks; flow-based filtering in hardware
clients — VLAN, ACL, BW, HIC (layer 1 to layer 4)
SSH for secure CLI session with public key infrastructure Support of Microsoft® Network Access Protection (NAP)
(PKI) support Bridge Protocol Data Unit (BPDU) blocking automatically
TACACS+ client allows for authentication authorization and shuts down user ports to prevent topology loops if an STP
accounting (AAA) with a remote TACACS+ server BPDU packet is seen
Centralized RADIUS and Lightweight Directory Access STP Root Guard prevents edge devices from becoming STP
Protocol (LDAP) user authentication root nodes
Converged networks
PoE Traffic prioritization: Flow-based QoS with internal and
Dynamic PoE allocation delivers only the power needed by external prioritization (also known as re-marking)
the attached device up to the total power budget for most Bandwidth management: Flow based bandwidth
efficient power consumption management, ingress rate limiting; egress rate shaping per
PoE models support Alcatel-Lucent IP phones and WLAN port
access points, as well as any IEEE 802.3af-compliant end Queue management: Configurable scheduling algorithms:
device Strict Priority Queuing (SPQ), Weighted Round Robin (WRR)
Configurable per-port PoE priority and max power for and Deficit Round Robin (DRR)
power allocation Congestion avoidance: Support for End-to-end Head-of-Line
(E2E-HOL) blocking prevention and flow control
QoS LLDP network polices for dynamic designation of VLAN-ID
Priority queues: Eight hardware-based queues per port for and layer-2/layer-3 priority for IP phones
flexible QoS management Auto-QoS for switch management traffic as well as traffic
from Alcatel-Lucent IP phones
5
Alcatel-Lucent OmniSwitch 6850E Data Sheet
IP Multicast VLAN (IPMVLAN) for optimized multicast ¬ Multicast streams isolation from multiple content
replication at the edge saving network core resources providers over the same interface
Optimized Ethernet access services delivery MEF 9 and 14 certified
¬ Network bandwidth protection against overload of video Managed by Alcatel-Lucent 5620 Service Aware Manager
traffic
Supported Standards
IEEE standards • RFC 2439 BGP Route Flap Damping • RFC 2668/3636 IEEE 802.3 MAU MIB
• RFC 2545 BGP-4 Multiprotocol • RFC 2674 VLAN MIB
• IEEE 802.1D (STP)
Extensions for IPv6 Inter-Domain • RFC 3414 User based Security model
• IEEE 802.1p (CoS)
• IEEE 802.1Q (VLANs) Routing • RFC 4251 Secure Shell Protocol
• IEEE 802.1ad (Provider Bridges) (Q- • RFC 2796 BGP Route Reflection architecture
in-Q/VLAN stacking) • RFC 2858 Multiprotocol Extensions • RFC 4252 The Secure Shell (SSH)
• IEEE 802.1ag (Connectivity Fault for BGP-4 Authentication Protocol
Management) • RFC 3065 BGP AS Confederations • RFC 4878 OA&M Functions on
• IEEE 802.1ak (Multiple VLAN IP multicast Ethernet-Like Interfaces
Registration Protocol) • RFC 1075 DVMRP Security
• IEEE 802.1s (MSTP) • RFC 1112 IGMP v1 • RFC 1321 MD5
• IEEE 802.1w (RSTP) • RFC 2236/2933 IGMP v2 and MIB • RFC 2104 HMAC Message
• IEEE 802.1X (Port Based Network • RFC 2362/4601 PIM-SM Authentication
Access Control) • RFC 2365 Multicast • RFC 2138/2865/2868/3575/2618
• IEEE 802.3i (10Base-T) • RFC 2715/2932 Multicast Routing RADIUS Authentication and Client MIB
• IEEE 802.3u (Fast Ethernet) MIB • RFC 2139/2866/2867/2620 RADIUS
• IEEE 802.3x (Flow Control) • RFC 2934 PIM MIB for IPv4 Accounting and Client MIB
• IEEE 802.3z (Gigabit Ethernet) • RFC 3376 IGMPv3 • RFC 2228 FTP Security Extensions
• IEEE 802.3ab (1000Base-T) • RFC 5060 Protocol Independent • RFC 2284 PPP EAP
• IEEE 802.3ac (VLAN Tagging) Multicast MIB • RFC 2869/2869bis RADIUS Extension
• IEEE 802.3ad (Link Aggregation) • RFC 5132 IP Multicast MIB QoS
• IEEE 802.3ae (10G Ethernet) • RFC 5240 PIM Bootstrap Router MIB • RFC 896 Congestion Control
• IEEE 802.3af (Power over Ethernet) IPv6 • RFC 1122 Internet Hosts
• RFC 1886/3596 DNS for IPv6 • RFC 2474/2475/2597/3168/3246
• RFC 2292/2553/3493/3542 IPv6 DiffServ
ITU-T standards Sockets • RFC 2697 srTCM
• ITU-T G.8032: Draft (June 2007) • RFC 2373/2374/3513/3587 IPv6 • RFC 2698 trTCM
Ethernet Ring Protection Addressing • RFC 3635 Pause Control
• ITU-T Y.1731 OA&M fault and • RFC 2460//2462/2464 Core IPv6 Others
performance management • RFC 2461 NDP • RFC 768 UDP
• RFC 2463/2466/4443 ICMP v6 and • RFC 791/894/1024/1349 IP and
MIB IP/Ethernet
IETF standards • RFC 2452/2454 IPv6 TCP/UDP MIB • RFC 792 ICMP
IPv4 • RFC 2893/4213 IPv6 Transition • RFC 793/1156 TCP/IP and MIB
• RFC 2003 IP/IP Tunneling Mechanisms • RFC 826/903 ARP and Reverse ARP
• RFC 2784 GRE Tunneling • RFC 3056 IPv6 Tunneling • RFC 919/922 Broadcasting internet
OSPF • RFC 3542/3587 IPv6 datagram
• RFC 1253/1850/2328 OSPF v2 and • RFC 3595 TC for Flow Label • RFC 925/1027 Multi LAN ARP /
MIB • RFC 4007 IPv6 Scoped Address Proxy ARP
• RFC 1587/3101 OSPF NSSA Option Architecture • RFC 950 Subnetting
• RFC 1765 OSPF Database Overflow • RFC 4193 Unique Local IPv6 Unicast • RFC 951 BOOTP
• RFC 2154 OSPF MD5 Signature Addresses • RFC 1151 RDP
• RFC 2370/3630 OSPF Opaque LSA Manageability • RFC 1191/1981 Path MTU Discovery
• RFC 3623 OSPF Graceful Restart • RFC 854/855 Telnet and Telnet • RFC 1256 ICMP Router Discovery
RIP options • RFC 1305/2030 NTP v3 and Simple
• RFC 1058 RIP v1 • RFC 959/2640 FTP NTP
• RFC 1722/1723/2453/1724 RIP v2 • RFC 1155/2578-2580 SMI v1 and SMI • RFC 1493 Bridge MIB
and MIB v2 • RFC 1518/1519 CIDR
• RFC 1812/2644 IPv4 Router • RFC 1157/2271 SNMP • RFC 1541/1542/2131/3396/3442
Requirements • RFC 1212/2737 MIB and MIB-II DHCP
• RFC 2080 RIPng for IPv6 • RFC 1213/2011-2013 SNMP v2 MIB • RFC 1757/2819 RMON and MIB
BGP • RFC 1215 Convention for SNMP • RFC 2131/3046 DHCP/BootP Relay
• RFC 1269/1657 BGP v3 & v4 MIB Traps • RFC 2132 DHCP Options
• RFC 1403/1745 BGP/OSPF • RFC 1350 TFTP Protocol • RFC 2251 LDAP v3
Interaction • RFC 1573/2233/2863 Private • RFC 2338/3768/2787 VRRP and MIB
• RFC 1771-1774/2842/2918/3392 Interface MIB • RFC 3021 Using 31-bit prefixes
BGP v4 • RFC 1643/2665 Ethernet MIB • RFC 3060 Policy Core
• RFC 1965 BGP AS Confederations • RFC 1901-1908/3416-3418 SNMP v2c • RFC 3176 sFlow
• RFC 1966 BGP Route Reflection • RFC 2096 IP MIB • RFC 4562 MAC-Forced Forwarding
• RFC 1997/1998 BGP Communities • RFC 2131 DHCP server/client
Attribute • RFC 2570-2576/3411-3415 SNMP v3
• RFC 2042 BGP New Attribute • RFC 2616 /2854 HTTP and HTML
• RFC 2385 BGP MD5 Signature • RFC 2667 IP Tunneling MIB
6
Alcatel-Lucent OmniSwitch 6850E Data Sheet
Service and Support
Warranty
Limited lifetime hardware warranty: Limited to the original owner, and will be provided for up
to 5 years after the product’s End-of-Sales announcement.
7
Alcatel-Lucent OmniSwitch 6850E Data Sheet
www.alcatel-lucent.com Alcatel, Lucent, Alcatel-Lucent and the Alcatel-
Lucent logo, OmniSwitch and OmniVista are trademarks of Alcatel-Lucent. All
other trademarks are the property of their respective owners. The information
presented is subject to change without notice. Alcatel-Lucent assumes no
responsibility for inaccuracies contained herein. Copyright © 2010 Alcatel-Lucent.
All rights reserved.
8
Alcatel-Lucent OmniSwitch 6850E Data Sheet
Alcatel-Lucent OmniSwitch 6855
HARDENED L AN SWITCH
Alcatel-Lucent OmniSwitch™ 6855 Hardened LAN Switch (HLS) models are industrial grade, managed, Gigabit
and 10 Gigabit Ethernet switches designed to operate reliably in harsh electrical environments and severe
temperatures. This superior, rugged hardware design, coupled with the widely deployed and field-proven
Alcatel-Lucent Operating System (AOS), makes the OmniSwitch 6855 ideal for industrial and mission-critical
applications that require wider operating temperature ranges, more stringent EMC/EMI requirements and an
optimized feature set for high security, reliability, performance and easy management.
The target applications for these versatile LAN switches are power utilities, transportation and traffic control
systems, industrial factory floor installations, video surveillance systems and outdoor installations, all of which
require gigabit backbone connectivity.
FEATURES BENEFITS
Combo ports are ports individually configurable to be 10/100/1000Base-T or 1000Base-X, which support SFP transceivers
for short, long and very long distances.
Both models support 15.4 W per port PoE ( compliant with IEEE 802.3af standard).
Technical specifications
NUMBER OF PORTS
Width 21.6 cm (8.50 in) 21.6 cm (8.50 in) 43.8 cm (17.25 in) 43.8 cm (17.25 in) 43.8 cm (17.25 in)
Height 4.4 cm (1.73 in) 4.4 cm (1.73 in) 4.4 cm (1.73 in) 4.4 cm (1.73 in) 4.4 cm (1.73 in)
Depth (no PS shelf attached) 26 cm (10.25 in) 26 cm (10.25 in) 27.4 cm (10.78 in) 27.4 cm (10.78 in) 27.4 cm (10.78 in)
Depth (with PS shelf attached) 44.5 cm (17.50 in) 44.5 cm (17.50 in) 44.8 cm (17.60 in) 44.8 cm (17.60 in) 44.8 cm (17.60 in)
Weight (no PS) 2.42 kg (5.28 lb) 2.42 kg (5.28 lb) 3.78 kg (8.34 lb) 3.78 kg (8.34 lb) 5.3 kg (11.68 lb)
Weight (with one PS and tray) 3.55 kg (7.78 lb) 3.55 kg (7.78 lb) 5.35 kg (11.8 lb) 5.35 kg (11.8 lb) 6.87 kg (15.14 lb)
Operating temperature -40°C to +70°C -40°C to +70°C -40°C to +75°C -40°C to +75°C -40°C to +70°C
(-40°F to +158°F) (-40°F to +158°F) (-40°F to +167°F) (-40°F to +167°F) (-40°F to +158°F)
Storage temperature -40°C to +85°C -40°C to +85°C -40°C to +85°C -40°C to +85°C -40°C to +85°C
(-40°F to +185°F) (-40°F to +185°F) (-40°F to +185°F) (-40°F to +185°F) (-40°F to +185°F)
Humidity (operating and storage) 5% to 95% 5% to 95% 5% to 95% 5% to 95% 5% to 95%
MTBF* (hours) 508,942 430,389 529,644 488,705 373,980
Fanless design Yes Yes No No Yes ***
Acoustic (dB) at <50°C silent silent 33 33 silent
Acoustic (dB) – all fans on n/a n/a 57 52 n/a
Power consumption **** 25 W 30 W 46 W 49 W 51 W
Heat dissipation ** (BTU/hr) 85.3 102.4 157 167.2 174
* MTBF values calculated at 25°C (77°F) for the switch only
** Sufficient spacing required for airflow and heat dissipation
*** The OS6855-U24X chassis is fanless. The external AC or DC power supplies have fans.
**** Power consumption was measured from the AC input power using nominal input voltage of 120 V AC and running full traffic on all ports.
Gigabit fiber interfaces on the OmniSwitch 6855-U10 and OmniSwitch 6855-U24 models support Gigabit SFP or
100Base-X SFP optical transceivers. See the full list of supported transceivers at the end of the data sheet.
Power supplies
All OmniSwitch 6855 models support redundant, hot-swappable AC, DC or PoE power supplies. The primary and the backup
power supply units are external, allowing for easier maintenance and replacement.
There is no interruption of service when a new power supply is installed or an old one replaced.
OS6855-PSS PSU for OS6855-14 and OS6855-U10; 90 V to 240 V AC, 50 Hz to 60 Hz AC; 40 W, 12 V, AC-DC
OS6855-PSS-P PSU for PoE on OS6855-14; 66 W, 48 V PoE, AC-DC
OS6855-PSS-D PSU for 6855-14 and OS6855-U10; 40 W, -48 V and 24 V input to 12 V DC-DC
OS6855-PSS-P-D PSU for PoE on OS6855-14; 66 W, -48 V input DC-DC
OS6855-PSS 0.65 kg (1.3 lb) 14 cm (5.5 in) 8.1 cm (3.2 in) 4.1 cm (1.6 in)
OS6855-PSS-P
OS6855-PSS-D
OS6855-PSS-P-D 0.5 kg (1.1 lb) 16.6 cm (6.53 in) 8 cm (3.15 in) 4.4 cm (1.73 in)
Power brick tray 0.5 kg (1.35 lb) 19.1 cm (7.5 in) 21.6 cm (8.5 in) 4.4 cm (1.73 in)
The power supply shelf holds two power bricks and can be mounted either in a side-by-side configuration with the switch for
19-inch rack mounting or attached at the back of the switch for bulkhead mounting options.
Power supply (AC, DC or PoE) 1.00 kg (2.20 lb) 16.5 cm (6.5 in) 16 cm (6.3 in) 4.4 cm (1.73 in)
Power supply tray 0.60 kg (1.32 lb) 17.8 cm (7.0 in) 35.3 cm (13.88 in) 4.4 cm (1.73 in)
Any power supply can be remotely connected using a cable, which enables rack mounting using the mounting ears provided with
the unit. This feature allows for space-sensitive installations requiring reduced depth (for example, in a wall-mounted cabinet).
Indicators
• Per-port LEDs: link/activity/PoE
• System LEDs: OK (switch HW/SW status)
• PS1/PS2: primary and/or redundant power supply status
• 7-segment LED on OS6855-U24X indicating the operational mode and stack number
OS6855-14 Layer-3 fixed-configuration fanless switch in a 1U form factor. It has 12 RJ-45 connectors individually configurable to 10/100/1000Base-T,
OS6855-14D four of which are PoE–capable, and two SFP ports that support various distances. An OS6855-PSS or OS6855-PSS-D power supply respectively
is included inn the bundle.
OS6855-U10 Layer-3 fixed-configuration fanless switch in a 1U form factor. It has two RJ-45 connectors individually configurable to 10/100/1000Base-T,
OS6855-U10D and eight SFP ports that support various distances. An OS6855-PSS or OS6855-PSS-D power supply respectively is included in the bundle.
OS6855-24 Layer-3 fixed-configuration switch in a 1U form factor. It has 20 RJ-45 connectors individually configurable to 10/100/1000Base-T, four of
OS6855-24DL which provide PoE and four combo ports. On the combo ports, either copper or fiber can be used on a one-for-one basis. An OS6855-PSL-P,
OS6855-24D OS6855-PSL-D or OS6855-PSL-DL power supply respectively is included in the bundle.
OS6855-U24 Layer-3 fixed-configuration switch in a 1U form factor. It has 22 SFP ports that support various distances, and two combo ports. On the combo
OS6855-U24DL ports, either RJ-45 connectors individually configurable to 10/100/1000Base-T, or fiber SFP can be used on a one-for-one basis. An OS6855-PSL,
OS6855-U24D OS6855-PSL-DL or OS6855-PSL-D power supply respectively is included in the bundle.
OS6855-U24X Layer-3 fixed-configuration switch in a 1U form factor. It has two 10G SFP+ ports, 22 SFP ports that support various distances, and two combo
OS6855-U24XDL ports. On the combo ports, either RJ-45 connectors individually configurable to 10/100/1000Base-T, or fiber SFP can be used on a one-for-one
OS6855-U24XD basis. The 10G SFP+ ports can be used either as uplinks or as stacking ports. An OS6855-PSL, OS6855-PSL-DL or OS6855-PSL-D power supply
respectively is included in the bundle.
TRANSCEIVERS All optical transceivers qualified for the OmniSwitch 6855 operate at a wider operating temperature range than the corresponding commercial types.
iSFP-10G-LR 10G industrial optical transceiver (SFP+). Supports single-mode fiber over 1310 nm wavelength (nominal) with an LC connector. Typical reach of 10 km.
iSFP-GIG-LH70 1000Base-LH industrial transceiver. Supports single-mode fiber over 1550 nm wavelength (nominal) with an LC connector. Typical reach of 70 km.
iSFP-GIG-LH40 1000Base-LH industrial transceiver Supports single-mode fiber over 1310 nm wavelength (nominal) with an LC connector. Typical reach of 40 km.
iSFP-GIG-LX 1000Base-LX industrial transceiver Supports single-mode fiber over 1310 nm wavelength (nominal) with an LC connector. Typical reach of 10 km.
iSFP-GIG-SX 1000Base-SX industrial transceiver. Supports multimode fiber over 850 nm wavelength (nominal) with an LC connector. Typical reach of 300 m.
iSFP-GIG-T 1000Base-T Gigabit industrial Ethernet Transceiver (SFP MSA). Supports category 5, 5E, and 6 copper cabling up to 100 m. SFP supports
10/100/1000 Mb/s and full-duplex mode.
iSFP-GIG-BX-U 1000Base-BX SFP transceiver with an LC type interface. Supports single-mode fiber on a single strand link up to 10 km. Transmits 1310 nm and
receives 1490 nm optical signal.
iSFP-GIG-BX-D 1000Base-BX SFP transceiver with an LC type interface. Supports single-mode fiber on a single strand link up to 10 km. Transmits 1490 nm and
receives 1310 nm optical signal.
iSFP-100-MM 100Base-FX industrial transceiver with an LC type interface. This transceiver is designed for use over multimode fiber.
iSFP-100-SM15 100Base-FX industrial transceiver with an LC type interface. This transceiver is designed for use over single-mode fiber up to 15 km.
iSFP-100-SM40 100Base-FX industrial transceiver with an LC type interface. This transceiver is designed for use over single-mode fiber up to 40 km.
iSFP-100-BX-U 100Base-BX industrial transceiver with an SC type interface. This bidirectional transceiver is designed for use over single-mode fiber on a
single strand link up to 20 km point-to-point. This transceiver is normally used in the client (ONU) and transmits 1310 nm and receives 1550 nm
optical signal.
iSFP-100-BX-D 100Base-BX industrial SFP transceiver with an SC type interface. This bidirectional transceiver is designed for use over single mode fiber on
a single strand link up to 20 km point-to-point. This transceiver is normally used in the central office (OLT) and transmits 1550 nm and receives
1310 nm optical signal.
networks
user authentication, deep packet inspection (DPI), and fingerprinting for network analytics and up to 60 watts
At the aggregation layer
comprehensive security features to secure the network of Power over Ethernet (PoE) per port, making it ready
edge while accommodating user and device mobility to meet the evolving business needs of enterprise
In a small enterprise network core
with a high degree of integration between the wired networks.
and wireless LAN. In the data center for GigE server connectivity and SDN
These versatile LAN switches can be positioned:
applications
KEY BENEFITS • With the variety of interfaces and models, the deployments. It offers deployment flexibility, simplifing • OS6860E offers flexible deployment options and enables
OmniSwitch 6860 family meets any customer the wiring and reducing the time to deploy a variety of the network for BYOD deployments and zero-touch guest
• The OmniSwitch 6860 Virtual Chassis increases system network administrators with a comprehensive viewof the network services
redundancy, resiliency, and high availability while applications running in the network, enabling
simplifying deployment, operations and management of optimization and control of network performance
• Future proofs enterprise investment and enables
• With advanced PoE capabilities and high density of PoE outstanding performance when supporting real-time
ports, the OS6860 is ideal for converged campus voice, data, and video applications
KEY FEATURES VERSATILE FEATURES AND MODELS OFFERING HIGH DENSITY GIGABIT AND 10 GIGABIT INTERFACES
Up to 8 switches can be connected using Virtual Chassis
technology to create a single chassis-like entity with up
to 32 10Gigabit uplinks and 384 Gigabit ports
IEEE 802.3AF AND 802.3AT COMPLIANT POE OF 30 W PER PORT ON ALL PORTS
The enhanced models of OS6860 family support up to
60W of PoE per port on 4 ports
• Extensive security features for network access • Airgroup™ Network Services for Bonjour • Device posture/health check and fingerprinting
control (NAC), policy enforcement and attack speaking devices
containment • Application management
• Advanced guest management capabilities
TECHNICAL
INFORMATION
OmniSwitch 6860 family GigE RJ-45 ports GigE PoE+ ports GigE PoE++ ports 100/1000 SFP ports 1/10GigE SFP+ ports 20G VFL ports* PoE power budget Power supply AC/DC Optional backup PSU Height rack units
Standard models
OmniSwitch 6860-24 24 0 0 0 4 2 NA AC AC 1
OmniSwitch 6860-48 48 0 0 0 4 2 NA AC AC 1
OmniSwitch 6860-24D 24 0 0 0 4 2 NA DC DC 1
OmniSwitch 6860-48D 48 0 0 0 4 2 NA DC DC 1
Enhanced models
OmniSwitch 6860E-24 24 0 0 0 4 2 NA AC AC 1
OmniSwitch 6860E-48 48 0 0 0 4 2 NA AC AC 1
OmniSwitch 6860E-24D 24 0 0 0 4 2 NA DC DC 1
OmniSwitch 6860E-48D 48 0 0 0 4 2 NA DC DC 1
OmniSwitch 6860E-U28 0 0 0 28 4 2 NA AC AC 1
OmniSwitch 6860E-U28D 0 0 0 28 4 2 NA DC DC 1
1
ACCESS TO TECHNICAL SUPPORT
ENTERPRISE CUSTOMER CARE GUIDELINE – JANUARY 2016
Contents
1 Objective ....................................................................................... 2
2 Introduction .................................................................................... 2
3 Requirements for accessing technical support ............................................ 2
3.1. Accessing Technical support ......................................................................... 2
3.1.1. Service Contract Check .................................................................................... 2
3.1.2. Engineer Certification Check ............................................................................. 2
3.2. Opening Severity 1,2,3 and 4 severities ........................................................... 3
3.3. Basic Requirements for opening an eService Request ........................................... 3
3.4. Status of eService Request ........................................................................... 3
3.5. eService Request Escalation ......................................................................... 4
3.6. END CUSTOMER NAME ................................................................................. 4
4 Incident Severity .............................................................................. 4
4.1. Severity 1: Critical severity (Severity One) ...................................................... 4
4.2. Severity 2: High severity (Severity Two). .......................................................... 4
4.3. Severity 3: Medium severity (Severity Three) .................................................... 4
4.4. Severity 4: Low severity (Severity Four) ........................................................... 4
5 Tools available: ................................................................................ 5
5.1. Contact Checker ....................................................................................... 5
5.2. Alcatel-Lucent Enterprise Application Partner Program (AAPP) ............................... 5
5.3. Security Advisories ..................................................................................... 5
5.4. Technical communications ........................................................................... 5
5.5. The Knowledge Center ................................................................................ 6
5.6. Twitter and Facebook ................................................................................. 6
5.7. Contacts ................................................................................................. 6
Notes
This document is provided and supported by Alcatel Lucent Enterprise Customer Care
2
Enterprise Customer Care Guideline – January 2016
1 Objective
This document defines how a Business Partner expert can access technical support.
2 Introduction
End-Customers report their technical issues to our business partners who provide them support & services.
Certified Engineers of our business partners are entitled to open request to Alcatel Lucent Enterprise
Technical Support organization. The system for which the issue is reported must have a valid support contract
(SPS).
ACSR
Alcatel-Lucent Certified For sales representatives who sell
SALES
Sales Representative Alcatel-Lucent products and solutions
AQPS
Alcatel-Lucent For Presales engineers who design
Qualified Presales stand-alone projects
PRESALES
ACPS
Alcatel-Lucent For presales engineers who design
Certified Presales large/complex networking projects
4 Incident Severity
To ensure that all customer maintenance and support problems are reported and evaluated in a standard
format by the Partner and the customer, four (4) problem severity levels have been established. These
severity levels will assist the Partner and Alcatel in allocating the appropriate resources to resolve problems
and use a common classification system that facilitates all action plans and decisions. According to the
problem severity level, the Partner must contact Alcatel Technical Support via the Welcome Center to report
the problem and determine an action plan in order to resolve the issue with all the resources needed within a
specific period of time.
The order of priority levels begins from the most severe system breakdown (severity 1) to normal assistance
and routine support and information requests with no impact on the customer day to day operations (severity
4).
5 Tools available:
5.7. Contacts
Please contact one of the following persons should you have any additional questions regarding Customer
Care support access and procedures:
- Franck DUPUY: [email protected]
- Marc CHAUVIN: [email protected]
- Eric LECHELARD: [email protected]
End of document
Find a Course
Browse our catalog available on ALE Knowledge Hub (https://enterprise-education.csod.
com) to find your training path and course detail.
Feedback
In order to improve the quality of the documentation, please report any feedback to:
Address:
Alcatel-Lucent Enterprise
115-225 rue Antoine de Saint-Exupéry
ZAC Prat Pip – Guipavas
29806 BREST CEDEX 9 – France
FAX: (33) 2 98 28 50 03
Or Email: [email protected]