Part No. 060306-10, Rev. C May 2012 OmniSwitch 6250/6450 Switch Management Guide www.alcatel-lucent.com This user guide documents release 6.6.3 of the OmniSwitch 6250, 6450. The functionality described in this guide is subject to change without notice. Copyright © 2012 by Alcatel-Lucent. All rights reserved. This document may not be reproduced in whole or in part without the express written permission of Alcatel-Lucent. Alcatel-Lucent® and the Alcatel-Lucent logo are registered trademarks of Alcatel-Lucent. Xylan®, OmniSwitch®, OmniStack®, and Alcatel-Lucent OmniVista® are registered trademarks of Alcatel-Lucent. OmniAccess™, Omni Switch/Router™, PolicyView™, RouterView™, SwitchManager™, VoiceView™, WebView™, X-Cell™, X-Vision™, and the Xylan logo are trademarks of Alcatel-Lucent. This OmniSwitch product contains components which may be covered by one or more of the following U.S. Patents: •U.S. Patent No. 6,339,830 •U.S. Patent No. 6,070,243 •U.S. Patent No. 6,061,368 •U.S. Patent No. 5,394,402 •U.S. Patent No. 6,047,024 •U.S. Patent No. 6,314,106 •U.S. Patent No. 6,542,507 •U.S. Patent No. 6,874,090 26801 West Agoura Road Calabasas, CA 91301 (818) 880-3500 FAX (818) 880-3505 [email protected] US Customer Support—(800) 995-2696 International Customer Support—(818) 878-4507 Internet—eservice.ind.alcatel.com ii OmniSwitch 6250/6450 Switch Management Guide May 2012 Contents About This Guide ..........................................................................................................xi Supported Platforms ..........................................................................................................xi Who Should Read this Manual? .......................................................................................xii When Should I Read this Manual? ...................................................................................xii What is in this Manual? ....................................................................................................xii What is Not in this Manual? ............................................................................................xiii How is the Information Organized? ................................................................................xiii Documentation Roadmap ................................................................................................xiv Related Documentation ...................................................................................................xvi User Manual CD ...........................................................................................................xviii Technical Support .........................................................................................................xviii Chapter 1 Managing System Files .............................................................................................1-1 In This Chapter ................................................................................................................1-1 File Management Specifications .....................................................................................1-2 Switch Administration Overview ....................................................................................1-3 File Transfer .............................................................................................................1-3 Switch Directories ....................................................................................................1-4 File and Directory Management ......................................................................................1-5 Using Wildcards .......................................................................................................1-7 Multiple Characters ...........................................................................................1-7 Single Characters ...............................................................................................1-7 Directory Commands ...............................................................................................1-8 Determining Your Location in the File Structure ..............................................1-8 Changing Directories .........................................................................................1-9 Displaying Directory Contents ........................................................................1-10 Making a New Directory .................................................................................1-11 Displaying Directory Contents Including Subdirectories ................................1-12 Copying an Existing Directory ........................................................................1-12 Removing a Directory and its Contents ...........................................................1-13 File Commands ......................................................................................................1-14 Creating or Modifying Files ............................................................................1-14 Copy an Existing File ......................................................................................1-14 Secure Copy an Existing File .................................................................................1-15 Move an Existing File or Directory .................................................................1-15 Change File Attribute and Permissions ...........................................................1-16 Delete an Existing File ....................................................................................1-16 Managing Files on Switches ............................................................................1-17 OmniSwitch 6250/6450 Switch Management Guide May 2012 iii Contents Utility Commands ..................................................................................................1-18 Displaying Free Memory Space ......................................................................1-18 Performing a File System Check .....................................................................1-18 Deleting the Entire File System .......................................................................1-19 Loading Software onto the Switch ................................................................................1-20 Using the Switch as an FTP Server ........................................................................1-20 Using the Switch as an FTP Client .........................................................................1-21 Using Secure Shell FTP .........................................................................................1-23 Closing a Secure Shell FTP Session ......................................................................1-24 Using TFTP to Transfer Files .................................................................................1-25 Using Zmodem .......................................................................................................1-25 Registering Software Image Files .................................................................................1-27 Directories on the Switch .......................................................................................1-27 Available Image Files .............................................................................................1-28 Application Examples for File Management ................................................................1-29 Transferring a File to the Switch Using FTP .........................................................1-29 Creating a File Directory on the Switch .................................................................1-30 FTP Client Application Example ....................................................................1-31 Creating a File Directory Using Secure Shell FTP ................................................1-33 Transfer a File Using Secure Shell FTP .................................................................1-34 Closing a Secure Shell FTP Session ......................................................................1-34 Verifying Directory Contents ........................................................................................1-35 Installing Software Licenses .........................................................................................1-36 Licensed Features ...................................................................................................1-37 Setting the System Clock ..............................................................................................1-39 Setting Date and Time ............................................................................................1-39 Date ..................................................................................................................1-39 Time Zone .......................................................................................................1-39 Time .................................................................................................................1-40 Daylight Savings Time Configuration ...................................................................1-41 Enabling DST ..................................................................................................1-42 Chapter 2 Logging Into the Switch ............................................................................................2-1 In This Chapter ................................................................................................................2-1 Login Specifications ........................................................................................................2-3 Login Defaults .................................................................................................................2-3 Quick Steps for Logging Into the Switch ........................................................................2-5 Overview of Switch Login Components .........................................................................2-6 Management Interfaces ............................................................................................2-6 Logging Into the CLI .........................................................................................2-6 Using the WebView Management Tool ............................................................2-7 Using SNMP to Manage the Switch ..................................................................2-7 User Accounts ..........................................................................................................2-7 Using Telnet ....................................................................................................................2-8 Logging Into the Switch Through Telnet .................................................................2-8 Starting a Telnet Session from the Switch ...............................................................2-8 iv OmniSwitch 6250/6450 Switch Management Guide May 2012 Contents Using FTP .....................................................................................................................2-10 Using FTP to Log Into the Switch .........................................................................2-10 Using Secure Shell ........................................................................................................2-12 Secure Shell Components .......................................................................................2-12 Secure Shell Interface ......................................................................................2-13 Secure Shell File Transfer Protocol .................................................................2-13 Secure Shell Application Overview .......................................................................2-14 Secure Shell Authentication ...................................................................................2-15 Protocol Identification .....................................................................................2-15 Algorithm and Key Exchange .........................................................................2-15 Authentication Phase .......................................................................................2-15 Connection Phase ............................................................................................2-16 Using Secure Shell DSA Public Key Authentication .............................................2-16 Starting a Secure Shell Session ..............................................................................2-17 Closing a Secure Shell Session ..............................................................................2-19 Log Into the Switch with Secure Shell FTP ...........................................................2-19 Closing a Secure Shell FTP Session ......................................................................2-20 Modifying the Login Banner .........................................................................................2-21 Modifying the Text Display Before Login .............................................................2-22 Configuring Login Parameters ......................................................................................2-23 Configuring the Inactivity Timer ..................................................................................2-23 Enabling the DNS Resolver ..........................................................................................2-24 Verifying Login Settings ...............................................................................................2-25 Chapter 3 Using SNMP .................................................................................................................3-1 In This Chapter ................................................................................................................3-1 SNMP Specifications ......................................................................................................3-2 SNMP Defaults ...............................................................................................................3-2 Quick Steps for Setting Up An SNMP Management Station .........................................3-4 Quick Steps for Setting Up Trap Filters ..........................................................................3-5 Filtering by Trap Families ........................................................................................3-5 Filtering by Individual Traps ....................................................................................3-6 SNMP Overview .............................................................................................................3-7 SNMP Operations ....................................................................................................3-7 Using SNMP for Switch Management .....................................................................3-8 Setting Up an SNMP Management Station .......................................................3-8 SNMP Versions ........................................................................................................3-8 SNMPv1 ............................................................................................................3-8 SNMPv2 ............................................................................................................3-9 SNMPv3 ............................................................................................................3-9 Using SNMP For Switch Security ................................................................................3-10 Community Strings (SNMPv1 and SNMPv2) .......................................................3-10 Configuring Community Strings .....................................................................3-10 Encryption and Authentication (SNMPv3) ............................................................3-11 Configuring Encryption and Authentication ...................................................3-11 OmniSwitch 6250/6450 Switch Management Guide May 2012 v Contents Setting SNMP Security ...................................................................................3-12 Working with SNMP Traps ..........................................................................................3-13 Trap Filtering ..........................................................................................................3-13 Filtering by Trap Families ...............................................................................3-13 Filtering By Individual Trap ............................................................................3-13 Authentication Trap ................................................................................................3-14 Trap Management ..................................................................................................3-14 Replaying Traps ...............................................................................................3-14 Absorbing Traps ..............................................................................................3-14 Sending Traps to WebView .............................................................................3-14 SNMP MIB Information ...............................................................................................3-15 MIB Tables .............................................................................................................3-15 MIB Table Description ....................................................................................3-15 Industry Standard MIBs .........................................................................................3-16 Enterprise (Proprietary) MIBs ................................................................................3-20 Verifying the SNMP Configuration ..............................................................................3-24 Chapter 4 Configuring Network Time Protocol (NTP) ..........................................................4-1 In This Chapter ................................................................................................................4-1 NTP Specifications ..........................................................................................................4-2 NTP Defaults Table .........................................................................................................4-2 NTP Quick Steps .............................................................................................................4-3 NTP Overview ................................................................................................................4-5 Stratum .....................................................................................................................4-6 Using NTP in a Network ..........................................................................................4-6 Authentication ..........................................................................................................4-8 Configuring NTP .............................................................................................................4-9 Configuring the OmniSwitch as a Client .................................................................4-9 NTP Servers ...........................................................................................................4-10 Using Authentication ..............................................................................................4-12 Verifying NTP Configuration .......................................................................................4-13 Chapter 5 Managing CMM Directory Content ........................................................................5-1 In This Chapter ................................................................................................................5-1 CMM Specifications .......................................................................................................5-2 USB Flash Drive Specifications ......................................................................................5-2 CMM Files ......................................................................................................................5-3 CMM Software Directory Structure .........................................................................5-3 Where is the Switch Running From? .................................................................5-4 Software Rollback Feature .......................................................................................5-4 Software Rollback Configuration Scenarios for a Single Switch .....................5-5 Redundancy ..............................................................................................................5-9 Redundancy Scenarios .......................................................................................5-9 vi OmniSwitch 6250/6450 Switch Management Guide May 2012 Contents Managing the Directory Structure (Non-Redundant) ...................................................5-13 Rebooting the Switch .............................................................................................5-13 Copying the Running Configuration to the Working Directory ............................5-16 Rebooting from the Working Directory .................................................................5-18 Copying the Working Directory to the Certified Directory ...................................5-21 Copying the Certified Directory to the Working Directory ...................................5-22 Show Currently Used Configuration ......................................................................5-23 Show Switch Files ..................................................................................................5-24 Managing Redundancy in a Stack and CMM ...............................................................5-25 Rebooting the Switch .............................................................................................5-25 Copying the Working Directory to the Certified Directory ...................................5-26 Synchronizing the Primary and Secondary CMMs ................................................5-27 Swapping the Primary CMM for the Secondary CMM .........................................5-29 Show Currently Used Configuration ......................................................................5-30 NI Module Behavior During Takeover ...........................................................5-31 Using the USB Flash Drive ...........................................................................................5-32 Transferring Files Using USB .........................................................................5-32 Automatically Upgrading Code Using USB ...................................................5-32 Disaster Recovery Using USB ........................................................................5-33 Emergency Restore of the boot.cfg File ........................................................................5-34 Can I Restore the boot.file While Running from Certified? ..................................5-34 Displaying CMM Conditions ........................................................................................5-35 Chapter 6 Using the CLI ...............................................................................................................6-1 CLI Specifications ...........................................................................................................6-2 CLI Overview ..................................................................................................................6-3 Online Configuration ................................................................................................6-3 Offline Configuration Using Configuration Files ....................................................6-3 Command Entry Rules and Syntax .................................................................................6-4 Text Conventions .....................................................................................................6-4 Using “Show” Commands .......................................................................................6-5 Using the “No” Form ...............................................................................................6-5 Using “Alias” Commands ........................................................................................6-5 Partial Keyword Completion ....................................................................................6-6 Command Help ...............................................................................................................6-7 Tutorial for Building a Command Using Help .........................................................6-9 CLI Services ..................................................................................................................6-11 Command Line Editing ..........................................................................................6-11 Deleting Characters .........................................................................................6-11 Recalling the Previous Command Line ...........................................................6-12 Inserting Characters .........................................................................................6-12 Syntax Checking ....................................................................................................6-13 Prefix Recognition ..................................................................................................6-13 Example for Using Prefix Recognition ...........................................................6-14 Prefix Prompt ...................................................................................................6-15 Command History ..................................................................................................6-15 Logging CLI Commands and Entry Results .................................................................6-17 OmniSwitch 6250/6450 Switch Management Guide May 2012 vii Contents Enabling Command Logging ..........................................................................6-17 Disabling Command Logging .........................................................................6-17 Viewing the Current Command Logging Status .............................................6-18 Viewing Logged CLI Commands and Command Entry Results ....................6-18 Customizing the Screen Display ...................................................................................6-19 Changing the Screen Size .......................................................................................6-19 Changing the CLI Prompt ......................................................................................6-19 Setting Session Prompt as System Name ........................................................6-20 Displaying Table Information ................................................................................6-20 Filtering Table Information ....................................................................................6-21 Multiple User Sessions ..................................................................................................6-22 Listing Other User Sessions ...................................................................................6-22 Listing Your Current Login Session ......................................................................6-23 Terminating Another Session .................................................................................6-24 Application Example .....................................................................................................6-25 Using a Wildcard to Filter Table Information ........................................................6-25 Verifying CLI Usage .....................................................................................................6-27 Chapter 7 Working With Configuration Files .........................................................................7-1 In This Chapter ................................................................................................................7-1 Configuration File Specifications ...................................................................................7-2 Tutorial for Creating a Configuration File ......................................................................7-2 Quick Steps for Applying Configuration Files ...............................................................7-4 Setting a File for Immediate Application .................................................................7-4 Setting an Application Session for a Date and Time ...............................................7-4 Setting an Application Session for a Specified Time Period ...................................7-5 Configuration Files Overview .........................................................................................7-6 Applying Configuration Files to the Switch ............................................................7-6 Verifying a Timed Session ................................................................................7-6 Cancelling a Timed Session ..............................................................................7-7 Configuration File Error Reporting ...................................................................7-7 Setting the Error File Limit ...............................................................................7-8 Syntax Checking ................................................................................................7-8 Displaying a Text File ..............................................................................................7-9 Text Editing on the Switch .......................................................................................7-9 Invoke the “Vi” Editor .......................................................................................7-9 Creating Snapshot Configuration Files .........................................................................7-10 Snapshot Feature List .............................................................................................7-10 User-Defined Naming Options ........................................................................7-11 Editing Snapshot Files .....................................................................................7-11 Verifying File Configuration .........................................................................................7-14 Chapter 8 Managing Automatic Remote Configuration Download .................................8-1 In This Chapter ................................................................................................................8-1 Automatic Remote Configuration Specifications ...........................................................8-2 viii OmniSwitch 6250/6450 Switch Management Guide May 2012 Contents Automatic Remote Configuration Defaults ...................................................................8-3 Quick Steps for Automatic Remote Configuration .........................................................8-4 Overview .........................................................................................................................8-5 Basic Operation ........................................................................................................8-5 Network Components ........................................................................................8-6 Information Provided by DHCP Server ............................................................8-6 Information Provided by Instruction File ..........................................................8-6 File Servers and Download Process ..................................................................8-7 LED Status .........................................................................................................8-7 Interaction With Other Features ......................................................................................8-8 UDP/DHCP Relay .............................................................................................8-8 QoS ....................................................................................................................8-8 802.1Q ...............................................................................................................8-8 LLDP ........................................................................................................................8-8 Dynamic Link Aggregation (LACP) .................................................................8-8 Automatic Remote Configuration Download Process ....................................................8-9 Process Illustration .................................................................................................8-10 Additional Process Notes .......................................................................................8-11 Download Component Files ..........................................................................................8-12 Instruction File .......................................................................................................8-12 Instruction File Syntax ....................................................................................8-13 Instruction File Usage Guidelines ...................................................................8-14 Firmware Upgrade Files .........................................................................................8-14 Bootup Configuration File .....................................................................................8-14 Debug Configuration File .......................................................................................8-15 Script File ...............................................................................................................8-15 Script File Usage Guidelines ...........................................................................8-15 LACP Auto Detection and Automatic Link Aggregate Association ............................8-16 DHCP Client Auto-Configuration Process ...................................................................8-17 Nearest-Edge Mode Operation ......................................................................................8-20 Zero Touch License Upgrade ........................................................................................8-22 Troubleshooting ............................................................................................................8-23 Error Resolution ..............................................................................................8-23 Server Connection Failure and File Download Errors ...........................................8-23 Error Description Table ...................................................................................8-24 Script File Errors ....................................................................................................8-24 Error Description Table ...................................................................................8-25 Chapter 9 Managing Switch User Accounts ............................................................................9-1 In This Chapter ................................................................................................................9-1 User Database Specifications ..........................................................................................9-2 User Account Defaults ....................................................................................................9-2 Overview of User Accounts ............................................................................................9-4 Startup Defaults ........................................................................................................9-6 Quick Steps for Network Administrator User Accounts ..........................................9-7 OmniSwitch 6250/6450 Switch Management Guide May 2012 ix Contents Quick Steps for Creating Customer Login User Accounts ......................................9-8 Default User Settings ...............................................................................................9-9 Account and Password Policy Settings ..................................................................9-10 How User Settings Are Saved ................................................................................9-11 Creating a User ..............................................................................................................9-12 Removing a User ....................................................................................................9-13 User-Configured Password ....................................................................................9-14 Configuring Password Policy Settings ..........................................................................9-16 Setting a Minimum Password Size .........................................................................9-17 Configuring the Username Password Exception ....................................................9-18 Configuring Password Character Requirements ....................................................9-19 Configuring Password Expiration ..........................................................................9-20 Default Password Expiration ...........................................................................9-20 Specific User Password Expiration .................................................................9-20 Configuring the Password History .........................................................................9-21 Configuring the Minimum Age for a Password .....................................................9-22 Configuring Global User Lockout Settings ...................................................................9-22 Configuring the User Lockout Window .................................................................9-23 Configuring the User Lockout Threshold Number ................................................9-24 Configuring the User Lockout Duration Time .......................................................9-25 Manually Locking and Unlocking User Accounts .................................................9-26 Configuring Privileges for a User .................................................................................9-27 Setting Up SNMP Access for a User Account ..............................................................9-28 SNMP Access Without Authentication/Encryption ...............................................9-29 SNMP Access With Authentication/Encryption ....................................................9-30 Removing SNMP Access From a User ..................................................................9-31 Setting Up End-User Profiles ........................................................................................9-32 Creating End-User Profiles ....................................................................................9-33 Setting Up Port Ranges in a Profile .......................................................................9-34 Setting Up VLAN Ranges in a Profile ...................................................................9-35 Associating a Profile With a User ..........................................................................9-36 Removing a Profile From the Configuration ..........................................................9-37 Verifying the User Configuration .................................................................................9-38 Chapter 10 Managing Switch Security ......................................................................................10-1 In This Chapter ..............................................................................................................10-1 Switch Security Specifications ......................................................................................10-2 Switch Security Defaults ...............................................................................................10-2 Switch Security Overview .............................................................................................10-3 Authenticated Switch Access ........................................................................................10-4 AAA Servers—RADIUS or LDAP ........................................................................10-4 Authentication-only—ACE/Server ........................................................................10-4 Interaction With the User Database .......................................................................10-5 ASA and Authenticated VLANs ............................................................................10-5 Configuring Authenticated Switch Access ...................................................................10-6 x OmniSwitch 6250/6450 Switch Management Guide May 2012
Description: