User manual EXTREME NETWORKS SUMMIT 200

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual EXTREME NETWORKS SUMMIT 200. We hope that this EXTREME NETWORKS SUMMIT 200 user guide will be useful to you.


EXTREME NETWORKS SUMMIT 200 : Download the complete user guide (3502 Ko)

Manual abstract: user guide EXTREME NETWORKS SUMMIT 200

Detailed instructions for use are in the User's Guide.

[. . . ] Summit 200 Series Switch Installation and User Guide Software Version 6. 2e. 2 Extreme Networks, Inc. 3585 Monroe Street Santa Clara, California 95051 (888) 257-3000 http://www. extremenetworks. com Published: June 2003 Part Number: 100149-00 Rev 01 ©2003 Extreme Networks, Inc. Extreme Networks and BlackDiamond are registered trademarks of Extreme Networks, Inc. ExtremeWare, ExtremeWare Vista, ExtremeWorks, ExtremeAssist, ExtremeAssist1, ExtremeAssist2, PartnerAssist, Extreme Standby Router Protocol, ESRP, SmartTraps, Alpine, Summit, Summit1, Summit4, Summit4/FX, Summit7i, Summit24, Summit48, Summit 200 Series, Summit 200-24, Summit 200-48, Summit Virtual Chassis, SummitLink, SummitGbX, SummitRPS and the Extreme Networks logo are trademarks of Extreme Networks, Inc. , which may be registered or pending registration in certain jurisdictions. [. . . ] Any VLAN that warrants fault protection is configured on all ring ports in the ring, and is then assigned to an EAPS domain. On that ring domain, one switch, or node, is designated the master node (see Figure 25), while all other nodes are designated as transit nodes. One port of the master node is designated the master node's primary port (P) to the ring; another port is designated as the master node's secondary port (S) to the ring. In normal operation, the master node blocks the secondary port for all non-control traffic belonging to this EAPS domain, thereby avoiding a loop in the ring, like STP. Layer 2 switching and learning mechanisms operate per existing standards on this ring. NOTE Like the master node, each transit node is also configured with a primary port and a secondary port on the ring, but the primary/secondary port distinction is ignored as long as the node is configured as a transit node. Figure 25: EAPS operation S4 S3 S5 S2 P S1 Direction of health-check message S6 S Secondary port is logically blocked Master node EW_071 If the ring is complete, the master node logically blocks all data traffic in the transmit and receive directions on the secondary port to prevent a loop. If the master node detects a break in the ring, it unblocks its secondary port and allows data traffic to be transmitted and received through it. 130 Summit 200 Series Switch Installation and User Guide Overview of the EAPS Protocol Fault Detection and Recovery EAPS fault detection on a ring is based on a single control VLAN per EAPS domain. This EAPS domain provides protection to one or more data-carrying VLANs called protected VLANs. The control VLAN is used only to send and receive EAPS messages; the protected VLANs carry the actual data traffic. As long as the ring is complete, the EAPS master node blocks the protected VLANs from accessing its secondary port. NOTE The control VLAN is not blocked. Messages sent on the control VLAN must be allowed into the switch for the master node to determine whether the ring is complete. Figure 26: EAPS fault detection and protection switching Break in ring S4 S4 sends "link down" message to master node S3 S3 sends "link down" message to master node S5 S2 P S1 S S6 Master node opens secondary port to allow traffic to pass Master node EW_072 A master node detects a ring fault in either of two ways: · Polling response · Trap message sent by a transit node Polling The master node transmits a health-check packet on the control VLAN at a user-configurable interval (see Figure 25). If the ring is complete, the master node will receive the health-check packet on its secondary port (the control VLAN is not blocked on the secondary port). When the master node receives the health-check packet, it resets its fail-period timer and continues normal operation. If the master node does not receive the health-check packet before the fail-period timer expires, it declares a "failed" state and opens its logically blocked secondary port on all the protected VLANs. The master node also flushes its forwarding Summit 200 Series Switch Installation and User Guide 131 Ethernet Automatic Protection Switching database (FDB) and sends a message on the control VLAN to all of its associated transit nodes to flush their forwarding databases as well, so that all of the switches can learn the new paths to Layer 2 end stations on the reconfigured ring topology. Trap Message Sent by a Transit Node When any transit node detects a loss of link connectivity on any of its ring ports, it immediately sends a "link down" message on the control VLAN using its good link to the master node. When the master node receives the "link down" message (see Figure 26), it immediately declares a "failed" state and performs the same steps described above; it unblocks its secondary port for access by the protected VLANs, flushes its FDB, and sends a "flush FDB" message to its associated transit nodes. Restoration Operations The master node continues sending health-check packets out its primary port even when the master node is operating in the failed state. As long as there is a break in the ring, the fail-period timer of the master node will continue to expire and the master node will remain in the failed state. When the broken link is restored, the master will receive its health-check packet back on its secondary port, and will once again declare the ring to be complete. It will logically block the protected VLANs on its secondary port, flush its FDB, and send a "flush FDB" message to its associated transit nodes. During the time between when the transit node detects that the link is operable again and when the master node detects that the ring is complete, the secondary port on the master node is still open and data could start traversing the transit node port that just came up. To prevent the possibility of a such a temporary loop, when the transit node detects that its failed link is up again, it will perform these steps: 1 For the port that just came up, put all the protected VLANs traversing that port into a temporary blocked state. [. . . ] Specify that the endstation entries are static or permanent. Debug Tracing ExtremeWare includes a debug-tracing facility for the switch. The show debug-tracing command can be applied to one or all VLANs, as follows: show debug-tracing {vlan <name>} The debug commands should only be used under the guidance of Extreme Networks technical personnel. TOP Command The top command is a utility that indicates CPU utilization by process. Contacting Extreme Technical Support If you have a network issue that you are unable to resolve, contact Extreme Networks technical support. Extreme Networks maintains several Technical Assistance Centers (TACs) around the world to answer networking questions and resolve network problems. You can contact technical support by phone at: · (800) 998-2408 · (408) 579-2826 or by email at: · support@extremenetworks. com You can also visit the support website at: · http://www. extremenetworks. com/extreme/support/techsupport. asp to download software updates (requires a service contract) and documentation. Summit 200 Series Switch Installation and User Guide 237 Troubleshooting 238 Summit 200 Series Switch Installation and User Guide Index Numerics 802. 1p configuration commands (table) 149 autonegotiation autopolarity detection feature, Ethernet ports 77 78 A access control lists adding configuration commands (table) deleting description examples ICMP filter example permit-established example permit-established keyword verifying settings access levels access masks adding deleting access policies, description access profiles, reverse mask accounts creating deleting viewing adding access lists access masks rate limits Address Resolution Protocol. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE EXTREME NETWORKS SUMMIT 200




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual EXTREME NETWORKS SUMMIT 200 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.