User guide
September 2009
Page 50 of 79 OmniSwitch 6400/6850/6855/9000/9000E—Release 6.4.2.R01
in the Flash File System. Other output devices can be configured via Command Line Interface. All log
records generated are copied to all configured output devices.
Command Line Interface can be used to display and configure Switch Logging information. Log
information can be helpful in resolving configuration or authentication issues, as well as general errors.
Text File Configuration
The text file configuration feature allows you to configure the switch using an ASCII-based text file.
You may type CLI commands directly into a text document to create a configuration file. This file
resides in the switch’s file system. You can create configuration files in the following ways.
• You may create, edit and view a file using a standard text editor (such as Microsoft NotePad)
on a workstation. The resulting configuration file is then uploaded to the switch.
• You can invoke the switch’s CLI snapshot command to capture the switch’s current
configuration into a text file.
• You can use the switch’s text editor to create or make changes to a configuration file.
TFTP Client for IPv4
Trivial File Transfer Protocol (TFTP), a client-server protocol, can be used to transfer files between the
TFTP server and client. TFTP client functionality on the OmniSwitch is used to download files from or
upload files to the TFTP server within a LAN.
Traffic Anomaly Detection (TAD)
The Traffic Anomaly Detection (TAD) feature, also referred to as Network Security, is used to detect
anomalies through statistical analysis of network traffic. It can be used to detect network attacks by
observing the patterns of a port through ingress and egress packets. Anomalies occur in network traffic
when the traffic patterns in a network do not meet the expectations. Such anomalies are detected in real
time network traffic and can be logged, generate SNMP traps, or result in disabling the anomalous port
automatically.
Network Security provides the following capabilities:
• Real time network traffic monitoring.
• Dynamic anomaly detection.
• Dynamic anomalous port quarantining.
UDLD - Fiber and Copper
The unidirectional link detection protocol is a protocol that can be used to detect and disable
malfunctioning unidirectional Ethernet fiber or copper links. Errors due to improper installation of
fiber strands, interface malfunctions, media converter faults, etc can be detected and the link can be
disabled. It operates at Layer 2 in conjunction with IEEE 802.3's existing Layer 1 fault detection
mechanisms.
User Definable Loopback Interface
Loopback0 is the name assigned to an IP interface to identify a consistent address for network manage-
ment purposes. The Loopback0 interface is not bound to any VLAN, therefore it always remains opera-
tionally active. This differs from other IP interfaces, such that if there are no active ports in the VLAN,
all IP interfaces associated with that VLAN are not active. In addition, the Loopback0 interface
provides a unique IP address for the switch that is easily identifiable to network management
applications.