User guide

Configuring Network Services Protection Switching-EPSR
528
AlliedView NMS Administration Guide
Finally, the user selects Configure Protection Scheme. The Task List window appears as the data ring attributes are applied
to the devices. The data ring is now included in the protection domain of the associated control ring.
Table 6-27 lists the fields of the Configure EPS Data Ring panel.
For option 2, an existing Data Networked VLAN is selected to become a Protected Data Network VLAN. The Network
VLAN Manager shows the map for the VLAN Interface. The user then selects Create/Protect EPS Data Ring, and the
Protection Data Ring Configuration Panel appears with the same options as shown in Figure 6-116. Once
Configure
Protection Scheme
is selected, the application will complete the data protection ring (and create any additional VLAN
Interfaces) as well.
Option 3 is similar to Option 2, but since the network data VLAN has already been configured as a ring, completion of
the data network VLAN to form a ring by the application is not needed.
6.13.3.2 Unprotect Data Protection Ring
To unprotect an EPS data ring, the user selects the newly created data protection ring and right-clicks View EPS Data
Protection...This bring up the Configure EPS Data Ring Panel with all of its attributes. The data ring can now be unprotected,
using the following strategies:
The user can choose a port to be deleted from the VLAN interface so that it will not form a loop after it becomes
unprotected. Note that the unselected ports are the ones which will be unprotected.
If the user chooses no ports, this will delete all the VLAN interfaces on all the devices.
6.13.4 Configuration Guidelines
The creation of an EPSR configuration should be planned and engineered carefully to ensure that the resulting topology has
the desired results. The following notes and warnings that must be taken into account when the EPSR is introduced.
Note: One of the advantages of using the AlliedView NMS GUI (Network VLAN Manager application) is that many of these rules
are automatically enforced or allow configuration errors to be easily seen and corrected.
Before configuring an EPSR topology, the following rules must be considered, since they will affect how the EPSR topology
will fit into the network and how the network will be affected during the configuration steps:
The ports used for EPSR are gigabit ethernet ports only.
TABLE 6-27 Fields for the Configure EPS Data Ring Panel
Option Purpose
Configure Protection
Scheme
Applies (CREATE operation) the EPS data ring attributes (control ring domain, VID, etc.)
to the devices listed.
New VLAN Protection
Domains... panel
Lists the relevant information for the created data protection ring (No fields are editable)
Device: The name that has been given to the device
Domain: The domain of the associated EPS control ring
Data VID: The VID that will be used to define the VLAN interfaces for the devices
Interface #1/Pri: The ports that make up the primary interface
Interface #2/Sec: The ports that make up the secondary interface
Operation: The next logical operation that can be performed.
Device Operations Options to perform on the protected data VLAN
Protect - Will create the protection ring over the domain of the control ring.
Unprotect - Activated only when the EPS Data Ring has already been created, allows the
user to delete the protection domain for the network VLAN. Note that the network
VLAN itself is not deleted. Refer to 6.13.3.2.