User guide
Protection Switching-EPSR Configuration Guidelines
AlliedView NMS Administration Guide (Configuring Network Services)
6-144
Finally, the user selects Configure Protection Scheme. The Task List window appears as the data ring attributes are applied to
the devices. The data ring is now included in the protection domain of the associated control ring.
Table 6-27 lists the fields of the Configure EPS Data Ring panel.
• For option 2, an existing Data Networked VLAN is selected to become a Protected Data Network VLAN. The Network
VLAN Manager shows the map for the VLAN Interface. The user then selects Create/Protect EPS Data Ring, and the
Protection Data Ring Configuration Panel appears with the same options as shown in Figure 6-122. Once
Configure Protec-
tion Scheme is selected, the application will complete the data protection ring (and create any additional VLAN Interfaces)
as well.
• Option 3 is similar to Option 2, but since the network data VLAN has already been configured as a ring, completion of the
data network VLAN to form a ring by the application is not needed.
6.13.3.2 Unprotect Data Protection Ring
To unprotect an EPS data ring, the user selects the newly created data protection ring and right-clicks View EPS Data Protec-
tion...This bring up the Configure EPS Data Ring Panel with all of its attributes. The data ring can now be unprotected, using
the following strategies:
• The user can choose a port so that it will be deleted from the VLAN interface so that it will not form a loop after it becomes
unprotected.
• If the user chooses no ports, this will delete all the VLAN interfaces on all the devices.
6.13.4 Configuration Guidelines
The creation of an EPSR configuration should be planned and engineered carefully to ensure that the resulting topology has the
desired results. The following notes and warnings that must be taken into account when the EPSR is introduced.
Note: One of the advantages of using the AlliedView NMS GUI (Network VLAN Manager application) is that many
of these rules are automatically enforced or allow configuration errors to be easily seen and corrected.
Before configuring an EPSR topology, the following rules must be considered, since they will affect how the EPSR topology
will fit into the network and how the network will be affected during the configuration steps:
• The ports used for EPSR are gigabit ethernet ports only.
TABLE 6-27 Fields for the Configure EPS Data Ring Panel
Option Purpose
Configure Protection
Scheme
Applies (CREATE operation) the EPS data ring attributes (control ring domain, VID, etc.)
to the devices listed.
New VLAN Protec-
tion Domains... panel
Lists the relevant information for the created data protection ring (No fields are editable)
Device: The name that has been given to the device
Domain: The domain of the associated EPS control ring
Data VID: The VID that will be used to define the VLAN interfaces for the devices
Interface #1/Pri: The ports that make up the primary interface
Interface #2/Sec: The ports that make up the secondary interface
Operation: The next logical operation that can be performed.
Device Operations Options to perform on the protected data VLAN
Protect - Will create the protection ring over the domain of the control ring.
Unprotect - Activated only when the EPS Data Ring has already been created, allows the
user to delete the protection domain for the network VLAN. Note that the network VLAN
itself is not deleted. Refer to 6.13.3.2.