ECS4100 Series Web Management Guide-R07
Table Of Contents
- How to Use This Guide
- Contents
- Figures
- Tables
- Getting Started
- Web Configuration
- Using the Web Interface
- Basic Management Tasks
- Displaying System Information
- Displaying Hardware/Software Versions
- Configuring Support for Jumbo Frames
- Displaying Bridge Extension Capabilities
- Managing System Files
- Setting the System Clock
- Configuring the Console Port
- Configuring Telnet Settings
- Displaying CPU Utilization
- Configuring CPU Guard
- Displaying Memory Utilization
- Resetting the System
- Using Cloud Management
- Interface Configuration
- VLAN Configuration
- Address Table Settings
- Spanning Tree Algorithm
- Congestion Control
- Class of Service
- Quality of Service
- VoIP Traffic Configuration
- Security Measures
- AAA (Authentication, Authorization and Accounting)
- Configuring User Accounts
- Web Authentication
- Network Access (MAC Address Authentication)
- Configuring HTTPS
- Configuring the Secure Shell
- Access Control Lists
- Filtering IP Addresses for Management Access
- Configuring Port Security
- Configuring 802.1X Port Authentication
- DoS Protection
- DHCP Snooping
- DHCPv6 Snooping
- IPv4 Source Guard
- IPv6 Source Guard
- ARP Inspection
- Application Filter
- Basic Administration Protocols
- Configuring Event Logging
- Link Layer Discovery Protocol
- Power over Ethernet
- Simple Network Management Protocol
- Configuring Global Settings for SNMP
- Setting Community Access Strings
- Setting the Local Engine ID
- Specifying a Remote Engine ID
- Setting SNMPv3 Views
- Configuring SNMPv3 Groups
- Configuring Local SNMPv3 Users
- Configuring Remote SNMPv3 Users
- Specifying Trap Managers
- Creating SNMP Notification Logs
- Showing SNMP Statistics
- Remote Monitoring
- Switch Clustering
- Setting a Time Range
- Ethernet Ring Protection Switching
- Connectivity Fault Management
- Configuring Global Settings for CFM
- Configuring Interfaces for CFM
- Configuring CFM Maintenance Domains
- Configuring CFM Maintenance Associations
- Configuring Maintenance End Points
- Configuring Remote Maintenance End Points
- Transmitting Link Trace Messages
- Transmitting Loop Back Messages
- Transmitting Delay-Measure Requests
- Displaying Local MEPs
- Displaying Details for Local MEPs
- Displaying Local MIPs
- Displaying Remote MEPs
- Displaying Details for Remote MEPs
- Displaying the Link Trace Cache
- Displaying Fault Notification Settings
- Displaying Continuity Check Errors
- OAM Configuration
- UDLD Configuration
- LBD Configuration
- Smart Pair Configuration
- Multicast Filtering
- Overview
- Layer 2 IGMP (Snooping and Query for IPv4)
- Configuring IGMP Snooping and Query Parameters
- Specifying Static Interfaces for a Multicast Router
- Assigning Interfaces to Multicast Services
- Setting IGMP Snooping Status per Interface
- Filtering IGMP Packets on an Interface
- Displaying Multicast Groups Discovered by IGMP Snooping
- Displaying IGMP Snooping Statistics
- Filtering and Throttling IGMP Groups
- MLD Snooping (Snooping and Query for IPv6)
- Configuring MLD Snooping and Query Parameters
- Setting Immediate Leave Status for MLD Snooping per Interface
- Specifying Static Interfaces for an IPv6 Multicast Router
- Assigning Interfaces to IPv6 Multicast Services
- Filtering MLD Query Packets on an Interface
- Showing MLD Snooping Groups and Source List
- Displaying MLD Snooping Statistics
- Filtering and Throttling MLD Groups
- Multicast VLAN Registration for IPv4
- Multicast VLAN Registration for IPv6
- IP Tools
- IP Configuration
- General IP Routing
- Unicast Routing
- Overview
- Configuring the Routing Information Protocol
- Configuring General Protocol Settings
- Clearing Entries from the Routing Table
- Specifying Network Interfaces
- Specifying Passive Interfaces
- Specifying Static Neighbors
- Configuring Route Redistribution
- Specifying an Administrative Distance
- Configuring Network Interfaces for RIP
- Displaying RIP Interface Settings
- Displaying Peer Router Information
- Resetting RIP Statistics
- IP Services
- Appendices
Chapter 13
| Basic Administration Protocols
Ethernet Ring Protection Switching
– 485 –
◆ Holdoff Timer – The hold-off timer is used to filter out intermittent link faults.
Faults will only be reported to the ring protection mechanism if this timer
expires. (Range: 0-10000 milliseconds, in steps of 100 milliseconds)
In order to coordinate timing of protection switches at multiple layers, a hold-
off timer may be required. Its purpose is to allow, for example, a server layer
protection switch to have a chance to fix the problem before switching at a
client layer.
When a new defect or more severe defect occurs (new Signal Failure), this event
will not be reported immediately to the protection switching mechanism if the
provisioned hold-off timer value is non-zero. Instead, the hold-off timer will be
started. When the timer expires, whether a defect still exists or not, the timer
will be checked. If one does exist, that defect will be reported to the protection
switching mechanism. The reported defect need not be the same one that
started the timer.
◆ Guard Timer – The guard timer is used to prevent ring nodes from receiving
outdated R-APS messages. During the duration of the guard timer, all received
R-APS messages are ignored by the ring protection control process, giving time
for old messages still circulating on the ring to expire. (Range: 10-2000
milliseconds, in steps of 10 milliseconds)
The guard timer duration should be greater than the maximum expected
forwarding delay for an R-APS message to pass around the ring. A side-effect of
the guard timer is that during its duration, a node will be unaware of new or
existing ring requests transmitted from other nodes.
◆ WTB Timer – The Wait to Block (WTB) timer is used when clearing Forced
Switch (FS) and Manual Switch (MS) commands. As multiple FS commands are
allowed to co-exist in a ring, the WTB timer ensures that clearing of a single FS
command does not trigger re-blocking of the RPL. When clearing an MS
command, the WTB timer prevents the formation of a closed loop due to
possible a timing anomaly where the RPL owner node receives an outdated
remote MS request during the recovery process.
When recovering from an FS or MS command, the delay timer must be long
enough to receive any latent remote FS or MS commands. This delay timer
called the WTB timer is defined to be 5 seconds longer than the guard timer.
This is enough time to allow a reporting ring node to transmit two R-APS
messages and allow the ring to identify the latent condition.
This delay timer is activated on the RPL owner node. When the relevant delay
timer expires, the RPL owner node initiates the reversion process by
transmitting an R-APS (NR, RB) message. The delay timer, (i.e., WTR or WTB) is
deactivated when any higher priority request preempts this delay timer.
The delay timers (i.e. WTR and WTB) may be started and stopped by the system.
A request to start running the delay timer does not restart the delay timer. A
request to stop the delay timer stops the delay timer and resets its value. The
Clear command (Configure Operation page) can be used to stop the delay
timer.