Web Management Guide-R02
Table Of Contents
- How to Use This Guide
- Contents
- Figures
- Tables
- Getting Started
- Web Configuration
- Using the Web Interface
- Basic Management Tasks
- Displaying System Information
- Displaying Hardware/Software Versions
- Configuring Support for Jumbo Frames
- Displaying Bridge Extension Capabilities
- Managing System Files
- Setting the System Clock
- Configuring the Console Port
- Configuring Telnet Settings
- Displaying CPU Utilization
- Configuring CPU Guard
- Displaying Memory Utilization
- Resetting the System
- Interface Configuration
- VLAN Configuration
- Address Table Settings
- Spanning Tree Algorithm
- Congestion Control
- Class of Service
- Quality of Service
- VoIP Traffic Configuration
- Security Measures
- AAA (Authentication, Authorization and Accounting)
- Configuring User Accounts
- Web Authentication
- Network Access (MAC Address Authentication)
- Configuring HTTPS
- Configuring the Secure Shell
- Access Control Lists
- Filtering IP Addresses for Management Access
- Configuring Port Security
- Configuring 802.1X Port Authentication
- DoS Protection
- DHCP Snooping
- DHCPv6 Snooping
- ND Snooping
- IPv4 Source Guard
- IPv6 Source Guard
- ARP Inspection
- Application Filter
- Basic Administration Protocols
- Configuring Event Logging
- Link Layer Discovery Protocol
- Simple Network Management Protocol
- Configuring Global Settings for SNMP
- Setting Community Access Strings
- Setting the Local Engine ID
- Specifying a Remote Engine ID
- Setting SNMPv3 Views
- Configuring SNMPv3 Groups
- Configuring Local SNMPv3 Users
- Configuring Remote SNMPv3 Users
- Specifying Trap Managers
- Creating SNMP Notification Logs
- Showing SNMP Statistics
- Remote Monitoring
- Setting a Time Range
- Ethernet Ring Protection Switching
- MLAG Configuration
- OAM Configuration
- LBD Configuration
- Multicast Filtering
- Overview
- Layer 2 IGMP (Snooping and Query for IPv4)
- Configuring IGMP Snooping and Query Parameters
- Specifying Static Interfaces for a Multicast Router
- Assigning Interfaces to Multicast Services
- Setting IGMP Snooping Status per Interface
- Filtering IGMP Packets on an Interface
- Displaying Multicast Groups Discovered by IGMP Snooping
- Displaying IGMP Snooping Statistics
- Filtering and Throttling IGMP Groups
- MLD Snooping (Snooping and Query for IPv6)
- Configuring MLD Snooping and Query Parameters
- Setting Immediate Leave Status for MLD Snooping per Interface
- Specifying Static Interfaces for an IPv6 Multicast Router
- Assigning Interfaces to IPv6 Multicast Services
- Filtering MLD Query Packets on an Interface
- Showing MLD Snooping Groups and Source List
- Displaying MLD Snooping Statistics
- Filtering and Throttling MLD Groups
- Multicast VLAN Registration for IPv4
- IP Tools
- IP Configuration
- General IP Routing
- IP Services
- Appendices
Chapter 13
| Basic Administration Protocols
Ethernet Ring Protection Switching
– 491 –
initiates reversion by blocking the traffic channel on the RPL,
transmitting an R-APS (NR, RB) message over both ring ports,
informing the ring that the RPL is blocked, and flushes its FDB.
c. The acceptance of the R-APS (NR, RB) message causes all ring
nodes to unblock any blocked non-RPL that does not have an
SF condition. If it is an R-APS (NR, RB) message without a DNF
indication, all Ethernet Ring Nodes flush their FDB. This action
unblocks the ring port which was blocked as a result of an
operator command.
■
Recovery with non-revertive mode is handled as follows:
a. The RPL Owner Node, upon reception of an R-APS (NR)
message and in the absence of any other higher priority
request does not perform any action.
b. Then, after the operator issues the Clear command (Configure
Operation page) at the RPL Owner Node, this ring node blocks
the ring port attached to the RPL, transmits an R-APS (NR, RB)
message over both ring ports, informing the ring that the RPL is
blocked, and flushes its FDB.
c. The acceptance of the R-APS (NR, RB) message triggers all ring
nodes to unblock any blocked non-RPL which does not have an
SF condition. If it is an R-APS (NR, RB) message without a DNF
indication, all ring nodes flush their FDB. This action unblocks
the ring port which was blocked as result of an operator
command.
◆ R-APS with VC – Configures an R-APS virtual channel to connect two
interconnection points on a sub-ring, allowing ERPS protocol traffic to be
tunneled across an arbitrary Ethernet network. (Default: Enabled)
■
A sub-ring may be attached to a primary ring with or without a virtual
channel. A virtual channel is used to connect two interconnection points
on the sub-ring, tunneling R-APS control messages across an arbitrary
Ethernet network topology. If a virtual channel is not used to cross the
intermediate Ethernet network, data in the traffic channel will still flow
across the network, but the all R-APS messages will be terminated at the
interconnection points.
■
Sub-ring with R-APS Virtual Channel – When using a virtual channel to
tunnel R-APS messages between interconnection points on a sub-ring, the
R-APS virtual channel may or may not follow the same path as the traffic
channel over the network. R-APS messages that are forwarded over the
sub-ring’s virtual channel are broadcast or multicast over the
interconnected network. For this reason the broadcast/multicast domain of
the virtual channel should be limited to the necessary links and nodes. For
example, the virtual channel could span only the interconnecting rings or
sub-rings that are necessary for forwarding R-APS messages of this sub-
ring. Care must also be taken to ensure that the local RAPS messages of the