Specifications

New and Enhanced Features in ExtremeWare 7.3
ExtremeWare 7.3.1b3 Release Notes 15
Stand-alone ELRP
Extreme Loop Recovery Protocol (ELRP) is used to detect network loops in an L2 network. A switch
running ELRP transmits multicast packets with a special MAC destination address out of some, or all,
of the ports belonging to a VLAN. All the other switches in the network treat this packet as a regular,
multicast packet and flood it to all the ports belonging to the VLAN. If the packets transmitted by a
switch are received back by that switch, this indicates a loop in the layer-2 network. Once a loop is
detected by ELRP, different recovery actions can be taken such as blocking certain ports to prevent
loops, or logging a message to the system log. The action taken is largely dependent on the protocol
using ELRP to detect loops in the network.
RADIUS Server Configuration Enhancements in ExtremeWare 7.3
ExtremeWare 7.3 has added enhancements for configuring the RADIUS server:
Configuring RADIUS Servers
In ExtremeWare 7.3, you can configure up to four RADIUS servers: two primary servers and two
secondary servers. P1 and P2 indicates the two primary server settings. S1 and S2 indicates the two
secondary server settings. The Default Authentication Primary and Secondary server setting for both
management and network access is P1 and S1.
Configuring RADIUS Authentication and Accounting Servers
If you set the RADIUS server for management or network access for the current session, the setting
takes precedence over the default setting. If you unconfigure the setting, the default authentication
setting takes effect again.
Use the
configure auth mgmt-access command to set up management access for the primary and
secondary RADIUS servers.
Use the
configure auth netlogin radius command to configure a set of primary or secondary
RADIUS servers for network access.
Showing the Current RADIUS Server Authentication Setting
Use the show auth command to show the authentication servers configured for mgmt-access/netlogin
type of sessions. If you use the
configure auth mgmt-access radius or the configure auth
netlogin radius
command, the show auth command will show the session setting for the
management or Network Login sessions. If both
configure auth mgmt-access radius and
configure auth netlogin radius commands are used, then the show auth command will display
the session setting for both the management and Network Login sessions, and omits the Default Auth
Setting.
The
show auth command will not show anything if you are not specifically setting up authentication
using the
configure auth command and:
RADIUS is disabled.
P1 and S1 are not configured. In other words, you have enabled RADIUS without configuring a
RADIUS server.
P2 and S2 are configured; P1 and S1 are unconfigured. Although the
show radius command still
shows P2 and S2, by default, these RADIUS settings are not set in the default authentication.