Design Reference
Table Of Contents
- Contents
- Chapter 1: Introduction
- Chapter 2: New in this release
- Chapter 3: Network design fundamentals
- Chapter 4: Hardware fundamentals and guidelines
- Chapter 5: Optical routing design
- Chapter 6: Platform redundancy
- Chapter 7: Link redundancy
- Chapter 8: Layer 2 loop prevention
- Chapter 9: Layer 2 switch clustering and SMLT
- Chapter 10: Layer 3 switch clustering and RSMLT
- Chapter 11: Layer 3 switch clustering and multicast SMLT
- Chapter 12: Spanning tree
- Chapter 13: Layer 3 network design
- Chapter 14: SPBM design guidelines
- Chapter 15: IP multicast network design
- Multicast and VRF-Lite
- Multicast and MultiLink Trunking considerations
- Multicast scalability design rules
- IP multicast address range restrictions
- Multicast MAC address mapping considerations
- Dynamic multicast configuration changes
- IGMPv3 backward compatibility
- IGMP Layer 2 Querier
- TTL in IP multicast packets
- Multicast MAC filtering
- Guidelines for multicast access policies
- Split-subnet and multicast
- Protocol Independent Multicast-Sparse Mode guidelines
- Protocol Independent Multicast-Source Specific Multicast guidelines
- Multicast for multimedia
- Chapter 16: System and network stability and security
- Chapter 17: QoS design guidelines
- Chapter 18: Layer 1, 2, and 3 design examples
- Glossary
• RSMLT and SMLT with virtual IST
Split MultiLink Trunking (SMLT) provides subsecond failover when a switch fails. Routed Split
MultiLink Trunking (RSMLT) permits rapid failover for core topologies by providing an active-
active router concept to core SMLT networks. Virtual Inter-Switch Trunk (vIST) improves on
this resiliency by using a virtualized IST channel through the SPBM Cloud.
For more information, see Layer 2 switch clustering and SMLT on page 50, Layer 3 switch
clustering and RSMLT on page 54, and Layer 3 switch clustering and multicast SMLT on
page 62.
See the following section for information about feature-related changes in VOSS 4.2.
Features for VSP Operating System Software (VOSS) 4.2
• Authentication and password enhancements
VOSS 4.2 supports authentication and password enhancements. After you enable enhanced
secure mode, the system can supports role-based access levels, stronger password
requirements, and stronger rules on password length, password complexity, password change
intervals, password reuse, and password maximum age use.
For more information, see
Control plane security on page 154.
For more information on system access security enhancements, see Administration for Avaya
Virtual Services Platform 4000 Series, NN46251-600.
• Enhanced secure mode
VOSS 4.2 adds support for the new boot config flags enhancedsecure-mode
command. If you enable enhanced secure mode, the system can provide role-based access
levels, strong password requirements, and strong rules on password length, password
complexity, password change intervals, password reuse, and password maximum age use.
For more information see:
- Data plane security on page 151.
- Control plane security on page 154.
For additional information see the sections “Standard MIBs”, “Software scaling capabilities”,
and Supported RFCs”in Administration for Avaya Virtual Services Platform 4000 Series,
NN46251-600
• load-encryption-module
VOSS 4.2 removes the load-encryption-module {3DES|AES|DES} command. The
command is no longer required to load the security encryption image.
• Secure Shell version 2 (SSHv2)
VOSS 4.2 updates Secure Shell implementation on the switch. The switch now supports only
Secure Shell version 2 (SSHv2).
SSHv2 also adds encryption support for MD5, SHA-1, and SHA-2.
For more information, see Control plane security on page 154.
For more information on SSHv2 conceptual information and configuration information, see
Administration for Avaya Virtual Services Platform 4000 Series, NN46251-600.
• Secure Copy (SCP)
New in this release
14 Network Design Reference for Avaya VSP 4000 Series June 2015
Comments on this document? infodev@avaya.com










