Admin Guide
Table Of Contents
- Contents
- Chapter 1: Introduction
- Chapter 2: New in this document
- Chapter 3: Basic administration
- Chapter 4: System startup fundamentals
- Chapter 5: Boot parameter configuration using ACLI
- Chapter 6: Run-time process management using ACLI
- Chapter 7: Chassis operations
- Chassis operations fundamentals
- Chassis operations configuration using ACLI
- Enabling jumbo frames
- Configuring port lock
- Configuring SONMP
- Viewing the topology message status
- Associating a port to a VRF instance
- Configuring an IP address for the management port
- Configuring Ethernet ports with Autonegotiation
- Enabling channelization
- Configuring serial management port dropping
- Controlling slot power
- Enabling or disabling the USB port
- Chassis operations configuration using EDM
- Editing system information
- Editing chassis information
- Configuring system flags
- Configuring channelization
- Configuring basic port parameters
- Viewing the boot configuration
- Configuring boot flags
- Enabling Jumbo frames
- Configuring the date and time
- Associating a port to a VRF instance
- Configuring CP Limit
- Configuring an IP address for the management port
- Editing the management port parameters
- Configuring the management port IPv6 interface parameters
- Configuring management port IPv6 addresses
- Auto reactivating the port of the SLPP shutdown
- Editing serial port parameters
- Enabling port lock
- Locking a port
- Viewing power information
- Viewing power status on VSP 8400
- Viewing fan information
- Viewing topology status information
- Viewing the topology message status
- Configuring a forced message control pattern
- Chapter 8: Hardware status using EDM
- Chapter 9: Domain Name Service
- Chapter 10: Licensing
- Chapter 11: Network Time Protocol
- Chapter 12: Secure Shell
- Secure Shell fundamentals
- Secure Shell configuration using ACLI
- Downloading the software
- Enabling the SSHv2 server
- Changing the SSH server authentication mode
- Setting SSH configuration parameters
- Verifying and displaying SSH configuration information
- Connecting to a remote host using the SSH client
- Generating user key files
- Managing an SSL certificate
- Disabling SFTP without disabling SSH
- Enabling SSH rekey
- Configuring SSH rekey data-limit
- Configuring SSH rekey time-interval
- Displaying SSH rekey information
- Downgrading or upgrading from releases that support different key sizes
- Secure Shell configuration using Enterprise Device Manager
- Chapter 13: System access
- System access fundamentals
- System access configuration using ACLI
- Enabling ACLI access levels
- Changing passwords
- Configuring an access policy
- Specifying a name for an access policy
- Allowing a network access to the switch
- Configuring access policies by MAC address
- System access security enhancements
- Displaying the boot config flags status
- Enabling enhanced secure mode
- Creating accounts for different access levels
- Deleting accounts in enhanced secure mode
- Configuring a password for a specific user
- Returning the system to the factory defaults
- Configuring the password complexity rule
- Configuring the password length rule
- Configuring the change interval rule
- Configuring the reuse rule
- Configuring the maximum number of sessions
- Configuring the maximum age rule
- Configuring the pre- and post-notification rule
- System access configuration using EDM
- Chapter 14: ACLI show command reference
- Access, logon names, and passwords
- Basic switch configuration
- Current switch configuration
- CLI settings
- Ftp-access sessions
- Hardware information
- NTP server statistics
- Power summary
- Power information for power supplies
- System information
- System status (detailed)
- Telnet-access sessions
- Users logged on
- Port egress COS queue statistics
- CPU queue statistics
- Chapter 15: Port numbering and MAC address assignment reference
- Chapter 16: Supported standards, RFCs, and MIBs
- Glossary
NonVolatile Random
Access Memory
(NVRAM)
Random Access Memory that retains its contents after electrical power
turns off.
out of band (OOB) Network dedicated for management access to chassis.
Packet Capture Tool
(PCAP)
A data packet capture tool that captures ingress and egress (on Ethernet
modules only) packets on selected ports. You can analyze captured
packets for troubleshooting purposes.
port A physical interface that transmits and receives data.
Protocol Data Units
(PDUs)
A unit of data that is specified in a protocol of a specific layer and that
consists of protocol-control information of the specific layer and possibly
user data of that layer.
Protocol
Independent
Multicast, Sparse
Mode (PIM-SM)
PIM-SM is a multicast routing protocol for IP networks. PIM-SM provides
multicast routing for multicast groups that can span wide-area and inter-
domain networks, where receivers are not densely populated. PIM-SM
sends multicast traffic only to those routers that belong to a specific
multicast group and that choose to receive the traffic. PIM-SM adds a
Rendezvous Point router to avoid multicast-data flooding. Use PIM-SM
when receivers for multicast data are sparsely distributed throughout the
network.
quality of service
(QoS)
QoS features reserve resources in a congested network, allowing you to
configure a higher priority for certain devices. For example, you can
configure a higher priority for IP deskphones, which need a fixed bit rate
and split the remaining bandwidth between data connections if calls in the
network are more important than the file transfers.
Read Write All (RWA)
An access class that lets users access all menu items and editable fields.
remote login (rlogin) An application that provides a terminal interface between hosts (usually
UNIX) that use the TCP/IP network protocol. Unlike Telnet, rlogin assumes
the remote host is, or behaves like, a UNIX host.
remote monitoring
(RMON)
A remote monitoring standard for Simple Network Management Protocol
(SNMP)-based management information bases (MIB). The Internetwork
Engineering Task Force (IETF) proposed the RMON standard to provide
guidelines for remote monitoring of individual LAN segments.
Routing Information
Protocol (RIP)
A distance vector protocol in the IP suite, used by IP network-layer protocol,
that enables routers in the same AS to exchange routing information by
means of periodic updates. You often use RIP as a very simple interior
gateway protocol (IGP) within small networks.
Secure Copy (SCP)
Secure Copy securely transfers files between the switch and a remote
station.
Glossary
January 2017 Administering Avaya VSP 7200 Series and 8000 Series 250
Comments on this document? infodev@avaya.com










